Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v6 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] dump: Include missing "cpu.h" header for tswap32/tswap64() declarations
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 00/11] SVM: vNMI (with my fixes)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 18/32] x86/fred: add a debug fault entry stub for FRED
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- Re: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH 30/32] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 31/32] x86/fred: allow dynamic stack frame size
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 26/32] x86/fred: no ESPFIX needed when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 28/32] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 27/32] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 32/32] x86/fred: disable FRED by default in its early stage
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 29/32] x86/ia32: do not modify the DPL bits for a null selector
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 24/32] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 25/32] x86/fred: disallow the swapgs instruction when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 13/32] x86/fred: header file for event types
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 15/32] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 17/32] x86/fred: add a page fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 18/32] x86/fred: add a debug fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 08/32] x86/objtool: teach objtool about ERETU and ERETS
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 04/32] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 16/32] x86/fred: reserve space for the FRED stack frame
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 05/32] x86/traps: add exc_raise_irq() for VMX IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 07/32] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 19/32] x86/fred: add a NMI entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 12/32] x86/cpu: add MSR numbers for FRED configuration
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 11/32] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 09/32] x86/cpu: add X86_CR4_FRED macro
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 20/32] x86/fred: add a machine check entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 10/32] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 06/32] x86/cpufeature: add the cpu feature bit for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 03/32] x86/traps: add install_system_interrupt_handler()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 02/32] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 01/32] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 00/32] x86: enable FRED for x86-64
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: Coverity: handle_vmclear(): Error handling issues
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/4] arm: pmu: Print counter values as hexadecimals
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/4] arm: pmu: Add support for PMUv3p5
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/4] arm: pmu: Prepare for testing 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/4] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- RE: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH] KVM: selftests: Zero out valid_bank_mask for "all" case in Hyper-V IPI test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/13] riscv: fix jal offsets in patched alternatives
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v1 13/16] vfio/ccw: allocate/populate the guest idal
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: Coverity: handle_vmclear(): Error handling issues
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V6 0/7] fixes for virtual address update
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v1 16/16] vfio/ccw: remove old IDA format restrictions
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 15/16] vfio/ccw: don't group contiguous pages on 2K IDAWs
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 11/16] vfio/ccw: discard second fmt-1 IDAW
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 13/16] vfio/ccw: allocate/populate the guest idal
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 12/16] vfio/ccw: calculate number of IDAWs regardless of format
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 11/16] vfio/ccw: discard second fmt-1 IDAW
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH V6 0/7] fixes for virtual address update
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: RFC: few questions about hypercall patching in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 08/16] vfio/ccw: pass page count to page_array struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Install sanitised kernel headers before compilation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 0/2] target/i386/kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION d650871875b2ccc670f1044be7f3cc90f276745d
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/1] QEMU: Dirty quota-based throttling of vcpus
- From: Hyman Huang <huangy81@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v10 052/108] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH] KVM: selftests: Install sanitised kernel headers before compilation
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [RFC 00/12] Add vfio_device cdev for iommufd support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 12/12] vfio: Compile group optionally
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 08/12] vfio: Add infrastructure for bind_iommufd and attach
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 09/12] vfio: Make vfio_device_open() exclusive between group path and device cdev path
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 07/12] vfio: Block device access via device fd until device is opened
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 10/12] vfio: Add cdev for vfio_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 06/12] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 04/12] kvm/vfio: Rename kvm_vfio_group to prepare for accepting vfio device fd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 02/12] vfio: Refine vfio file kAPIs
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 01/12] vfio: Allocate per device file structure
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 00/12] Add vfio_device cdev for iommufd support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH V6 3/7] vfio/type1: track locked_vm per dma
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH V6 6/7] vfio/type1: revert "implement notify callback"
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 7/7] vfio: revert "iommu driver notify callback"
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 4/7] vfio/type1: restore locked_vm
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 5/7] vfio/type1: revert "block on invalid vaddr"
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost_net: revert upend_idx only on retriable error
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v4] vhost_vdpa: fix the crash in unmap a large memory
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- 答复: Found a memory leak in kvm module
- From: 柳菁峰 <liujingfeng@xxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH linux-next] KVM: x86/xen: Remove unneeded semicolon
- From: <zhang.songyi@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] QEMU: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- [RFC PATCH v1 2/2] vsock_test: mutual hungup reproducer
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v1 1/2] virtio/vsock: send credit update depending on SO_RCVLOWAT
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] target/riscv/cpu: Restrict some sysemu-specific fields from CPUArchState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 9/9] target/xtensa/cpu: Include missing "memory.h" header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 8/9] target/sparc/sysemu: Remove pointless CONFIG_USER_ONLY guard
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 7/9] target/riscv/cpu: Restrict some sysemu-specific fields from CPUArchState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 5/9] target/ppc/kvm: Remove unused "sysbus.h" header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 6/9] target/riscv/cpu: Move Floating-Point fields closer
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 4/9] target/ppc/internal: Restrict MMU declarations to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 3/9] target/loongarch/cpu: Restrict "memory.h" header to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 2/9] target/loongarch/cpu: Remove unused "sysbus.h" header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 1/9] target/alpha: Remove obsolete STATUS document
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 0/9] target/misc: Header cleanups around "cpu.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] exec: Rename NEED_CPU_H -> CONFIG_TARGET
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH 2/2] sysemu/kvm: Reduce target-specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [Bug 216812] kvm-unit-test xapic failed on linux 6.1 release kernel
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 2/2] KVM: MMU: Make the definition of 'INVALID_GPA' common
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/2] sysemu/kvm: Reduce target-specific declarations
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH 1/2] sysemu/kvm: Remove CONFIG_USER_ONLY guard
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] exec: Rename NEED_CPU_H -> CONFIG_TARGET
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 2/2] sysemu/kvm: Reduce target-specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/2] sysemu/kvm: Remove CONFIG_USER_ONLY guard
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 0/2] sysemu/kvm: Header cleanups around "cpu.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 4/5] target/cpu: Restrict cpu_get_phys_page_debug() handlers to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 5/5] target/cpu: Restrict do_transaction_failed() handlers to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 0/5] target/cpu: System/User cleanups around hwaddr/vaddr
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 1/5] dump: Include missing "cpu.h" header for tswap32/tswap64() declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 3/5] gdbstub: Use vaddr type for generic insert/remove_breakpoint() API
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 2/5] cputlb: Restrict SavedIOTLB to system emulation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 09/16] vfio/ccw: populate page_array struct inline
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH-for-8.0 0/4] ppc: Clean up few headers to make them target agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 08/16] vfio/ccw: pass page count to page_array struct
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V6 7/7] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 6/7] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 5/7] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 3/7] vfio/type1: track locked_vm per dma
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 4/7] vfio/type1: restore locked_vm
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 0/7] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] kvm: kvm_main: Remove unnecessary (void*) conversions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH-for-8.0 0/4] ppc: Clean up few headers to make them target agnostic
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: MMU: Make the definition of 'INVALID_GPA' common
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH-for-8.0 3/4] hw/ppc/spapr: Reduce "vof.h" inclusion
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH-for-8.0 2/4] hw/ppc/vof: Do not include the full "cpu.h"
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH-for-8.0 1/4] target/ppc/kvm: Add missing "cpu.h" and "exec/hwaddr.h"
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- [Bug 216812] kvm-unit-test xapic failed on linux 6.1 release kernel
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION ca39c4daa6f7f770b1329ffb46f1e4a6bcc3f291
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V5 4/7] vfio/type1: restore locked_vm
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V5 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Minor security issue on website
- From: davtur19 <davtur19@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v1 10/10] gdbstub: retire exec/gdbstub.h
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- [PATCH v4 0/2] KVM: MMU: Use 'INVALID_GPA' and 'INVALID_GFN' properly
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v4 2/2] KVM: MMU: Make the definition of 'INVALID_GPA' common
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v9 12/12] vdpa: always start CVQ in SVQ mode if possible
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [Bug 216812] New: kvm-unit-test xapic failed on linux 6.1 release kernel
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [linux-next:master] BUILD REGRESSION 459c73db4069c27c1d4a0e20d055b837396364b8
- From: Vincent Mailhol <vincent.mailhol@xxxxxxxxx>
- Re: [PATCH v10 106/108] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 077/108] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the tip tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 052/108] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v2 vfio 0/7] pds vfio driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH V5 3/7] vfio/type1: count reserved pages
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH V5 7/7] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 5/7] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 6/7] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 4/7] vfio/type1: restore locked_vm
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 3/7] vfio/type1: count reserved pages
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 0/7] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.2-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH V4 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v10 024/108] KVM: TDX: allocate/free TDX vcpu structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.2-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] VFIO updates for v6.2-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 06/16] vfio/ccw: simplify CCW chain fetch routines
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v1 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v1 04/16] vfio/ccw: move where IDA flag is set in ORB
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 03/16] vfio/ccw: allow non-zero storage keys
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [GIT PULL] VFIO updates for v6.2-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 05/11] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [GIT PULL v2] First batch of KVM changes for Linux 6.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 011/108] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [GIT PULL v2] First batch of KVM changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Found a memory leak in kvm module
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Use kvm_read_guest_virt() instead of open-coding it badly
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix a typo in the vcpu_msrs_set assert
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/11] RISC-V: KVM: Implement trap & emulate for hpmcounters
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 10/11] RISC-V: KVM: Implement perf support without sampling
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 00/11] KVM perf support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 05/11] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 08/11] RISC-V: KVM: Disable all hpmcounter access for VS/VU mode
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 06/11] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 11/11] RISC-V: KVM: Implement firmware events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 01/11] RISC-V: Define helper functions expose hpm counter width and count
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 07/11] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 02/11] RISC-V: KVM: Define a probe function for SBI extension data structures
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 03/11] RISC-V: KVM: Return correct code for hsm stop function
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 04/11] RISC-V: KVM: Modify SBI extension handler to return SBI error code
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: Broken link on Virtio page
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 459c73db4069c27c1d4a0e20d055b837396364b8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] Fix "Instructions Retired" from incorrectly counting
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v9 11/12] vdpa: add shadow_data to vhost_vdpa
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 12/12] vdpa: always start CVQ in SVQ mode if possible
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 10/12] vdpa: store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 09/12] vdpa: add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 08/12] vdpa: allocate SVQ array unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 07/12] vdpa: move SVQ vring features check to net/
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 06/12] vdpa: request iova_range only once
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 04/12] vhost: move iova_tree set to vhost_svq_start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 05/12] vdpa: add vhost_vdpa_net_valid_svq_features
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 03/12] vhost: allocate SVQ device file descriptors at device start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 01/12] vdpa: use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 02/12] vhost: set SVQ device call handler at SVQ start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 00/12] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] s390/vfio_ap: increase max wait time for reset verification
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 2/7] s390/vfio_ap: check TAPQ response code when waiting for queue reset
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v3] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: RFC: few questions about hypercall patching in KVM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net-next v7] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 1/7] s390/vfio-ap: verify reset complete in separate function
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- RE: [PATCH iommufd v2 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [RFC PATCH v2 vfio 0/7] pds vfio driver
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- RE: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- RE: [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [RFC PATCH 2/9] KVM: x86: Add a kvm-only leaf for RRSBA_CTRL
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [PATCH RFC v7 21/64] x86/fault: fix handle_split_page_fault() to work with memfd backed pages
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: RFC: few questions about hypercall patching in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: "Jayaramappa, Srilakshmi" <sjayaram@xxxxxxxxxx>
- Re: [PATCH v12 04/17] riscv: Add vector feature to compile
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v2 vfio 7/7] vfio/pds: Add Kconfig and documentation
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 5/7] vfio/pds: Add support for dirty page tracking
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 6/7] vfio/pds: Add support for firmware recovery
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 4/7] vfio: Commonize combine_ranges for use in other VFIO drivers
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 3/7] vfio/pds: Add VFIO live migration support
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 2/7] vfio/pds: Add support to register as PDS client
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 1/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 0/7] pds vfio driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 3/9] KVM: x86: Add a kvm-only leaf for BHI_CTRL
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- [PATCH V4 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] KVM: x86: Add a kvm-only leaf for RRSBA_CTRL
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- [PATCH V4 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: "Jayaramappa, Srilakshmi" <sjayaram@xxxxxxxxxx>
- [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- RE: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 08/64] KVM: Move kvm_for_each_memslot_in_hva_range() to be used in SVM
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 64/64] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 63/64] x86/sev: Document KVM_SEV_SNP_{G,S}ET_CERTS
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 61/64] KVM: SVM: Make VMSAVE target area memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 05/64] KVM: x86: Add 'update_mem_attr' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 60/64] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 59/64] ccp: Add support to decrypt the page
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V3 2/5] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH RFC v7 58/64] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 57/64] KVM: SEV: Handle restricted memory invalidations for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 55/64] KVM: SVM: Add SNP-specific handling for memory attribute updates
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 56/64] KVM: x86/mmu: Generate KVM_EXIT_MEMORY_FAULT for implicit conversions for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 54/64] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 50/64] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 51/64] KVM: SVM: Add support to handle the RMP nested page fault
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 53/64] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 48/64] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 47/64] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 46/64] KVM: SVM: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 49/64] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 45/64] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 44/64] KVM: SVM: Remove the long-lived GHCB host map
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 43/64] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 42/64] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 41/64] KVM: X86: Keep the NPT and RMP page level in sync
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 38/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 34/64] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 36/64] KVM: SVM: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 35/64] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 31/64] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 33/64] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 30/64] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 32/64] crypto: ccp: Provide APIs to query extended attestation report
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 28/64] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 23/64] x86/fault: Add support to dump RMP entry on fault
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 27/64] crypto: ccp: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 24/64] crypto:ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 26/64] crypto:ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 22/64] x86/fault: Return pfn from dump_pagetable() for SEV-specific fault handling.
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 20/64] x86/fault: Add support to handle the RMP fault for user address
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 21/64] x86/fault: fix handle_split_page_fault() to work with memfd backed pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 19/64] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 18/64] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 17/64] x86/mm/pat: Introduce set_memory_p
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 16/64] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 15/64] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 14/64] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 13/64] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 12/64] KVM: SEV: Implement .fault_is_private callback
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 10/64] KVM: SEV: Populate private memory fd during LAUNCH_UPDATE_DATA
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 09/64] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH V3 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in kvm_set_pte_rmapp()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/7] improve AP queue reset processing
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [GIT PULL] Please pull IOMMUFD subsystem changes
- From: pr-tracker-bot@xxxxxxxxxx
- RFC: few questions about hypercall patching in KVM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- RE: [PATCH 0/7] KVM: VMX: Handle NMI VM-Exits in noinstr section
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [RFC PATCH 5/6] vdpa_sim: use kthread worker
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 0/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 4/6] vdpa_sim: make devices agnostic for work management
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 3/6] vringh: support VA with iotlb
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 2/6] vhost-vdpa: use bind_mm device callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 663397d1b469ff57f216d499b74a0b0183a508b8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] improve AP queue reset processing
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in kvm_set_pte_rmapp()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH] KVM: x86/xen: Use kvm_read_guest_virt() instead of open-coding it badly
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/mmu: Don't attempt to map leaf if target TDP MMU SPTE is frozen
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH net-next v7] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 4/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH net-next v7] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 5/7] x86/entry: KVM: Use dedicated VMX NMI entry for 32-bit kernels too
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- RE: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86/MMU: Move pte_list operations to rmap.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86/MMU: Move pte_list operations to rmap.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V2 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH net-next v7] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [linux-stable-rc:linux-5.15.y 2855/9999] arch/x86/kvm/hyperv.c:2185:5: warning: stack frame size (1036) exceeds limit (1024) in 'kvm_hv_hypercall'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH v4 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 7/9] KVM: s390: selftest: memop: Add bad address test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 6/9] KVM: s390: selftest: memop: Add cmpxchg tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 4/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 3/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 8/9] KVM: s390: selftest: memop: Fix typo
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V1 0/2] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 6/7] s390/vfio_ap: increase max wait time for reset verification
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 2/7] s390/vfio_ap: check TAPQ response code when waiting for queue reset
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 1/7] s390/vfio-ap: verify reset complete in separate function
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 0/7] improve AP queue reset processing
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH iommufd v2 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [PATCH] kvm: x86/mmu: Remove FNAME(is_self_change_mapping)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 3/4] hw/ppc/spapr: Reduce "vof.h" inclusion
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 2/4] hw/ppc/vof: Do not include the full "cpu.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 1/4] target/ppc/kvm: Add missing "cpu.h" and "exec/hwaddr.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 0/4] ppc: Clean up few headers to make them target agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/14] KVM: selftests: Define literal to asm constraint in aarch64 as unsigned long
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]