Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v9 16/24] x86/sev: Drop sev_guest_platform_data structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 15/24] x86/sev: Cache the secrets page address
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH 1/1] RISC-V: KVM: No need to use mask when hart-index-bit is 0
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH v9 14/24] x86/sev: Handle failures from snp_init()
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 13/24] x86/sev: Make sev-guest driver functional again
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 12/24] x86/sev: Make snp_issue_guest_request() static
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 11/24] x86/sev: Replace dev_[err,alert] with pr_[err,alert]
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 10/24] x86/sev: Move core SEV guest driver routines to common code
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 09/24] virt: sev-guest: Carve out SNP guest messaging init/exit
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 06/24] virt: sev-guest: Simplify VMPCK and sequence number assignments
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 08/24] virt: sev-guest: Take mutex in snp_send_guest_request()
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 07/24] virt: sev-guest: Store VMPCK index to SNP guest device structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 05/24] virt: sev-guest: Fix user-visible strings
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 04/24] virt: sev-guest: Add SNP guest request structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 03/24] virt: sev-guest: Make payload a variable length array
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 02/24] virt: sev-guest: Replace dev_dbg with pr_debug
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 01/24] virt: sev-guest: Use AES GCM crypto library
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v9 00/24] Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v3 3/3] KVM: SEV-ES: Fix LBRV code
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- RE: [PATCH] vfio/qat: add PCI_IOV dependency
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH] vdpa: Add support for no-IOMMU mode
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 8/9] arm64: support cpuidle-haltpoll
- From: "Okanovic, Haris" <harisokn@xxxxxxxxxx>
- Re: [PATCH 5/5] core/cpu-common: initialise plugin state before thread creation
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH 4/5] plugins: remove special casing for cpu->realized
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH 3/5] cpu-target: don't set cpu->thread_id to bogus value
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH 2/5] cpu: move Qemu[Thread|Cond] setup into common code
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH 1/5] hw/core: expand on the alignment of CPUState
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH v2 09/15] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v5 08/16] riscv: add ISA parsing for Zca, Zcf, Zcd and Zcb
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH v2 15/15] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 14/15] KVM: x86/tdp_mmu: Invalidate correct roots
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 13/15] KVM: x86/tdp_mmu: Make mmu notifier callbacks to check kvm_process
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 12/15] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 11/15] KVM: x86/tdp_mmu: Reflect tearing down mirror page tables
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 10/15] KVM: x86/tdp_mmu: Reflect building mirror page tables
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 09/15] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 08/15] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 07/15] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 06/15] KVM: x86/mmu: Support GFN direct mask
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 05/15] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 04/15] KVM: x86/mmu: Add a new mirror_pt member for union kvm_mmu_page_role
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 02/15] KVM: x86: Add a VM type define for TDX
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 03/15] KVM: x86/mmu: Add a mirrored pointer to struct kvm_mmu_page
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 01/15] KVM: Add member to struct kvm_gfn_range for target alias
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 00/15] TDX MMU prep series part 1
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 5/5] core/cpu-common: initialise plugin state before thread creation
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH 4/5] plugins: remove special casing for cpu->realized
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH 2/5] cpu: move Qemu[Thread|Cond] setup into common code
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH 3/5] cpu-target: don't set cpu->thread_id to bogus value
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH 1/5] hw/core: expand on the alignment of CPUState
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH 0/5] cpus: a few tweaks to CPU realization
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Zhi Wang <zhiw@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM/arm64 fixes for NV PAC support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] vfio/pci: add msi interrupt affinity support
- From: Fred Griffoul <fgriffo@xxxxxxxxxxxx>
- Re: [PATCH v5 13/16] riscv: add ISA extension parsing for Zcmop
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v5 09/16] riscv: hwprobe: export Zca, Zcf, Zcd and Zcb ISA extensions
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v5 02/16] riscv: add ISA extension parsing for Zimop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v5 02/16] riscv: add ISA extension parsing for Zimop
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KVM: SEV-ES: Fix LBRV code
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 5/5] KVM: selftests: KVM: SVM: Add Idle HLT intercept test
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v4 28/31] hw/i386: Add support for loading BIOS using guest_memfd
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 31/31] i386/sev: Enable KVM_HC_MAP_GPA_RANGE hcall for SNP guests
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 29/31] hw/i386/sev: Allow use of pflash in conjunction with -bios
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 21/31] i386/sev: Extract build_kernel_loader_hashes
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 30/31] i386/kvm: Add KVM_EXIT_HYPERCALL handling for KVM_HC_MAP_GPA_RANGE
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 27/31] hw/i386/sev: Use guest_memfd for legacy ROMs
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 26/31] i386/sev: Invoke launch_updata_data() for SNP class
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 24/31] hw/i386/sev: Add support to encrypt BIOS when SEV-SNP is enabled
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 25/31] i386/sev: Invoke launch_updata_data() for SEV class
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 22/31] i386/sev: Reorder struct declarations
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 19/31] i386/sev: Add support for populating OVMF metadata pages
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 18/31] hw/i386/sev: Add function to get SEV metadata from OVMF header
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 23/31] i386/sev: Allow measured direct kernel boot on SNP
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 20/31] i386/sev: Add support for SNP CPUID validation
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 16/31] i386/sev: Add handling to encrypt/finalize guest launch data
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 14/31] i386/sev: Update query-sev QAPI format to handle SEV-SNP
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 17/31] i386/sev: Set CPU state to protected once SNP guest payload is finalized
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 15/31] i386/sev: Add the SNP launch start context
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 12/31] i386/sev: Don't return launch measurements for SEV-SNP guests
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 13/31] i386/sev: Add a class method to determine KVM VM type for SNP guests
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 11/31] i386/cpu: Set SEV-SNP CPUID bit when SNP enabled
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 06/31] i386/sev: Move sev_launch_finish to separate class method
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 08/31] i386/sev: Add a sev_snp_enabled() helper
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 10/31] i386/sev: Add snp_kvm_init() override for SNP class
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 07/31] i386/sev: Introduce 'sev-snp-guest' object
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 09/31] i386/sev: Add sev_kvm_init() override for SEV class
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 04/31] i386/sev: Introduce "sev-common" type to encapsulate common SEV state
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 05/31] i386/sev: Move sev_launch_update to separate class method
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 01/31] i386/sev: Replace error_report with error_setg
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 02/31] linux-headers: Update to current kvm/next
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 00/31] Add AMD Secure Nested Paging (SEV-SNP) support
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 03/31] memory: Introduce memory_region_init_ram_guest_memfd()
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH] vdpa: Add support for no-IOMMU mode
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [RFC v2 7/7] qemu-options: Add the cache topology description of -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [RFC v2 6/7] i386/pc: Support cache topology in -smp for PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [RFC v2 5/7] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [RFC v2 4/7] i386/cpu: Support thread and module level cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [RFC v2 3/7] hw/core: Add cache topology options in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [RFC v2 2/7] hw/core: Define cache topology for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [RFC v2 1/7] hw/core: Make CPU topology enumeration arch-agnostic
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [RFC v2 0/7] Introduce SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [PATCH v5 02/16] riscv: add ISA extension parsing for Zimop
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 0/2] KVM/arm64 fixes for NV PAC support
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 30/54] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 26/54] KVM: x86/pmu: Avoid legacy vPMU code when accessing global_ctrl in passthrough vPMU
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 24/54] KVM: x86/pmu: Create a function prototype to disable MSR interception
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 20/54] KVM: x86/pmu: Allow RDPMC pass through when all counters exposed to guest
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 12/54] perf: x86: Add x86 function to switch PMI handler
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 1/2] vfio: Create vfio_fs_type with inode per device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 2/2] vfio/pci: Use unmap_mapping_range()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 0/2] vfio/pci: vfio device address space mapping
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 38/54] KVM: x86/pmu: Call perf_guest_enter() at PMU context switch
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 00/54] Mediated Passthrough vPMU 2.0 for x86
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 42/54] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v4 4/7] KVM: Move MMU lock acquisition for test/clear_young to architecture
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v4 3/7] KVM: Add lockless memslot walk to KVM
- From: James Houghton <jthoughton@xxxxxxxxxx>
- RE: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 2/7] mm: multi-gen LRU: Have secondary MMUs participate in aging
- From: James Houghton <jthoughton@xxxxxxxxxx>
- RE: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH 1/2] vfio: Create vfio_fs_type with inode per device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/7] mm: multi-gen LRU: Have secondary MMUs participate in aging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 2/7] mm: multi-gen LRU: Have secondary MMUs participate in aging
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH v5 02/16] riscv: add ISA extension parsing for Zimop
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v5 04/16] RISC-V: KVM: Allow Zimop extension for Guest/VM
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v5 06/16] dt-bindings: riscv: add Zca, Zcf, Zcd and Zcb ISA extension description
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v5 03/16] riscv: hwprobe: export Zimop ISA extension
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v5 01/16] dt-bindings: riscv: add Zimop ISA extension description
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH v5 02/16] riscv: add ISA extension parsing for Zimop
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- [syzbot] [kvm?] [net?] [virt?] INFO: task hung in __vhost_worker_flush
- From: syzbot <syzbot+7f3bbe59e8dd2328a990@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/7] mm: multi-gen LRU: Have secondary MMUs participate in aging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 4/7] KVM: Move MMU lock acquisition for test/clear_young to architecture
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/7] KVM: Add lockless memslot walk to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/7] mm: multi-gen LRU: Have secondary MMUs participate in aging
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Update pre_fault_memory_test.c to test no memslot case
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v4 7/7] KVM: selftests: Add multi-gen LRU aging to access_tracking_perf_test
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v4 5/7] KVM: x86: Relax locking for kvm_test_age_gfn and kvm_age_gfn
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v4 6/7] KVM: arm64: Relax locking for kvm_test_age_gfn and kvm_age_gfn
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v4 4/7] KVM: Move MMU lock acquisition for test/clear_young to architecture
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v4 3/7] KVM: Add lockless memslot walk to KVM
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v4 2/7] mm: multi-gen LRU: Have secondary MMUs participate in aging
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v4 1/7] mm/Kconfig: Add LRU_GEN_WALKS_SECONDARY_MMU
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v4 0/7] mm: multi-gen LRU: Walk secondary MMU page tables while aging
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH v4 4/5] RISC-V: KVM: add support for SBI_FWFT_PTE_AD_HW_UPDATING
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/16] KVM: arm64: nv: Add handling of NXS-flavoured TLBI operations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 15/16] KVM: arm64: nv: Add handling of range-based TLBI operations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/16] KVM: arm64: nv: Add handling of outer-shareable TLBI operations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/16] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/16] KVM: arm64: nv: Handle FEAT_TTL hinted TLB operations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 12/16] KVM: arm64: nv: Tag shadow S2 entries with guest's leaf S2 level
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/16] KVM: arm64: nv: Handle TLBI IPAS2E1{,IS} operations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/16] KVM: arm64: nv: Handle TLBI ALLE1{,IS} operations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/16] KVM: arm64: nv: Handle TLB invalidation targeting L2 stage-1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/16] KVM: arm64: nv: Handle TLBI VMALLS12E1{,IS} operations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/16] KVM: arm64: nv: Handle EL2 Stage-1 TLB invalidation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/16] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/16] KVM: arm64: nv: Add Stage-1 EL2 invalidation primitives
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/16] KVM: arm64: nv: Handle shadow stage 2 page faults
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/16] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/16] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/16] KVM: arm64: nv: Shadow stage-2 page table handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: nv: Fix relative priorities of exceptions generated by ERETAx
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: nv: Fix relative priorities of exceptions generated by ERETAx
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH for-9.1 0/7] target/i386/kvm: Cleanup the kvmclock feature name
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 0/6] target/i386: Misc cleanup on KVM PV defs and outdated comments
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 10/12] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2
- From: Pierre-Clément Tosi <ptosi@xxxxxxxxxx>
- Re: [PATCH v3 09/12] KVM: arm64: VHE: Add test module for hyp kCFI
- From: Pierre-Clément Tosi <ptosi@xxxxxxxxxx>
- [PATCH v4 13/13] KVM: arm64: nVHE: Support test module for hyp kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 12/13] KVM: arm64: VHE: Add test module for hyp kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 11/13] KVM: arm64: Improve CONFIG_CFI_CLANG error message
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 10/13] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 09/13] KVM: arm64: Introduce print_nvhe_hyp_panic helper
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 08/13] arm64: Introduce esr_comment() & esr_is_cfi_brk()
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 07/13] KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 06/13] KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 05/13] KVM: arm64: Rename __guest_exit_panic __hyp_panic
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 04/13] KVM: arm64: nVHE: Add EL2h sync exception handler
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 03/13] KVM: arm64: nVHE: Simplify __guest_exit_panic path
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 02/13] KVM: arm64: Fix __pkvm_init_switch_pgd call ABI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 01/13] KVM: arm64: Fix clobbered ELR in sync abort/SError
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v4 00/13] KVM: arm64: Add support for hypervisor kCFI
- From: "Pierre-Clément Tosi" <ptosi@xxxxxxxxxx>
- [PATCH v3 3/3] vfio/pci: Enable PCI resource mmap() on s390 and remove VFIO_PCI_MMAP
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v3 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v3 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v3 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: SEV-ES: Prevent MSR access post VMSA encryption
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH v4 2/5] dt-bindings: riscv: Add Svadu Entry
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 4.19 1/2] KVM: x86: Handle SRCU initialization failure during page track init
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attr
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: Re: [RFC PATCH 0/5] vsock/virtio: Add support for multi-devices
- From: Xuewei Niu <niuxuewei97@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH] vfio/qat: add PCI_IOV dependency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RESEND PATCH 0/3] XICS emulation optimizations in KVM for PPC
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH] vfio/qat: add PCI_IOV dependency
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- RE: [PATCH] vfio/qat: add PCI_IOV dependency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Add arch hooks for enabling/disabling virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: Add iowrite64 and ioread64 support for vfio pci
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH] KVM: x86: add missing MODULE_DESCRIPTION() macros
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 12/49] KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 20/49] KVM: x86: Rename kvm_cpu_cap_mask() to kvm_cpu_cap_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Cpu steal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Bug 218739] pmu_counters_test kvm-selftest fails with (count != NUM_INSNS_RETIRED)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 218739] pmu_counters_test kvm-selftest fails with (count != NUM_INSNS_RETIRED)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v19 105/130] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: SEV-ES: Prevent MSR access post VMSA encryption
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 33/49] KVM: x86: Advertise TSC_DEADLINE_TIMER in KVM_GET_SUPPORTED_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 3/3] vfio/pci: Enable PCI resource mmap() on s390 and remove VFIO_PCI_MMAP
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [syzbot] [kvm?] WARNING in __kvm_gpc_refresh (2)
- From: syzbot <syzbot+fd555292a1da3180fc82@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH net-next v5 07/13] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v5 06/13] mm: page_frag: add '_va' suffix to page_frag API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH] vfio/qat: add PCI_IOV dependency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attr
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for the Idle HLT intercept feature
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v4 4/5] RISC-V: KVM: add support for SBI_FWFT_PTE_AD_HW_UPDATING
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH 2/2] KVM: arm64: nv: Expose BTI and CSV_frac to a guest hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/2] KVM: arm64: nv: Fix relative priorities of exceptions generated by ERETAx
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/2] KVM/arm64 fixes for NV PAC support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] KVM: selftests: KVM: SVM: Add Idle HLT intercept test
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 1/5] x86/cpufeatures: Add CPUID feature bit for Idle HLT intercept
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftest: Add family and model check for zen4 in PMU filter test
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 2/5] KVM: SVM: Add Idle HLT intercept support
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 5/5] KVM: selftests: KVM: SVM: Add Idle HLT intercept test
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 3/5] KVM: selftests: Add safe_halt() and cli() helpers to common code
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 4/5] KVM: selftests: Add an interface to read the data of named vcpu stat
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 1/5] x86/cpufeatures: Add CPUID feature bit for Idle HLT intercept
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 0/5] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- RE: [PATCH v2 00/54] Mediated Passthrough vPMU 2.0 for x86
- From: "Ma, Yongwei" <yongwei.ma@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 04/10] selftests/harness: Fix interleaved scheduling leading to race conditions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Bug 218739] pmu_counters_test kvm-selftest fails with (count != NUM_INSNS_RETIRED)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/3] KVM/arm64 fixes for AArch32 handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v4 5/5] KVM: riscv: selftests: Add Svadu Extension to get-reg-list testt
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 4/5] RISC-V: KVM: add support for SBI_FWFT_PTE_AD_HW_UPDATING
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/5] RISC-V: KVM: Add Svadu Extension Support for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 2/5] dt-bindings: riscv: Add Svadu Entry
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH 1/2] perf: Skip pmu_ctx based on event_type
- From: Kan Liang <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] MIPS: Loongson64: Include bootinfo.h in dma.c
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 1/4] MIPS: kvm: Declare prototype for kvm_init_loongson_ipi
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v3 3/4] LoongArch: KVM: Add vm migration support for LBT registers
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 4/4] LoongArch: KVM: Add VM LBT feature detection support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 1/4] LoongArch: KVM: Add HW Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/4] LoongArch: KVM: Add Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/4] LoongArch: KVM: Add LBT feature detection with cpucfg
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [syzbot] [kvm?] KASAN: wild-memory-access Read in __timer_delete_sync
- From: syzbot <syzbot+d74d6f2cf5cb486c708f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v9] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v8 1/8] scripts/update-linux-headers: Copy setup_data.h to correct directory
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v8 8/8] Revert "docs/specs/pvpanic: mark shutdown event as not implemented"
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 5/8] hw/misc/pvpanic: add support for normal shutdowns
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 7/8] tests/qtest/pvpanic: add tests for pvshutdown event
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 6/8] pvpanic: Emit GUEST_PVSHUTDOWN QMP event on pvpanic shutdown signal
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 3/8] hw/misc/pvpanic: centralize definition of supported events
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 2/8] linux-headers: update to 6.10-rc1
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 0/8] update linux headers to v6.10-rc1 and shutdown support for pvpanic
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 4/8] tests/qtest/pvpanic: use centralized definition of supported events
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- [PATCH v8 1/8] scripts/update-linux-headers: Copy setup_data.h to correct directory
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- Re: [PATCH v19 105/130] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Drop support for hand tuning APIC timer advancement from userspace
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM/arm64 fixes for AArch32 handling
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix AArch32 register narrowing on userspace write
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix AArch32 register narrowing on userspace write
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v2] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 21/21] sched/cputime: Cope with steal time going backwards or negative
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 20/21] KVM: x86/xen: Prevent runstate times from becoming negative
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [PATCH 3/3] KVM: arm64: AArch32: Fix spurious trapping of conditional instructions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/3] KVM/arm64 fixes for AArch32 handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Fix AArch32 register narrowing on userspace write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v3 19/21] KVM: x86: Avoid periodic KVM clock updates in master clock mode
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 18/21] KVM: x86: Avoid gratuitous global clock reload in kvm_arch_vcpu_load()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 17/21] KVM: x86: Avoid global clock update on setting KVM clock MSR
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 16/21] KVM: x86: Factor out kvm_use_master_clock()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 15/21] KVM: x86: Allow KVM master clock mode when TSCs are offset from each other
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 14/21] KVM: x86: Kill cur_tsc_{nsec,offset,write} fields
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 13/21] KVM: x86: Improve synchronization in kvm_synchronize_tsc()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH] vfio/pci: Add iowrite64 and ioread64 support for vfio pci
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v3 12/21] KVM: x86: Remove implicit rdtsc() from kvm_compute_l1_tsc_offset()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 11/21] KVM: x86: Simplify and comment kvm_get_time_scale()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 10/21] KVM: x86: Fix software TSC upscaling in kvm_update_guest_time()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 1/2] vfio: Create vfio_fs_type with inode per device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v3 09/21] KVM: x86: Fix KVM clock precision in __get_kvmclock()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [RFC PATCH v3 04/21] UAPI: x86: Move pvclock-abi to UAPI for x86 platforms
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [RFC PATCH v4 5/5] KVM: riscv: selftests: Add Svadu Extension to get-reg-list testt
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 4/5] RISC-V: KVM: add support for SBI_FWFT_PTE_AD_HW_UPDATING
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 3/5] RISC-V: KVM: Add Svadu Extension Support for Guest/VM
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [v2][kvmtool PATCH 1/1] riscv: Add zacas extension
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [RFC PATCH v4 2/5] dt-bindings: riscv: Add Svadu Entry
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 1/5] RISC-V: Detect and Enable Svadu Extension Support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [RFC PATCH v4 0/5] Add Svadu Extension Support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- RE: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v4 0/2] LoongArch: Add steal time support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v4 1/2] LoongArch: KVM: Add steal time support in kvm side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v4 2/2] LoongArch: Add steal time support in guest side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [v2][kvmtool PATCH 1/1] riscv: Add zacas extension
- From: "Shaoqing Qin" <qinshaoqing@xxxxxxxxxx>
- [v2][kvmtool PATCH 0/1] riscv: Add zacas extension
- From: "Shaoqing Qin" <qinshaoqing@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Delete the now unused kvm_arch_sched_in()
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vfio-mdev: add MODULE_DESCRIPTION() macros
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- [PATCH 2/2] vfio/pci: Use unmap_mapping_range()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 1/2] vfio: Create vfio_fs_type with inode per device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 0/2] vfio/pci: vfio device address space mapping
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL v2] virtio: features, fixes, cleanups
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 0/4] Export APICv-related state via binary stats interface
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- [PATCH v6] KVM: arm64: Add early_param to control WFx trapping
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH 0/9] KVM: x86: Fixes for KVM_INTEL_PROVE_VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH][next][V2] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH][next] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: "Colin King (gmail)" <colin.i.king@xxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH][next] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 3/3] vfio/pci: Enable PCI resource mmap() on s390 and remove VFIO_PCI_MMAP
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] vsock/virtio: Add support for multi-devices
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Cpu steal
- From: "Y.G Kumar" <ygkumar17@xxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/bhi: BHI mitigation can trigger warning in #DB handler
- From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
- [PATCH v3 2/3] KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v3 3/3] KVM: SEV-ES: Fix LBRV code
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v3 1/3] KVM: SEV-ES: Prevent MSR access post VMSA encryption
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v3 0/3] KVM: SEV-ES: Fix KVM_{GET|SET}_MSRS and LBRV handling
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH][next] selftests: kvm: fix shift of 32 bit unsigned int more than 32 bits
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- [PATCH v2 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v2 3/3] vfio/pci: Enable PCI resource mmap() on s390 and remove VFIO_PCI_MMAP
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v2 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v2 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] vsock/virtio: Add support for multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] vsock: Add an ioctl request to get all CIDs
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] vsock: seqpacket_allow adapts to multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 3/5] vsock/virtio: can_msgzerocopy adapts to multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 2/5] vsock/virtio: Add support for multi-devices
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] vsock/virtio: Extend virtio-vsock spec with an "order" field
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: Jürgen Groß <jgross@xxxxxxxx>
- Re: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix incorrect reg_subtype labels in kvm_riscv_vcpu_set_reg_isa_ext function
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] vfio/pci: Enable VFIO_PCI_MMAP for s390
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] vsock/virtio: Extend virtio-vsock spec with an "order" field
- From: Alyssa Ross <hi@xxxxxxxxx>
- [GIT PULL v2] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: x86: Register "emergency disable" callbacks when virt is enabled
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 5/6] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Add arch hooks for enabling/disabling virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v2 2/4] LoongArch: KVM: Add LBT feature detection with cpucfg
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 3/4] LoongArch: KVM: Add vm migration support for LBT registers
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 0/4] LoongArch: KVM: Add Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 1/4] LoongArch: KVM: Add HW Binary Translation extension support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 4/4] LoongArch: KVM: Add VM LBT feature detection support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix incorrect reg_subtype labels in kvm_riscv_vcpu_set_reg_isa_ext function
- From: zhouquan@xxxxxxxxxxx
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: selftest: Define _GNU_SOURCE for all selftests code
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vfio/pci: Add iowrite64 and ioread64 support for vfio pci
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 3/3] vfio/pci: Enable VFIO_PCI_MMAP for s390
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: x86: Register "emergency disable" callbacks when virt is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 5/6] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: Rename functions related to enabling virtualization hardware
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Add arch hooks for enabling/disabling virtualization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/1] x86: vmexit: Allow IPI test to be accelerated by SVM AVIC
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: RFC: NTP adjustments interfere with KVM emulation of TSC deadline timers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [Bug 218876] PCIE device crash when trying to pass through USB PCIe Card to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] PCIE device crash when trying to pass through USB Device to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218876] New: PCIE device crash when trying to pass through USB Device to virtual machine
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: take mmap write lock for io_remap_pfn_range
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/9] cpuidle-haltpoll: condition on ARCH_CPUIDLE_HALTPOLL
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH 4/9] cpuidle-haltpoll: define arch_haltpoll_supported()
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: Add a flag to track if a loaded vCPU is scheduled out
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 3/3] vfio/pci: Fix typo in macro to declare accessors
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [PATCH v4 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [PATCH v4 1/3] vfio/pci: Extract duplicated code into macro
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- [PATCH v4 0/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 36/49] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [no subject]
- From: Harsh Kumar <text2hk@xxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vhost v9 0/6] refactor the params of find_vqs()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes, cleanups
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [GIT PULL] virtio: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 0/2] Add support for LAM in QEMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 0/2] Add support for LAM in QEMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 33/49] KVM: x86: Advertise TSC_DEADLINE_TIMER in KVM_GET_SUPPORTED_CPUID
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: KVM: No need to use mask when hart-index-bit is 0
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v1 RESEND] arch/powerpc/kvm: Fix doorbell emulation by adding DPDES support
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v10 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH] arch/powerpc/kvm: Fix doorbell emulation by adding DPDES support
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: KVM: No need to use mask when hart-index-bit is 0
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 08/16] riscv: add ISA parsing for Zca, Zcf, Zcd and Zcb
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: Rename functions related to enabling virtualization hardware
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v7 08/10] KVM VMX: Move MSR_IA32_VMX_MISC bit defines to asm/vmx.h
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 04/10] KVM: VMX: Move MSR_IA32_VMX_BASIC bit defines to asm/vmx.h
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 07/10] KVM: nVMX: Add a helper to encode VMCS info in MSR_IA32_VMX_BASIC
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v7 04/10] KVM: VMX: Move MSR_IA32_VMX_BASIC bit defines to asm/vmx.h
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 20/49] KVM: x86: Rename kvm_cpu_cap_mask() to kvm_cpu_cap_init()
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] LoongArch: KVM: Add steal time support in kvm side
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2 1/6] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 12/49] KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/6] KVM: x86: Register "emergency disable" callbacks when virt is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/6] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: Add arch hooks for enabling/disabling virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: Add a module param to allow enabling virtualization when KVM is loaded
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: Rename functions related to enabling virtualization hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: Register cpuhp and syscore callbacks when enabling hardware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/6] KVM: Register cpuhp/syscore callbacks when enabling virt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] LoongArch: Add steal time support in guest side
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/6] KVM: x86: Drop now-superflous setting of l1tf_flush_l1d in vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: Delete the now unused kvm_arch_sched_in()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: VMX: Move PLE grow/shrink helpers above vmx_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: Add a flag to track if a loaded vCPU is scheduled out
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/6] KVM: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2024.05.22 - CANCELED
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/16] KVM: x86/mmu: Introduce a slot flag to zap only slot leafs on slot deletion
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH] KVM: x86: Drop support for hand tuning APIC timer advancement from userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v3 01/21] KVM: x86/xen: Do not corrupt KVM clock in kvm_xen_shared_info_init()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 16/21] KVM: x86: Factor out kvm_use_master_clock()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 12/21] KVM: x86: Remove implicit rdtsc() from kvm_compute_l1_tsc_offset()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 20/21] KVM: x86/xen: Prevent runstate times from becoming negative
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 00/21] Cleaning up the KVM clock mess
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 15/21] KVM: x86: Allow KVM master clock mode when TSCs are offset from each other
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 18/21] KVM: x86: Avoid gratuitous global clock reload in kvm_arch_vcpu_load()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 05/21] KVM: selftests: Add KVM/PV clock selftest to prove timer correction
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 02/21] KVM: x86: Improve accuracy of KVM clock when TSC scaling is in force
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 09/21] KVM: x86: Fix KVM clock precision in __get_kvmclock()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 14/21] KVM: x86: Kill cur_tsc_{nsec,offset,write} fields
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 07/21] KVM: x86: Add KVM_VCPU_TSC_SCALE and fix the documentation on TSC migration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 08/21] KVM: x86: Avoid NTP frequency skew for KVM clock on 32-bit host
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 17/21] KVM: x86: Avoid global clock update on setting KVM clock MSR
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 21/21] sched/cputime: Cope with steal time going backwards or negative
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 03/21] KVM: x86: Add KVM_[GS]ET_CLOCK_GUEST for accurate KVM clock migration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 10/21] KVM: x86: Fix software TSC upscaling in kvm_update_guest_time()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 19/21] KVM: x86: Avoid periodic KVM clock updates in master clock mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 13/21] KVM: x86: Improve synchronization in kvm_synchronize_tsc()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 04/21] UAPI: x86: Move pvclock-abi to UAPI for x86 platforms
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 11/21] KVM: x86: Simplify and comment kvm_get_time_scale()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH v3 06/21] KVM: x86: Explicitly disable TSC scaling without CONSTANT_TSC
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: access_tracking_perf_test kvm selftest doesn't work when Multi-Gen LRU is in use
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV-ES: Don't intercept MSR_IA32_DEBUGCTLMSR for SEV-ES guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 08/16] riscv: add ISA parsing for Zca, Zcf, Zcd and Zcb
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: x86: Disable KVM_INTEL_PROVE_VE by default
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Drop unused check_apicv_inhibit_reasons() callback definition
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PULL 13/19] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 3/3] vfio/pci: Continue to refactor vfio_pci_core_do_io_rw
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 4/5] vfio/type1: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH v3 2/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/3] vfio/pci: Extract duplicated code into macro
- From: Gerd Bayer <gbayer@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Fix guest memory leak when handling guest requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix an inversion error when a negative value assigned to lapic_timer.timer_advance_ns
- From: zhoushuling <zhoushuling@xxxxxxxxxx>
- [PATCH 3/3] vfio/pci: Enable VFIO_PCI_MMAP for s390
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 2/3] vfio/pci: Tolerate oversized BARs by disallowing mmap
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v5 07/16] riscv: add ISA extensions validation callback
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 1/9] KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: How to implement message forwarding from one CID to another in vhost driver
- From: Alexander Graf <agraf@xxxxxxxxx>
- Re: [PATCH v2 4/5] KVM: selftests: Add an interface to read the data of named vcpu stat
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH] KVM: x86: Advertise AVX10.1 CPUID to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 1/2] LoongArch: KVM: Add steal time support in kvm side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/2] LoongArch: Add steal time support in guest side
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/2] LoongArch: Add steal time support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]