Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 1/2] LoongArch: KVM: Add steal time support in kvm side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/2] LoongArch: Add steal time support in guest side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/2] LoongArch: Add steal time support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 07/10] KVM: nVMX: Add a helper to encode VMCS info in MSR_IA32_VMX_BASIC
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] VFIO updates for v6.10-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 3/3] KVM: SVM: Consider NUMA affinity when allocating per-CPU save_area
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 2/3] KVM: SVM: not account memory allocation for per-CPU svm_data
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 1/3] KVM: SVM: remove useless input parameter in snp_safe_alloc_page
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [GIT PULL] VFIO updates for v6.10-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 03/10] KVM: x86: Stuff vCPU's PAT with default value at RESET, not creation
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v7 10/10] KVM: nVMX: Use macros and #defines in vmx_restore_vmx_misc()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 09/10] KVM: VMX: Open code VMX preemption timer rate mask in its accessor
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 08/10] KVM VMX: Move MSR_IA32_VMX_MISC bit defines to asm/vmx.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/10] KVM: nVMX: Add a helper to encode VMCS info in MSR_IA32_VMX_BASIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 06/10] KVM: nVMX: Use macros and #defines in vmx_restore_vmx_basic()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 05/10] KVM: VMX: Track CPU's MSR_IA32_VMX_BASIC as a single 64-bit value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 04/10] KVM: VMX: Move MSR_IA32_VMX_BASIC bit defines to asm/vmx.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 03/10] KVM: x86: Stuff vCPU's PAT with default value at RESET, not creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 02/10] x86/cpu: KVM: Move macro to encode PAT value to common header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 01/10] x86/cpu: KVM: Add common defines for architectural memory types (PAT, MTRRs, etc.)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 00/10] x86/cpu: KVM: Clean up PAT and VMX macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH V6 4/4] KVM: selftests: Add test for configure of x86 APIC bus frequency
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V6 4/4] KVM: selftests: Add test for configure of x86 APIC bus frequency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V6 4/4] KVM: selftests: Add test for configure of x86 APIC bus frequency
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: fix spelling of KVM_RUN_X86_BUS_LOCK in docs
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] KVM: fix documentation rendering for KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: SEV: Fix unused variable in guest request handling
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Carlos Bilbao <carlos.bilbao.osdev@xxxxxxxxx>
- Re: [PATCH 1/9] KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v3 0/3] KVM: SVM: refine snp_safe_alloc_page() implementation
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH v3 2/3] KVM: SVM: not account memory allocation for per-CPU svm_data
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH v3 1/3] KVM: SVM: remove useless input parameter in snp_safe_alloc_page
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH v3 3/3] KVM: SVM: Consider NUMA affinity when allocating per-CPU save_area
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: <zhoushuling@xxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Dorjoy Chowdhury <dorjoychy111@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RESEND PATCH 3/3] arch/powerpc/kvm: Reduce lock contention by moving spinlock from ics to irq_state
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [RESEND PATCH 2/3] arch/powerpc/kvm: Optimize the server number -> ICP lookup
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [RESEND PATCH 1/3] arch/powerpc/kvm: Use bitmap to speed up resend of irqs in ICS
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [RESEND PATCH 0/3] XICS emulation optimizations in KVM for PPC
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- From Financial Crimes Enforcement Network
- From: "Financial Crimes Enforcement Network" <bill@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Carlos Bilbao <carlos.bilbao.osdev@xxxxxxxxx>
- [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <mdroth@xxxxxxxxxx>
- How to implement message forwarding from one CID to another in vhost driver
- From: Dorjoy Chowdhury <dorjoychy111@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH] selftests: drivers/s390x: Use SKIP() during FIXTURE_SETUP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/9] KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfo
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] KVM: VMX: Don't kill the VM on an unexpected #VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: x86/mmu: Print SPTEs on unexpected #VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/9] KVM: VMX: Dump VMCS on unexpected #VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] KVM: x86: Fixes for KVM_INTEL_PROVE_VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PULL 17/19] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/2] selftests: harness: refactor __constructor_order
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 05/16] KVM: Add member to struct kvm_gfn_range for target alias
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PULL 17/19] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH] KVM: x86: Force KVM_WERROR if the global WERROR is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2 00/49] KVM: x86: CPUID overhaul, fixes, and caching
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH v2 49/49] *** DO NOT APPLY *** KVM: x86: Verify KVM initializes all consumed guest caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 48/49] KVM: x86: Add a macro for features that are synthesized into boot_cpu_data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 47/49] KVM: x86: Drop superfluous host XSAVE check when adjusting guest XSAVES caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 46/49] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 45/49] KVM: x86: Shuffle code to prepare for dropping guest_cpuid_has()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 44/49] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 43/49] KVM: x86: Update OS{XSAVE,PKE} bits in guest CPUID irrespective of host support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 42/49] KVM: x86: Drop unnecessary check that cpuid_entry2_find() returns right leaf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 41/49] KVM: x86: Avoid double CPUID lookup when updating MWAIT at runtime
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 40/49] KVM: x86: Initialize guest cpu_caps based on KVM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 39/49] KVM: x86: Extract code for generating per-entry emulated CPUID information
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 38/49] KVM: x86: Initialize guest cpu_caps based on guest CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 37/49] KVM: x86: Replace guts of "governed" features with comprehensive cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 36/49] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 35/49] KVM: x86: Add a macro to handle features that are fully VMM controlled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 34/49] KVM: x86: Advertise HYPERVISOR in KVM_GET_SUPPORTED_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 33/49] KVM: x86: Advertise TSC_DEADLINE_TIMER in KVM_GET_SUPPORTED_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 32/49] KVM: x86: Remove all direct usage of cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 31/49] KVM: x86: Move kvm_find_cpuid_entry{,_index}() up near cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 30/49] KVM: x86: Always operate on kvm_vcpu data in cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 29/49] KVM: x86: Remove unnecessary caching of KVM's PV CPUID base
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 28/49] KVM: x86: Clear PV_UNHALT for !HLT-exiting only when userspace sets CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 27/49] KVM: x86: Swap incoming guest CPUID into vCPU before massaging in KVM_SET_CPUID2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 26/49] KVM: x86: Add a macro to init CPUID features that KVM emulates in software
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 25/49] KVM: x86: Harden CPU capabilities processing against out-of-scope features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 24/49] KVM: x86: #undef SPEC_CTRL_SSBD in cpuid.c to avoid macro collisions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 23/49] KVM: x86: Handle kernel- and KVM-defined CPUID words in a single helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 22/49] KVM: x86: Add a macro to precisely handle aliased 0x1.EDX CPUID features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 21/49] KVM: x86: Add a macro to init CPUID features that are 64-bit only
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/49] KVM: x86: Rename kvm_cpu_cap_mask() to kvm_cpu_cap_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/49] KVM: x86: Add a macro to init CPUID features that ignore host kernel support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/49] KVM: x86: Account for max supported CPUID leaf when getting raw host CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/49] KVM: x86: Do reverse CPUID sanity checks in __feature_leaf()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/49] KVM: x86: Don't update PV features caches when enabling enforcement capability
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/49] KVM: x86: Zero out PV features cache when the CPUID leaf is not present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/49] KVM: selftests: Update x86's KVM PV test to match KVM's disabling exits behavior
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/49] KVM: selftests: Fix a bad TEST_REQUIRE() in x86's KVM PV test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/49] KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/49] KVM: x86: Disallow KVM_CAP_X86_DISABLE_EXITS after vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/49] KVM: x86: Drop now-redundant MAXPHYADDR and GPA rsvd bits from vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/49] KVM: x86/pmu: Drop now-redundant refresh() during init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/49] KVM: x86: Move __kvm_is_valid_cr4() definition to x86.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/49] KVM: selftests: Verify KVM stuffs runtime CPUID OS bits on CR4 writes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/49] KVM: selftests: Refresh vCPU CPUID cache in __vcpu_get_cpuid_entry()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/49] KVM: selftests: Assert that the @cpuid passed to get_cpuid_entry() is non-NULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/49] KVM: selftests: Update x86's set_sregs_test to match KVM's CPUID enforcement
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/49] KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/49] KVM: x86: Explicitly do runtime CPUID updates "after" initial setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/49] KVM: x86: Do all post-set CPUID processing during vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/49] KVM: x86: CPUID overhaul, fixes, and caching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 07/16] riscv: add ISA extensions validation callback
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 05/16] KVM: riscv: selftests: Add Zimop extension to get-reg-list test
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v5 04/16] RISC-V: KVM: Allow Zimop extension for Guest/VM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: Jürgen Groß <jgross@xxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH v5 16/16] KVM: riscv: selftests: Add Zcmop extension to get-reg-list test
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 15/16] RISC-V: KVM: Allow Zcmop extension for Guest/VM
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 14/16] riscv: hwprobe: export Zcmop ISA extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 13/16] riscv: add ISA extension parsing for Zcmop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 12/16] dt-bindings: riscv: add Zcmop ISA extension description
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 11/16] KVM: riscv: selftests: Add some Zc* extensions to get-reg-list test
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 10/16] RISC-V: KVM: Allow Zca, Zcf, Zcd and Zcb extensions for Guest/VM
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 09/16] riscv: hwprobe: export Zca, Zcf, Zcd and Zcb ISA extensions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 08/16] riscv: add ISA parsing for Zca, Zcf, Zcd and Zcb
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 07/16] riscv: add ISA extensions validation callback
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 06/16] dt-bindings: riscv: add Zca, Zcf, Zcd and Zcb ISA extension description
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 05/16] KVM: riscv: selftests: Add Zimop extension to get-reg-list test
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 04/16] RISC-V: KVM: Allow Zimop extension for Guest/VM
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 03/16] riscv: hwprobe: export Zimop ISA extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 02/16] riscv: add ISA extension parsing for Zimop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 01/16] dt-bindings: riscv: add Zimop ISA extension description
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v5 00/16] Add support for a few Zc* extensions, Zcmop and Zimop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [RFC PATCH 5/5] vsock: Add an ioctl request to get all CIDs
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 4/5] vsock: seqpacket_allow adapts to multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 3/5] vsock/virtio: can_msgzerocopy adapts to multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 2/5] vsock/virtio: Add support for multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 1/5] vsock/virtio: Extend virtio-vsock spec with an "order" field
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- [RFC PATCH 0/5] vsock/virtio: Add support for multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/3] vfio/pci: Extract duplicated code into macro
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 4/4] riscv: add SBI SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 3/4] riscv: add SSE assembly entry handling
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/4] riscv: add SBI SSE extension definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/4] riscv: move REG_L/REG_W in a dedicated asm.h file
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/4] riscv: add SBI SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- unsubscribe
- From: Satay Epic <satayepic@xxxxxxxxx>
- [PATCH 1/2] selftests: harness: remove unneeded __constructor_order_last()
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 0/2] selftests: harness: refactor __constructor_order
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 3/3] vfio/pci: Continue to refactor vfio_pci_core_do_io_rw
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH v3 1/3] vfio/pci: Extract duplicated code into macro
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Thomas Hellström <thomas.hellstrom@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/14] arm64: Force device mappings to be non-secure shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] Fix Issue: When VirtIO Backend providing VIRTIO_BLK_F_MQ feature, The file system of the front-end OS fails to be mounted.
- From: Andrey Zhadchenko <andrey.zhadchenko@xxxxxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Christian König <ckoenig.leichtzumerken@xxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH] vfio/pci: Restore zero affected bus reset devices warning
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH] vfio/pci: Collect hot-reset devices to local buffer
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH] Fix Issue: When VirtIO Backend providing VIRTIO_BLK_F_MQ feature, The file system of the front-end OS fails to be mounted.
- From: Lynch <lynch.wy@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v8] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] vringh: add MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the loongarch tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] vfio/pci: Restore zero affected bus reset devices warning
- From: Cédric Le Goater <clg@xxxxxxxx>
- [PATCH] vfio/pci: Restore zero affected bus reset devices warning
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: Collect hot-reset devices to local buffer
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4] vfio/pci: migration: Skip config space check for Vendor Specific Information in VSC during restore/load
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH v5] KVM: arm64: Add early_param to control WFx trapping
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 07/14] arm64: Make the PHYS_MASK_SHIFT dynamic
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v2 03/14] arm64: realm: Query IPA size from the RMM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH] vhost: use pr_err for vq_err
- From: Peng Fan <peng.fan@xxxxxxx>
- Re: [PATCH] vhost: use pr_err for vq_err
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- RE: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- RE: [PATCH 1/5] x86/pat: Let pat_pfn_immune_to_uc_mtrr() check MTRR for untracked PAT range
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vhost: use pr_err for vq_err
- From: "Peng Fan (OSS)" <peng.fan@xxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvmtool PATCH v3 1/1] riscv: Fix the hart bit setting of AIA
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 6.10 merge window
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- access_tracking_perf_test kvm selftest doesn't work when Multi-Gen LRU is in use
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix uninitialized firmware error code
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [GIT PULL] First batch of KVM changes for Linux 6.10 merge window
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: add KVM_RUN_X86_GUEST_MODE kvm_run flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH] KVM: Unexport kvm_debugfs_dir
- From: Borislav Petkov <bp@xxxxxxxxxx>
- [PATCH] vhost/vsock: always initialize seqpacket_allow
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [kvmtool PATCH v2 1/1] riscv: Fix the hart bit setting of AIA
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 00/21] i386: Introduce smp.modules and clean up cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [RFC v4 07/13] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [RFC v4 06/13] mm: page_frag: add '_va' suffix to page_frag API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: add KVM_RUN_X86_GUEST_MODE kvm_run flag
- From: Julian Stecklina <julian.stecklina@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 10/14] arm64: Force device mappings to be non-secure shared
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- [kvmtool PATCH v2 1/1] riscv: Fix the hart bit setting of AIA
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v2 10/14] arm64: Force device mappings to be non-secure shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] KVM: x86: Prevent L0 VMM from modifying L2 VM registers via ioctl
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: <cheng.lin130@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the loongarch tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH]virtio-pci: Check if is_avq is NULL
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] KVM: SEV: Replace KVM_EXIT_VMGEXIT with KVM_EXIT_SNP_REQ_CERTS
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH 16/16] KVM: x86/tdp_mmu: Invalidate correct roots
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 15/16] KVM: x86/tdp_mmu: Make mmu notifier callbacks to check kvm_process
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 14/16] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 13/16] KVM: x86/tdp_mmu: Introduce shared, private KVM MMU root types
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 12/16] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 11/16] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 07/16] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 09/16] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 08/16] KVM: x86/mmu: Bug the VM if kvm_zap_gfn_range() is called for TDX
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 06/16] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 05/16] KVM: Add member to struct kvm_gfn_range for target alias
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 04/16] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 03/16] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 01/16] KVM: x86: Add a VM type define for TDX
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 00/16] TDX MMU prep series part 1
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [RFC PATCH 6/7] riscv: kvm: add SBI FWFT support for SBI_FWFT_DOUBLE_TRAP_ENABLE
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH]virtio-pci: Check if is_avq is NULL
- From: li zhang <zhanglikernel@xxxxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] KVM: arm64: nv: Fix relative priorities of exceptions generated by ERETAx
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [RFC PATCH 5/7] riscv: add double trap driver
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 13/15] KVM: x86: Kill cur_tsc_{nsec,offset,write} fields
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 18/33] arm: realm: Add test for FPU/SIMD context save/restore
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 06/14] arm64: Override set_fixmap_io
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [RFC PATCH 6/7] riscv: kvm: add SBI FWFT support for SBI_FWFT_DOUBLE_TRAP_ENABLE
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 30/54] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/7] riscv: add double trap driver
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] riscv: add ISA extensions validation
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v2 27/54] KVM: x86/pmu: Exclude PMU MSRs in vmx_get_passthrough_msr_slot()
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [kvmtool PATCH 3/3] riscv: Add Zacas extensiona support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH 2/3] riscv: Add Ztso extensiona support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH 1/3] Sync-up headers with Linux-6.9 kernel
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH 0/3] Add RISC-V ISA extensions based on Linux-6.9
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: "Manwaring, Derek" <derekmn@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 02/21] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/21] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 02/21] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- [PATCH] KVM: SEV: Fix unused variable in guest request handling
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 10/12] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] KVM: SEV: Fix uninitialized firmware error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v3 09/12] KVM: arm64: VHE: Add test module for hyp kCFI
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] Kselftest fixes for v6.9
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 08/14] arm64: Enforce bounce buffers for realm DMA
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 07/14] arm64: Make the PHYS_MASK_SHIFT dynamic
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 4/4] KVM: Rename functions related to enabling virtualization hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/16] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Register emergency virt callback in common code, via kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/14] arm64: Override set_fixmap_io
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v3 08/12] arm64: Move esr_comment() to <asm/esr.h>
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 07/12] KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 06/12] KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 04/12] KVM: arm64: nVHE: Remove __guest_exit_panic path
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 03/12] KVM: arm64: Pass pointer to __pkvm_init_switch_pgd
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 03/14] arm64: realm: Query IPA size from the RMM
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 02/12] KVM: arm64: Fix __pkvm_init_switch_pgd C signature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 01/12] KVM: arm64: Fix clobbered ELR in sync abort/SError
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: arm64: Only reset vCPU-scoped feature ID regs once
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: arm64: Reset VM feature ID regs from kvm_reset_sys_regs()
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: arm64: Rename is_id_reg() to imply VM scope
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH v4 00/22] hw/i386: Remove deprecated pc-i440fx-2.0 -> 2.3 machines
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: Rename functions related to enabling virtualization hardware
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Register emergency virt callback in common code, via kvm_x86_ops
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [syzbot] Monthly kvm report (May 2024)
- From: syzbot <syzbot+listae8e7effb4763866f80d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [Bug 218684] CPU soft lockups in KVM VMs on kernel 6.x after switching hypervisor from C8S to C9S
- From: bugzilla-daemon@xxxxxxxxxx
- Re: Unmapping KVM Guest Memory from Host Kernel
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- RE: [PATCH v6 2/5] hisi_acc_vfio_pci: modify the register location of the XQC address
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 08/25] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 08/25] KVM: selftests: Add test for uaccesses to non-existent vgic-v2 CPUIF
- From: Pavel Machek <pavel@xxxxxxx>
- RE: [PATCH] vfio/pci: Collect hot-reset devices to local buffer
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 17/17] KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfns
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 16/17] KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error values
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 14/17] KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 15/17] KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faults
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 13/17] KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 12/17] KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIO
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 10/17] KVM: x86/mmu: Move private vs. shared check above slot validity checks
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 09/17] KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faults
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 07/17] KVM: x86/mmu: Use synthetic page fault error code to indicate private faults
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 04/17] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 02/17] KVM: x86: Remove separate "bit" defines for page fault error code masks
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 01/17] KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulation
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH] Build guest_memfd_test also on arm64.
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH 1/3] LoongArch: KVM: Add HW Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/3] LoongArch: KVM: Add Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 3/3] LoongArch: KVM: Add vm migration support for LBT feature
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 2/3] LoongArch: KVM: Add LBT feature detection with cpucfg
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [GIT PULL] Final KVM change for Linux 6.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Kselftest fixes for v6.9
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Kselftest fixes for v6.9
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] Final KVM change for Linux 6.9
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KVM: x86 pull requests for 6.10
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.10
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PULL 09/19] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [mst-vhost:vhost 54/54] drivers/vdpa/octeon_ep/octep_vdpa_main.c:538:25: error: implicit declaration of function 'readq'; did you mean 'readl'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- [PATCH v7 07/10] selftests/pidfd: Fix wrong expectation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 06/10] selftests/harness: Constify fixture variants
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 10/10] selftests/harness: Handle TEST_F()'s explicit exit codes
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 05/10] selftests/landlock: Do not allocate memory in fixture data
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 09/10] selftests/harness: Fix vfork() side effects
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 04/10] selftests/harness: Fix interleaved scheduling leading to race conditions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 08/10] selftests/harness: Share _metadata between forked processes
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 03/10] selftests/harness: Fix fixture teardown
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 02/10] selftests/landlock: Fix FS tests when run on a private mount point
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 00/10] Fix Kselftest's vfork() side effects
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 01/10] selftests/pidfd: Fix config for pidfd_setns_test
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 6.10
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: x86: Prioritize getting max_gfn from GuestPhysBits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2] KVM: x86/mmu: Only allocate shadowed translation cache for sp->role.level <= KVM_MAX_HUGEPAGE_LEVEL
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH v2 12/25] KVM: VMX: Handle FRED event data
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: <cheng.lin130@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- [RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v2 11/25] KVM: x86: Add kvm_is_fred_enabled()
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v2 11/25] KVM: x86: Add kvm_is_fred_enabled()
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [GIT PULL] KVM: x86: VMX changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Selftests "tree"-wide changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Selftests cleanups and fixes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: MMU changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: Misc changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Common changes for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- KVM: x86 pull requests for 6.10
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio: remove an extra semicolon
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PULL 08/19] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 07/19] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 06/19] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 05/19] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 04/19] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 03/19] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 02/19] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 01/19] KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is needed
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 19/19] crypto: ccp: Add the SNP_VLEK_LOAD command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 18/19] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 17/19] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 16/19] KVM: SVM: Add module parameter to enable SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 15/19] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- [PULL 14/19] KVM: x86: Implement hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 12/19] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 11/19] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 10/19] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PULL 09/19] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v3] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v2 0/6] powerpc: pSeries: vfio: iommu: Re-enable support for SPAPR TCE VFIO
- From: Shawn Anastasio <sanastasio@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] Avoid rcu_core() if CPU just left guest vcpu
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Addressing a possible race in kvm_vcpu_on_spin:
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [kvm-unit-tests PATCH 18/33] arm: realm: Add test for FPU/SIMD context save/restore
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fix supported VM_TYPES caps
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] LoongArch KVM changes for v6.10
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Addressing a possible race in kvm_vcpu_on_spin:
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] KVM: arm64: Add early_param to control WFx trapping
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: introduce vm's max_halt_poll_ns to debugfs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selftests/harness: Use 1024 in place of LINE_MAX
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v2 1/2] Revert "selftests/harness: remove use of LINE_MAX"
- From: Simon Horman <horms@xxxxxxxxxx>
- [PATCH v3 12/12] KVM: arm64: Improve CONFIG_CFI_CLANG error message
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 11/12] KVM: arm64: nVHE: Support test module for hyp kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 10/12] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 09/12] KVM: arm64: VHE: Add test module for hyp kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 08/12] arm64: Move esr_comment() to <asm/esr.h>
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 07/12] KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 06/12] KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 05/12] KVM: arm64: nVHE: Add EL2h sync exception handler
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 04/12] KVM: arm64: nVHE: Remove __guest_exit_panic path
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 03/12] KVM: arm64: Pass pointer to __pkvm_init_switch_pgd
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 02/12] KVM: arm64: Fix __pkvm_init_switch_pgd C signature
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 01/12] KVM: arm64: Fix clobbered ELR in sync abort/SError
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 00/12] KVM: arm64: Add support for hypervisor kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [syzbot] [kvm?] WARNING in kvm_mmu_notifier_invalidate_range_start (4)
- From: syzbot <syzbot+30d8503d558f3d50306b@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]