Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: add KVM_RUN_X86_GUEST_MODE kvm_run flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH] KVM: Unexport kvm_debugfs_dir
- From: Borislav Petkov <bp@xxxxxxxxxx>
- [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [kvmtool PATCH v2 1/1] riscv: Fix the hart bit setting of AIA
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 00/21] i386: Introduce smp.modules and clean up cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [RFC v4 07/13] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [RFC v4 06/13] mm: page_frag: add '_va' suffix to page_frag API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: add KVM_RUN_X86_GUEST_MODE kvm_run flag
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 10/14] arm64: Force device mappings to be non-secure shared
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- [kvmtool PATCH v2 1/1] riscv: Fix the hart bit setting of AIA
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v2 10/14] arm64: Force device mappings to be non-secure shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: <cheng.lin130@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the loongarch tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH]virtio-pci: Check if is_avq is NULL
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] KVM: SEV: Replace KVM_EXIT_VMGEXIT with KVM_EXIT_SNP_REQ_CERTS
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH 16/16] KVM: x86/tdp_mmu: Invalidate correct roots
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 15/16] KVM: x86/tdp_mmu: Make mmu notifier callbacks to check kvm_process
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 14/16] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 13/16] KVM: x86/tdp_mmu: Introduce shared, private KVM MMU root types
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 12/16] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 11/16] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 07/16] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 09/16] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 06/16] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 05/16] KVM: Add member to struct kvm_gfn_range for target alias
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 03/16] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 01/16] KVM: x86: Add a VM type define for TDX
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 00/16] TDX MMU prep series part 1
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [RFC PATCH 6/7] riscv: kvm: add SBI FWFT support for SBI_FWFT_DOUBLE_TRAP_ENABLE
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH]virtio-pci: Check if is_avq is NULL
- From: li zhang <zhanglikernel@xxxxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] KVM: arm64: nv: Fix relative priorities of exceptions generated by ERETAx
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [RFC PATCH 5/7] riscv: add double trap driver
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 13/15] KVM: x86: Kill cur_tsc_{nsec,offset,write} fields
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 18/33] arm: realm: Add test for FPU/SIMD context save/restore
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 06/14] arm64: Override set_fixmap_io
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [RFC PATCH 6/7] riscv: kvm: add SBI FWFT support for SBI_FWFT_DOUBLE_TRAP_ENABLE
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 30/54] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/7] riscv: add double trap driver
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v2 27/54] KVM: x86/pmu: Exclude PMU MSRs in vmx_get_passthrough_msr_slot()
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [kvmtool PATCH 3/3] riscv: Add Zacas extensiona support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH 2/3] riscv: Add Ztso extensiona support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH 1/3] Sync-up headers with Linux-6.9 kernel
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH 0/3] Add RISC-V ISA extensions based on Linux-6.9
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: "Manwaring, Derek" <derekmn@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 02/21] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/21] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 02/21] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 10/12] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] KVM: SEV: Fix uninitialized firmware error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v3 09/12] KVM: arm64: VHE: Add test module for hyp kCFI
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] Kselftest fixes for v6.9
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 08/14] arm64: Enforce bounce buffers for realm DMA
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 07/14] arm64: Make the PHYS_MASK_SHIFT dynamic
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 4/4] KVM: Rename functions related to enabling virtualization hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/16] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Register emergency virt callback in common code, via kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/14] arm64: Override set_fixmap_io
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v3 08/12] arm64: Move esr_comment() to <asm/esr.h>
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 07/12] KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 06/12] KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 04/12] KVM: arm64: nVHE: Remove __guest_exit_panic path
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 03/12] KVM: arm64: Pass pointer to __pkvm_init_switch_pgd
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 03/14] arm64: realm: Query IPA size from the RMM
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 02/12] KVM: arm64: Fix __pkvm_init_switch_pgd C signature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 01/12] KVM: arm64: Fix clobbered ELR in sync abort/SError
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: arm64: Only reset vCPU-scoped feature ID regs once
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: arm64: Reset VM feature ID regs from kvm_reset_sys_regs()
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: arm64: Rename is_id_reg() to imply VM scope
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH v4 00/22] hw/i386: Remove deprecated pc-i440fx-2.0 -> 2.3 machines
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: Rename functions related to enabling virtualization hardware
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Register emergency virt callback in common code, via kvm_x86_ops
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [syzbot] Monthly kvm report (May 2024)
- From: syzbot <syzbot+listae8e7effb4763866f80d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [Bug 218684] CPU soft lockups in KVM VMs on kernel 6.x after switching hypervisor from C8S to C9S
- From: bugzilla-daemon@xxxxxxxxxx
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- RE: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 08/25] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 08/25] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Pavel Machek <pavel@xxxxxxx>
- RE: [PATCH] vfio/pci: Collect hot-reset devices to local buffer
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 17/17] KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfns
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 16/17] KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error values
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 14/17] KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 15/17] KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faults
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 13/17] KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 12/17] KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIO
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 10/17] KVM: x86/mmu: Move private vs. shared check above slot validity checks
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 09/17] KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faults
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 07/17] KVM: x86/mmu: Use synthetic page fault error code to indicate private faults
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 02/17] KVM: x86: Remove separate "bit" defines for page fault error code masks
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 01/17] KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulation
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH] Build guest_memfd_test also on arm64.
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH 1/3] LoongArch: KVM: Add HW Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/3] LoongArch: KVM: Add Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 3/3] LoongArch: KVM: Add vm migration support for LBT feature
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 2/3] LoongArch: KVM: Add LBT feature detection with cpucfg
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [GIT PULL] Final KVM change for Linux 6.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Kselftest fixes for v6.9
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Kselftest fixes for v6.9
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] Final KVM change for Linux 6.9
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KVM: x86 pull requests for 6.10
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.10
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PULL 09/19] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [mst-vhost:vhost 54/54] drivers/vdpa/octeon_ep/octep_vdpa_main.c:538:25: error: implicit declaration of function 'readq'; did you mean 'readl'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- [PATCH v7 07/10] selftests/pidfd: Fix wrong expectation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 06/10] selftests/harness: Constify fixture variants
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 10/10] selftests/harness: Handle TEST_F()'s explicit exit codes
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 05/10] selftests/landlock: Do not allocate memory in fixture data
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 09/10] selftests/harness: Fix vfork() side effects
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 04/10] selftests/harness: Fix interleaved scheduling leading to race conditions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 08/10] selftests/harness: Share _metadata between forked processes
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 03/10] selftests/harness: Fix fixture teardown
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 02/10] selftests/landlock: Fix FS tests when run on a private mount point
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 00/10] Fix Kselftest's vfork() side effects
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 01/10] selftests/pidfd: Fix config for pidfd_setns_test
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 6.10
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2] KVM: x86/mmu: Only allocate shadowed translation cache for sp->role.level <= KVM_MAX_HUGEPAGE_LEVEL
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH v2 12/25] KVM: VMX: Handle FRED event data
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: <cheng.lin130@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v2 11/25] KVM: x86: Add kvm_is_fred_enabled()
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v2 11/25] KVM: x86: Add kvm_is_fred_enabled()
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [GIT PULL] KVM: x86: VMX changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Selftests "tree"-wide changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Selftests cleanups and fixes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: MMU changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: Misc changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Common changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- KVM: x86 pull requests for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio: remove an extra semicolon
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PULL 08/19] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 07/19] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 06/19] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 05/19] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 04/19] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 03/19] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 02/19] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 01/19] KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is needed
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 19/19] crypto: ccp: Add the SNP_VLEK_LOAD command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 17/19] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 16/19] KVM: SVM: Add module parameter to enable SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 15/19] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- [PULL 14/19] KVM: x86: Implement hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 12/19] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 11/19] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 10/19] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 09/19] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v3] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v2 0/6] powerpc: pSeries: vfio: iommu: Re-enable support for SPAPR TCE VFIO
- From: Shawn Anastasio <sanastasio@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Addressing a possible race in kvm_vcpu_on_spin:
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [kvm-unit-tests PATCH 18/33] arm: realm: Add test for FPU/SIMD context save/restore
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fix supported VM_TYPES caps
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] LoongArch KVM changes for v6.10
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Addressing a possible race in kvm_vcpu_on_spin:
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] KVM: arm64: Add early_param to control WFx trapping
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selftests/harness: Use 1024 in place of LINE_MAX
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v2 1/2] Revert "selftests/harness: remove use of LINE_MAX"
- From: Simon Horman <horms@xxxxxxxxxx>
- [PATCH v3 12/12] KVM: arm64: Improve CONFIG_CFI_CLANG error message
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 11/12] KVM: arm64: nVHE: Support test module for hyp kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 10/12] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 09/12] KVM: arm64: VHE: Add test module for hyp kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 08/12] arm64: Move esr_comment() to <asm/esr.h>
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 07/12] KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 06/12] KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 05/12] KVM: arm64: nVHE: Add EL2h sync exception handler
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 04/12] KVM: arm64: nVHE: Remove __guest_exit_panic path
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 03/12] KVM: arm64: Pass pointer to __pkvm_init_switch_pgd
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 02/12] KVM: arm64: Fix __pkvm_init_switch_pgd C signature
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 01/12] KVM: arm64: Fix clobbered ELR in sync abort/SError
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 00/12] KVM: arm64: Add support for hypervisor kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [syzbot] [kvm?] WARNING in kvm_mmu_notifier_invalidate_range_start (4)
- From: syzbot <syzbot+30d8503d558f3d50306b@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- RE: [PATCH v2 12/25] KVM: VMX: Handle FRED event data
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH v2] KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH] KVM: Addressing a possible race in kvm_vcpu_on_spin:
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v2 13/15] KVM: x86: Kill cur_tsc_{nsec,offset,write} fields
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v2 10/10] s390/hugetlb: convert PG_arch_1 code to work on folio->flags
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add 'malloc' failure check in test_vmx_nested_state
- From: Kunwu Chan <kunwu.chan@xxxxxxxxxxx>
- Re: [PATCH v3] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v3] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: <cheng.lin130@xxxxxxxxxx>
- Re: [PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH] vfio: remove an extra semicolon
- From: "foryun.ma" <foryun.ma@xxxxxxxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH v3] KVM: x86/mmu: Always drop mmu_lock to allocate TDP MMU SPs for eager splitting
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: Don't clobber CLIDR and MPIDR across vCPU reset
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 00/10] s390: PG_arch_1+folio cleanups for uv+hugetlb
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] KVM: Addressing a possible race in kvm_vcpu_on_spin:
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Check API version when creating VM
- From: Ivan Orlov <ivan.orlov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] s390: PG_arch_1+folio cleanups for uv+hugetlb
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [bug report] vfio/mlx5: Let firmware knows upon leaving PRE_COPY back to RUNNING
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH v2 12/12] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [bug report] vfio/mlx5: Let firmware knows upon leaving PRE_COPY back to RUNNING
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v3] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- [bug report] vfio/mlx5: Let firmware knows upon leaving PRE_COPY back to RUNNING
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- RE: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v8 3/3] KVM: selftests: aarch64: Add invalid filter test in pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v8 2/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v8 0/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v8 1/3] KVM: selftests: aarch64: Add helper function for the vpmu vcpu creation
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH] KVM: Addressing a possible race in kvm_vcpu_on_spin:
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v7 2/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- [RFC PATCH 2/2] KVM: x86: Enable guest SSP read/write interface with new uAPIs
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [RFC PATCH 1/2] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 13/54] perf: core/x86: Forbid PMI handler when guest own PMU
- From: "Zhang, Xiong Y" <xiong.y.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v2 12/54] perf: x86: Add x86 function to switch PMI handler
- From: "Zhang, Xiong Y" <xiong.y.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 07/31] scripts: allow machine option to be specified in unittests.cfg
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [PATCH v6] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- [PATCH v2 2/2] selftests/harness: Use 1024 in place of LINE_MAX
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] Revert "selftests/harness: remove use of LINE_MAX"
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH v2 0/2] Selftests: Fix compilation warnings due to missing _GNU_SOURCE definition
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests: Include KHDR_INCLUDES in Makefile
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH] KVM: x86: invalid_list not used anymore in mmu_shrink_scan
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: <cheng.lin130@xxxxxxxxxx>
- Re: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v19 097/130] KVM: x86: Split core of hypercall emulation to helper function
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 26/54] KVM: x86/pmu: Avoid legacy vPMU code when accessing global_ctrl in passthrough vPMU
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Only allocate shadowed translation cache for sp->role.level <= KVM_MAX_HUGEPAGE_LEVEL
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH v2 26/54] KVM: x86/pmu: Avoid legacy vPMU code when accessing global_ctrl in passthrough vPMU
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [PATCH v2 42/54] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests: Include KHDR_INCLUDES in Makefile
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH v2 26/54] KVM: x86/pmu: Avoid legacy vPMU code when accessing global_ctrl in passthrough vPMU
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/54] KVM: x86/pmu: Always set global enable bits in passthrough mode
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/54] KVM: x86/pmu: Always set global enable bits in passthrough mode
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests: Include KHDR_INCLUDES in Makefile
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- Re: [PATCH v2 17/54] KVM: x86/pmu: Always set global enable bits in passthrough mode
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 24/54] KVM: x86/pmu: Create a function prototype to disable MSR interception
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [PATCH v2 20/54] KVM: x86/pmu: Allow RDPMC pass through when all counters exposed to guest
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [PATCH v2 5/5] selftests: Drop duplicate -D_GNU_SOURCE
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v2 26/54] KVM: x86/pmu: Avoid legacy vPMU code when accessing global_ctrl in passthrough vPMU
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [PATCH v2 3/5] selftests: Include KHDR_INCLUDES in Makefile
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests: Drop define _GNU_SOURCE
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/sgx: Include KHDR_INCLUDES in Makefile
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v2 1/5] selftests: Compile kselftest headers with -D_GNU_SOURCE
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests: Drop define _GNU_SOURCE
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- [PATCH 12/12] mm, riscv, arm64: Use common get_and_clear_full_ptes()/clear_full_ptes() functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 11/12] mm, riscv, arm64: Use common ptep_set_wrprotect()/wrprotect_ptes() functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 10/12] mm, riscv, arm64: Use common ptep_set_access_flags() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 09/12] mm, riscv, arm64: Use common ptep_clear_flush_young() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 08/12] mm, riscv, arm64: Use common ptep_test_and_clear_young() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 07/12] mm, riscv, arm64: Use common ptep_get_and_clear() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 06/12] mm, riscv, arm64: Use common pte_clear() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 05/12] mm, riscv, arm64: Use common set_pte() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 04/12] mm, riscv, arm64: Use common ptep_get_lockless() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 03/12] mm, riscv, arm64: Use common set_ptes() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 02/12] mm, riscv, arm64: Use common ptep_get() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 00/12] Make riscv use THP contpte support for arm64
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v3 10/10] s390/hugetlb: convert PG_arch_1 code to work on folio->flags
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 09/10] s390/uv: implement HAVE_ARCH_MAKE_FOLIO_ACCESSIBLE
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 08/10] s390/uv: convert uv_convert_owned_from_secure() to uv_convert_from_secure_(folio|pte)()
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 07/10] s390/uv: convert uv_destroy_owned_page() to uv_destroy_(folio|pte)()
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 06/10] s390/uv: make uv_convert_from_secure() a static function
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 05/10] s390/uv: update PG_arch_1 comment
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 04/10] s390/uv: convert PG_arch_1 users to only work on small folios
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 03/10] s390/uv: split large folios in gmap_make_secure()
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 02/10] s390/uv: gmap_make_secure() cleanups for further changes
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 01/10] s390/uv: don't call folio_wait_writeback() without a folio reference
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 00/10] s390: PG_arch_1+folio cleanups for uv+hugetlb
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 42/54] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [PATCH v2 10/10] s390/hugetlb: convert PG_arch_1 code to work on folio->flags
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- Re: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.8 18/52] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/sgx: Include KHDR_INCLUDES in Makefile
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Destroy mpidr_data for 'late' vCPU creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/sgx: Include KHDR_INCLUDES in Makefile
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 07/17] KVM: x86: add fields to struct kvm_arch for CoCo features
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [GIT PULL] LoongArch KVM changes for v6.10
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Only allocate shadowed translation cache for sp->role.level <= KVM_MAX_HUGEPAGE_LEVEL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 07/17] KVM: x86: add fields to struct kvm_arch for CoCo features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 17/54] KVM: x86/pmu: Always set global enable bits in passthrough mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests: Drop define _GNU_SOURCE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: PPC: Book3S HV nestedv2: Cancel pending DEC exception
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: PPC: Fix documentation for ppc mmu caps
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: PPC: Book3S HV nestedv2: Fix an error handling path in gs_msg_ops_kvmhv_nestedv2_config_fill_info()
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: PPC: code cleanup for kvmppc_book3s_irqprio_deliver
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH] powerpc: rename SPRN_HID2 define to SPRN_HID2_750FX
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- [PATCH net-next v3 07/13] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v3 06/13] mm: page_frag: add '_va' suffix to page_frag API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 07/31] scripts: allow machine option to be specified in unittests.cfg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: nVMX: fix CR4_READ_SHADOW when L0 updates CR4 during a signal
- From: Thomas Prescher <thomas.prescher@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: x86: add KVM_RUN_X86_GUEST_MODE kvm_run flag
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 07/31] scripts: allow machine option to be specified in unittests.cfg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 07/31] scripts: allow machine option to be specified in unittests.cfg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v6] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 07/31] scripts: allow machine option to be specified in unittests.cfg
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [PATCH v2 12/12] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [PATCH v2 1/5] selftests: Compile kselftest headers with -D_GNU_SOURCE
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: x86: Print names of apicv inhibit reasons in traces
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: <cheng.lin130@xxxxxxxxxx>
- Re: [PATCH net-next v2 3/3] test/vsock: add ioctl unsent bytes test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 09/54] perf: core/x86: Register a new vector for KVM GUEST PMI
- From: Yanfei Xu <yanfei.xu@xxxxxxxxx>
- Re: [PATCH v2 10/54] KVM: x86: Extract x86_set_kvm_irq_handler() function
- From: "Zhang, Xiong Y" <xiong.y.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 12/54] perf: x86: Add x86 function to switch PMI handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/54] perf: Support get/put passthrough PMU interfaces
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] vfio/pci: Allow MMIO regions to be exported through dma-buf
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH net-next v2 1/3] vsock: add support for SIOCOUTQ ioctl for all vsock socket types.
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests: Drop duplicate -D_GNU_SOURCE
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests: Include KHDR_INCLUDES in Makefile
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [RFC] TDX module configurability of 0x80000008
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 4/5] selftests: Drop define _GNU_SOURCE
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/sgx: Include KHDR_INCLUDES in Makefile
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selftests: Compile kselftest headers with -D_GNU_SOURCE
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH v2] KVM: arm64: Destroy mpidr_data for 'late' vCPU creation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v10 17/27] KVM: x86: Report KVM supported CET MSRs as to-be-saved
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 12/54] perf: x86: Add x86 function to switch PMI handler
- From: "Zhang, Xiong Y" <xiong.y.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Destroy mpidr_data for 'late' vCPU creation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH] Build guest_memfd_test also on arm64.
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Destroy mpidr_data for 'late' vCPU creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 17/54] KVM: x86/pmu: Always set global enable bits in passthrough mode
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.8 18/52] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v8 4/6] LoongArch: KVM: Add vcpu search support from physical cpuid
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Correct BTYPE/SS in host SMC emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 4/6] LoongArch: KVM: Add vcpu search support from physical cpuid
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v2 06/54] perf: Support get/put passthrough PMU interfaces
- From: "Zhang, Xiong Y" <xiong.y.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/54] KVM: x86/pmu: Always set global enable bits in passthrough mode
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 38/54] KVM: x86/pmu: Call perf_guest_enter() at PMU context switch
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/54] KVM: x86/pmu: Always set global enable bits in passthrough mode
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/54] perf: Support get/put passthrough PMU interfaces
- From: "Zhang, Xiong Y" <xiong.y.zhang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 12/54] perf: x86: Add x86 function to switch PMI handler
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Only allocate shadowed translation cache for sp->role.level <= KVM_MAX_HUGEPAGE_LEVEL
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v10 04/27] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v5 07/17] KVM: x86: add fields to struct kvm_arch for CoCo features
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v1 2/2] vfio/pci: Allow MMIO regions to be exported through dma-buf
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 07/17] KVM: x86: add fields to struct kvm_arch for CoCo features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] KVM: guest_memfd: New hooks and functionality for SEV-SNP and TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 04/27] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH AUTOSEL 6.1 08/25] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 15/43] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.8 18/52] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5 07/17] KVM: x86: add fields to struct kvm_arch for CoCo features
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v10 04/27] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests: Include KHDR_INCLUDES in Makefile
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v19 023/130] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2 5/5] selftests: Drop duplicate -D_GNU_SOURCE
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- [PATCH v2 4/5] selftests: Drop define _GNU_SOURCE
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- [PATCH v2 3/5] selftests: Include KHDR_INCLUDES in Makefile
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- [PATCH v2 2/5] selftests/sgx: Include KHDR_INCLUDES in Makefile
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- [PATCH v2 1/5] selftests: Compile kselftest headers with -D_GNU_SOURCE
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- [PATCH v2 0/5] Define _GNU_SOURCE for sources using
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- Re: [PATCH v2 12/54] perf: x86: Add x86 function to switch PMI handler
- From: "Chen, Zide" <zide.chen@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v19 103/130] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: arm64: Destroy mpidr_data for 'late' vCPU creation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 01/15] KVM: x86/xen: Do not corrupt KVM clock in kvm_xen_shared_info_init()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/4] MIPS: Loongson64: DTS: Fix PCIe port nodes for ls7a
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- [PATCH 3/4] MIPS: Loongson64: DTS: Fix msi node for ls7a
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- [PATCH 2/4] MIPS: Loongson64: Include bootinfo.h in dma.c
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- [PATCH 1/4] MIPS: kvm: Declare prototype for kvm_init_loongson_ipi
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- [PATCH 0/4] MIPS: Loongson64: Sweeping build warnings
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 9/9] KVM: x86: Add hook for determining max NPT mapping level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 8/9] KVM: guest_memfd: Add hook for invalidating memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/9] KVM: guest_memfd: extract __kvm_gmem_get_pfn()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 7/9] KVM: guest_memfd: Add interface for populating gmem pages with user data
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 5/9] KVM: guest_memfd: Add hook for initializing memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 4/9] KVM: guest_memfd: limit overzealous WARN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/9] KVM: guest_memfd: pass error up from filemap_grab_folio
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/9] KVM: guest_memfd: Use AS_INACCESSIBLE when creating guest_memfd inode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/9] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 0/9] KVM: guest_memfd: New hooks and functionality for SEV-SNP and TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 00/10] Define _GNU_SOURCE for sources using
- From: Edward Liaw <edliaw@xxxxxxxxxx>
- Re: [PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 00/14] Improve KVM + userfaultfd performance via KVM_EXIT_MEMORY_FAULTs on stage-2 faults
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v10 17/27] KVM: x86: Report KVM supported CET MSRs as to-be-saved
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fix supported VM_TYPES caps
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC] TDX module configurability of 0x80000008
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] travis.yml: Update the aarch64 and ppc64le jobs to Jammy
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fix supported VM_TYPES caps
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL 0/1] KVM: s390: Fix for 6.9
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: Collect hot-reset devices to local buffer
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 07/10] s390/uv: convert uv_destroy_owned_page() to uv_destroy_(folio|pte)()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/10] s390/uv: convert uv_convert_owned_from_secure() to uv_convert_from_secure_(folio|pte)()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC] TDX module configurability of 0x80000008
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 09/10] s390/uv: implement HAVE_ARCH_MAKE_FOLIO_ACCESSIBLE
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] s390/uv: gmap_make_secure() cleanups for further changes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/10] s390/hugetlb: convert PG_arch_1 code to work on folio->flags
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/10] s390/uv: make uv_convert_from_secure() a static function
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] s390: PG_arch_1+folio cleanups for uv+hugetlb
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/10] s390/uv: split large folios in gmap_make_secure()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] s390/uv: convert PG_arch_1 users to only work on small folios
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v19 023/130] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC] TDX module configurability of 0x80000008
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 06/11] KVM: guest_memfd: Add hook for initializing memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/17] KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/17] KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIO
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/17] KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/17] KVM: x86/mmu: Pass full 64-bit error code when handling page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/17] KVM: x86/mmu: Move private vs. shared check above slot validity checks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/17] KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/17] KVM: x86: Define more SEV+ page fault error bits/flags for #NPF
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 17/17] KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfns
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/17] KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error values
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/17] KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/17] KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/17] KVM: x86/mmu: check for invalid async page faults involving private memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/17] KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/17] KVM: x86/mmu: Use synthetic page fault error code to indicate private faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/17] KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zero
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/17] KVM: x86: Remove separate "bit" defines for page fault error code masks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 00/17] KVM: x86/mmu: Page fault and MMIO cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/7] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 5/7] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/7] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 4/7] KVM: x86/mmu: Add Suppress VE bit to EPT shadow_mmio_mask/shadow_present_mask
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/7] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 0/7] KVM: MMU changes for TDX VE support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/7] KVM, x86: add architectural support code for #VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 00/10] Fix Kselftest's vfork() side effects
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 12/12] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PULL v2 03/16] block/block-backend: add block layer APIs resembling Linux ZonedBlockDevice ioctls
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/6] powerpc: pSeries: vfio: iommu: Re-enable support for SPAPR TCE VFIO
- From: Shivaprasad G Bhat <sbhat@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 07/31] scripts: allow machine option to be specified in unittests.cfg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Correct BTYPE/SS in host SMC emulation
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC] TDX module configurability of 0x80000008
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v7 2/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC] TDX module configurability of 0x80000008
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 00/10] Fix Kselftest's vfork() side effects
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 17/31] powerpc: Add cpu_relax
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [kvm-unit-tests PATCH] travis.yml: Update the aarch64 and ppc64le jobs to Jammy
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v4 2/3] KVM: x86: Introduce kvm_x86_call() to simplify static calls of kvm_x86_ops
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v4 3/3] KVM: x86/pmu: Add kvm_pmu_call() to simplify static calls of kvm_pmu_ops
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v4 1/3] KVM: x86: Replace static_call_cond() with static_call()
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v4 0/3] KVM/x86: Enhancements to static calls
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v19 023/130] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [GIT PULL 1/1] KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [GIT PULL 0/1] KVM: s390: Fix for 6.9
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 12/31] powerpc: general interrupt tests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 03/31] powerpc: Mark known failing tests as kfail
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v7] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- RE: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH net-next v2 2/3] vsock/virtio: add SIOCOUTQ support for all virtio based transports
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 38/54] KVM: x86/pmu: Call perf_guest_enter() at PMU context switch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v2 13/54] perf: core/x86: Forbid PMI handler when guest own PMU
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 12/54] perf: x86: Add x86 function to switch PMI handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] KVM: x86/mmu: Fine-grained check of whether a invalid & RAM PFN is MMIO
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 10/54] KVM: x86: Extract x86_set_kvm_irq_handler() function
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/54] perf: core/x86: Register a new vector for KVM GUEST PMI
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 07/54] perf: Add generic exclude_guest support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v2 06/54] perf: Support get/put passthrough PMU interfaces
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH 2/5] KVM: x86/mmu: Fine-grained check of whether a invalid & RAM PFN is MMIO
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 06/54] perf: Support get/put passthrough PMU interfaces
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] hisi_acc_vfio_pci: create subfunction for data reading
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: liulongfang <liulongfang@xxxxxxxxxx>
- RE: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 4/5] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v3 1/1] accel/kvm: Fix segmentation fault
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v19 103/130] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- [PATCH] selftests: Add _GNU_SOURCE definition when including kselftest_harness.h
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/5] KVM: x86/mmu: Fine-grained check of whether a invalid & RAM PFN is MMIO
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/5] Enforce CPU cache flush for non-coherent device assignment
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 01/16] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/5] add shellcheck support
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [PATCH 2/3] x86/bus_lock: Add support for AMD
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH 1/3] x86/split_lock: Move Split and Bus lock code to a dedicated file
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [kvm-unit-tests PATCH v9 03/31] powerpc: Mark known failing tests as kfail
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] doc: update unittests doc
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [PATCH 2/3] x86/bus_lock: Add support for AMD
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [kvm-unit-tests PATCH v9 01/31] doc: update unittests doc
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]