Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH] KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix broken SNP support with KVM module built-in
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.14, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/5] nVMX: add a test for canonical checks of various host state vmcs12 fields.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/5] Add a test for writing canonical values to various msrs and fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] Collection of tests for canonical checks on LA57 enabled CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 17/18] x86: pmu: Adjust lower boundary of branch-misses event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 13/18] x86: pmu: Improve instruction and branches events verification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 08/18] x86: pmu: Fix cycles event validation failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 07/18] x86: pmu: Fix potential out of bound access for fixed events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 05/18] x86: pmu: Enlarge cnt[] length to 48 in check_counters_many()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 04/18] x86: pmu: Fix the issue that pmu_counter_t.config crosses cache line
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/5] vfio/type1: Use mapping page mask for pfnmaps
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/11] KVM: Add lockless memslot walk to KVM
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH 5/5] vfio/type1: Use mapping page mask for pfnmaps
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v6 9/9] KVM: selftests: Add a basic SEV-SNP smoke test
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v6 6/9] KVM: selftests: Add library support for interacting with SNP
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v6 4/9] KVM: selftests: Add VMGEXIT helper
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v6 2/9] KVM: SEV: Disable SEV on platform init failure
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v6 1/9] KVM: SEV: Disable SEV-SNP on FW validation failure
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH 1/5] vfio/type1: Catch zero from pin_user_pages_remote()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [kvm-unit-tests PATCH] x86: Make set/clear_bit() atomic
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [kvm-unit-tests PATCH] nVMX: Clear A/D enable bit in EPTP after negative testcase on non-A/D host
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2 26/45] migration: close kvm after cpr
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v9 02/11] KVM: Add lockless memslot walk to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH][next] KVM: selftests: Fix spelling mistake "Unabled" -> "Unable"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: Collecting Open Questions from the Linux Kernel SIG Call
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Patch net v3] vsock/virtio: fix variables initialization during resuming
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v6 2/3] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v6 3/3] PCI: s390: Enable HAVE_PCI_MMAP on s390 and restrict mmap() of resources to mappable BARs
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v6 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v7 07/45] arm64: RME: Define the user ABI
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- [PATCH][next] KVM: selftests: Fix spelling mistake "Unabled" -> "Unable"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [Patch net v3] vsock/virtio: fix variables initialization during resuming
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3 00/18] vDSO: Introduce generic data storage
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.14, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 1/6] kbuild: Allow multiple asm-offsets file to be generated
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 0/6] riscv: add SBI SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 4/6] riscv: lib: Add SBI SSE extension definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 6/6] riscv: sbi: Add SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 5/6] lib: riscv: Add SBI SSE support
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 3/6] riscv: Use asm-offsets to generate SBI_EXT_HSM values
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 2/6] riscv: Set .aux.o files as .PRECIOUS
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v3 00/18] vDSO: Introduce generic data storage
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v1 2/2] KVM: s390: pv: fix race when making a page secure
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] KVM: s390: pv: fix race when making a page secure
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 2/2] KVM: s390: pv: fix race when making a page secure
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] KVM: s390: fix issues when splitting folios
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 4/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [Patch net v3] vsock/virtio: fix variables initialization during resuming
- From: Luigi Leonardi <leonardi@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- subscribe
- From: list archives <lkml@xxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH v4 26/27] KVM: arm64: selftests: Add SME system registers to get-reg-list
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 27/27] KVM: arm64: selftests: Add SME to set_id_regs test
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 25/27] KVM: arm64: Provide interface for configuring and enabling SME for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 24/27] KVM: arm64: Expose SME to nested guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 23/27] KVM: arm64: Handle SME exceptions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 22/27] KVM: arm64: Context switch SME state for normal guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 21/27] KVM: arm64: Expose SME specific state to userspace
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 20/27] KVM: arm64: Support userspace access to streaming mode Z and P registers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 19/27] KVM: arm64: Provide assembly for SME state restore
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 18/27] KVM: arm64: Support SME priority registers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 17/27] KVM: arm64: Support SME identification registers for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 14/27] KVM: arm64: Implement SME vector length configuration
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 16/27] KVM: arm64: Support TPIDR2_EL0
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 15/27] KVM: arm64: Support SME control registers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 13/27] KVM: arm64: Store vector lengths in an array
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 12/27] KVM: arm64: Rename sve_state_reg_region
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 10/27] KVM: arm64: Document the KVM ABI for SME
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 09/27] KVM: arm64: Rename SVE finalization constants to be more general
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 11/27] KVM: arm64: Define internal features for SME
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 08/27] KVM: arm64: Move SVE state access macros after feature test macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 05/27] KVM: arm64: Introduce non-UNDEF FGT control
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 07/27] KVM: arm64: Pull ctxt_has_ helpers to start of sysreg-sr.h
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 06/27] KVM: arm64: Pay attention to FFR parameter in SVE save and load
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 03/27] arm64/fpsimd: Check enable bit for FA64 when saving EFI state
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 04/27] arm64/fpsimd: Determine maximum virtualisable SME vector length
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 02/27] arm64/fpsimd: Decide to save ZT0 and streaming mode FFR at bind time
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 01/27] arm64/fpsimd: Update FA64 and ZT0 enables when loading SME state
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Patch net v3] vsock/virtio: fix variables initialization during resuming
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] KVM:x86:Fix an interrupt injection logic error during PIC interrupt simulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v8 0/3] Poisoned memory recovery on reboot
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v1 2/2] KVM: s390: pv: fix race when making a page secure
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 1/2] KVM: s390: fix issues when splitting folios
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 2/2] KVM: s390: pv: fix race when making a page secure
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v1 2/2] KVM: s390: pv: fix race when making a page secure
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v1 1/2] KVM: s390: fix issues when splitting folios
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v1 0/2] KVM: s390: fix two newly introduced bugs
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] Poisoned memory recovery on reboot
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [RFC PATCH v4 3/3] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [RFC PATCH v3 5/8] KVM: arm64: Introduce module param to partition the PMU
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [RFC PATCH v4 1/3] mm/filemap: add mempolicy support to the filemap layer
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v3 6/8] perf: arm_pmuv3: Generalize counter bitmasks
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 7/8] perf: arm_pmuv3: Keep out of guest counter partition
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 8/8] KVM: arm64: selftests: Reword selftests error
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 1/8] arm64: cpufeature: Add cap for HPMN0
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 4/8] KVM: arm64: Reorganize PMU functions
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 3/8] KVM: arm64: Cleanup PMU includes
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 5/8] KVM: arm64: Introduce module param to partition the PMU
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 2/8] arm64: Generate sign macro for sysreg Enums
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v3 0/8] PMU partitioning driver support
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH v7 40/45] arm64: RME: Provide register list for unfinalized RME RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 38/45] arm64: RME: Propagate max SVE vector length from RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 33/45] arm64: rme: Enable PMU support with a realm guest
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 32/45] arm_pmu: Provide a mechanism for disabling the physical IRQ
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 45/45] WIP: Enable support for PAGE_SIZE>4k
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 42/45] arm64: kvm: Expose support for private memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 44/45] KVM: arm64: Allow activating realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 36/45] arm64: RME: Set breakpoint parameters through SET_ONE_REG
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 41/45] arm64: RME: Provide accurate register list
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 43/45] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 17/45] arm64: RME: Handle realm enter/exit
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 21/45] arm64: RME: Runtime faulting of memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 39/45] arm64: RME: Configure max SVE vector length for a Realm
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 37/45] arm64: RME: Initialize PMCR.N with number counter supported by RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 35/45] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 23/45] KVM: arm64: Validate register access for a Realm VM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 14/45] arm64: RME: Support for the VGIC in realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 16/45] arm64: RME: Allow VMM to set RIPAS
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 24/45] KVM: arm64: Handle Realm PSCI requests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 34/45] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 10/45] arm64: kvm: Allow passing machine type in KVM creation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 31/45] arm64: rme: Prevent Device mappings for Realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 11/45] arm64: RME: RTT tear down
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 13/45] KVM: arm64: vgic: Provide helper for number of list registers
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 30/45] arm64: RME: Always use 4k pages for realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 29/45] arm64: rme: Allow checking SVE on VM instance
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 28/45] arm64: rme: support RSI_HOST_CALL
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 15/45] KVM: arm64: Support timers in realm RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 27/45] arm64: rme: allow userspace to inject aborts
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 06/45] arm64: RME: Check for RME support at KVM init
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 25/45] KVM: arm64: WARN on injected undef exceptions
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 09/45] kvm: arm64: Expose debug HW register numbers for Realm
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 22/45] KVM: arm64: Handle realm VCPU load
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 03/45] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 05/45] arm64: RME: Add wrappers for RMI calls
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 26/45] arm64: Don't expose stolen time for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 19/45] KVM: arm64: Handle realm MMIO emulation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 20/45] arm64: RME: Allow populating initial contents
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 18/45] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 12/45] arm64: RME: Allocate/free RECs to match vCPUs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 08/45] arm64: RME: ioctls to create and configure realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 07/45] arm64: RME: Define the user ABI
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 00/45] arm64: Support for Arm CCA in KVM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 04/45] arm64: RME: Add SMC definitions for calling the RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 02/45] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v7 01/45] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH net-next] tun: Pad virtio headers
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/18] Add kvmtool_params to test specification
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- Re: [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 14/39] KVM: guest_memfd: hugetlb: initialization and cleanup
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/5] riscv: sbi: Add SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net-next] tun: Pad virtio headers
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v2 08/17] KVM: TDX: Complete interrupts after TD exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 08/17] KVM: TDX: Complete interrupts after TD exit
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v4 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v2 05/17] KVM: x86: Assume timer IRQ was injected if APIC state is protected
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH net-next] tun: Pad virtio headers
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 04/17] KVM: TDX: Implement non-NMI interrupt injection
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 03/17] KVM: VMX: Move posted interrupt delivery code to common header
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH net-next] tun: Pad virtio headers
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] kvm: Introduce kvm_total_suspend_ns().
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- RE: Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH v9 05/11] KVM: x86/mmu: Rename spte_has_volatile_bits() to spte_needs_atomic_write()
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v9 04/11] KVM: x86/mmu: Relax locking for kvm_test_age_gfn() and kvm_age_gfn()
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v9 05/11] KVM: x86/mmu: Rename spte_has_volatile_bits() to spte_needs_atomic_write()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 04/11] KVM: x86/mmu: Relax locking for kvm_test_age_gfn() and kvm_age_gfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Clear pv_unhalted on all transitions to KVM_MP_STATE_RUNNABLE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Introduce kvm_set_mp_state()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/18] Add kvmtool_params to test specification
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/18] Add kvmtool_params to test specification
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 04/18] run_tests: Introduce unittest parameter 'qemu_params'
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v5 1/2] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v5 0/2] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 04/18] run_tests: Introduce unittest parameter 'qemu_params'
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Vasily Gorbik <gor@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/3] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v4 1/3] mm/filemap: add mempolicy support to the filemap layer
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 05/11] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [linus:master] [treewide] b04e317b52: INFO:task_blocked_for_more_than#seconds
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 9/9] KVM: selftests: Add a basic SEV-SNP smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/9] KVM: selftests: Add library support for interacting with SNP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 4/9] KVM: selftests: Add VMGEXIT helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/9] KVM: SEV: Disable SEV on platform init failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/9] KVM: SEV: Disable SEV-SNP on FW validation failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/17] KVM: VMX: Add a helper for NMI handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/9] vhost-scsi: log control queue write descriptors
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH v2 16/17] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/11] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 0/3] Poisoned memory recovery on reboot
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix broken SNP support with KVM module built-in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 3/3] target/arm/kvm: Report memory errors injection
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v8 1/3] system/physmem: handle hugetlb correctly in qemu_ram_remap()
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v8 2/3] system/physmem: poisoned memory discard on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v8 0/3] Poisoned memory recovery on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: async_pf: determine x86 user as cpl == 3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 1/2] KVM: x86: async_pf: remove support for KVM_ASYNC_PF_SEND_ALWAYS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 00/16] x86/tsc: Try to wrangle PV clocks vs. TSC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [RFC PATCH v5 02/15] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [kvmtool PATCH] riscv: Fix no params with nodefault segfault
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/18] Add kvmtool_params to test specification
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 00/16] x86/tsc: Try to wrangle PV clocks vs. TSC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/3] LoongArch: KVM: Some tiny code cleanup
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/cpufeatures: Add SNP Secure TSC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [syzbot] Monthly kvm report (Feb 2025)
- From: syzbot <syzbot+list2039ca2416c8ea9fe8ef@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 03/18] KVM: arm64: Handle trapping of FEAT_LS64* instructions
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 02/18] arm64: Add syndrome information for trapped LD64B/ST64B{,V,V0}
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] LoongArch: KVM: remove unnecessary header include path
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 11/11] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 06/11] KVM: x86: Mark KVM_X86_SW_PROTECTED_VM as supporting guest_memfd shared memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 10/11] KVM: arm64: Enable mapping guest_memfd in arm64
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 05/11] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 07/11] KVM: arm64: Refactor user_mem_abort() calculation of force_pte
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 01/11] mm: Consolidate freeing of typed folios on final folio_put()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 00/11] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvmtool PATCH 2/6] Add __KERNEL_DIV_ROUND_UP() macro
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [kvmtool PATCH 0/6] Add RISC-V ISA extensions based on Linux-6.13
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 0/2] Error handling fixes
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH 1/2] drm/i915/gvt: Store ->kvm reference in intel_vgpu struct.
- From: Andrey Ryabinin <arbn@xxxxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH 2/2] vfio: Release KVM pointer after the first device open.
- From: Andrey Ryabinin <arbn@xxxxxxxxxxxxxxx>
- Re: [kvmtool PATCH 2/6] Add __KERNEL_DIV_ROUND_UP() macro
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool] riscv: Allow initrd to be above 256MB on 64 bit
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: switch to using kvm_lock/unlock_all_vcpus
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: switch to using kvm_lock/unlock_all_vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH V4] KVM: SEV: fix wrong pinning of pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [Patch net 0/2] vsock suspend/resume fix
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [Patch net 2/2] vsock/virtio: Don't reset the created SOCKET during suspend to ram
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: SVM: Enable Secure TSC for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [Patch net 2/2] vsock/virtio: Don't reset the created SOCKET during suspend to ram
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- [Patch net 0/2] vsock suspend/resume fix
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 15/15] RISC-V: KVM: add support for SBI_FWFT_MISALIGNED_DELEG
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 01/15] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH v2 01/15] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH net-next v6 0/7] tun: Unify vnet implementation
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v2 17/17] KVM: TDX: Handle EXIT_REASON_OTHER_SMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 16/17] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 15/17] KVM: VMX: Add a helper for NMI handling
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 14/17] KVM: VMX: Move emulation_required to struct vcpu_vt
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 13/17] KVM: TDX: Add methods to ignore virtual apic related operation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [no subject]
- [PATCH v2 12/17] KVM: TDX: Force APICv active for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 11/17] KVM: TDX: Enforce KVM_IRQCHIP_SPLIT for TDX guests
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 10/17] KVM: TDX: Always block INIT/SIPI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 08/17] KVM: TDX: Complete interrupts after TD exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 07/17] KVM: TDX: Implement methods to inject NMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 05/17] KVM: x86: Assume timer IRQ was injected if APIC state is protected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 06/17] KVM: TDX: Wait lapic expire when timer IRQ was injected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 04/17] KVM: TDX: Implement non-NMI interrupt injection
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 03/17] KVM: VMX: Move posted interrupt delivery code to common header
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 02/17] KVM: TDX: Disable PI wakeup for IPIv
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 00/17] KVM: TDX: TDX interrupts
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 7/8] KVM: TDX: Handle TDX PV port I/O hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 4/8] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 2/8] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 0/8] KVM: TDX: TDX hypercalls may exit to userspace
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH V4] KVM: SEV: fix wrong pinning of pages
- Re: [PATCH v2 0/6] Introduce CET supervisor state support
- From: Xin Li <xin@xxxxxxxxx>
- [PATCH v2 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 2/3] LoongArch: KVM: Remove duplicated cache attribute setting
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 0/3] LoongArch: KVM: Some tiny code cleanup
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 3/3] RISC-V: KVM: switch to kvm_lock/unlock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: switch to using kvm_lock/unlock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: move sev_lock/unlock_vcpus_for_migration to kvm_main.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/3] KVM: extract lock_all_vcpus/unlock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: Question about lock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: selftests: Fix PMC checks in PMU counters test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 4/4] KVM: arm64: Make guests see only counters they can access
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] perf: arm_pmuv3: Introduce module param to partition the PMU
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v4 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 2/3] KVM: SVM: Ensure PSP module is initialized if KVM module is built-in
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 1/3] crypto: ccp: Add external API interface for PSP module initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 0/3] Fix broken SNP support with KVM module built-in
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH V3] KVM: SEV: fix wrong pinning of pages
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 15/15] RISC-V: KVM: add support for SBI_FWFT_MISALIGNED_DELEG
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 13/15] RISC-V: KVM: add SBI extension reset callback
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 12/15] RISC-V: KVM: add SBI extension init()/deinit() functions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 11/15] selftests: riscv: add misaligned access testing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 10/15] Documentation/sysctl: add riscv to unaligned-trap supported archs
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 09/15] riscv: misaligned: use get_user() instead of __get_user()
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 07/15] riscv: misaligned: factorize trap handling
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 08/15] riscv: misaligned: enable IRQs while handling misaligned accesses
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 06/15] riscv: misaligned: add a function to check misalign trap delegability
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 05/15] riscv: misaligned: move emulated access uniformity check in a function
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 04/15] riscv: misaligned: use correct CONFIG_ ifdef for misaligned_access_speed
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 03/15] riscv: misaligned: use on_each_cpu() for scalar misaligned access probing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 02/15] riscv: misaligned: request misaligned exception from SBI
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 00/15] riscv: add SBI FWFT misaligned exception delegation support
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 01/15] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: SVM: Enable Secure TSC for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/9] vhost-scsi: cache log buffer in I/O queue vhost_scsi_cmd
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 18/18] KVM: arm64: Use FGT feature maps to drive RES0 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 17/18] KVM: arm64: Validate FGT register descriptions against RES0 masks
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 15/18] KVM: arm64: Handle PSB CSYNC traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 16/18] KVM: arm64: Switch to table-driven FGU configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 14/18] KVM: arm64: Use KVM-specific HCRX_EL2 RES0 mask
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/18] KVM: arm64: Remove most hand-crafted masks for FGT registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/18] KVM: arm64: Propagate FGT masks to the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/18] KVM: arm64: Use computed FGT masks to setup FGT registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 09/18] KVM: arm64: Use computed masks as sanitisers for FGT registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/18] KVM: arm64: Compute FGT masks from KVM's own FGT tables
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/18] KVM: arm64: Restrict ACCDATA_EL1 undef to FEAT_ST64_ACCDATA being disabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/18] KVM: arm64: Unconditionally configure fine-grain traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/18] KVM: arm64: Add description of FGT bits leading to EC!=0x18
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/18] arm64: Add syndrome information for trapped LD64B/ST64B{,V,V0}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/18] KVM: arm64: Revamp Fine Grained Trap handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/18] KVM: arm64: Don't treat HCRX_EL2 as a FGT register
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/18] KVM: arm64: Handle trapping of FEAT_LS64* instructions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/18] arm64: Add ID_AA64ISAR1_EL1.LS64 encoding for FEAT_LS64WB
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/18] scripts: Refuse to run the tests if not configured for qemu
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v4 22/30] context_tracking: Exit CT_STATE_IDLE upon irq/nmi entry
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/cpufeatures: Add "Allowed SEV Features" Feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] vsock/virtio: Move rx_buf_nr and rx_buf_max_nr initialization position
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: Question about lock_all_vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/18] scripts: Refuse to run the tests if not configured for qemu
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: Question about lock_all_vcpus
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: leonardi@xxxxxxxxxx
- Re: [PATCH 1/2] vsock/virtio: Move rx_buf_nr and rx_buf_max_nr initialization position
- From: Luigi Leonardi <leonardi@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/18] scripts: Refuse to run the tests if not configured for qemu
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH] LoongArch: KVM: remove unnecessary header include path
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v2 4/4] KVM: SVM: Enable Secure TSC for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 2/4] KVM: SVM: Add GUEST_TSC_FREQ MSR for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 1/4] x86/cpufeatures: Add SNP Secure TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 0/4] Enable Secure TSC for SEV-SNP
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [RFC PATCH v2 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 2/7] target/i386/kvm: introduce 'pmu-cap-disabled' to set KVM_PMU_CAP_DISABLE
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/4] KVM: arm64: Make guests see only counters they can access
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v2 2/4] perf: arm_pmuv3: Introduce module param to partition the PMU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [RFC PATCH v4 3/3] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v4 1/3] mm/filemap: add mempolicy support to the filemap layer
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v4 0/3] Add NUMA mempolicy support for KVM guest-memfd
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v6 0/3] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH V2] target/loongarch: fix vcpu reset command word issue
- From: lixianglai <lixianglai@xxxxxxxxxxx>
- Re: [PATCH 2/7] target/i386/kvm: introduce 'pmu-cap-disabled' to set KVM_PMU_CAP_DISABLE
- From: dongli.zhang@xxxxxxxxxx
- Re: [GIT PULL] KVM changes for Linux 6.14-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] accel: Only include qdev-realized vCPUs in global &cpus_queue
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH V2] target/loongarch: fix vcpu reset command word issue
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [GIT PULL] KVM changes for Linux 6.14-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: The business loan-
- From: David Song <chrispinerick@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: ccp: Add external API interface for PSP module initialization
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 4/4] KVM: arm64: Make guests see only counters they can access
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 3/4] perf: arm_pmuv3: Keep out of guest counter partition
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 2/4] perf: arm_pmuv3: Introduce module param to partition the PMU
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 1/4] perf: arm_pmuv3: Generalize counter bitmasks
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 0/4] PMU partitioning driver support
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: Problem with vmrun in an interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v3 1/2] x86/cpufeatures: Add "Allowed SEV Features" Feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v3 0/2] KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v3 2/3] KVM: SVM: Ensure PSP module is initialized if KVM module is built-in
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 1/3] crypto: ccp: Add external API interface for PSP module initialization
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/2] i386/xen: Move KVM_XEN_HVM_CONFIG ioctl to kvm_xen_init_vcpu()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3] PCI: account for sysfs-disabled reset in pci_{slot,bus}_resettable()
- From: Nishanth Aravamudan <naravamudan@xxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH 9/9] vhost-scsi: Fix vhost_scsi_send_bad_target()
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 8/9] vhost-scsi: protect vq->log_used with vq->mutex
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 7/9] vhost: add WARNING if log_num is more than limit
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 3/9] vhost-scsi: cache log buffer in I/O queue vhost_scsi_cmd
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 6/9] vhost-scsi: log event queue write descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 0/9] vhost-scsi: log write descriptors for live migration (and two bugfix)
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 5/9] vhost-scsi: log control queue write descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 4/9] vhost-scsi: log I/O queue write descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 2/9] vhost-scsi: adjust vhost_scsi_get_desc() to log vring descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 1/9] vhost: modify vhost_log_write() for broader users
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v4 22/30] context_tracking: Exit CT_STATE_IDLE upon irq/nmi entry
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v6 6/7] tap: Keep hdr_len in tap_get_user()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH net-next v6 5/7] tun: Extract the vnet handling code
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v4 22/30] context_tracking: Exit CT_STATE_IDLE upon irq/nmi entry
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v4 11/21] RISC-V: perf: Restructure the SBI PMU code
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v2 09/10] accel/kvm: Assert vCPU is created when calling kvm_dirty_ring_reap*()
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- [PATCH v2 10/10] accel/kvm: Remove unreachable assertion in kvm_dirty_ring_reap*()
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] accel: Only include qdev-realized vCPUs in global &cpus_queue
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH 1/2] i386/xen: Move KVM_XEN_HVM_CONFIG ioctl to kvm_xen_init_vcpu()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFCv2 00/13] iommu: Add MSI mapping support with nested SMMU
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH 2/2] hw/xen: Add "mode" parameter to xen-block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/2] i386/xen: Move KVM_XEN_HVM_CONFIG ioctl to kvm_xen_init_vcpu()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RFCv2 00/13] iommu: Add MSI mapping support with nested SMMU
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Matias Ezequiel Vara Larsen <mvaralar@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Matias Ezequiel Vara Larsen <mvaralar@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Hanna Czenczek <hreitz@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [RFC v2 1/5] qapi/qom: Introduce kvm-pmu-filter object
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Problem with vmrun in an interrupt shadow
- From: Doug Covelli <doug.covelli@xxxxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Hanna Czenczek <hreitz@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: "Huang, Honglei1" <Honglei1.Huang@xxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v4 12/21] RISC-V: perf: Modify the counter discovery mechanism
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v3 00/18] vDSO: Introduce generic data storage
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/21] RISC-V: perf: Restructure the SBI PMU code
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 2/7] target/i386/kvm: introduce 'pmu-cap-disabled' to set KVM_PMU_CAP_DISABLE
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/21] RISC-V: Add Sscfg extension CSR definition
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 06/21] RISC-V: Add Smcntrpmf extension parsing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 09/21] RISC-V: Add Ssccfg ISA extension definition and parsing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 09/21] RISC-V: Add Ssccfg ISA extension definition and parsing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 02/21] RISC-V: Add Sxcsrind ISA extension CSR definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [RFC PATCH 00/39] 1G page support for guest_memfd
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [PATCH net-next v6 7/7] tap: Use tun's vnet-related code
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 6/7] tap: Keep hdr_len in tap_get_user()
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 5/7] tun: Extract the vnet handling code
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 4/7] tun: Decouple vnet handling
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 3/7] tun: Decouple vnet from tun_struct
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 2/7] tun: Keep hdr_len in tun_get_user()
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 1/7] tun: Refactor CONFIG_TUN_VNET_CROSS_LE
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 0/7] tun: Unify vnet implementation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 1/2] vsock/virtio: Move rx_buf_nr and rx_buf_max_nr initialization position
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 2/3] LoongArch: KVM: Remove duplicated cache attribute setting
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/3] LoongArch: KVM: Some tiny code cleanup
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/4] KVM: x86/mmu: Further check old SPTE is leaf for spurious prefetch fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/4] Small changes related to prefetch and spurious faults
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 0/5] vfio: Improve DMA mapping performance for huge pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] vfio/type1: Use mapping page mask for pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] vfio/type1: Use vfio_batch for vaddr_get_pfns()
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] vfio/type1: Convert all vaddr_get_pfns() callers to use vfio_batch
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]