Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v14 06/11] s390x/cpu topology: interception of PTF instruction
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/7] x86/cpu, kvm: Move the LFENCE_RDTSC / LFENCE always serializing feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [kvm-unit-tests PATCH 9/9] lib/linux/const.h: test for `__ASSEMBLER__` as well
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 8/9] s390x: use STACK_FRAME_SIZE macro in linker scripts
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 7/9] s390x: use C pre-processor for linker script generation
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 6/9] s390x: define a macro for the stack frame size
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 5/9] s390x/Makefile: remove unused include path
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 4/9] s390x/Makefile: refactor CPPFLAGS
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/9] s390x/Makefile: fix `*.gbin` target dependencies
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 2/9] s390x/Makefile: simplify `%.hdr` target rules
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/9] Some cleanup patches
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/9] .gitignore: ignore `s390x/comm.key` file
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] rcu: Equip sleepable RCU with lockdep dependency graph checks
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/3] rcu: Equip sleepable RCU with lockdep dependency graph checks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v14 01/11] s390x/cpu topology: adding s390 specificities to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v14 01/11] s390x/cpu topology: adding s390 specificities to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v11 024/113] KVM: TDX: Do TDX specific vcpu initialization
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v4] vfio: fix potential deadlock on vfio group lock
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] x86/hotplug: Do not put offline vCPUs in mwait idle state
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 11/16] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 13/17] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 18/24] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 40/53] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH net-next v10] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v11 035/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] accel/kvm: Specify default IPA size for arm64
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v11 033/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH net-next v10] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v11 032/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 031/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 023/113] KVM: TDX: allocate/free TDX vcpu structure
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v11 025/113] KVM: TDX: Use private memory for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 021/113] KVM: TDX: Refuse to unplug the last cpu on the package
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 019/113] KVM: TDX: initialize VM with TDX specific parameters
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v6] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- RE: [PATCH] vhost: remove unused paramete
- From: Liming Wu <liming.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/hotplug: Do not put offline vCPUs in mwait idle state
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH v2] x86/hotplug: Do not put offline vCPUs in mwait idle state
- From: "Srivatsa S. Bhat" <srivatsa@xxxxxxxxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v10 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v10 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v11 017/113] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 014/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH 4/4] KVM: Improve warning report in mark_page_dirty_in_slot()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH 3/4] KVM: Refactor mark_page_dirty_in_slot()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH 2/4] KVM: arm64: Allow saving vgic3 pending tables in no running vcpu context
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH 1/4] KVM: arm64: Allow saving vgic3 LPI pending status in no running vcpu context
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH 0/4] Improve dirty ring warning report
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 06/13] riscv: introduce riscv_has_extension_[un]likely()
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH v4 13/13] riscv: remove riscv_isa_ext_keys[] array and related usage
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 12/13] riscv: KVM: Switch has_svinval() to riscv_has_extension_unlikely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 11/13] riscv: cpu_relax: switch to riscv_has_extension_likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 06/13] riscv: introduce riscv_has_extension_[un]likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 08/13] riscv: module: move find_section to module.h
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 09/13] riscv: switch to relative alternative entries
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 07/13] riscv: fpu: switch has_fpu() to riscv_has_extension_likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 04/13] riscv: hwcap: make ISA extension ids can be used in asm
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 03/13] riscv: cpufeature: detect RISCV_ALTERNATIVES_EARLY_BOOT earlier
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 02/13] riscv: move riscv_noncoherent_supported() out of ZICBOM probe
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 01/13] riscv: fix jal offsets in patched alternatives
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v4 00/13] riscv: improve boot time isa extensions handling
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [RFC PATCH 8/9] x86/kvm/vmx: Initialize SPEC_CTRL MASK for RRSBA
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH v3 04/13] riscv: hwcap: make ISA extension ids can be used in asm
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH v10 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v10 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 00/11] SVM: vNMI (with my fixes)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH 0/2] Fix kvm_setup_gdt and reuse in vcpu_init_descriptor_tables
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Reuse kvm_setup_gdt in vcpu_init_descriptor_tables
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [PATCH 1/2] KVM: selftests: Fix initialization of GDT limit
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: 5.15.y backport request to fix compilation error in selftests/kvm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] KVM: x86/mmu: Use kstrtobool() instead of strtobool()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v11 018/113] KVM: TDX: create/destroy VM structure
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH] accel/kvm: Specify default IPA size for arm64
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH] accel/kvm: Specify default IPA size for arm64
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4] vfio: fix potential deadlock on vfio group lock
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/3] locking/lockdep: Improve the deadlock scenario print for sync and read lock
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH RFC v7 23/64] x86/fault: Add support to dump RMP entry on fault
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 4/9] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 23/64] x86/fault: Add support to dump RMP entry on fault
- From: Alper Gun <alpergun@xxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Alper Gun <alpergun@xxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH net-next v10] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH] KVM: SVM: Account scratch allocations used to decrypt SEV guest memory
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- Re: [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [RFC PATCH v5 6/6] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v5 4/6] KVM: x86: Let userspace re-enable previously disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v5 5/6] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v5 3/6] KVM: x86: Reject disabling of MWAIT interception when not allowed
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v5 2/6] KVM: x86: Move *_in_guest power management flags to vCPU scope
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v5 1/6] KVM: x86: only allow exits disable before vCPUs created
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v5 0/6] KVM: x86: add per-vCPU exits disable capability
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.2-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3] vfio: fix potential deadlock on vfio group lock
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3] vfio: fix potential deadlock on vfio group lock
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] rcu: Equip sleepable RCU with lockdep dependency graph checks
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH RFC v7 10/64] KVM: SEV: Populate private memory fd during LAUNCH_UPDATE_DATA
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] vfio: fix potential deadlock on vfio group lock
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC v7 08/64] KVM: Move kvm_for_each_memslot_in_hva_range() to be used in SVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/6] KVM: x86: x2APIC reserved bits/regs fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] KVM: x86: x2APIC reserved bits/regs fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC 03/14] KVM: x86/MMU: Move the Shadow MMU implementation to shadow_mmu.c
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 2/3] rcu: Equip sleepable RCU with lockdep dependency graph checks
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [RFC 07/14] KVM: x86/MMU: Cleanup shrinker interface with Shadow MMU
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [RFC 07/14] KVM: x86/MMU: Cleanup shrinker interface with Shadow MMU
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.2-rc4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Liam Howlett <liam.howlett@xxxxxxxxxx>
- [PATCH 2/2] KVM: arm64: Remove VPIPT I-cache handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/2] KVM: arm64: Drop support for VPIPT i-cache policy
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/2] KVM: arm64: Disable KVM on systems with a VPIPT i-cache
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Liam Howlett <liam.howlett@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Use enum for test numbers in xen_shinfo_test
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3] vfio: fix potential deadlock on vfio group lock
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v14 01/11] s390x/cpu topology: adding s390 specificities to CPU topology
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 7/7] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm:queue 121/153] arch/arm64/kvm/arm.c:2211: warning: expecting prototype for Initialize Hyp(). Prototype was for kvm_arm_init() instead
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/4] arm: pmu: Prepare for testing 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH v11 018/113] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 019/113] KVM: TDX: initialize VM with TDX specific parameters
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Thoughts on (not) expanding the KVM IRQ routing table
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] KVM: arm64: Drop Columbia-hosted mailing list
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v11 018/113] KVM: TDX: create/destroy VM structure
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v11 017/113] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- [PATCH 1/3] KVM: Show lockdep the kvm->mutex vs. kvm->srcu ordering rule
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 0/3] KVM: Make use of SRCU deadlock detection support
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: Use enum for test numbers in xen_shinfo_test
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Add EVTCHNOP_send slow path test to xen_shinfo_test
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- [PATCH] kvm: x86/mmu: Simplify pte_list_{add|remove}
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v2 11/11] RISC-V: KVM: Implement firmware events
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v2 09/11] RISC-V: KVM: Implement trap & emulate for hpmcounters
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/11] RISC-V: KVM: Implement perf support without sampling
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] rcu: Equip sleepable RCU with lockdep dependency graph checks
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: checkpoint/restore: Adding more "Getters" to the KVM API
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- 5.15.y backport request to fix compilation error in selftests/kvm
- From: Harshit Mogalapalli <harshit.m.mogalapalli@xxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Bug 216923] New: kvm-unit-test pmu_pebs is skipped on SPR
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 04/11] RISC-V: KVM: Modify SBI extension handler to return SBI error code
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/11] RISC-V: KVM: Return correct code for hsm stop function
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] RISC-V: Define helper functions expose hpm counter width and count
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH 1/3] locking/lockdep: Introduce lock_sync()
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH 3/3] WIP: locking/lockdep: selftests: Add selftests for SRCU
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH 2/3] rcu: Equip sleepable RCU with lockdep dependency graph checks
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH 0/3] Detect SRCU related deadlocks
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH 9/9] KVM: arm64: Use local TLBI on permission relaxation
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 8/9] KVM: arm64: Split huge pages during KVM_CLEAR_DIRTY_LOG
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 7/9] KVM: arm64: Open-code kvm_mmu_write_protect_pt_masked()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 6/9] KVM: arm64: Split huge pages when dirty logging is enabled
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 5/9] KVM: arm64: Add kvm_uninit_stage2_mmu()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 4/9] KVM: arm64: Refactor kvm_arch_commit_memory_region()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 3/9] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 2/9] KVM: arm64: Add helper for creating removed stage2 subtrees
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 1/9] KVM: arm64: Add KVM_PGTABLE_WALK_REMOVED into ctx->flags
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 0/9] KVM: arm64: Eager Huge-page splitting for dirty-logging
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 02/12] KVM: arm64: Allow visiting block PTEs in post-order
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 00/12] KVM: arm64: Eager huge-page splitting for dirty-logging
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH rcu v2 17/20] kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Alper Gun <alpergun@xxxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Replace 0-length arrays with flexible arrays
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Replace 0-length arrays with flexible arrays
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 11/13] riscv: cpu_relax: switch to riscv_has_extension_likely()
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v3 07/13] riscv: fpu: switch has_fpu() to riscv_has_extension_likely()
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v3 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/13] riscv: switch to relative alternative entries
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v3 04/13] riscv: hwcap: make ISA extension ids can be used in asm
- From: Conor Dooley <conor@xxxxxxxxxx>
- linux-next: Fixes tag needs some work in the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v3 03/13] riscv: cpufeature: detect RISCV_ALTERNATIVES_EARLY_BOOT earlier
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Alper Gun <alpergun@xxxxxxxxxx>
- [PATCH v2] vfio: fix potential deadlock on vfio group lock
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v3 01/13] riscv: fix jal offsets in patched alternatives
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH v7 36/68] KVM: arm64: nv: Handle shadow stage 2 page faults
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 53/68] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 33/68] KVM: arm64: nv: Hide RAS from nested guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 21/68] KVM: arm64: nv: Handle PSCI call via smc from the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 65/68] KVM: arm64: nv: Fast-track 'InHost' exception returns
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 40/68] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 13/68] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 31/68] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 55/68] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 68/68] KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV is on
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 30/68] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 24/68] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 41/68] KVM: arm64: nv: Trap and emulate TLBI instructions from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 48/68] KVM: arm64: nv: vgic: Emulate the HW bit in software
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 38/68] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 63/68] KVM: arm64: nv: Allocate VNCR page when required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 17/68] KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 15/68] KVM: arm64: nv: Handle HCR_EL2.E2H specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 47/68] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 49/68] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 44/68] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 26/68] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 37/68] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 58/68] KVM: arm64: nv: Map VNCR-capable registers to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 18/68] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 22/68] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 57/68] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 45/68] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 59/68] KVM: arm64: nv: Move nested vgic state into the sysreg file
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 51/68] KVM: arm64: nv: Deal with broken VGIC on maintenance interrupt delivery
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 50/68] KVM: arm64: nv: Implement maintenance interrupt forwarding
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 34/68] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 28/68] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 56/68] KVM: arm64: nv: Tag shadow S2 entries with nested level
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 27/68] KVM: arm64: nv: Allow a sysreg to be hidden from userspace only
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 32/68] KVM: arm64: nv: Filter out unsupported features from ID regs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 46/68] KVM: arm64: nv: Nested GICv3 Support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 64/68] KVM: arm64: nv: Enable ARMv8.4-NV support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 20/68] KVM: arm64: nv: Trap CPACR_EL1 access in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 11/68] KVM: arm64: nv: Handle trapped ERET from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 10/68] KVM: arm64: nv: Inject HVC exceptions to the virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 23/68] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 43/68] KVM: arm64: nv: arch_timer: Support hyp timer emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 39/68] KVM: arm64: nv: Set a handler for the system instruction traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 14/68] KVM: arm64: nv: Handle SPSR_EL2 specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 16/68] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 62/68] KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 19/68] KVM: arm64: nv: Add accessors for SPSR_EL1, ELR_EL1 and VBAR_EL1 from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 61/68] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 35/68] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 42/68] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 60/68] KVM: arm64: Add FEAT_NV2 cpu feature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 52/68] KVM: arm64: nv: Add nested GICv3 tracepoints
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 29/68] KVM: arm64: nv: Forward debug traps to the nested guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 25/68] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 66/68] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 67/68] KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 54/68] KVM: arm64: nv: Add handling of FEAT_TTL TLB invalidation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 12/68] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 02/68] KVM: arm64: nv: Introduce nested virtualization VCPU feature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 08/68] KVM: arm64: nv: Reset VMPIDR_EL2 and VPIDR_EL2 to sane values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 05/68] KVM: arm64: nv: Add EL2 system registers to vcpu context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 06/68] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 04/68] KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 03/68] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 07/68] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 09/68] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 00/68] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v7 01/68] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: step down as vfio reviewer
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 04/11] RISC-V: KVM: Modify SBI extension handler to return SBI error code
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2 03/11] RISC-V: KVM: Return correct code for hsm stop function
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 02/11] RISC-V: KVM: Define a probe function for SBI extension data structures
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2 01/11] RISC-V: Define helper functions expose hpm counter width and count
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2 06/11] RISC-V: KVM: Add skeleton support for perf
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2 07/11] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/7] s390x: Add a linker script to assembly snippets
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/7] s390x: Cleanup flat.lds
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 7/7] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/7] s390x: snippets: c: Cleanup flat.lds
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- [RFC PATCH v3 14/16] KVM: x86/tdp_mmu: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 16/16] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 13/16] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 15/16] KVM: x86/mmu: Make kvm fault handelr aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 12/16] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 11/16] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 10/16] KVM: x86/tdp_mmu: Allocate private page table for large page split
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 09/16] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 07/16] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 08/16] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 06/16] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 05/16] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 04/16] KVM: TDX: Pass size to tdx_measure_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 03/16] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 01/16] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v3 00/16] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 057/113] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 053/113] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 045/113] KVM: x86/mmu: Make make_spte() aware of shared GPA for MTRR
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 069/113] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 060/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 042/113] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 058/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 043/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 063/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 052/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 051/113] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 066/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 062/113] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 056/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 064/113] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 033/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 059/113] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 050/113] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 065/113] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 061/113] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 068/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 054/113] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 055/113] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 067/113] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 044/113] KVM: x86/tdp_mmu: Make handle_changed_spte() return value
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 041/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 040/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 038/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 036/113] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 037/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 034/113] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 039/113] KVM: x86/mmu: Require TDP MMU for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 031/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 030/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 032/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 035/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 024/113] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 025/113] KVM: TDX: Use private memory for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 015/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 019/113] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 023/113] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 018/113] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 021/113] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 014/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 022/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 020/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 010/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 017/113] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 012/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 011/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 111/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 112/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 108/113] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 105/113] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 107/113] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 008/113] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 009/113] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 110/113] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 099/113] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 097/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 007/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 000/113] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 006/113] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 005/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 103/113] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 109/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 106/113] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 003/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 101/113] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 100/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 102/113] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 104/113] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 098/113] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 094/113] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 091/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 095/113] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 093/113] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 096/113] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 092/113] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 087/113] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 089/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 083/113] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 085/113] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 090/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 086/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 076/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 084/113] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 080/113] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 078/113] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 081/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 088/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 082/113] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 073/113] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 077/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 079/113] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 074/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 075/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 070/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 072/113] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 071/113] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: Ensure lockdep knows about kvm->lock vs. vcpu->mutex ordering rule
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v10 000/108] KVM TDX basic feature support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: x86/xen: Fix lockdep warning on "recursive" gpc locking
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [PATCH] KVM: arm64: vgic-v3: Limit IPI-ing when accessing GICR_{C,S}ACTIVER0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: arm64: Kill CPACR_EL1_TTA definition
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/7] s390x: snippets: c: Cleanup flat.lds
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/7] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/11] RISC-V: KVM: Disable all hpmcounter access for VS/VU mode
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 7/7] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 6/7] s390x: Clear first stack frame and end backtrace early
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/7] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/7] s390x: Cleanup flat.lds
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/7] lib: s390x: sie: Set guest memory pointer
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/7] s390x: Snippet fixes
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v2 07/11] RISC-V: KVM: Add SBI PMU extension support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 06/11] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: step down as vfio reviewer
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 7/7] RISC-V: KVM: Implement guest external interrupt line management
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 6/7] RISC-V: KVM: Virtualize per-HART AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 5/7] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 4/7] RISC-V: KVM: Initial skeletal support for AIA
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 2/7] RISC-V: Detect AIA CSRs from ISA string
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 3/7] RISC-V: KVM: Drop the _MASK suffix from hgatp.VMID mask defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 1/7] RISC-V: Add AIA related CSR defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 0/7] RISC-V KVM virtualize AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Reduce overhead of trapped timer sysreg accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Don't arm a hrtimer for an already pending timer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: timers: Don't BUG() on unhandled timer trap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: timer fixes and optimisations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v14 11/11] docs/s390x/cpu topology: document s390x cpu topology
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v14 10/11] qapi/s390/cpu topology: POLARITY_CHANGE qapi event
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 11/11] docs/s390x/cpu topology: document s390x cpu topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 04/11] RISC-V: KVM: Modify SBI extension handler to return SBI error code
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 03/11] RISC-V: KVM: Return correct code for hsm stop function
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/11] RISC-V: KVM: Define a probe function for SBI extension data structures
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 01/11] RISC-V: Define helper functions expose hpm counter width and count
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] configure: Show the option in case it is not known
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] arm: Replace MAX_SMP probe loop in favor of reading directly
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: x86/xen: Avoid deadlock by adding kvm->arch.xen.xen_lock leaf node lock
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] arm: Replace MAX_SMP probe loop in favor of reading directly
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/4] arm: pmu: Prepare for testing 64-bit overflows
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] vhost-scsi: unbreak any layout for response
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v2 00/15] Introduce Architectural LBR for vPMU
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Pedro Falcato <pedro.falcato@xxxxxxxxx>
- Re: [PATCH rcu 01/27] arch/x86: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 01/13] riscv: fix jal offsets in patched alternatives
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.2, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: x86/xen: Avoid deadlock by adding kvm->arch.xen.xen_lock leaf node lock
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 6/7] x86/cpu: Support AMD Automatic IBRS
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Erdem Aktas <erdemaktas@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/1] Replace MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/1] arm: Replace MAX_SMP probe loop in favor of reading directly
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [Patch v2] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1] drm/ttm: Refcount allocated tail pages
- From: Dmitry Osipenko <dmitry.osipenko@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vhost-scsi: unbreak any layout for response
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [Patch v2] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 6/9] irq: Rename IRQ_DOMAIN_MSI_REMAP to IRQ_DOMAIN_ISOLATED_MSI
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 5/9] irq: Remove unused irq_domain_check_msi_remap() code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 1/9] irq: Add msi_device_has_isolated_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/13] riscv: switch to relative alternative entries
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 4/4] KVM: x86/xen: Avoid deadlock by adding kvm->arch.xen.xen_lock leaf node lock
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 3/4] KVM: Ensure lockdep knows about kvm->lock vs. vcpu->mutex ordering rule
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 1/4] KVM: x86/xen: Fix lockdep warning on "recursive" gpc locking
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/13] riscv: fix jal offsets in patched alternatives
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 04/11] s390x/sclp: reporting the maximum nested topology entries
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 13/13] riscv: remove riscv_isa_ext_keys[] array and related usage
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 07/13] riscv: fpu: switch has_fpu() to riscv_has_extension_likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 09/13] riscv: switch to relative alternative entries
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 06/13] riscv: introduce riscv_has_extension_[un]likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 12/13] riscv: KVM: Switch has_svinval() to riscv_has_extension_unlikely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 11/13] riscv: cpu_relax: switch to riscv_has_extension_likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 08/13] riscv: module: move find_section to module.h
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 04/13] riscv: hwcap: make ISA extension ids can be used in asm
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 03/13] riscv: cpufeature: detect RISCV_ALTERNATIVES_EARLY_BOOT earlier
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 02/13] riscv: move riscv_noncoherent_supported() out of ZICBOM probe
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 01/13] riscv: fix jal offsets in patched alternatives
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 00/13] riscv: improve boot time isa extensions handling
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v1] drm/ttm: Refcount allocated tail pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1] drm/ttm: Refcount allocated tail pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v4 2/2] qtests/arm: add some mte tests
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v4 1/2] arm/kvm: add support for MTE
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v4 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v4] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 14/64] x86/sev: Add the host SEV-SNP initialization support
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [PATCH RFC v7 47/64] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Tom Dohrmann <erbse.13@xxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Harald Hoyer <harald@xxxxxxxxxxx>
- Re: [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Tom Dohrmann <erbse.13@xxxxxx>
- Re: [PATCH RFC v7 49/64] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 00/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] Documentation: kvm: clarify SRCU locking order
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH] vhost: remove unused paramete
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v14 07/11] target/s390x/cpu topology: activating CPU topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH 2/3] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/3] KVM: Ensure lockdep knows about kvm->lock vs. vcpu->mutex ordering rule
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: "Linux kernel regression tracking (#adding)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 04/11] s390x/sclp: reporting the maximum nested topology entries
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 05/11] s390x/cpu topology: resetting the Topology-Change-Report
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] vhost: remove unused paramete
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v4] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [PATCH] vhost-scsi: unbreak any layout for response
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH v2] vfio: Support VFIO_NOIOMMU with iommufd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [Bug 216910] New: Test Assertion failure in kvm selftest rseq_test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [Patch] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [V5 PATCH 3/3] KVM: selftests: x86: Use host's native hypercall instruction in kvm_hypercall()
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V5 PATCH 2/3] KVM: selftests: x86: Cache host CPU vendor (AMD vs. Intel)
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V5 PATCH 1/3] KVM: selftests: x86: Use "this_cpu" prefix for cpu vendor queries
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V5 PATCH 0/3] Execute hypercalls according to host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [V4 PATCH 4/4] KVM: selftests: x86: Invoke kvm hypercall as per host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [V4 PATCH 2/4] KVM: selftests: x86: Add variables to store cpu type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]