Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/2] lib/on-cpus: Correct and simplify synchronization
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH][next] KVM: s390: selftests: Fix spelling mistake "avaialable" -> "available"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v14 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 3/7] s390/physmem_info: query diag500(STORAGE LIMIT) to support QEMU/KVM memory devices
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/7] s390/physmem_info: query diag500(STORAGE LIMIT) to support QEMU/KVM memory devices
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 0/7] virtio-mem: s390 support
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/7] s390/sparsemem: provide memory_add_physaddr_to_nid() with CONFIG_NUMA
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/7] virtio-mem: s390 support
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/7] s390/physmem_info: query diag500(STORAGE LIMIT) to support QEMU/KVM memory devices
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/7] Documentation: s390-diag.rst: document diag500(STORAGE LIMIT) subfunction
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] Documentation: s390-diag.rst: make diag500 a generic KVM hypercall
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Jun Miao <jun.miao@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Get rid of userspace_irqchip_in_use
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 09/43] arm64: RME: ioctls to create and configure realms
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v5 17/43] arm64: RME: Allow VMM to set RIPAS
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v14 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v3 1/3] linux-headers: Add unistd_64.h
- From: Alistair Francis <alistair23@xxxxxxxxx>
- Re: [PATCH v3 0/9] Initial support for SMMUv3 nested translation
- From: Donald Dutile <ddutile@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: x86: Add a test for KVM_CAP_X86_VMWARE_HYPERCALL
- From: Zack Rusin <zack.rusin@xxxxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Add support for VMware guest specific hypercalls
- From: Zack Rusin <zack.rusin@xxxxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Allow enabling of the vmware backdoor via a cap
- From: Zack Rusin <zack.rusin@xxxxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Small changes to support VMware guests
- From: Zack Rusin <zack.rusin@xxxxxxxxxxxx>
- Re: [PATCH 14/21] KVM: TDX: Implement hooks to propagate changes of TDP MMU mirror page table
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/4] system/physmem: Largepage punch hole before reset of memory pages
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v1 2/4] accel/kvm: Keep track of the HWPoisonPage page_size
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v3 1/3] linux-headers: Add unistd_64.h
- From: gaosong <gaosong@xxxxxxxxxxx>
- Re: cgroup2 freezer and kvm_vm_worker_thread()
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: cgroup2 freezer and kvm_vm_worker_thread()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Get rid of userspace_irqchip_in_use
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 05/10] guestmemfs: add file mmap callback
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: cgroup2 freezer and kvm_vm_worker_thread()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: cgroup2 freezer and kvm_vm_worker_thread()
- From: Roman Gushchin <roman.gushchin@xxxxxxxxx>
- Re: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 2/9] hw/core: Make CPU topology enumeration arch-agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] x86/mtrr: Rename mtrr_overwrite_state() to guest_force_mtrr_state()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/3] dt-bindings: riscv: Add Svukte entry
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH RFC 2/3] riscv: Add Svukte extension support
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Get rid of userspace_irqchip_in_use
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 4/4] KVM: SVM: Delay legacy platform initialization on SNP
- From: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH 1/4] kvm: svm: Fix gctx page leak on invalid inputs
- From: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v14 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 25/27] KVM: nVMX: Add FRED VMCS fields
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH] x86/mtrr: Rename mtrr_overwrite_state() to guest_force_mtrr_state()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Get rid of userspace_irqchip_in_use
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC kvm-unit-tests PATCH] lib/report: Return pass/fail result from report
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 01/18] PCI/P2PDMA: refactor the p2pdma mapping helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v2 1/3] iommu: Add a wrapper for remove_dev_pasid
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v2] KVM: arm64: Get rid of userspace_irqchip_in_use
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 00/14] AMD: Add Secure AVIC Guest Support
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH 2/2] KVM: x86: introduce cache configurations for previous CR3s
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] x86/mtrr: Rename mtrr_overwrite_state() to guest_force_mtrr_state()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/18] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: expand the LRU cache of previous CR3s
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 00/14] AMD: Add Secure AVIC Guest Support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- [Invitation] bi-weekly guest_memfd upstream call on 2024-10-31
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC 00/14] AMD: Add Secure AVIC Guest Support
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [RFC 00/14] AMD: Add Secure AVIC Guest Support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC kvm-unit-tests PATCH] lib/report: Return pass/fail result from report
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/2] lib/on-cpus: Correct and simplify synchronization
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [RFC 00/14] AMD: Add Secure AVIC Guest Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 00/14] AMD: Add Secure AVIC Guest Support
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC 15/14] x86/apic: Add kexec support for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC 00/14] AMD: Add Secure AVIC Guest Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v14 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v6 00/18] IOMMUFD Dirty Tracking
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v14 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 1/1] RISC-V: KVM: Fix APLIC in_clrip and clripnum write emulation
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 00/18] IOMMUFD Dirty Tracking
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH 05/18] dma: Provide an interface to allow allocate IOVA
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 1/3] iommu: Add a wrapper for remove_dev_pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v14 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v1: vfio: avoid unnecessary pin memory when dma map io address space 0/2]
- From: qinyuntan <qinyuntan@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] KVM: x86: introduce cache configurations for previous CR3s
- From: Yong He <zhuangel570@xxxxxxxxx>
- [PATCH 1/2] KVM: x86: expand the LRU cache of previous CR3s
- From: Yong He <zhuangel570@xxxxxxxxx>
- [PATCH 0/2] Introduce configuration for LRU cache of previous CR3s
- From: Yong He <zhuangel570@xxxxxxxxx>
- Re: [PATCH v14 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v1: vfio: avoid unnecessary pin memory when dma map io address space 0/2]
- From: 半叶 <qinyuntan@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/18] IOMMUFD Dirty Tracking
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v6 00/18] IOMMUFD Dirty Tracking
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH v6 00/10] TDX host: metadata reading tweaks, bug fix and info dump
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- cgroup2 freezer and kvm_vm_worker_thread()
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH v2] KVM: arm64: Get rid of userspace_irqchip_in_use
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v6 08/10] x86/virt/tdx: Reduce TDMR's reserved areas by using CMRs to find memory holes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 10/10] x86/virt/tdx: Print TDX module version
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 03/10] x86/virt/tdx: Use auto-generated code to read global metadata
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 10/10] x86/virt/tdx: Print TDX module version
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v6 08/10] x86/virt/tdx: Reduce TDMR's reserved areas by using CMRs to find memory holes
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 04/21] KVM: x86/xen: Initialize hrtimer in kvm_xen_init_vcpu()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/10] x86/virt/tdx: Trim away tail null CMRs
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 06/10] x86/virt/tdx: Switch to use auto-generated global metadata reading code
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 05/10] x86/virt/tdx: Add missing header file inclusion to local tdx.h
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 04/10] x86/virt/tdx: Use dedicated struct members for PAMT entry sizes
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 00/10] TDX host: metadata reading tweaks, bug fix and info dump
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 03/10] x86/virt/tdx: Use auto-generated code to read global metadata
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 00/10] TDX host: metadata reading tweaks, bug fix and info dump
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 02/10] x86/virt/tdx: Start to track all global metadata in one structure
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 01/18] PCI/P2PDMA: refactor the p2pdma mapping helpers
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 09/14] KVM: sefltests: Explicitly include ucall_common.h in mmu_stress_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: selftests: Add a basic SNP smoke test
- From: "Pratik R. Sampat" <pratikrajesh.sampat@xxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v3 0/7] target/i386: Add support for perfmon-v2, RAS bits and EPYC-Turin CPU model
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 00/10] TDX host: metadata reading tweaks, bug fix and info dump
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/18] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 09/18] docs: core-api: document the IOVA-based API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFC PATCH 2/7] block: don't merge different kinds of P2P transfers in a single bio
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] target/i386: Add support for perfmon-v2, RAS bits and EPYC-Turin CPU model
- From: "Moger, Babu" <babu.moger@xxxxxxx>
- Re: [PATCH v3 25/27] KVM: nVMX: Add FRED VMCS fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 4/5] KVM: Introduce KVM_EXIT_COCO exit type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 09/18] docs: core-api: document the IOVA-based API
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 02/18] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 01/18] PCI/P2PDMA: refactor the p2pdma mapping helpers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the arm64 tree
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 00/10] TDX host: metadata reading tweaks, bug fix and info dump
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: selftests: Add a basic SNP smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the arm64 tree
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 0/3] KVM: VMX: Initialize TDX when loading KVM module
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Mark the VM as dead for failed initializations
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v1 3/4] system/physmem: Largepage punch hole before reset of memory pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fast forward the iterator when zapping the TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Mark the VM as dead for failed initializations
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH v1 2/4] accel/kvm: Keep track of the HWPoisonPage page_size
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC RESEND 0/6] hugetlbfs largepage RAS project
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jacob Pan <jacob.pan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/21] KVM: x86/xen: Initialize hrtimer in kvm_xen_init_vcpu()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: vmx_pmu_caps_test fails on Skylake based CPUS due to read only LBRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 06/10] x86/virt/tdx: Switch to use auto-generated global metadata reading code
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v3 5/7] target/i386: Expose bits related to SRSO vulnerability
- From: "Moger, Babu" <babu.moger@xxxxxxx>
- Re: [PATCH v3 0/7] target/i386: Add support for perfmon-v2, RAS bits and EPYC-Turin CPU model
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/7] target/i386: Add support for perfmon-v2, RAS bits and EPYC-Turin CPU model
- From: "Moger, Babu" <babu.moger@xxxxxxx>
- Re: [PATCH v6 05/10] x86/virt/tdx: Add missing header file inclusion to local tdx.h
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v6 04/10] x86/virt/tdx: Use dedicated struct members for PAMT entry sizes
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- [PATCH 3/3] KVM: VMX: Initialize TDX during KVM module load
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 2/3] KVM: Export hardware virtualization enabling/disabling functions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 1/3] KVM: VMX: Refactor VMX module init/exit functions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 0/3] KVM: VMX: Initialize TDX when loading KVM module
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH] Documentation: kvm: Reduce padding of "At the beginning" cell
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH v6 10/10] x86/virt/tdx: Print TDX module version
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 09/10] x86/virt/tdx: Require the module to assert it has the NO_RBP_MOD mitigation
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 08/10] x86/virt/tdx: Reduce TDMR's reserved areas by using CMRs to find memory holes
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 07/10] x86/virt/tdx: Trim away tail null CMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 06/10] x86/virt/tdx: Switch to use auto-generated global metadata reading code
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 05/10] x86/virt/tdx: Add missing header file inclusion to local tdx.h
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 04/10] x86/virt/tdx: Use dedicated struct members for PAMT entry sizes
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 03/10] x86/virt/tdx: Use auto-generated code to read global metadata
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 02/10] x86/virt/tdx: Start to track all global metadata in one structure
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 01/10] x86/virt/tdx: Rename 'struct tdx_tdmr_sysinfo' to reflect the spec better
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 00/10] TDX host: metadata reading tweaks, bug fix and info dump
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 0/8] TDX host: metadata reading tweaks, bug fix and info dump
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH net-next v23 4/7] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 08/15] RISCV: KVM: use raw_spinlock for critical section in imsic
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.11 25/32] LoongArch: KVM: Mark hrtimer to expire in hard interrupt context
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.11 19/32] RISCV: KVM: use raw_spinlock for critical section in imsic
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] KVM: PPC: Book3S HV: Add Power11 capability support for Nested PAPR guests
- From: Amit Machhiwal <amachhiw@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] linux-headers: Add unistd_64.h
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v3 25/27] KVM: nVMX: Add FRED VMCS fields
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3] KVM: PPC: Book3S HV: Mask off LPCR_MER for a vCPU before running it to avoid spurious interrupts
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/9] Introduce SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 5/7] target/i386: Expose bits related to SRSO vulnerability
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 0/7] target/i386: Add support for perfmon-v2, RAS bits and EPYC-Turin CPU model
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- linux-next: build warning after merge of the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] linux-headers: Add unistd_64.h
- From: gaosong <gaosong@xxxxxxxxxxx>
- [PATCH 04/21] KVM: x86/xen: Initialize hrtimer in kvm_xen_init_vcpu()
- From: Nam Cao <namcao@xxxxxxxxxxxxx>
- Re: [PATCH 05/18] dma: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 2/7] target/i386: Add RAS feature bits on EPYC CPU models
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 4/4] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH 05/18] dma: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 16/27] KVM: VMX: Virtualize FRED nested exception tracking
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 07/18] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the arm64 tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v14 13/13] x86/sev: Allow Secure TSC feature for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 11/13] tsc: Switch to native sched clock
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 10/13] tsc: Upgrade TSC clocksource rating
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 07/13] x86/sev: Mark Secure TSC as reliable clocksource
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 05/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 02/13] x86/sev: Relocate SNP guest messaging routines to common code
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v14 00/13] Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH 05/18] dma: Provide an interface to allow allocate IOVA
- From: Srinivasulu Thanneeru <dev.srinivasulu@xxxxxxxxx>
- Re: [PATCH v3 1/7] target/i386: Fix minor typo in NO_NESTED_DATA_BP feature bit
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v3 3/3] linux-headers: Update to Linux v6.12-rc5
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/3] linux-headers: loongarch: Add kvm_para.h
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 1/3] linux-headers: Add unistd_64.h
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/3] linux-headers: Update to Linux v6.12-rc5
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- RE: [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 07/18] dma-mapping: Implement link/unlink ranges API
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/18] dma: Provide an interface to allow allocate IOVA
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [RFC PATCH 3/7] blk-mq: add a dma mapping iterator
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [RFC PATCH 7/7] nvme-pci: convert to blk_rq_dma_map
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [RFC PATCH 6/7] nvme-pci: use a better encoding for small prp pool allocations
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [RFC PATCH 5/7] nvme-pci: remove struct nvme_descriptor
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [RFC PATCH 4/7] blk-mq: add scatterlist-less DMA mapping helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [RFC PATCH 0/7] Block and NMMe PCI use of new DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [RFC PATCH 2/7] block: don't merge different kinds of P2P transfers in a single bio
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [RFC PATCH 1/7] block: share more code for bio addition helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 15/18] vfio/mlx5: Explicitly use number of pages instead of allocated length
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 18/18] vfio/mlx5: Convert vfio to use DMA link API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 17/18] vfio/mlx5: Explicitly store page list
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 16/18] vfio/mlx5: Rewrite create mkey flow to allow better code reuse
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 10/18] mm/hmm: let users to tag specific PFN with DMA mapped bit
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 14/18] RDMA/umem: Separate implicit ODP initialization from explicit ODP
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 13/18] RDMA/core: Convert UMEM ODP DMA mapping to caching IOVA and page linkage
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 12/18] RDMA/umem: Store ODP access mask information in PFN
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 11/18] mm/hmm: provide generic DMA managing logic
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 05/18] dma: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 09/18] docs: core-api: document the IOVA-based API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 08/18] dma-mapping: add a dma_need_unmap helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 07/18] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 06/18] iommu/dma: Factor out a iommu_dma_map_swiotlb helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 03/18] iommu: generalize the batched sync after map interface
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 04/18] dma-mapping: Add check if IOVA can be used
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 02/18] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 01/18] PCI/P2PDMA: refactor the p2pdma mapping helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH 00/18] Provide a new two step DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [syzbot] [bcachefs] WARNING in srcu_check_nmi_safety (2)
- From: syzbot <syzbot+314c2cfd4071ad738810@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 43/58] KVM: x86/pmu: Introduce PMU operator for setting counter overflow
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH vfio 7/7] vfio/virtio: Enable live migration once VIRTIO_PCI was configured
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 6/7] vfio/virtio: Add PRE_COPY support for live migration
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 5/7] vfio/virtio: Add support for the basic live migration functionality
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 4/7] virtio-pci: Introduce APIs to execute device parts admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 3/7] virtio: Manage device and driver capabilities via the admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 2/7] virtio: Extend the admin command to include the result size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 1/7] virtio_pci: Introduce device parts access commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 0/7] Enhances the vfio-virtio driver to support live migration
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Initial support for SMMUv3 nested translation
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [kvm-unit-tests PATCH v6 1/1] riscv: sbi: Add tests for HSM extension
- From: James Raphael Tiovalen <jamestiotio@xxxxxxxxx>
- [kvm-unit-tests PATCH v6 0/1] riscv: sbi: Add support to test HSM extension
- From: James Raphael Tiovalen <jamestiotio@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Mark the VM as dead for failed initializations
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] kvm: selftest: fix noop test in guest_memfd_test.c
- From: Muhammad Usama Anjum <Usama.Anjum@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Mark the VM as dead for failed initializations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Mark the VM as dead for failed initializations
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 18/25] KVM: TDX: Do TDX specific vcpu initialization
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v1 2/4] accel/kvm: Keep track of the HWPoisonPage page_size
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v1 3/4] system/physmem: Largepage punch hole before reset of memory pages
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: (subset) [PATCH v6 0/6] Add PSCI v1.3 SYSTEM_OFF2 support for hibernation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] KVM: arm64: Mark the VM as dead for failed initializations
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v6 6/6] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v13 00/85] KVM: Stop grabbing references to PFNMAP'd pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 00/13] Accelerate KVM RISC-V when running as a guest
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [syzbot] [kvm?] WARNING in vcpu_run
- From: syzbot <syzbot+1522459a74d26b0ac33a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [RFC PATCH v3 43/58] KVM: x86/pmu: Introduce PMU operator for setting counter overflow
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [RFC kvm-unit-tests PATCH] lib/report: Return pass/fail result from report
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v1 08/11] virtio-mem: mark device ready before registering callbacks in kdump mode
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 11/11] s390/kdump: virtio-mem kdump support (CONFIG_PROC_VMCORE_DEVICE_RAM)
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 10/11] virtio-mem: support CONFIG_PROC_VMCORE_DEVICE_RAM
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 09/11] virtio-mem: remember usable region size
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 07/11] fs/proc/vmcore: introduce PROC_VMCORE_DEVICE_RAM to detect device RAM ranges in 2nd kernel
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 06/11] fs/proc/vmcore: factor out freeing a list of vmcore ranges
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 05/11] fs/proc/vmcore: factor out allocating a vmcore memory node
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 04/11] fs/proc/vmcore: move vmcore definitions from kcore.h to crash_dump.h
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 03/11] fs/proc/vmcore: disallow vmcore modifications after the vmcore was opened
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 02/11] fs/proc/vmcore: replace vmcoredd_mutex by vmcore_mutex
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 01/11] fs/proc/vmcore: convert vmcore_cb_lock into vmcore_mutex
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 00/11] fs/proc/vmcore: kdump support for virtio-mem on s390
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2] KVM: PPC: Book3S HV: Mask off LPCR_MER for a vCPU before running it to avoid spurious interrupts
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: PPC: Book3S HV: Mask off LPCR_MER for a vCPU before running it to avoid spurious interrupts
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [PATCH v3 7/7] s390/sparsemem: provide memory_add_physaddr_to_nid() with CONFIG_NUMA
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 6/7] s390/sparsemem: reduce section size to 128 MiB
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 5/7] lib/Kconfig.debug: default STRICT_DEVMEM to "y" on s390
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 4/7] virtio-mem: s390 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 3/7] s390/physmem_info: query diag500(STORAGE LIMIT) to support QEMU/KVM memory devices
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 2/7] Documentation: s390-diag.rst: document diag500(STORAGE LIMIT) subfunction
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 1/7] Documentation: s390-diag.rst: make diag500 a generic KVM hypercall
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 0/7] virtio-mem: s390 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 06/43] arm64: RME: Add wrappers for RMI calls
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v5 05/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v5 04/43] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [no subject]
- Re: [kvm-unit-tests PATCH 1/2] lib/on-cpus: Correct and simplify synchronization
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/7] virtio-mem: s390 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 4/7] s390/physmem_info: query diag500(STORAGE LIMIT) to support QEMU/KVM memory devices
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v11 4/4] Documentation: add debugfs description for hisi migration
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v11 3/4] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v11 2/4] hisi_acc_vfio_pci: create subfunction for data reading
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v11 1/4] hisi_acc_vfio_pci: extract public functions for container_of
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v11 0/4] debugfs to hisilicon migration driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH 02/13] ALSA: hda_intel: Use always-managed version of pcim_intx()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH vhost 2/2] vdpa/mlx5: Fix suboptimal range on iotlb iteration
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH vhost 1/2] vdpa/mlx5: Fix PA offset with unaligned starting iotlb map
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 02/13] ALSA: hda_intel: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH v3 16/27] KVM: VMX: Virtualize FRED nested exception tracking
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v3 21/27] KVM: VMX: Invoke vmx_set_cpu_caps() before nested setup
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v3 25/27] KVM: nVMX: Add FRED VMCS fields
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v5 06/43] arm64: RME: Add wrappers for RMI calls
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v2] KVM: PPC: Book3S HV: Mask off LPCR_MER for a vCPU before running it to avoid spurious interrupts
- From: "Ritesh Harjani (IBM)" <ritesh.list@xxxxxxxxx>
- Re: [PATCH v5 05/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 6/6] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: PPC: Book3S HV: Mask off LPCR_MER for a vCPU before running it to avoid spurious interrupts
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 41/58] KVM: x86/pmu: Add support for PMU context switch at VM-exit/enter
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 37/58] KVM: x86/pmu: Switch IA32_PERF_GLOBAL_CTRL at VM boundary
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 27/58] KVM: x86/pmu: Create a function prototype to disable MSR interception
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 26/58] KVM: x86/pmu: Manage MSR interception for IA32_PERF_GLOBAL_CTRL
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 15/58] perf/x86: Support switch_interrupt interface
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/13] RISC-V: KVM: Use NACL HFENCEs for KVM request based HFENCEs
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 7/7] target/i386: Add support for EPYC-Turin model
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v3 6/7] target/i386: Expose new feature bits in CPUID 8000_0021_EAX/EBX
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v3 5/7] target/i386: Expose bits related to SRSO vulnerability
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v3 4/7] target/i386: Enable perfmon-v2 and RAS feature bits on EPYC-Genoa
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v3 3/7] target/i386: Add PerfMonV2 feature bit
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v3 2/7] target/i386: Add RAS feature bits on EPYC CPU models
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v3 1/7] target/i386: Fix minor typo in NO_NESTED_DATA_BP feature bit
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v3 0/7] target/i386: Add support for perfmon-v2, RAS bits and EPYC-Turin CPU model
- From: Babu Moger <babu.moger@xxxxxxx>
- Re: [RFC PATCH v3 37/58] KVM: x86/pmu: Switch IA32_PERF_GLOBAL_CTRL at VM boundary
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [RFC PATCH v3 26/58] KVM: x86/pmu: Manage MSR interception for IA32_PERF_GLOBAL_CTRL
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [RFC PATCH v3 27/58] KVM: x86/pmu: Create a function prototype to disable MSR interception
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [PATCH v6 6/6] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v3 41/58] KVM: x86/pmu: Add support for PMU context switch at VM-exit/enter
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [RFC PATCH v3 15/58] perf/x86: Support switch_interrupt interface
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [PATCH RFC v2 3/3] riscv: KVM: Add Svukte extension support for Guest/VM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v1: vfio: avoid unnecessary pin memory when dma map io address space 0/2]
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2] KVM: PPC: Book3S HV: Mask off LPCR_MER for a vCPU before running it to avoid spurious interrupts
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v1: vfio: avoid unnecessary pin memory when dma map io address space 0/2]
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 18/27] KVM: VMX: Dump FRED context in dump_vmcs()
- From: Xin Li <xin@xxxxxxxxx>
- RE: [PATCH v10 0/4] debugfs to hisilicon migration driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v6 6/6] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/6] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 02/13] ALSA: hda_intel: Use always-managed version of pcim_intx()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v5 34/37] KVM: arm64: Disable hierarchical permissions when POE is enabled
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v13 05/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v10 0/4] debugfs to hisilicon migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 33/37] KVM: arm64: Add POE save/restore for AT emulation fast-path
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v5 18/37] KVM: arm64: Add AT fast-path support for S1PIE
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v5 21/43] arm64: RME: Runtime faulting of memory
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v5 21/37] KVM: arm64: Implement AT S1PIE support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 04/43] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v5 20/37] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v5 21/37] KVM: arm64: Implement AT S1PIE support
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v5 21/43] arm64: RME: Runtime faulting of memory
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v6 6/6] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- RE: [PATCH v10 0/4] debugfs to hisilicon migration driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v10 4/4] Documentation: add debugfs description for hisi migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v10 3/4] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v6 6/6] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 17/37] KVM: arm64: Sanitise ID_AA64MMFR3_EL1
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v5 17/37] KVM: arm64: Sanitise ID_AA64MMFR3_EL1
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH 3/3] riscv: sbi: Add SUSP tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] riscv: sbi: Clean up env checking
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] riscv: Implement setjmp/longjmp
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] riscv: sbi: Add SUSP tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v5 17/37] KVM: arm64: Sanitise ID_AA64MMFR3_EL1
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [kvm-unit-tests PATCH 2/2] riscv: sbi: Add IPI extension tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] riscv: Add sbi_send_ipi_broadcast
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] riscv: sbi: Add IPI tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 5/6] KVM: arm64: nvhe: Pass through PSCI v1.3 SYSTEM_OFF2 call
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- Re: [PATCH v5 09/37] KVM: arm64: Extend masking facility to arbitrary registers
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH] kvm/x86: simplify kvm_mmu_do_page_fault() a little bit
- From: Jürgen Groß <jgross@xxxxxxxx>
- Re: [PATCH] KVM: x86: Fast forward the iterator when zapping the TDP MMU
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [PATCH v5 12/37] KVM: arm64: Sanitise TCR2_EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH] kvm: selftest: fix noop test in guest_memfd_test.c
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [PATCH v13 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 08/37] KVM: arm64: Correctly access TCR2_EL1, PIR_EL1, PIRE0_EL1 with VHE
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [PATCH] kvm: selftest: fix noop test in guest_memfd_test.c
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH 4/4] KVM: document KVM_GUEST_MEMFD_POPULATE ioctl
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [PATCH 3/4] KVM: allow KVM_GUEST_MEMFD_POPULATE in another mm
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [PATCH 2/4] KVM: add KVM_GUEST_MEMFD_POPULATE ioctl for guest_memfd
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [PATCH 1/4] KVM: guest_memfd: add generic post_populate callback
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [RFC PATCH 0/4] KVM: ioctl for populating guest_memfd
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [PATCH v1: vfio: avoid unnecessary pin memory when dma map io address space 2/2] vfio: avoid unnecessary pin memory when dma map io address space
- From: Qinyun Tan <qinyuntan@xxxxxxxxxxxxxxxxx>
- [PATCH v1: vfio: avoid unnecessary pin memory when dma map io address space 0/2]
- From: Qinyun Tan <qinyuntan@xxxxxxxxxxxxxxxxx>
- [PATCH v1: vfio: avoid unnecessary pin memory when dma map io address space 1/2] mm: introduce vma flag VM_PGOFF_IS_PFN
- From: Qinyun Tan <qinyuntan@xxxxxxxxxxxxxxxxx>
- Re: [EXTERNAL] Re: [PATCH v2 0/2] vhost-vdpa: Add support for NO-IOMMU mode
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v13 05/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] Fix arm64 clang errors on fpu tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/5] Support cross compiling with clang
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 5/4] arm64: gitlab-ci: Add clang build tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 02/13] ALSA: hda_intel: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH v13 05/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 21/27] KVM: VMX: Invoke vmx_set_cpu_caps() before nested setup
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v3 7/9] iommu/arm-smmu-v3: Expose the arm_smmu_attach interface
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 25/27] KVM: nVMX: Add FRED VMCS fields
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v3 4/9] iommu/arm-smmu-v3: Report IOMMU_CAP_ENFORCE_CACHE_COHERENCY for CANWBS
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 3/9] ACPI/IORT: Support CANWBS memory access flag
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v13 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 18/27] KVM: VMX: Dump FRED context in dump_vmcs()
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 17/27] KVM: x86: Mark CR4.FRED as not reserved when guest can use FRED
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [syzbot] [kvm?] WARNING in kvm_put_kvm (2)
- From: syzbot <syzbot+4f8d3ac3727ffc0ecd8a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 16/27] KVM: VMX: Virtualize FRED nested exception tracking
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v13 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH v13 00/85] KVM: Stop grabbing references to PFNMAP'd pages
- From: Dmitry Osipenko <dmitry.osipenko@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] mm: multi-gen LRU: remove MM_LEAF_OLD and MM_NONLEAF_TOTAL stats
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH 1/2] mm: multi-gen LRU: remove MM_LEAF_OLD and MM_NONLEAF_TOTAL stats
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH] KVM: x86: Fast forward the iterator when zapping the TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 18/20] meson: build contrib/plugins with meson
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- RE: [EXTERNAL] RE: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- RE: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH RFC v2 3/5] kvm: Convert to use guest_memfd library
- From: Mike Day <michael.day@xxxxxxx>
- Re: [PATCH V13 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [RFC kvm-unit-tests PATCH] lib/report: Return pass/fail result from report
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 27/37] arm64: Add encoding for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 3/6] KVM: arm64: Add support for PSCI v1.2 and v1.3
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- Re: [kvmtool PATCH v2 0/8] Add RISC-V ISA extensions based on Linux-6.11
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v5 27/37] arm64: Add encoding for POR_EL2
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v5 03/37] arm64: Add encoding for PIRE0_EL2
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v5 10/37] arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v6 2/6] KVM: arm64: Add PSCI v1.3 SYSTEM_OFF2 function for hibernation
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- Re: [PATCH v6 1/6] firmware/psci: Add definitions for PSCI v1.3 specification
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/4] arm: fpu: Fix the input/output args for inline asm in fpu.c
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/4] arm: fpu: Add '.arch_extension fp' to fpu macros
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/4] arm: fpu: Convert 'q' registers to 'v' to satisfy clang
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/4] arm: Fix clang error in sve_vl()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/4] Fix arm64 clang errors on fpu tests
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 02/13] ALSA: hda_intel: Use always-managed version of pcim_intx()
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH v5 37/37] KVM: arm64: Handle WXN attribute
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 34/37] KVM: arm64: Disable hierarchical permissions when POE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 35/37] KVM: arm64: Make PAN conditions part of the S1 walk context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 36/37] KVM: arm64: Handle stage-1 permission overlays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 33/37] KVM: arm64: Add POE save/restore for AT emulation fast-path
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 32/37] KVM: arm64: Add save/restore support for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 31/37] KVM: arm64: Add basic support for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 29/37] KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 30/37] KVM: arm64: Add kvm_has_s1poe() helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 28/37] KVM: arm64: Drop bogus CPTR_EL2.E0POE trap routing
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 26/37] KVM: arm64: Rely on visibility to let PIR*_ELx/TCR2_ELx UNDEF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 27/37] arm64: Add encoding for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 25/37] KVM: arm64: Hide S1PIE registers from userspace when disabled for guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 24/37] KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 22/37] KVM: arm64: Add a composite EL2 visibility helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 21/37] KVM: arm64: Implement AT S1PIE support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 23/37] KVM: arm64: Define helper for EL2 registers with custom visibility
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 20/37] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 17/37] KVM: arm64: Sanitise ID_AA64MMFR3_EL1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 19/37] KVM: arm64: Split S1 permission evaluation into direct and hierarchical parts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 13/37] KVM: arm64: Add save/restore for TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 18/37] KVM: arm64: Add AT fast-path support for S1PIE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 16/37] KVM: arm64: Handle PIR{,E0}_EL2 traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 15/37] KVM: arm64: Add save/restore for PIR{,E0}_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 14/37] KVM: arm64: Add PIR{,E0}_EL2 to the sysreg arrays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 11/37] KVM: arm64: Add TCR2_EL2 to the sysreg arrays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 12/37] KVM: arm64: Sanitise TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 09/37] KVM: arm64: Extend masking facility to arbitrary registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 10/37] arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 08/37] KVM: arm64: Correctly access TCR2_EL1, PIR_EL1, PIRE0_EL1 with VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 07/37] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 05/37] KVM: arm64: nv: Add missing EL2->EL1 mappings in get_el2_to_el1_mapping()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 06/37] KVM: arm64: nv: Handle CNTHCTL_EL2 specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 04/37] KVM: arm64: Drop useless struct s2_mmu in __kvm_at_s1e2()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 03/37] arm64: Add encoding for PIRE0_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 02/37] arm64: Remove VNCR definition for PIRE0_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 01/37] arm64: Drop SKL0/SKL1 from TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 00/37] KVM: arm64: Add EL2 support to FEAT_S1PIE/S1POE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/5] riscv: sbi: Add support to test HSM extension
- From: James R T <jamestiotio@xxxxxxxxx>
- Re: [PATCH v5 02/43] kvm: arm64: pgtable: Track the number of pages in the entry level
- From: Steven Price <steven.price@xxxxxxx>
- Re: [RFC PATCH 0/5] Extend SEV-SNP SVSM support with a kvm_vcpu per VMPL
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/5] riscv: sbi: Add support to test HSM extension
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 02/13] ALSA: hda_intel: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [kvm-unit-tests PATCH 4/4] riscv: Rework smp_boot_secondary
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 3/4] riscv: Fix secondary_entry
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/4] riscv: Filter unmanaged harts from present mask
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/4] riscv: Bump NR_CPUS to 256
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/4] riscv: A few SMP fixes
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/2] lib/on-cpus: Fix on_cpumask
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] lib/on-cpus: Correct and simplify synchronization
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] lib/on-cpus: A couple of fixes
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v3 10/18] gitlab: make check-[dco|patch] a little more verbose
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH] KVM: Array access out of bounds
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: Try to enable irr_pending state with disabled APICv
- From: Yong He <zhuangel570@xxxxxxxxx>
- [PATCH 5/5] Documentation: kvm: introduce "VM plane" concept
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 4/5] Documentation: kvm: reorganize introduction
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 3/5] Documentation: kvm: replace section numbers with links
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 2/5] Documentation: kvm: fix a few mistakes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 1/5] KVM: powerpc: remove remaining traces of KVM_CAP_PPC_RMA
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 0/5] Documentation: kvm: cleanup and introduce "VM planes"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: Array access out of bounds
- From: Liu Jing <liujing@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] Extend SEV-SNP SVSM support with a kvm_vcpu per VMPL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 17/18] contrib/plugins: remove Makefile for contrib/plugins
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 15/18] testing: Enhance gdb probe script
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 18/18] plugins: fix qemu_plugin_reset
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 16/18] MAINTAINERS: mention my plugins/next tree
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 13/18] tests/tcg: enable basic testing for aarch64_be-linux-user
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 11/18] MAINTAINERS: mention my gdbstub/next tree
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 14/18] tests/tcg/aarch64: Use raw strings for regexes in test-mte.py
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 12/18] config/targets: update aarch64_be-linux-user gdb XML list
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 06/18] scripts/ci: remove architecture checks for build-environment updates
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 08/18] accel/tcg: add tracepoints for cpu_loop_exit_atomic
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 07/18] tests/tcg/x86_64: Add cross-modifying code test
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 05/18] docs/devel: update tsan build documentation
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 10/18] gitlab: make check-[dco|patch] a little more verbose
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 09/18] dockerfiles: fix default targets for debian-loongarch-cross
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 04/18] meson: hide tsan related warnings
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 02/18] tests/docker: add NOFETCH env variable for testing
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 03/18] MAINTAINERS: mention my testing/next tree
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 01/18] tests/docker: Fix microblaze atomics
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 00/18] maintainer updates (testing, gdbstub, plugins) pre-PR
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v2 1/7] s390/kdump: implement is_kdump_kernel()
- From: Alexander Egorenkov <egorenar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] iommu: Add a wrapper for remove_dev_pasid
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v7 00/11] arm64: Support for running as a guest in Arm CCA
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] KVM: x86: Fast forward the iterator when zapping the TDP MMU
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [PATCH v2 18/20] meson: build contrib/plugins with meson
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v2 07/20] tests/tcg/x86_64: Add cross-modifying code test
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v4 07/11] s390/mm/gmap: Remove gmap_{en,dis}able()
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH] KVM: x86: Make the debugfs per VM optional
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [EXTERNAL] Re: [PATCH v2 0/2] vhost-vdpa: Add support for NO-IOMMU mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] Fix arm64 clang errors on fpu tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v2 18/20] meson: build contrib/plugins with meson
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 1/7] s390/kdump: implement is_kdump_kernel()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/7] s390/kdump: implement is_kdump_kernel()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/4] system/physmem: Largepage punch hole before reset of memory pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 2/4] accel/kvm: Keep track of the HWPoisonPage page_size
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [EXTERNAL] Re: [PATCH v2 0/2] vhost-vdpa: Add support for NO-IOMMU mode
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 21/43] arm64: RME: Runtime faulting of memory
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v5 02/43] kvm: arm64: pgtable: Track the number of pages in the entry level
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v7 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v7 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v13 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2] mm: page_alloc: move mlocked flag clearance into free_pages_prepare()
- From: Roman Gushchin <roman.gushchin@xxxxxxxxx>
- Re: [PATCH v3 3/9] iommu/vt-d: Let intel_pasid_tear_down_entry() return pasid entry
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/20] tests/tcg/x86_64: Add cross-modifying code test
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 07/20] tests/tcg/x86_64: Add cross-modifying code test
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- Re: [EXTERNAL] RE: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V13 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH V13 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 00/11] Enable haltpoll on arm64
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH v2 13/20] tests/tcg: enable basic testing for aarch64_be-linux-user
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v1 4/4] accel/kvm: Report the loss of a large memory page
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v1 0/4] hugetlbfs memory HW error fixes
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v1 1/4] accel/kvm: SIGBUS handler should also deal with si_addr_lsb
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v1 2/4] accel/kvm: Keep track of the HWPoisonPage page_size
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v1 3/4] system/physmem: Largepage punch hole before reset of memory pages
- From: “William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v2 11/20] MAINTAINERS: mention my gdbstub/next tree
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v2 17/20] plugins: add ability to register a GDB triggered callback
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] Fix arm64 clang errors on fpu tests
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v2 16/20] MAINTAINERS: mention my plugins/next tree
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 15/20] testing: Enhance gdb probe script
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 13/20] tests/tcg: enable basic testing for aarch64_be-linux-user
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 12/20] config/targets: update aarch64_be-linux-user gdb XML list
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 07/20] tests/tcg/x86_64: Add cross-modifying code test
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 06/20] scripts/ci: remove architecture checks for build-environment updates
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 02/20] tests/docker: add NOFETCH env variable for testing
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 01/20] tests/docker: Fix microblaze atomics
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2] mm: page_alloc: move mlocked flag clearance into free_pages_prepare()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V13 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] KVM: drop the kvm_has_noapic_vcpu optimization
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [PATCH v3 0/4] Allow AVIC's IPI virtualization to be optional
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: drop the kvm_has_noapic_vcpu optimization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm/x86: simplify kvm_mmu_do_page_fault() a little bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] mm: page_alloc: move mlocked flag clearance into free_pages_prepare()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/27] KVM: VMX: Add support for the secondary VM exit controls
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH V13 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/27] KVM: VMX: Disable FRED if FRED consistency checks fail
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v3 07/27] KVM: VMX: Initialize VMCS FRED fields
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v2] mm: page_alloc: move mlocked flag clearance into free_pages_prepare()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/4] x86/cpufeatures: Add CPUID feature bit for Idle HLT intercept
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/11] s390/kvm: Handle guest-related program interrupts in KVM
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/9] hw/core: Add a helper to check the cache topology level
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 1/9] i386/cpu: Don't enumerate the "invalid" CPU topology level
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 02/13] ALSA: hda_intel: Use always-managed version of pcim_intx()
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH v4 9/9] i386/cpu: add has_caches flag to check smp_cache configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 8/9] i386/pc: Support cache topology in -machine for PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 7/9] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 6/9] i386/cpu: Support thread and module level cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 5/9] hw/core: Add a helper to check the cache topology level
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 4/9] hw/core: Check smp cache topology support for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 3/9] qapi/qom: Define cache enumeration and properties for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 2/9] hw/core: Make CPU topology enumeration arch-agnostic
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 1/9] i386/cpu: Don't enumerate the "invalid" CPU topology level
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v4 0/9] Introduce SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 3/9] iommu/vt-d: Let intel_pasid_tear_down_entry() return pasid entry
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] Fix arm64 clang errors on fpu tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v2 1/3] iommu: Add a wrapper for remove_dev_pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 05/11] s390/mm/fault: Handle guest-related program interrupts in KVM
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/11] s390/mm: Convert to LOCK_MM_AND_FIND_VMA
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix build on on non-x86 architectures
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 11/11] s390/mm: Convert to LOCK_MM_AND_FIND_VMA
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 05/11] s390/mm/fault: Handle guest-related program interrupts in KVM
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 10/11] s390/mm: Get rid of fault type switch statements
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 07/11] s390/mm/gmap: Remove gmap_{en,dis}able()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 09/11] s390/mm: Simplify get_fault_type()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 08/11] s390: Remove gmap pointer from lowcore
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 03/11] s390/mm/gmap: Refactor gmap_fault() and add support for pfault
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 06/11] s390/kvm: Stop using gmap_{en,dis}able()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 04/11] s390/mm/gmap: Fix __gmap_fault() return code
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 02/11] s390/kvm: Remove kvm_arch_fault_in_page()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 01/11] s390/entry: Remove __GMAP_ASCE and use _PIF_GUEST_FAULT again
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 00/11] s390/kvm: Handle guest-related program interrupts in KVM
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/20] MAINTAINERS: mention my gdbstub/next tree
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 3/9] iommu/vt-d: Let intel_pasid_tear_down_entry() return pasid entry
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/20] MAINTAINERS: mention my testing/next tree
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2 10/20] gitlab: make check-[dco|patch] a little more verbose
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH V13 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v7 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 10/20] gitlab: make check-[dco|patch] a little more verbose
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v2 20/20] plugins: fix qemu_plugin_reset
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 16/20] MAINTAINERS: mention my plugins/next tree
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 18/20] meson: build contrib/plugins with meson
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 19/20] contrib/plugins: remove Makefile for contrib/plugins
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 17/20] plugins: add ability to register a GDB triggered callback
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 14/20] tests/tcg/aarch64: Use raw strings for regexes in test-mte.py
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 13/20] tests/tcg: enable basic testing for aarch64_be-linux-user
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 11/20] MAINTAINERS: mention my gdbstub/next tree
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 15/20] testing: Enhance gdb probe script
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 12/20] config/targets: update aarch64_be-linux-user gdb XML list
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 05/20] docs/devel: update tsan build documentation
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 08/20] accel/tcg: add tracepoints for cpu_loop_exit_atomic
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 07/20] tests/tcg/x86_64: Add cross-modifying code test
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 09/20] dockerfiles: fix default targets for debian-loongarch-cross
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 10/20] gitlab: make check-[dco|patch] a little more verbose
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 06/20] scripts/ci: remove architecture checks for build-environment updates
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 01/20] tests/docker: Fix microblaze atomics
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 02/20] tests/docker: add NOFETCH env variable for testing
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 04/20] meson: hide tsan related warnings
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 00/20] maintainer updates (testing, gdbstub, plugins)
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 03/20] MAINTAINERS: mention my testing/next tree
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v2 0/3] Support attaching PASID to the blocked_domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 4/4] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- [PATCH] kvm/x86: simplify kvm_mmu_do_page_fault() a little bit
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v8 3/3] irqchip/loongson-eiointc: Add extioi virt extension support
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v8 3/3] irqchip/loongson-eiointc: Add extioi virt extension support
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Support attaching PASID to the blocked_domain
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v3 3/9] iommu/vt-d: Let intel_pasid_tear_down_entry() return pasid entry
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 1/4] x86/cpufeatures: Add CPUID feature bit for Idle HLT intercept
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 3/9] iommu/vt-d: Let intel_pasid_tear_down_entry() return pasid entry
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] riscv: perf: add guest vs host distinction
- From: Quan Zhou <zhouquan@xxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]