Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v3 5/7] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v3 4/7] i386/cpu: Support thread and module level cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v3 3/7] hw/core: Check smp cache topology support for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v3 2/7] qapi/qom: Define cache enumeration and properties for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v3 1/7] hw/core: Make CPU topology enumeration arch-agnostic
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v3 0/7] Introduce SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v5 4/5] KVM: selftests: Add test for PSCI SYSTEM_OFF2
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- [kvm:kvm-coco-queue 62/109] arch/x86/kvm/mmu/tdp_mmu.c:474:14: sparse: sparse: incorrect type in argument 1 (different address spaces)
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] KVM: x86: Don't allow tsc_offset, tsc_scaling_ratio to change
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 1/2] KVM: x86: Push down setting vcpu.arch.user_set_tsc
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v2 2/2] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v2 1/2] KVM: x86/tdp_mmu: Add WARN_ON_ONCE() in tdp_mmu_map_handle_target_level()
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v2 0/2] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 01/11] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 3/3] selftests: KVM: Add test case for MMIO during event delivery
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm:kvm-coco-queue 60/109] arch/x86/kvm/mmu/tdp_mmu.c:1176:25: sparse: sparse: incorrect type in argument 1 (different address spaces)
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86, vmx: Add function for event delivery error generation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: vmx, svm, mmu: Process MMIO during event delivery
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86, vmx: Add function for event delivery error generation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 1/1] vfio: support CXL device in VFIO stub
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v5 4/4] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v5 3/4] KVM: x86: Advertise AMD_IBPB_RET to userspace
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v5 2/4] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v5 1/4] x86/cpufeatures: Clarify semantics of X86_FEATURE_IBPB
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v5 0/4] Distinguish between variants of IBPB
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 11/13] vfio/cxl: introduce VFIO CXL device cap
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC 10/13] vfio/pci: emulate CXL DVSEC registers in the configuration space
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC 09/13] vfio/pci: introduce CXL device awareness
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [RFC 05/13] vfio/cxl: expose CXL region to the usersapce via a new VFIO device region
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC 04/13] vfio: introduce vfio-cxl core preludes
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 11/11] arm64: Document Arm Confidential Compute
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 04/11] arm64: rsi: Add support for checking whether an MMIO is protected
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 01/11] arm64: rsi: Add RSI definitions
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.12, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 06/11] efi: arm64: Map Device with Prot Shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 0/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 0/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH v3 08/58] perf: Clean up perf ctx time
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v1 2/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 2/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v1 1/2] mm: huge_memory: add vma_thp_disabled() and thp_disabled_by_hw()
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [RFC PATCH v3 07/58] perf: Skip pmu_ctx based on event_type
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v1 2/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 1/2] mm: huge_memory: add vma_thp_disabled() and thp_disabled_by_hw()
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 0/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC] powerpc/kvm: Fix spinlock member access for PREEMPT_RT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC] powerpc/kvm: Fix spinlock member access for PREEMPT_RT
- From: Vishal Chourasia <vishalc@xxxxxxxxxxxxx>
- Re: [PATCH] accel/kvm: check for KVM_CAP_READONLY_MEM on VM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v9 3/4] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Ping: [PATCH] accel/kvm: check for KVM_CAP_READONLY_MEM on VM
- From: Tom Dohrmann <erbse.13@xxxxxx>
- Re: [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 1/1] x86: Add support save/load HWCR MSR
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC] powerpc/kvm: Fix spinlock member access for PREEMPT_RT
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 18/18] KVM: x86: Don't emit TLB flushes when aging SPTEs for mmu_notifiers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/18] KVM: Allow arch code to elide TLB flushes when aging a young page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/18] KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bits are disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/18] KVM: x86/mmu: Dedup logic for detecting TLB flushes on leaf SPTE changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/18] KVM: x86/mmu: Stop processing TDP MMU roots for test_age if young SPTE found
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/18] KVM: x86/mmu: Process only valid TDP MMU roots when aging a gfn range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/18] KVM: x86/mmu: Use Accessed bit even when _hardware_ A/D bits are disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/18] KVM: x86/mmu: Set shadow_dirty_mask for EPT even if A/D bits disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/18] KVM: x86/mmu: Set shadow_accessed_mask for EPT even if A/D bits disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/18] KVM: x86/mmu: Add a dedicated flag to track if A/D bits are globally enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/18] KVM: x86/mmu: WARN and flush if resolving a TDP MMU fault clears MMU-writable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/18] KVM: x86/mmu: Fold mmu_spte_update_no_track() into mmu_spte_update()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/18] KVM: x86/mmu: Drop ignored return value from kvm_tdp_mmu_clear_dirty_slot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/18] KVM: x86/mmu: Don't flush TLBs when clearing Dirty bit in shadow MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/18] KVM: x86/mmu: Don't force flush if SPTE update clears Accessed bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/18] KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/18] KVM: x86/mmu: Always set SPTE's dirty bit if it's created as writable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/18] KVM: x86/mmu: Flush remote TLBs iff MMU-writable flag is cleared from RO SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/18] KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [EXTERNAL] RE: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: MUKESH RATHOR <mukeshrathor@xxxxxxxxxxxxx>
- Re: [EXTERNAL] RE: [PATCH 3/5] hyperv: Add new Hyper-V headers
- From: MUKESH RATHOR <mukeshrathor@xxxxxxxxxxxxx>
- [PATCH kvmtool] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
- From: Cyril Bur <cyrilbur@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC] powerpc/kvm: Fix spinlock member access for PREEMPT_RT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/5] mm: Introduce guest_memfd library
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [RFC RESEND 0/6] hugetlbfs largepage RAS project
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v12 17/19] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v12 14/19] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: "Manwaring, Derek" <derekmn@xxxxxxxxxx>
- [PATCH v13 82/85] KVM: x86/mmu: Don't mark "struct page" accessed when zapping SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v12 09/19] x86/cc: Add CC_ATTR_GUEST_SNP_SECURE_TSC
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v12 05/19] virt: sev-guest: Reduce the scope of SNP command mutex
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v13 85/85] KVM: Don't grab reference on VM_MIXEDMAP pfns that have a "struct page"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 78/85] KVM: PPC: Explicitly require struct page memory for Ultravisor sharing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 84/85] KVM: Drop APIs that manipulate "struct page" via pfns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 83/85] KVM: arm64: Don't mark "struct page" accessed when making SPTE young
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 81/85] KVM: Make kvm_follow_pfn.refcounted_page a required field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 80/85] KVM: s390: Use kvm_release_page_dirty() to unpin "struct page" memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 79/85] KVM: Drop gfn_to_pfn() APIs now that all users are gone
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 77/85] KVM: arm64: Use __gfn_to_page() when copying MTE tags to/from userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 76/85] KVM: Add support for read-only usage of gfn_to_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 75/85] KVM: Convert gfn_to_page() to use kvm_follow_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 73/85] KVM: PPC: Remove extra get_page() to fix page refcount leak
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 74/85] KVM: PPC: Use kvm_vcpu_map() to map guest memory to patch dcbz instructions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 72/85] KVM: MIPS: Use kvm_faultin_pfn() to map pfns into the guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 71/85] KVM: MIPS: Mark "struct page" pfns accessed prior to dropping mmu_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 70/85] KVM: MIPS: Mark "struct page" pfns accessed only in "slow" page fault path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 69/85] KVM: MIPS: Mark "struct page" pfns dirty only in "slow" page fault path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 68/85] KVM: LoongArch: Use kvm_faultin_pfn() to map pfns into the guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 67/85] KVM: LoongArch: Mark "struct page" pfn accessed before dropping mmu_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 66/85] KVM: LoongArch: Mark "struct page" pfns accessed only in "slow" page fault path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 65/85] KVM: LoongArch: Mark "struct page" pfns dirty only in "slow" page fault path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 64/85] KVM: PPC: Use kvm_faultin_pfn() to handle page faults on Book3s PR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 63/85] KVM: PPC: Book3S: Mark "struct page" pfns dirty/accessed after installing PTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 62/85] KVM: PPC: Drop unused @kvm_ro param from kvmppc_book3s_instantiate_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 61/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s Radix
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 60/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s HV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 59/85] KVM: RISC-V: Use kvm_faultin_pfn() when mapping pfns into the guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 58/85] KVM: RISC-V: Mark "struct page" pfns accessed before dropping mmu_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 57/85] KVM: RISC-V: Mark "struct page" pfns dirty iff a stage-2 PTE is installed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 56/85] KVM: arm64: Use __kvm_faultin_pfn() to handle memory aborts
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 55/85] KVM: arm64: Mark "struct page" pfns accessed/dirty before dropping mmu_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 54/85] KVM: PPC: e500: Use __kvm_faultin_pfn() to handle page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 53/85] KVM: PPC: e500: Mark "struct page" pfn accessed before dropping mmu_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 52/85] KVM: PPC: e500: Mark "struct page" dirty in kvmppc_e500_shadow_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 51/85] KVM: VMX: Use __kvm_faultin_page() to get APIC access page/pfn
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 50/85] KVM: VMX: Hold mmu_lock until page is released when updating APIC access page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 49/85] KVM: Move x86's API to release a faultin page to common KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 48/85] KVM: x86/mmu: Don't mark unused faultin pages as accessed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 47/85] KVM: x86/mmu: Put refcounted pages instead of blindly releasing pfns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 46/85] KVM: guest_memfd: Provide "struct page" as output from kvm_gmem_get_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 45/85] KVM: guest_memfd: Pass index, not gfn, to __kvm_gmem_get_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 44/85] KVM: x86/mmu: Convert page fault paths to kvm_faultin_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 43/85] KVM: Add kvm_faultin_pfn() to specifically service guest page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 42/85] KVM: Move declarations of memslot accessors up in kvm_host.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 41/85] KVM: x86/mmu: Mark pages/folios dirty at the origin of make_spte()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 40/85] KVM: x86/mmu: Add helper to "finish" handling a guest page fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 39/85] KVM: x86/mmu: Add common helper to handle prefetching SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 38/85] KVM: x86/mmu: Put direct prefetched pages via kvm_release_page_clean()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 37/85] KVM: x86/mmu: Add "mmu" prefix fault-in helpers to free up generic names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 36/85] KVM: x86: Don't fault-in APIC access page during initial allocation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 35/85] KVM: Disallow direct access (w/o mmu_notifier) to unpinned pfn by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 34/85] KVM: Get writable mapping for __kvm_vcpu_map() only when necessary
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 33/85] KVM: Pass in write/dirty to kvm_vcpu_map(), not kvm_vcpu_unmap()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 32/85] KVM: nVMX: Mark vmcs12's APIC access page dirty when unmapping
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 31/85] KVM: Pin (as in FOLL_PIN) pages during kvm_vcpu_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 30/85] KVM: Migrate kvm_vcpu_map() to kvm_follow_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 29/85] KVM: pfncache: Precisely track refcounted pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 28/85] KVM: Move kvm_{set,release}_page_{clean,dirty}() helpers up in kvm_main.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 27/85] KVM: Provide refcounted page as output field in struct kvm_follow_pfn
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 26/85] KVM: Use plain "struct page" pointer instead of single-entry array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 25/85] KVM: nVMX: Add helper to put (unmap) vmcs12 pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 24/85] KVM: nVMX: Drop pointless msr_bitmap_map field from struct nested_vmx
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 23/85] KVM: nVMX: Rely on kvm_vcpu_unmap() to track validity of eVMCS mapping
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 22/85] KVM: Use NULL for struct page pointer to indicate mremapped memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 21/85] KVM: Explicitly initialize all fields at the start of kvm_vcpu_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 20/85] KVM: Remove pointless sanity check on @map param to kvm_vcpu_(un)map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 19/85] KVM: Introduce kvm_follow_pfn() to eventually replace "gfn_to_pfn" APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 18/85] KVM: Drop unused "hva" pointer from __gfn_to_pfn_memslot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 17/85] KVM: x86/mmu: Drop kvm_page_fault.hva, i.e. don't track intermediate hva
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 16/85] KVM: Replace "async" pointer in gfn=>pfn with "no_wait" and error code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 15/85] KVM: Drop extra GUP (via check_user_page_hwpoison()) to detect poisoned page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 14/85] KVM: Return ERR_SIGPENDING from hva_to_pfn() if GUP returns -EGAIN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 13/85] KVM: Annotate that all paths in hva_to_pfn() might sleep
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 12/85] KVM: Drop @atomic param from gfn=>pfn and hva=>pfn APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 11/85] KVM: Rename gfn_to_page_many_atomic() to kvm_prefetch_pages()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 10/85] KVM: x86/mmu: Use gfn_to_page_many_atomic() when prefetching indirect PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 09/85] KVM: x86/mmu: Mark page/folio accessed only when zapping leaf SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 08/85] KVM: x86/mmu: Mark folio dirty when creating SPTE, not when zapping/modifying
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 07/85] KVM: x86/mmu: Mark new SPTE as Accessed when synchronizing existing SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 06/85] KVM: x86/mmu: Invert @can_unsync and renamed to @synchronizing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 05/85] KVM: x86/mmu: Don't overwrite shadow-present MMU SPTEs when prefaulting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 04/85] KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 03/85] KVM: Add kvm_release_page_unused() API to put pages that KVM never consumes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 02/85] KVM: Allow calling kvm_release_page_{clean,dirty}() on a NULL page pointer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 01/85] KVM: Drop KVM_ERR_PTR_BAD_PAGE and instead return NULL to indicate an error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 00/85] KVM: Stop grabbing references to PFNMAP'd pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH 3/5] hyperv: Add new Hyper-V headers
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- RE: [PATCH 2/5] hyperv: Remove unnecessary #includes
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- RE: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- [RFC] powerpc/kvm: Fix spinlock member access for PREEMPT_RT
- From: Vishal Chourasia <vishalc@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Mike Galbraith <efault@xxxxxx>
- Re: [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v4 0/4] KVM: x86: Fix and harden reg caching from !TASK context
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v4 10/36] arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/4] KVM: x86: Fix and harden reg caching from !TASK context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private
- From: Peter Xu <peterx@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2] x86: Increase the timeout for the test "vmx_apicv_test"
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH V12 14/14] perf intel-pt: Add a test for pause / resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 13/14] perf intel-pt: Add documentation for pause / resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 12/14] perf intel-pt: Improve man page format
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 11/14] perf tools: Add missing_features for aux_start_paused, aux_pause, aux_resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 10/14] perf tools: Parse aux-action
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 09/14] perf tools: Add aux-action config term
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 08/14] perf tools: Add aux_start_paused, aux_pause and aux_resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 07/14] perf/x86/intel: Do not enable large PEBS for events with aux actions or aux sampling
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 06/14] perf/x86/intel/pt: Add support for pause / resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 05/14] perf/core: Add aux_pause, aux_resume, aux_start_paused
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 04/14] KVM: selftests: Add guest Intel PT test
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 02/14] KVM: x86: Fix Intel PT IA32_RTIT_CTL MSR validation
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 01/14] perf/x86/intel/pt: Fix buffer full but size is 0 case
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 00/14] perf/core: Add ability for an event to "pause" or "resume" AUX area tracing
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Proposal: bi-weekly guest_memfd upstream call
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 0/4] KVM: x86: Fix and harden reg caching from !TASK context
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/5] mm: Introduce guest_memfd library
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86: Rename APIC base setters to better capture their relationship
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] KVM: Move KVM_REG_SIZE() definition to common uAPI header
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] KVM: nVMX: update VPPR on vmlaunch/vmresume
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v4 03/36] arm64: Add encoding for PIRE0_EL2
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 22/25] KVM: TDX: Use guest physical address to configure EPT level and GPAW
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] s390x: edat: move LC_SIZE to arch_def.h
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] s390x: add test for diag258
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 10/25] KVM: TDX: Initialize KVM supported capabilities when module setup
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 22/25] KVM: TDX: Use guest physical address to configure EPT level and GPAW
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 11/11] KVM: arm64: Enable guest_memfd private memory when pKVM is enabled
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 10/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 09/11] KVM: arm64: Skip VMA checks for slots without userspace address
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 08/11] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 07/11] KVM: guest_memfd: Add a guest_memfd() flag to initialize it as mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 06/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is host mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 05/11] KVM: guest_memfd: Add guest_memfd support to kvm_(read|/write)_guest_page()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 03/11] KVM: guest_memfd: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 02/11] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 01/11] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 00/11] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: Add API documentation for KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86: Implement Hyper-V's vCPU suspended state
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: Introduce KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 5/7] KVM: x86: Implement KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/7] lib: Add pseudo random functions
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] configure: process arguments not starting with dash
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 7/7] s390x: Add test for STFLE interpretive execution (format-0)
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/7] lib: Add pseudo random functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 10/25] KVM: TDX: Initialize KVM supported capabilities when module setup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH v4 33/36] KVM: arm64: Disable hierarchical permissions when POE is enabled
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 20/36] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86/mmu: Zap only SPs that shadow gPTEs when deleting memslot
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Mike Galbraith <efault@xxxxxx>
- Re: [PATCH v4 29/36] KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM}
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 27/36] KVM: arm64: Add a composite EL2 visibility helper
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 23/36] KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 3/9] ACPI/IORT: Support CANWBS memory access flag
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH v4 20/36] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 12/13] HID: amd_sfh: Use always-managed version of pcim_intx()
- From: Basavaraj Natikar <bnatikar@xxxxxxx>
- [kvm-unit-tests PATCH v4 1/2] s390x: edat: move LC_SIZE to arch_def.h
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/2] s390x: add test for diag258
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/2] s390x: add tests for diag258
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v12 00/19] Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 5/6] KVM: Don't BUG() the kernel if xa_insert() fails with -EBUSY
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 05/13] net/ntb: Use never-managed version of pci_intx()
- From: Shyam Sundar S K <Shyam-sundar.S-k@xxxxxxx>
- Re: [RFC PATCH 05/13] net/ntb: Use never-managed version of pci_intx()
- From: Shyam Sundar S K <Shyam-sundar.S-k@xxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] ACPICA: IORT: Update for revision E.f
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/mmu: Recover TDP MMU huge page mappings in-place instead of zapping
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/5] mm: guest_memfd: Allow folios to be accessible to host
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v4 07/36] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Hortmann <philipp.g.hortmann@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: Clean up documentation for KVM_X86_QUIRK_SLOT_ZAP_ALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86/mmu: Zap only SPs that shadow gPTEs when deleting memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86/mmu: Don't zap "direct" non-leaf SPTEs on memslot removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 36/36] KVM: arm64: Handle WXN attribute
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 35/36] KVM: arm64: Handle stage-1 permission overlays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 32/36] KVM: arm64: Add POE save/restore for AT emulation fast-path
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 34/36] KVM: arm64: Make PAN conditions part of the S1 walk context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 33/36] KVM: arm64: Disable hierarchical permissions when POE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 31/36] KVM: arm64: Add save/retore support for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 28/36] KVM: arm64: Drop bogus CPTR_EL2.E0POE trap routing
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 30/36] KVM: arm64: Add basic support for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 29/36] KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 27/36] KVM: arm64: Add a composite EL2 visibility helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 26/36] arm64: Add encoding for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 25/36] KVM: arm64: Rely on visibility to let PIR*_ELx/TCR2_ELx UNDEF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 24/36] KVM: arm64: Hide S1PIE registers from userspace when disabled for guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 18/36] KVM: arm64: Add AT fast-path support for S1PIE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 23/36] KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 22/36] KVM: arm64: Define helper for EL2 registers with custom visibility
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 21/36] KVM: arm64: Implement AT S1PIE support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 20/36] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 19/36] KVM: arm64: Split S1 permission evaluation into direct and hierarchical parts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 16/36] KVM: arm64: Handle PIR{,E0}_EL2 traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 15/36] KVM: arm64: Add save/restore for PIR{,E0}_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 17/36] KVM: arm64: Sanitise ID_AA64MMFR3_EL1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 14/36] KVM: arm64: Add PIR{,E0}_EL2 to the sysreg arrays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 13/36] KVM: arm64: Add save/restore for TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 11/36] KVM: arm64: Add TCR2_EL2 to the sysreg arrays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 12/36] KVM: arm64: Sanitise TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 10/36] arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 08/36] KVM: arm64: Correctly access TCR2_EL1, PIR_EL1, PIRE0_EL1 with VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 07/36] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 09/36] KVM: arm64: Extend masking facility to arbitrary registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 06/36] KVM: arm64: nv: Handle CNTHCTL_EL2 specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 05/36] KVM: arm64: nv: Add missing EL2->EL1 mappings in get_el2_to_el1_mapping()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 04/36] KVM: arm64: Drop useless struct s2_mmu in __kvm_at_s1e2()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 03/36] arm64: Add encoding for PIRE0_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 02/36] arm64: Remove VNCR definition for PIRE0_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 01/36] arm64: Drop SKL0/SKL1 from TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 00/36] KVM: arm64: Add EL2 support to FEAT_S1PIE/S1POE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- [PATCH 6/7] KVM: x86: Rename APIC base setters to better capture their relationship
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: x86: Make kvm_recalculate_apic_map() local to lapic.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: x86: Move kvm_set_apic_base() implementation to lapic.c (from x86.c)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: x86: Inline kvm_get_apic_mode() in lapic.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] KVM: x86: Get vcpu->arch.apic_base directly and drop kvm_get_apic_base()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: x86: Drop superfluous kvm_lapic_set_base() call when setting APIC state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Short-circuit all kvm_lapic_set_base() if MSR value isn't changing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [PATCH v4 4/4] KVM: x86: Use '0' for guest RIP if PMI encounters protected guest state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 3/4] KVM: x86: Add lockdep-guarded asserts on register cache usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 2/4] KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 1/4] KVM: x86: Bypass register cache when querying CPL from kvm_sched_out()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 0/4] KVM: x86: Fix and harden reg caching from !TASK context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Initial support for SMMUv3 nested translation
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/mmu: Recover TDP MMU huge page mappings in-place instead of zapping
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [PATCH v3 7/9] iommu/arm-smmu-v3: Expose the arm_smmu_attach interface
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/mmu: Recover TDP MMU huge page mappings in-place instead of zapping
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v3 5/9] iommu/arm-smmu-v3: Support IOMMU_GET_HW_INFO via struct arm_smmu_hw_info
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 1/9] vfio: Remove VFIO_TYPE1_NESTING_IOMMU
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 7/9] iommu/arm-smmu-v3: Expose the arm_smmu_attach interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 6/9] iommu/arm-smmu-v3: Implement IOMMU_HWPT_ALLOC_NEST_PARENT
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 2/9] ACPICA: IORT: Update for revision E.f
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 3/9] ACPI/IORT: Support CANWBS memory access flag
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 0/9] Initial support for SMMUv3 nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 4/9] iommu/arm-smmu-v3: Report IOMMU_CAP_ENFORCE_CACHE_COHERENCY for CANWBS
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 00/19] Add Secure TSC support for SNP guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 14/14] KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 13/14] KVM: selftests: Add a read-only mprotect() phase to mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 12/14] KVM: selftests: Precisely limit the number of guest loops in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 11/14] KVM: selftests: Use vcpu_arch_put_guest() in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 10/14] KVM: selftests: Enable mmu_stress_test on arm64
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 09/14] KVM: sefltests: Explicitly include ucall_common.h in mmu_stress_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 08/14] KVM: selftests: Compute number of extra pages needed in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 07/14] KVM: selftests: Only muck with SREGS on x86 in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 06/14] KVM: selftests: Rename max_guest_memory_test to mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 05/14] KVM: selftests: Check for a potential unhandled exception iff KVM_RUN succeeded
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 04/14] KVM: selftests: Assert that vcpu_{g,s}et_reg() won't truncate
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 03/14] KVM: selftests: Return a value from vcpu_get_reg() instead of using an out-param
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 02/14] KVM: selftests: Disable strict aliasing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 01/14] KVM: Move KVM_REG_SIZE() definition to common uAPI header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 00/14] KVM: selftests: Morph max_guest_mem to mmu_stress
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC RESEND 0/6] hugetlbfs largepage RAS project
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 6/6] KVM: Drop hack that "manually" informs lockdep of kvm->lock vs. vcpu->mutex
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/6] KVM: Don't BUG() the kernel if xa_insert() fails with -EBUSY
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/6] KVM: Grab vcpu->mutex across installing the vCPU's fd and bumping online_vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/6] KVM: Verify there's at least one online vCPU when iterating over all vCPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 18/25] KVM: TDX: Do TDX specific vcpu initialization
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: memslot_perf_test: increase guest sync timeout
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC v5 04/10] tun: Unify vnet implementation
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH RFC v5 01/10] virtio_net: Add functions for hashing
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: KVM default behavior change on module loading in kernel 6.12
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC PATCH 09/13] ata: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH v2 1/1] x86: Add support save/load HWCR MSR
- From: Gao Shiyuan <gaoshiyuan@xxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 19/19] x86/sev: Allow Secure TSC feature for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 18/19] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 17/19] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 12/19] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 14/19] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 13/19] x86/sev: Mark Secure TSC as reliable clocksource
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 11/19] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 10/19] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 09/19] x86/cc: Add CC_ATTR_GUEST_SNP_SECURE_TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 08/19] x86/sev: Relocate SNP guest messaging routines to common code
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 07/19] x86/sev: Carve out and export SNP guest messaging init routines
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 06/19] virt: sev-guest: Carve out SNP message context structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 05/19] virt: sev-guest: Reduce the scope of SNP command mutex
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 04/19] virt: sev-guest: Consolidate SNP guest messaging parameters to a struct
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 03/19] x86/sev: Cache the secrets page address
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 02/19] x86/sev: Handle failures from snp_init()
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 01/19] virt: sev-guest: Use AES GCM crypto library
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 00/19] Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v1 1/1] x86: Add support save/load HWCR MSR
- From: "Gao,Shiyuan" <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 09/13] ata: Use always-managed version of pci_intx()
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
- From: Juergen Gross <jgross@xxxxxxxx>
- [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 12/13] HID: amd_sfh: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 11/13] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 09/13] ata: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 08/13] PCI: MSI: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 07/13] vfio/pci: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 06/13] misc: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 05/13] net/ntb: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 04/13] net/ethernet: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH v1 1/1] x86: Add support save/load HWCR MSR
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH RFC v5 07/10] tun: Introduce virtio-net RSS
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RFC v5 05/10] tun: Pad virtio header with zero
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 42/43] arm64: kvm: Expose support for private memory
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86: Use user_exit_on_hypercall() instead of opencode
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: x86: Check hypercall's exit to userspace generically
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] nVMX: Simple posted interrupts test
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC v2 00/12] Introduce Hybrid CPU Topology via Custom Topology Tree
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 05/12] hw/core/machine: Introduce custom CPU topology with max limitations
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 01/12] qdev: Allow qdev_device_add() to add specific category device
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 00/12] Introduce Hybrid CPU Topology via Custom Topology Tree
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86: Check hypercall's exit to userspace generically
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: "Manwaring, Derek" <derekmn@xxxxxxxxxx>
- Re: [PATCH v8 00/11] Enable haltpoll on arm64
- From: "zhenglifeng (A)" <zhenglifeng1@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 5/5] KVM: x86: Add fastpath handling of HLT VM-Exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [no subject]
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH] KVM: SVM: Increase X2AVIC limit to 4096 vcpus
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v5 09/43] arm64: RME: ioctls to create and configure realms
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] selftests: kvm: s390: Fix whitespace confusion in ucontrol test
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH net-next v20 04/14] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v6 11/11] arm64: Document Arm Confidential Compute
- From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx>
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 1/2] KVM: x86: Fix a comment inside kvm_vcpu_update_apicv()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 0/2] Fixup two comments
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC v2 00/12] Introduce Hybrid CPU Topology via Custom Topology Tree
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 05/12] hw/core/machine: Introduce custom CPU topology with max limitations
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 01/12] qdev: Allow qdev_device_add() to add specific category device
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Enable shared device assignment
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: "Marc Hartmayer" <mhartmay@xxxxxxxxxxxxx>
- [Bug 218025] Assertion Failure happens in kvm selftest vmx_preemption_timer_test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 1/4] selftests: kvm: s390: Add uc_map_unmap VM test case
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 4/4] selftests: kvm: s390: Fix whitespace confusion in ucontrol test
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 0/4] selftests: kvm: s390: Add ucontrol memory selftests
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 2/4] selftests: kvm: s390: Add uc_skey VM test case
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- [PATCH RFC v5 10/10] vhost/net: Support VIRTIO_NET_F_HASH_REPORT
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 09/10] selftest: tun: Add tests for virtio-net hashing
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 08/10] selftest: tun: Test vnet ioctls without device
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 07/10] tun: Introduce virtio-net RSS
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 05/10] tun: Pad virtio header with zero
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 04/10] tun: Unify vnet implementation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 03/10] net: flow_dissector: Export flow_keys_dissector_symmetric
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 02/10] skbuff: Introduce SKB_EXT_TUN_VNET_HASH
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 01/10] virtio_net: Add functions for hashing
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 00/10] tun: Introduce virtio-net hashing feature
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86: Add fastpath handling of HLT VM-Exits
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v6 11/11] arm64: Document Arm Confidential Compute
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v1 1/1] x86: Add support save/load HWCR MSR
- From: "Gao,Shiyuan" <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 09/11] arm64: Enable memory encrypt for Realms
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 08/11] arm64: mm: Avoid TLBI when marking pages as valid
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: Enforce bounce buffers for realm DMA
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 1/1] target/riscv: enable floating point unit
- From: Alistair Francis <alistair23@xxxxxxxxx>
- Re: [PATCH v6 06/11] efi: arm64: Map Device with Prot Shared
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 04/11] arm64: rsi: Add support for checking whether an MMIO is protected
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 03/11] arm64: realm: Query IPA size from the RMM
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 01/11] arm64: rsi: Add RSI definitions
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [GIT PULL] virtio: bugfixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: KVM default behavior change on module loading in kernel 6.12
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 2/5] hyperv: Remove unnecessary #includes
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 1/5] hyperv: Move hv_connection_id to hyperv-tlfs.h
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [GIT PULL] virtio: bugfixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: memslot_perf_test: increase guest sync timeout
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] i386/pc: Support cache topology in -machine for PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 6/7] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 5/7] i386/cpu: Support thread and module level cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 4/7] hw/core: Check smp cache topology support for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 3/7] hw/core: Add smp cache topology for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 07/43] arm64: RME: Check for RME support at KVM init
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 2/7] qapi/qom: Define cache enumeration and properties
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 19/43] KVM: arm64: Handle realm MMIO emulation
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v2 6/7] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [PATCH v5 05/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 1/4] x86/cpufeatures: Add CPUID feature bit for the Bus Lock Threshold
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v5 19/43] KVM: arm64: Handle realm MMIO emulation
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.12-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH 1/1] virtio_fs: store actual queue index in mq_map
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- [PATCH 1/1] virtio_fs: add informative log for new tag discovery
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- RE: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: David Laight <David.Laight@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.12-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v1 3/3] vfio/nvgrace-gpu: Check the HBM training and C2C link status
- From: <ankita@xxxxxxxxxx>
- [PATCH v1 1/3] vfio/nvgrace-gpu: Read dvsec register to determine need for uncached resmem
- From: <ankita@xxxxxxxxxx>
- [PATCH v1 2/3] vfio/nvgrace-gpu: Expose the blackwell device PF BAR1 to the VM
- From: <ankita@xxxxxxxxxx>
- [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: <ankita@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.12, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v3 1/4] x86/cpufeatures: Add CPUID feature bit for the Bus Lock Threshold
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 4/4] KVM: selftests: Add bus lock exit test
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: leave kvm.ko out of the build if no vendor module is requested
- From: kernel test robot <lkp@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]