Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KVM: SVM: Provide helpers to set the error code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/3] KVM: SVM: Add Idle HLT intercept support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RFC] x86: avoid one cpu limit for kvm
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v5 2/2] KVM: SVM: Provide helpers to set the error code
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH v5 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH v5 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Melody Wang <huibo.wang@xxxxxxx>
- Re: [PATCH 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: "Yosry Ahmed" <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: "Yosry Ahmed" <yosry.ahmed@xxxxxxxxx>
- [PATCH v5 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 4/4] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <ashish.kalra@xxxxxxx>
- [PATCH v5 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [RFC PATCH v2 2/2] s390/vfio-ap: Fixing mdev remove notification
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/2] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/2] Eventfd signal on guest AP configuration change
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- Re: [PATCH v3 24/27] KVM: nVMX: Add a prerequisite to existence of VMCS fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v10 08/11] governors/haltpoll: drop kvm_para_available() check
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH v4 11/16] KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 04/16] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 09/16] KVM: arm64: nv: Handle L2->L1 transition on interrupt injection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v4 02/16] arm64: sysreg: Add layout for ICH_VTR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 23/30] KVM: TDX: initialize VM with TDX specific parameters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v4 03/16] arm64: sysreg: Add layout for ICH_MISR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH v4 16/16] KVM: arm64: nv: Fail KVM init if asking for NV without GICv3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 06/16] KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 13/16] KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 05/16] KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 14/16] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 08/16] KVM: arm64: nv: Nested GICv3 emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 10/16] KVM: arm64: nv: Add Maintenance Interrupt emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 07/16] KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 01/16] arm64: sysreg: Add layout for ICH_HCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 03/27] KVM: VMX: Add support for the secondary VM exit controls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 15/16] KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 12/16] KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 00/16] KVM: arm64: Add NV GICv3 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: VMX: Extract checks on entry/exit control pairs to a helper macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v4 02/12] mm/secretmem: set AS_NO_DIRECT_MAP instead of special-casing
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 04/12] KVM: Add capability to discover KVM_GMEM_NO_DIRECT_MAP support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 03/12] KVM: guest_memfd: Add flag to remove from direct map
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 01/12] mm: introduce AS_NO_DIRECT_MAP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- Re: [PATCH v3 24/27] KVM: nVMX: Add a prerequisite to existence of VMCS fields
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 24/27] KVM: nVMX: Add a prerequisite to existence of VMCS fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: Drop kvm_arch_sync_events() now that all implementations are nops
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Snapshot the host's DEBUGCTL in common x86
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 21/27] KVM: VMX: Invoke vmx_set_cpu_caps() before nested setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: SVM: Zero DEBUGCTL before VMRUN if necessary
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 20/27] KVM: x86: Allow WRMSRNS to be advertised to guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 4/7] KVM: x86: Don't load/put vCPU when unloading its MMU during teardown
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: Assert that a destroyed/freed vCPU is no longer visible
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 08/12] KVM: selftests: Add guest_memfd based vm_mem_backing_src_types
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH 01/10] KVM: SVM: Save host DR masks but NOT DRs on CPUs with DebugSwap
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC kvm-unit-tests PATCH 1/4] x86/apic: Move ioapic tests together and add them to apic test group
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 2/4] x86/apic: Disable PIT for x2apic test to allow SVM AVIC to be tested
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 3/4] x86/apic: Disable PIT for ioapic test to allow SVM AVIC to be tested
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 4/4] x86/apic: Add test for xapic-split
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 0/4] x86/apic: SVM AVIC tests and some cleanups
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- Re: [RFC kvm-unit-tests PATCH] lib: Use __ASSEMBLER__ instead of __ASSEMBLY__
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH net-next v5 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: s390: Don't use %pK through tracepoints
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: s390: Don't use %pK through debug printing
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: Drop kvm_arch_sync_events() now that all implementations are nops
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v7 16/52] i386/tdvf: Introduce function to parse TDVF metadata
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 18/30] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v7 08/52] i386/tdx: Initialize TDX before creating TD vcpus
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/52] i386/tdx: Get tdx_capabilities via KVM_TDX_CAPABILITIES
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: x86: Don't load/put vCPU when unloading its MMU during teardown
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 3/7] KVM: Assert that a destroyed/freed vCPU is no longer visible
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH V2 09/12] KVM: TDX: restore user ret MSRs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH V2 08/12] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH Resend] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: weizijie <zijie.wei@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 07/12] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 0/5] bugfix some driver issues
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 3/3] migration: adapt to new migration configuration
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH 1/3] migration: update BAR space size
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH net-next v5 0/9] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v5 0/9] Device memory TCP TX
- From: Lei Yang <leiyang@xxxxxxxxxx>
- Re: [PATCH 01/10] KVM: SVM: Save host DR masks but NOT DRs on CPUs with DebugSwap
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Provide a capability to disable APERF/MPERF read intercepts
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/6] vfio/type1: Use consistent types for page counts
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 10/10] KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 6/7] KVM: x86: Fold guts of kvm_arch_sync_events() into kvm_arch_pre_destroy_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: Drop kvm_arch_sync_events() now that all implementations are nops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: x86: Unload MMUs during vCPU destruction, not before
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: x86: Don't load/put vCPU when unloading its MMU during teardown
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] KVM: Assert that a destroyed/freed vCPU is no longer visible
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: nVMX: Process events on nested VM-Exit if injectable IRQ or NMI is pending
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: x86: nVMX IRQ fix and VM teardown cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] virtio_blk: add length check for device writable portion
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- [PATCH 2/2] virtio_fs: add length check for device writable portion
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- [PATCH v1 0/2] virtio: Add length checks for device writable portions
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [PATCH 09/10] KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/10] KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 07/10] KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 05/10] KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/10] KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: (subset) [PATCH v2 00/14] KVM: arm64: NV userspace ABI
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 01/10] KVM: SVM: Save host DR masks but NOT DRs on CPUs with DebugSwap
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/2] two KVM MMU fixes for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 6.14 take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.14, take #3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Snapshot the host's DEBUGCTL in common x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: SVM: Manually zero/restore DEBUGCTL if LBR virtualization is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: SVM: Zero DEBUGCTL before VMRUN if necessary
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 08/11] governors/haltpoll: drop kvm_para_available() check
- From: "Christoph Lameter (Ampere)" <cl@xxxxxxxxxx>
- Re: [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- [PATCH] KVM: SVM: Inject #GP if memory operand for INVPCID is non-canonical
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Always set mp_state to RUNNABLE on wakeup from HLT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] x86/bugs: Add explicit BP_SPEC_REDUCE cmdline
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Drop "enabled" field from "struct kvm_vcpu_pv_apf_data"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Assert that STI blocking isn't set after event injection
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/2] x86: Add split/bus lock smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 0/5] x86: Add test cases for LAM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Move SMP #defines from apic-defs.h to smp.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-test PATCH 1/3] nVMX: fixed-function performance counters could be not contiguous
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Force host-phys-bits for normal maxphyaddr access tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 00/18] x86/pmu: Fixes and improvements
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Increase the timeout for the test "vmx_apicv_test"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] nVMX: Clear A/D enable bit in EPTP after negative testcase on non-A/D host
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] x86: Use macros for selectors in asm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] x86: Bump per-CPU stack/data to 12KiB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/6] x86: LA57 canonical testcases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] Collection of tests for canonical checks on LA57 enabled CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Make set/clear_bit() atomic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH] KVM: VMX: Reject KVM_RUN if userspace forces emulation during nested VM-Enter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v5 6/9] net: enable driver support for netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL] x86: Fixes, new tests, and more!
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Assert that STI blocking isn't set after event injection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: SVM: Fix an STI shadow on VMRUN bug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH] include/linux/log2.h: mark is_power_of_2() with __always_inline
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests RFC] x86: Fix "debug" test on AMD uArch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 5/6] powerpc/kvm-hv-pmu: Implement GSB message-ops for hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 3/6] kvm powerpc/book3s-apiv2: Add kunit tests for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 6/6] powerpc/kvm-hv-pmu: Add perf-events for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 2/6] kvm powerpc/book3s-apiv2: Add support for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 1/6] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 0/6] kvm powerpc/book3s-hv: Expose Hostwide counters as perf-events
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- Re: [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH vfio] vfio/virtio: Enable support for virtio-block live migration
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v6 3/3] PCI: s390: Enable HAVE_PCI_MMAP on s390 and restrict mmap() of resources to mappable BARs
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [kvm-unit-tests RFC] x86: Fix "debug" test on AMD uArch
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [no subject]
- [PATCH 3/3] LoongArch: KVM: Register perf callback for guest
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 2/3] LoongArch: KVM: Implement arch specified functions for guest perf
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 1/3] LoongArch: KVM: Add stub for kvm_arch_vcpu_preempted_in_kernel
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/3] Add perf event support for guest VM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v2 10/14] KVM: arm64: Allow userspace to limit NV support to nVHE
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- [PATCH kvmtool v2 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT in KVM_RUN ioctl return
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- [PATCH kvmtool v2 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 03/14] KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH 03/14] KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- [PATCH 3/3] KVM: TDX: Always honor guest PAT on TDX enabled platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/3] KVM: x86: Introduce Intel specific quirk KVM_X86_QUIRK_EPT_IGNORE_GUEST_PAT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/3] KVM: x86: Introduce supported_quirks for platform-specific valid quirks
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/3] KVM: x86: Introduce quirk KVM_X86_QUIRK_EPT_IGNORE_GUEST_PAT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Drop "enabled" field from "struct kvm_vcpu_pv_apf_data"
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [kvm:kvm-coco-queue 30/121] arch/x86/include/asm/tdx.h:183:12: error: unused function 'tdx_get_nr_guest_keyids'
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC]: Zeroing out mem immediately when the vm closes
- From: kinshuk <kinshukkataria4@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 8/9] net: check for driver support in netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 7/9] gve: add netmem TX support to GVE DQO-RDA mode
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 6/9] net: enable driver support for netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 5/9] net: add devmem TCP TX documentation
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 2/9] net: devmem: TCP tx netlink api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 1/9] net: add get_netmem/put_netmem support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 0/9] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [PATCH v3 16/16] KVM: TDX: Handle EXIT_REASON_OTHER_SMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 14/16] KVM: VMX: Add a helper for NMI handling
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 15/16] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 13/16] KVM: VMX: Move emulation_required to struct vcpu_vt
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 10/16] KVM: TDX: Enforce KVM_IRQCHIP_SPLIT for TDX guests
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 12/16] KVM: TDX: Add methods to ignore virtual apic related operation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 11/16] KVM: TDX: Force APICv active for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 08/16] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 09/16] KVM: TDX: Always block INIT/SIPI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 07/16] KVM: TDX: Implement methods to inject NMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 06/16] KVM: TDX: Wait lapic expire when timer IRQ was injected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 05/16] KVM: x86: Assume timer IRQ was injected if APIC state is protected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 04/16] KVM: TDX: Implement non-NMI interrupt injection
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 03/16] KVM: VMX: Move posted interrupt delivery code to common header
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 02/16] KVM: TDX: Disable PI wakeup for IPIv
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 01/16] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 00/16] KVM: TDX: TDX interrupts
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [RFC kvm-unit-tests PATCH] lib: Use __ASSEMBLER__ instead of __ASSEMBLY__
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL] x86: Fixes, new tests, and more!
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 9/9] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 8/9] KVM: TDX: Handle TDX PV port I/O hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 7/9] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 6/9] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 5/9] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 4/9] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/9] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/9] KVM: x86: Move pv_unhaulted check out of kvm_vcpu_has_events()
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/9] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/9] KVM: TDX: TDX hypercalls may exit to userspace
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Create KVM selftest runner
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 1/2] KVM: selftests: Add default testfiles for KVM selftests runner
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 0/2] Add KVM selftest runner
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Move SMP #defines from apic-defs.h to smp.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: replace segment selector magic number with macro definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Drop "enabled" field from "struct kvm_vcpu_pv_apf_data"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: Commit to using __ASSEMBLER__ instead of __ASSEMBLY__
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: replace segment selector magic number with macro definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Move descriptor table selector #defines to the top of desc.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] x86: Use macros for selectors in asm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH] vfio/pci: add PCIe TPH to device feature ioctl
- From: Wathsala Vithanage <wathsala.vithanage@xxxxxxx>
- [PATCH v7 07/10] KVM: selftests: Add library support for interacting with SNP
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 10/10] KVM: selftests: Add a basic SEV-SNP smoke test
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 06/10] KVM: selftests: Introduce SEV VM type check
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 09/10] KVM: selftests: Abstractions for SEV to decouple policy from type
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 08/10] KVM: selftests: Force GUEST_MEMFD flag for SNP VM type
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 05/10] KVM: selftests: Replace assert() with TEST_ASSERT_EQ()
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 04/10] KVM: selftests: Add SMT control state helper
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 03/10] KVM: selftests: Add vmgexit helper
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 02/10] KVM: selftests: SEV-SNP test for KVM_SEV_INIT2
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 00/10] Basic SEV-SNP Selftests
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [kvm-unit-tests PATCH 2/2] x86/debug: Add a split-lock #AC / bus-lock #DB testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] x86: Include libcflat.h in atomic.h for u64 typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] x86: Add split/bus lock smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/9] vhost-scsi: log write descriptors for live migration (and two bugfix)
- From: dongli.zhang@xxxxxxxxxx
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 6.14 take #1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Propagate AMD's IbrsSameMode to the guest
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/2] riscv: Introduce MACHINE_OVERRIDE
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBRS_SAME_MODE
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 0/3] Unify IBRS virtualization
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] riscv: Run with other QEMU models
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] configure: Allow earlycon for all architectures
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v4 08/12] KVM: selftests: Add guest_memfd based vm_mem_backing_src_types
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 06/12] KVM: selftests: load elf via bounce buffer
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 12/12] KVM: selftests: Test guest execution from direct map removed gmem
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 10/12] KVM: selftests: adjust test_create_guest_memfd_invalid
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 04/12] KVM: Add capability to discover KVM_GMEM_NO_DIRECT_MAP support
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 02/12] mm/secretmem: set AS_NO_DIRECT_MAP instead of special-casing
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 11/12] KVM: selftests: set KVM_GMEM_NO_DIRECT_MAP in mem conversion tests
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 01/12] mm: introduce AS_NO_DIRECT_MAP
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 07/12] KVM: selftests: set KVM_MEM_GUEST_MEMFD in vm_mem_add() if guest_memfd != -1
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 09/12] KVM: selftests: stuff vm_mem_backing_src_type into vm_shape
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 05/12] KVM: Documentation: document KVM_GMEM_NO_DIRECT_MAP flag
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 03/12] KVM: guest_memfd: Add flag to remove from direct map
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 00/12] Direct Map Removal for guest_memfd
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH] s390/vfio-ap: lock mdev object when handling mdev remove request
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 06/14] acpi/ghes: create an ancillary acpi_ghes_get_state() function
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [RFC PATCH v5 0/4] Add NUMA mempolicy support for KVM guest-memfd
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: "BillXiang" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v2] RISC-V: KVM: Optimize comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- [PATCH] include/linux/log2.h: mark is_power_of_2() with __always_inline
- From: Su Hui <suhui@xxxxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [kvm:kvm-coco-queue 30/121] arch/x86/include/asm/tdx.h:183:12: warning: 'tdx_get_nr_guest_keyids' defined but not used
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v4 2/2] KVM: x86: Include host suspended time in steal time
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH v4 1/2] KVM: x86: Advance guest TSC after deep suspend.
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH v4 0/2] KVM: x86: Include host suspended time in steal time
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- RE: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v2] RISC-V: KVM: Optimize comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Chao Du <duchao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 23/30] KVM: TDX: initialize VM with TDX specific parameters
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix comments in kvm_riscv_vcpu_isa_disable_allowed
- From: "Chao Du" <duchao@xxxxxxxxxxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH vhost v2] vdpa/mlx5: Fix oversized null mkey longer than 32bit
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Interest in contributing to KVM TODO
- From: Aaron Ang <a1ang@xxxxxxxx>
- Re: [PATCH v5 6/6] target/i386: Add support for EPYC-Turin model
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 5/6] target/i386: Update EPYC-Genoa for Cache property, perfmon-v2, RAS and SVM feature bits
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 4/6] target/i386: Add feature that indicates WRMSR to BASE reg is non-serializing
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 3/6] target/i386: Update EPYC-Milan CPU model for Cache property, RAS, SVM feature bits
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 2/6] target/i386: Update EPYC-Rome CPU model for Cache property, RAS, SVM feature bits
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH 13/30] KVM: TDX: Get TDX global information
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 07/30] x86/virt/tdx: allocate tdx_sys_info in static memory
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v3 3/3] Documentation: kvm: new UAPI when arm64 guest consumes UER
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [RFC PATCH v3 2/3] KVM: arm64: set FnV in vcpu's ESR_ELx when host FAR_EL2 is invalid
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [RFC PATCH v3 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- Re: [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: powerpc: Enable commented out BUILD_BUG_ON() assertion
- From: Thorsten Blum <thorsten.blum@xxxxxxxxx>
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 07/30] x86/virt/tdx: allocate tdx_sys_info in static memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 11/30] KVM: VMX: Refactor VMX module init/exit functions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH net-next v4 8/9] net: check for driver support in netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 5/9] net: add devmem TCP TX documentation
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 3/9] net: devmem: Implement TX path
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH v4 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH vhost v2] vdpa/mlx5: Fix oversized null mkey longer than 32bit
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- Re: [PATCH net-next v4 1/9] net: add get_netmem/put_netmem support
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH v4 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH v4 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Interest in contributing to KVM TODO
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [PATCH v4 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.14, take #3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH 30/30] KVM: TDX: Register TDX host key IDs to cgroup misc controller
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 26/30] KVM: TDX: create/free TDX vcpu structure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 27/30] KVM: TDX: Do TDX specific vcpu initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 19/30] KVM: TDX: Get system-wide info about TDX module on initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 24/30] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 23/30] KVM: TDX: initialize VM with TDX specific parameters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 21/30] KVM: TDX: Support per-VM KVM_CAP_MAX_VCPUS extension check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/30] KVM: TDX: Add placeholders for TDX VM/vCPU structures
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 28/30] KVM: x86: Introduce KVM_TDX_GET_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 29/30] KVM: x86/mmu: Taking guest pa into consideration when calculate tdp level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/30] x86/virt/tdx: Read essential global metadata for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/30] x86/virt/tdx: Add tdx_guest_keyid_alloc/free() to alloc and free TDX guest KeyID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 25/30] KVM: TDX: Don't offline the last cpu of one package when there's TDX guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/30] x86/virt/tdx: allocate tdx_sys_info in static memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 22/30] KVM: x86: expose cpuid_entry2_find for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 17/30] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/30] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/30] KVM: TDX: Add TDX "architectural" error codes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/30] KVM: TDX: Define TDX architectural definitions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/30] KVM: Export hardware virtualization enabling/disabling functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/30] KVM: VMX: Refactor VMX module init/exit functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/30] KVM: TDX: Get TDX global information
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX flush operations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/30] TDX initialization + vCPU/VM creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 6/9] KVM: selftests: Add library support for interacting with SNP
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v4 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 06/14] KVM: arm64: Consolidate idreg callbacks
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 7/7] arm64: run at EL2 if supported
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/7] arm64: drop to EL1 if booted at EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 6/7] arm64: pmu: count EL2 cycles
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 5/7] arm64: selftest: update test for running at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 4/7] arm64: micro-bench: use smc when at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 1/7] arm64: drop to EL1 if booted at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 3/7] arm64: micro-bench: fix timer IRQ
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 2/7] arm64: timer: use hypervisor timers when at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 7/7] arm64: run at EL2 if supported
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 0/7] arm64: support EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v2 00/14] KVM: arm64: NV userspace ABI
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v2 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [PATCH v2 12/14] KVM: arm64: Advertise FEAT_ECV when possible
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/14] KVM: arm64: Document NV caps and vcpu flags
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/14] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/14] KVM: arm64: Allow userspace to limit NV support to nVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/14] KVM: arm64: Make ID_REG_LIMIT_FIELD_ENUM() more widely available
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/14] KVM: arm64: Make ID_AA64MMFR4_EL1.NV_frac writable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/14] KVM: arm64: Enforce NV limits on a per-idregs basis
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/14] KVM: arm64: Move NV-specific capping to idreg sanitisation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/14] KVM: arm64: Consolidate idreg callbacks
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/14] KVM: arm64: Mark HCR.EL2.{NV*,AT} RES0 when ID_AA64MMFR4_EL1.NV_frac is 0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/14] KVM: arm64: Advertise NV2 in the boot messages
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/14] KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/14] KVM: arm64: NV userspace ABI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 00/14] KVM: arm64: NV userspace ABI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Provide a new two step DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH V2 03/12] KVM: TDX: Set arch.has_protected_state to true
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 0/5] riscv: KVM: Fix a few SBI issues
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 02/10] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 01/10] mm: Consolidate freeing of typed folios on final folio_put()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 6/6] target/i386: Add support for EPYC-Turin model
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] target/i386: Update EPYC-Genoa for Cache property, perfmon-v2, RAS and SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 4/6] target/i386: Add feature that indicates WRMSR to BASE reg is non-serializing
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 01/11] mm: Consolidate freeing of typed folios on final folio_put()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 3/6] target/i386: Update EPYC-Milan CPU model for Cache property, RAS, SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 2/6] target/i386: Update EPYC-Rome CPU model for Cache property, RAS, SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v2 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 1/2] KVM: TDX: Handle SEPT zap error due to page add error in premap
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 0/2] two KVM MMU fixes for TDX
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 Resend] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: weizijie <zijie.wei@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/15] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [RFC] LoongArch: KVM: Handle interrupt early before enabling irq
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: "xiangwencheng" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v4 5/9] net: add devmem TCP TX documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Chao Du <duchao@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v3 1/2] KVM: SVM: Increase X2AVIC limit to 4096 vcpus
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v3 0/2] KVM: SVM: Add support for 4096 vcpus with x2AVIC
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: "xiangwencheng" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v3] KVM: PPC: Enable CAP_SPAPR_TCE_VFIO on pSeries KVM guests
- From: Amit Machhiwal <amachhiw@xxxxxxxxxxxxx>
- RE: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 8/9] net: check for driver support in netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 7/9] gve: add netmem TX support to GVE DQO-RDA mode
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 5/9] net: add devmem TCP TX documentation
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 2/9] net: devmem: TCP tx netlink api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 1/9] net: add get_netmem/put_netmem support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 0/9] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: gmem: Don't rely on __kvm_gmem_get_pfn() for preparedness
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] KVM: x86: hyper-v: Inhibit APICv with VP Assist on SPR/EMR
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/15] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH 14/14] KVM: arm64: Document NV caps and vcpu flags
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 13/14] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 00/14] KVM: arm64: NV userspace ABI
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [PATCH 6/6] x86/bugs: Remove X86_FEATURE_USE_IBPB
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 3/6] x86/bugs: Remove the X86_FEATURE_USE_IBPB check in ib_prctl_set()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 2/6] x86/mm: Remove X86_FEATURE_USE_IBPB checks in cond_mitigation()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 0/6] IBPB cleanups and a fixup
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v4 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v7 19/52] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH v4 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Joel Fernandes <joelagnelf@xxxxxxxxxx>
- Re: [PATCH v6 6/9] KVM: selftests: Add library support for interacting with SNP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v5 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v5 0/1] SEV-SNP: Add KVM support for SNP certificate fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Joel Fernandes <joelagnelf@xxxxxxxxxx>
- Re: [RFC PATCH] KVM: x86: hyper-v: Inhibit APICv with VP Assist on SPR/EMR
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v6 9/9] KVM: selftests: Add a basic SEV-SNP smoke test
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v7 09/11] arm64: Enable memory encrypt for Realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 04/21] dt-bindings: riscv: add Sxcsrind ISA extension description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v4 07/21] dt-bindings: riscv: add Smcntrpmf ISA extension description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH RFC v2 03/29] mm: asi: Introduce ASI core API
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 19/52] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v7 16/52] i386/tdvf: Introduce function to parse TDVF metadata
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH RFC v2 03/29] mm: asi: Introduce ASI core API
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [RFC PATCH v5 4/4] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 3/4] KVM: guest_memfd: Pass file pointer instead of inode pointer
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 2/4] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 1/4] mm/filemap: add mempolicy support to the filemap layer
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 0/4] Add NUMA mempolicy support for KVM guest-memfd
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH v7 08/52] i386/tdx: Initialize TDX before creating TD vcpus
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 00/18] x86/pmu: Fixes and improvements
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- [no subject]
- RE: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] mm: Provide address mask in struct follow_pfnmap_args
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH v2 0/2] LoongArch: KVM: Enhancement about PGD saving
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 2/2] LoongArch: KVM: Fix GPA size issue about VM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 1/2] LoongArch: KVM: Remove PGD saving during VM context switch
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- kvm-coco-queue 2nd round regression test report
- From: "Chen, Farrah" <farrah.chen@xxxxxxxxx>
- Re: [PATCH v2 0/6] vfio: Improve DMA mapping performance for huge pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: "BillXiang" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] memory-attribute-manager: Introduce a callback to notify the shared/private state change
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 15/18] x86: pmu: Adjust lower boundary of llc-misses event to 0 for legacy CPUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Introduce CET supervisor state support
- From: Chao Gao <chao.gao@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]