Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 10/21] KVM: x86: Fix software TSC upscaling in kvm_update_guest_time()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 1/2] vfio: Create vfio_fs_type with inode per device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v3 09/21] KVM: x86: Fix KVM clock precision in __get_kvmclock()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 04/21] UAPI: x86: Move pvclock-abi to UAPI for x86 platforms
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [RFC PATCH v4 5/5] KVM: riscv: selftests: Add Svadu Extension to get-reg-list testt
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 4/5] RISC-V: KVM: add support for SBI_FWFT_PTE_AD_HW_UPDATING
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 3/5] RISC-V: KVM: Add Svadu Extension Support for Guest/VM
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [v2][kvmtool PATCH 1/1] riscv: Add zacas extension
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [RFC PATCH v4 2/5] dt-bindings: riscv: Add Svadu Entry
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 0/5] Add Svadu Extension Support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- RE: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v4 0/2] LoongArch: Add steal time support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v4 1/2] LoongArch: KVM: Add steal time support in kvm side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v4 2/2] LoongArch: Add steal time support in guest side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [v2][kvmtool PATCH 1/1] riscv: Add zacas extension
- From: "Shaoqing Qin" <qinshaoqing@xxxxxxxxxx>
- [v2][kvmtool PATCH 0/1] riscv: Add zacas extension
- From: "Shaoqing Qin" <qinshaoqing@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Delete the now unused kvm_arch_sched_in()
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vfio-mdev: add MODULE_DESCRIPTION() macros
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 1/2] vfio: Create vfio_fs_type with inode per device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 0/2] vfio/pci: vfio device address space mapping
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL v2] virtio: features, fixes, cleanups
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 0/4] Export APICv-related state via binary stats interface
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- [PATCH v6] KVM: arm64: Add early_param to control WFx trapping
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH 0/9] KVM: x86: Fixes for KVM_INTEL_PROVE_VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH][next][V2] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH][next] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: "Colin King (gmail)" <colin.i.king@xxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH][next] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 3/3] vfio/pci: Enable PCI resource mmap() on s390 and remove VFIO_PCI_MMAP
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] vsock/virtio: Add support for multi-devices
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Cpu steal
- From: "Y.G Kumar" <ygkumar17@xxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- [PATCH v3 2/3] KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v3 3/3] KVM: SEV-ES: Fix LBRV code
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v3 1/3] KVM: SEV-ES: Prevent MSR access post VMSA encryption
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v3 0/3] KVM: SEV-ES: Fix KVM_{GET|SET}_MSRS and LBRV handling
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH][next] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- [PATCH v2 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v2 3/3] vfio/pci: Enable PCI resource mmap() on s390 and remove VFIO_PCI_MMAP
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v2 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v2 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] vsock/virtio: Add support for multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] vsock: Add an ioctl request to get all CIDs
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] vsock: seqpacket_allow adapts to multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 3/5] vsock/virtio: can_msgzerocopy adapts to multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 2/5] vsock/virtio: Add support for multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] vsock/virtio: Extend virtio-vsock spec with an "order" field
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: Jürgen Groß <jgross@xxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix incorrect reg_subtype labels in kvm_riscv_vcpu_set_reg_isa_ext function
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] vfio/pci: Enable VFIO_PCI_MMAP for s390
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] vsock/virtio: Extend virtio-vsock spec with an "order" field
- From: Alyssa Ross <hi@xxxxxxxxx>
- [GIT PULL v2] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: x86: Register "emergency disable" callbacks when virt is enabled
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 5/6] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Add arch hooks for enabling/disabling virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v2 2/4] LoongArch: KVM: Add LBT feature detection with cpucfg
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 3/4] LoongArch: KVM: Add vm migration support for LBT registers
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 0/4] LoongArch: KVM: Add Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 1/4] LoongArch: KVM: Add HW Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 4/4] LoongArch: KVM: Add VM LBT feature detection support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix incorrect reg_subtype labels in kvm_riscv_vcpu_set_reg_isa_ext function
- From: zhouquan@xxxxxxxxxxx
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: selftest: Define _GNU_SOURCE for all selftests code
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vfio/pci: Add iowrite64 and ioread64 support for vfio pci
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 3/3] vfio/pci: Enable VFIO_PCI_MMAP for s390
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: x86: Register "emergency disable" callbacks when virt is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 5/6] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: Rename functions related to enabling virtualization hardware
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Add arch hooks for enabling/disabling virtualization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/1] x86: vmexit: Allow IPI test to be accelerated by SVM AVIC
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] PCIE device crash when trying to pass through USB Device to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] New: PCIE device crash when trying to pass through USB Device to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/9] cpuidle-haltpoll: condition on ARCH_CPUIDLE_HALTPOLL
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH 4/9] cpuidle-haltpoll: define arch_haltpoll_supported()
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: Add a flag to track if a loaded vCPU is scheduled out
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 3/3] vfio/pci: Fix typo in macro to declare accessors
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [PATCH v4 1/3] vfio/pci: Extract duplicated code into macro
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [PATCH v4 0/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 36/49] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [no subject]
- From: Harsh Kumar <text2hk@xxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [GIT PULL] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 0/2] Add support for LAM in QEMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 0/2] Add support for LAM in QEMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 33/49] KVM: x86: Advertise TSC_DEADLINE_TIMER in KVM_GET_SUPPORTED_CPUID
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: KVM: No need to use mask when hart-index-bit is 0
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v1 RESEND] arch/powerpc/kvm: Fix doorbell emulation by adding DPDES support
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH] arch/powerpc/kvm: Fix doorbell emulation by adding DPDES support
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: KVM: No need to use mask when hart-index-bit is 0
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 08/16] riscv: add ISA parsing for Zca, Zcf, Zcd and Zcb
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: Rename functions related to enabling virtualization hardware
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v7 08/10] KVM VMX: Move MSR_IA32_VMX_MISC bit defines to asm/vmx.h
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 04/10] KVM: VMX: Move MSR_IA32_VMX_BASIC bit defines to asm/vmx.h
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 07/10] KVM: nVMX: Add a helper to encode VMCS info in MSR_IA32_VMX_BASIC
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v7 04/10] KVM: VMX: Move MSR_IA32_VMX_BASIC bit defines to asm/vmx.h
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 20/49] KVM: x86: Rename kvm_cpu_cap_mask() to kvm_cpu_cap_init()
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] LoongArch: KVM: Add steal time support in kvm side
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2 1/6] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 12/49] KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/6] KVM: x86: Register "emergency disable" callbacks when virt is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/6] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: Add arch hooks for enabling/disabling virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: Rename functions related to enabling virtualization hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/6] KVM: Register cpuhp/syscore callbacks when enabling virt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] LoongArch: Add steal time support in guest side
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/6] KVM: x86: Drop now-superflous setting of l1tf_flush_l1d in vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: Delete the now unused kvm_arch_sched_in()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: VMX: Move PLE grow/shrink helpers above vmx_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: Add a flag to track if a loaded vCPU is scheduled out
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/6] KVM: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2024.05.22 - CANCELED
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH] KVM: x86: Drop support for hand tuning APIC timer advancement from userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v3 01/21] KVM: x86/xen: Do not corrupt KVM clock in kvm_xen_shared_info_init()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 16/21] KVM: x86: Factor out kvm_use_master_clock()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 12/21] KVM: x86: Remove implicit rdtsc() from kvm_compute_l1_tsc_offset()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 20/21] KVM: x86/xen: Prevent runstate times from becoming negative
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 00/21] Cleaning up the KVM clock mess
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 15/21] KVM: x86: Allow KVM master clock mode when TSCs are offset from each other
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 18/21] KVM: x86: Avoid gratuitous global clock reload in kvm_arch_vcpu_load()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 05/21] KVM: selftests: Add KVM/PV clock selftest to prove timer correction
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 02/21] KVM: x86: Improve accuracy of KVM clock when TSC scaling is in force
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 09/21] KVM: x86: Fix KVM clock precision in __get_kvmclock()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 14/21] KVM: x86: Kill cur_tsc_{nsec,offset,write} fields
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 07/21] KVM: x86: Add KVM_VCPU_TSC_SCALE and fix the documentation on TSC migration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 08/21] KVM: x86: Avoid NTP frequency skew for KVM clock on 32-bit host
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 17/21] KVM: x86: Avoid global clock update on setting KVM clock MSR
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 21/21] sched/cputime: Cope with steal time going backwards or negative
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 03/21] KVM: x86: Add KVM_[GS]ET_CLOCK_GUEST for accurate KVM clock migration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 10/21] KVM: x86: Fix software TSC upscaling in kvm_update_guest_time()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 19/21] KVM: x86: Avoid periodic KVM clock updates in master clock mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 13/21] KVM: x86: Improve synchronization in kvm_synchronize_tsc()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 04/21] UAPI: x86: Move pvclock-abi to UAPI for x86 platforms
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 11/21] KVM: x86: Simplify and comment kvm_get_time_scale()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 06/21] KVM: x86: Explicitly disable TSC scaling without CONSTANT_TSC
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: access_tracking_perf_test kvm selftest doesn't work when Multi-Gen LRU is in use
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 08/16] riscv: add ISA parsing for Zca, Zcf, Zcd and Zcb
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Drop unused check_apicv_inhibit_reasons() callback definition
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 3/3] vfio/pci: Continue to refactor vfio_pci_core_do_io_rw
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/3] vfio/pci: Extract duplicated code into macro
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: zhoushuling <zhoushuling@xxxxxxxxxx>
- [PATCH 3/3] vfio/pci: Enable VFIO_PCI_MMAP for s390
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v5 07/16] riscv: add ISA extensions validation callback
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 1/9] KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Alexander Graf <agraf@xxxxxxxxx>
- Re: [PATCH v2 4/5] KVM: selftests: Add an interface to read the data of named vcpu stat
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 1/2] LoongArch: KVM: Add steal time support in kvm side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/2] LoongArch: Add steal time support in guest side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/2] LoongArch: Add steal time support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 07/10] KVM: nVMX: Add a helper to encode VMCS info in MSR_IA32_VMX_BASIC
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 3/3] KVM: SVM: Consider NUMA affinity when allocating per-CPU save_area
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 2/3] KVM: SVM: not account memory allocation for per-CPU svm_data
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 1/3] KVM: SVM: remove useless input parameter in snp_safe_alloc_page
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [GIT PULL] VFIO updates for v6.10-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 03/10] KVM: x86: Stuff vCPU's PAT with default value at RESET, not creation
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v7 10/10] KVM: nVMX: Use macros and #defines in vmx_restore_vmx_misc()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 09/10] KVM: VMX: Open code VMX preemption timer rate mask in its accessor
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 08/10] KVM VMX: Move MSR_IA32_VMX_MISC bit defines to asm/vmx.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/10] KVM: nVMX: Add a helper to encode VMCS info in MSR_IA32_VMX_BASIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 06/10] KVM: nVMX: Use macros and #defines in vmx_restore_vmx_basic()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 05/10] KVM: VMX: Track CPU's MSR_IA32_VMX_BASIC as a single 64-bit value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 04/10] KVM: VMX: Move MSR_IA32_VMX_BASIC bit defines to asm/vmx.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 03/10] KVM: x86: Stuff vCPU's PAT with default value at RESET, not creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 02/10] x86/cpu: KVM: Move macro to encode PAT value to common header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 01/10] x86/cpu: KVM: Add common defines for architectural memory types (PAT, MTRRs, etc.)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 00/10] x86/cpu: KVM: Clean up PAT and VMX macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH V6 4/4] KVM: selftests: Add test for configure of x86 APIC bus frequency
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V6 4/4] KVM: selftests: Add test for configure of x86 APIC bus frequency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V6 4/4] KVM: selftests: Add test for configure of x86 APIC bus frequency
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: fix spelling of KVM_RUN_X86_BUS_LOCK in docs
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] KVM: fix documentation rendering for KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: SEV: Fix unused variable in guest request handling
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Carlos Bilbao <carlos.bilbao.osdev@xxxxxxxxx>
- Re: [PATCH 1/9] KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v3 0/3] KVM: SVM: refine snp_safe_alloc_page() implementation
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH v3 2/3] KVM: SVM: not account memory allocation for per-CPU svm_data
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH v3 1/3] KVM: SVM: remove useless input parameter in snp_safe_alloc_page
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH v3 3/3] KVM: SVM: Consider NUMA affinity when allocating per-CPU save_area
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: <zhoushuling@xxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Dorjoy Chowdhury <dorjoychy111@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RESEND PATCH 3/3] arch/powerpc/kvm: Reduce lock contention by moving spinlock from ics to irq_state
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [RESEND PATCH 2/3] arch/powerpc/kvm: Optimize the server number -> ICP lookup
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [RESEND PATCH 1/3] arch/powerpc/kvm: Use bitmap to speed up resend of irqs in ICS
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [RESEND PATCH 0/3] XICS emulation optimizations in KVM for PPC
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- From Financial Crimes Enforcement Network
- From: "Financial Crimes Enforcement Network" <bill@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Carlos Bilbao <carlos.bilbao.osdev@xxxxxxxxx>
- [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <mdroth@xxxxxxxxxx>
- How to implement message forwarding from one CID to another in vhost driver
- From: Dorjoy Chowdhury <dorjoychy111@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH] selftests: drivers/s390x: Use SKIP() during FIXTURE_SETUP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/9] KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfo
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] KVM: VMX: Don't kill the VM on an unexpected #VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: x86/mmu: Print SPTEs on unexpected #VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/9] KVM: VMX: Dump VMCS on unexpected #VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] KVM: x86: Fixes for KVM_INTEL_PROVE_VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PULL 17/19] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/2] selftests: harness: refactor __constructor_order
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 05/16] KVM: Add member to struct kvm_gfn_range for target alias
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PULL 17/19] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH] KVM: x86: Force KVM_WERROR if the global WERROR is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2 00/49] KVM: x86: CPUID overhaul, fixes, and caching
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH v2 49/49] *** DO NOT APPLY *** KVM: x86: Verify KVM initializes all consumed guest caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 48/49] KVM: x86: Add a macro for features that are synthesized into boot_cpu_data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 47/49] KVM: x86: Drop superfluous host XSAVE check when adjusting guest XSAVES caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 46/49] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 45/49] KVM: x86: Shuffle code to prepare for dropping guest_cpuid_has()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 44/49] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 43/49] KVM: x86: Update OS{XSAVE,PKE} bits in guest CPUID irrespective of host support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 42/49] KVM: x86: Drop unnecessary check that cpuid_entry2_find() returns right leaf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 41/49] KVM: x86: Avoid double CPUID lookup when updating MWAIT at runtime
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 40/49] KVM: x86: Initialize guest cpu_caps based on KVM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 39/49] KVM: x86: Extract code for generating per-entry emulated CPUID information
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 38/49] KVM: x86: Initialize guest cpu_caps based on guest CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 37/49] KVM: x86: Replace guts of "governed" features with comprehensive cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 36/49] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 35/49] KVM: x86: Add a macro to handle features that are fully VMM controlled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 34/49] KVM: x86: Advertise HYPERVISOR in KVM_GET_SUPPORTED_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 33/49] KVM: x86: Advertise TSC_DEADLINE_TIMER in KVM_GET_SUPPORTED_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 32/49] KVM: x86: Remove all direct usage of cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 31/49] KVM: x86: Move kvm_find_cpuid_entry{,_index}() up near cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 30/49] KVM: x86: Always operate on kvm_vcpu data in cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 29/49] KVM: x86: Remove unnecessary caching of KVM's PV CPUID base
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 28/49] KVM: x86: Clear PV_UNHALT for !HLT-exiting only when userspace sets CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 27/49] KVM: x86: Swap incoming guest CPUID into vCPU before massaging in KVM_SET_CPUID2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 26/49] KVM: x86: Add a macro to init CPUID features that KVM emulates in software
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 25/49] KVM: x86: Harden CPU capabilities processing against out-of-scope features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 24/49] KVM: x86: #undef SPEC_CTRL_SSBD in cpuid.c to avoid macro collisions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 23/49] KVM: x86: Handle kernel- and KVM-defined CPUID words in a single helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 22/49] KVM: x86: Add a macro to precisely handle aliased 0x1.EDX CPUID features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 21/49] KVM: x86: Add a macro to init CPUID features that are 64-bit only
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/49] KVM: x86: Rename kvm_cpu_cap_mask() to kvm_cpu_cap_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/49] KVM: x86: Add a macro to init CPUID features that ignore host kernel support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/49] KVM: x86: Account for max supported CPUID leaf when getting raw host CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/49] KVM: x86: Do reverse CPUID sanity checks in __feature_leaf()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/49] KVM: x86: Don't update PV features caches when enabling enforcement capability
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/49] KVM: x86: Zero out PV features cache when the CPUID leaf is not present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/49] KVM: selftests: Update x86's KVM PV test to match KVM's disabling exits behavior
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/49] KVM: selftests: Fix a bad TEST_REQUIRE() in x86's KVM PV test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/49] KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/49] KVM: x86: Disallow KVM_CAP_X86_DISABLE_EXITS after vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/49] KVM: x86: Drop now-redundant MAXPHYADDR and GPA rsvd bits from vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/49] KVM: x86/pmu: Drop now-redundant refresh() during init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/49] KVM: x86: Move __kvm_is_valid_cr4() definition to x86.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/49] KVM: selftests: Verify KVM stuffs runtime CPUID OS bits on CR4 writes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/49] KVM: selftests: Refresh vCPU CPUID cache in __vcpu_get_cpuid_entry()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/49] KVM: selftests: Assert that the @cpuid passed to get_cpuid_entry() is non-NULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/49] KVM: selftests: Update x86's set_sregs_test to match KVM's CPUID enforcement
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/49] KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/49] KVM: x86: Explicitly do runtime CPUID updates "after" initial setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/49] KVM: x86: Do all post-set CPUID processing during vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/49] KVM: x86: CPUID overhaul, fixes, and caching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 07/16] riscv: add ISA extensions validation callback
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 05/16] KVM: riscv: selftests: Add Zimop extension to get-reg-list test
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v5 04/16] RISC-V: KVM: Allow Zimop extension for Guest/VM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: Jürgen Groß <jgross@xxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH v5 16/16] KVM: riscv: selftests: Add Zcmop extension to get-reg-list test
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 15/16] RISC-V: KVM: Allow Zcmop extension for Guest/VM
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 14/16] riscv: hwprobe: export Zcmop ISA extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 13/16] riscv: add ISA extension parsing for Zcmop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 12/16] dt-bindings: riscv: add Zcmop ISA extension description
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 11/16] KVM: riscv: selftests: Add some Zc* extensions to get-reg-list test
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 10/16] RISC-V: KVM: Allow Zca, Zcf, Zcd and Zcb extensions for Guest/VM
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 09/16] riscv: hwprobe: export Zca, Zcf, Zcd and Zcb ISA extensions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 08/16] riscv: add ISA parsing for Zca, Zcf, Zcd and Zcb
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 07/16] riscv: add ISA extensions validation callback
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 06/16] dt-bindings: riscv: add Zca, Zcf, Zcd and Zcb ISA extension description
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 05/16] KVM: riscv: selftests: Add Zimop extension to get-reg-list test
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 04/16] RISC-V: KVM: Allow Zimop extension for Guest/VM
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 03/16] riscv: hwprobe: export Zimop ISA extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 02/16] riscv: add ISA extension parsing for Zimop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 01/16] dt-bindings: riscv: add Zimop ISA extension description
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 00/16] Add support for a few Zc* extensions, Zcmop and Zimop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [RFC PATCH 5/5] vsock: Add an ioctl request to get all CIDs
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 4/5] vsock: seqpacket_allow adapts to multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 3/5] vsock/virtio: can_msgzerocopy adapts to multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 2/5] vsock/virtio: Add support for multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 1/5] vsock/virtio: Extend virtio-vsock spec with an "order" field
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 0/5] vsock/virtio: Add support for multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/3] vfio/pci: Extract duplicated code into macro
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 4/4] riscv: add SBI SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 3/4] riscv: add SSE assembly entry handling
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/4] riscv: add SBI SSE extension definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/4] riscv: move REG_L/REG_W in a dedicated asm.h file
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/4] riscv: add SBI SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- unsubscribe
- From: Satay Epic <satayepic@xxxxxxxxx>
- [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 0/2] selftests: harness: refactor __constructor_order
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 3/3] vfio/pci: Continue to refactor vfio_pci_core_do_io_rw
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH v3 1/3] vfio/pci: Extract duplicated code into macro
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Thomas Hellström <thomas.hellstrom@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/14] arm64: Force device mappings to be non-secure shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] Fix Issue: When VirtIO Backend providing VIRTIO_BLK_F_MQ feature, The file system of the front-end OS fails to be mounted.
- From: Andrey Zhadchenko <andrey.zhadchenko@xxxxxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Christian König <ckoenig.leichtzumerken@xxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH] vfio/pci: Restore zero affected bus reset devices warning
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH] vfio/pci: Collect hot-reset devices to local buffer
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH] Fix Issue: When VirtIO Backend providing VIRTIO_BLK_F_MQ feature, The file system of the front-end OS fails to be mounted.
- From: Lynch <lynch.wy@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v8] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] vringh: add MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the loongarch tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] vfio/pci: Restore zero affected bus reset devices warning
- From: Cédric Le Goater <clg@xxxxxxxx>
- [PATCH] vfio/pci: Restore zero affected bus reset devices warning
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: Collect hot-reset devices to local buffer
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4] vfio/pci: migration: Skip config space check for Vendor Specific Information in VSC during restore/load
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH v5] KVM: arm64: Add early_param to control WFx trapping
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 07/14] arm64: Make the PHYS_MASK_SHIFT dynamic
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v2 03/14] arm64: realm: Query IPA size from the RMM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH] vhost: use pr_err for vq_err
- From: Peng Fan <peng.fan@xxxxxxx>
- Re: [PATCH] vhost: use pr_err for vq_err
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- RE: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- RE: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vhost: use pr_err for vq_err
- From: "Peng Fan (OSS)" <peng.fan@xxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvmtool PATCH v3 1/1] riscv: Fix the hart bit setting of AIA
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 6.10 merge window
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- access_tracking_perf_test kvm selftest doesn't work when Multi-Gen LRU is in use
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix uninitialized firmware error code
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]