Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH V12 14/14] perf intel-pt: Add a test for pause / resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 13/14] perf intel-pt: Add documentation for pause / resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 12/14] perf intel-pt: Improve man page format
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 11/14] perf tools: Add missing_features for aux_start_paused, aux_pause, aux_resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 10/14] perf tools: Parse aux-action
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 09/14] perf tools: Add aux-action config term
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 08/14] perf tools: Add aux_start_paused, aux_pause and aux_resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 07/14] perf/x86/intel: Do not enable large PEBS for events with aux actions or aux sampling
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 06/14] perf/x86/intel/pt: Add support for pause / resume
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 05/14] perf/core: Add aux_pause, aux_resume, aux_start_paused
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 04/14] KVM: selftests: Add guest Intel PT test
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 03/14] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 02/14] KVM: x86: Fix Intel PT IA32_RTIT_CTL MSR validation
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 01/14] perf/x86/intel/pt: Fix buffer full but size is 0 case
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V12 00/14] perf/core: Add ability for an event to "pause" or "resume" AUX area tracing
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: Proposal: bi-weekly guest_memfd upstream call
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Proposal: bi-weekly guest_memfd upstream call
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 0/4] KVM: x86: Fix and harden reg caching from !TASK context
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/5] mm: Introduce guest_memfd library
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86: Rename APIC base setters to better capture their relationship
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] KVM: Move KVM_REG_SIZE() definition to common uAPI header
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] KVM: nVMX: update VPPR on vmlaunch/vmresume
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v4 03/36] arm64: Add encoding for PIRE0_EL2
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 22/25] KVM: TDX: Use guest physical address to configure EPT level and GPAW
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] s390x: edat: move LC_SIZE to arch_def.h
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] s390x: add test for diag258
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 10/25] KVM: TDX: Initialize KVM supported capabilities when module setup
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 22/25] KVM: TDX: Use guest physical address to configure EPT level and GPAW
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 11/11] KVM: arm64: Enable guest_memfd private memory when pKVM is enabled
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 10/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 09/11] KVM: arm64: Skip VMA checks for slots without userspace address
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 08/11] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 07/11] KVM: guest_memfd: Add a guest_memfd() flag to initialize it as mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 06/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is host mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 05/11] KVM: guest_memfd: Add guest_memfd support to kvm_(read|/write)_guest_page()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 04/11] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 03/11] KVM: guest_memfd: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 02/11] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 01/11] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 00/11] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: Add API documentation for KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86: Implement Hyper-V's vCPU suspended state
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: Introduce KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 5/7] KVM: x86: Implement KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/7] lib: Add pseudo random functions
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] configure: process arguments not starting with dash
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 7/7] s390x: Add test for STFLE interpretive execution (format-0)
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/7] lib: Add pseudo random functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 10/25] KVM: TDX: Initialize KVM supported capabilities when module setup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH v4 33/36] KVM: arm64: Disable hierarchical permissions when POE is enabled
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 20/36] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86/mmu: Zap only SPs that shadow gPTEs when deleting memslot
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Mike Galbraith <efault@xxxxxx>
- Re: [PATCH v4 29/36] KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM}
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 27/36] KVM: arm64: Add a composite EL2 visibility helper
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 23/36] KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 3/9] ACPI/IORT: Support CANWBS memory access flag
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH v4 20/36] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 12/13] HID: amd_sfh: Use always-managed version of pcim_intx()
- From: Basavaraj Natikar <bnatikar@xxxxxxx>
- [kvm-unit-tests PATCH v4 1/2] s390x: edat: move LC_SIZE to arch_def.h
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/2] s390x: add test for diag258
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/2] s390x: add tests for diag258
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v12 00/19] Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 5/6] KVM: Don't BUG() the kernel if xa_insert() fails with -EBUSY
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 05/13] net/ntb: Use never-managed version of pci_intx()
- From: Shyam Sundar S K <Shyam-sundar.S-k@xxxxxxx>
- Re: [RFC PATCH 05/13] net/ntb: Use never-managed version of pci_intx()
- From: Shyam Sundar S K <Shyam-sundar.S-k@xxxxxxx>
- Re: [PATCH 17/24] sched/fair: Implement delayed dequeue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] ACPICA: IORT: Update for revision E.f
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/mmu: Recover TDP MMU huge page mappings in-place instead of zapping
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/5] mm: guest_memfd: Allow folios to be accessible to host
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v4 07/36] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Hortmann <philipp.g.hortmann@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: Clean up documentation for KVM_X86_QUIRK_SLOT_ZAP_ALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86/mmu: Zap only SPs that shadow gPTEs when deleting memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86/mmu: Don't zap "direct" non-leaf SPTEs on memslot removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 36/36] KVM: arm64: Handle WXN attribute
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 35/36] KVM: arm64: Handle stage-1 permission overlays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 32/36] KVM: arm64: Add POE save/restore for AT emulation fast-path
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 34/36] KVM: arm64: Make PAN conditions part of the S1 walk context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 33/36] KVM: arm64: Disable hierarchical permissions when POE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 31/36] KVM: arm64: Add save/retore support for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 28/36] KVM: arm64: Drop bogus CPTR_EL2.E0POE trap routing
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 30/36] KVM: arm64: Add basic support for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 29/36] KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 27/36] KVM: arm64: Add a composite EL2 visibility helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 26/36] arm64: Add encoding for POR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 25/36] KVM: arm64: Rely on visibility to let PIR*_ELx/TCR2_ELx UNDEF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 24/36] KVM: arm64: Hide S1PIE registers from userspace when disabled for guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 18/36] KVM: arm64: Add AT fast-path support for S1PIE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 23/36] KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 22/36] KVM: arm64: Define helper for EL2 registers with custom visibility
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 21/36] KVM: arm64: Implement AT S1PIE support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 20/36] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 19/36] KVM: arm64: Split S1 permission evaluation into direct and hierarchical parts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 16/36] KVM: arm64: Handle PIR{,E0}_EL2 traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 15/36] KVM: arm64: Add save/restore for PIR{,E0}_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 17/36] KVM: arm64: Sanitise ID_AA64MMFR3_EL1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 14/36] KVM: arm64: Add PIR{,E0}_EL2 to the sysreg arrays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 13/36] KVM: arm64: Add save/restore for TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 11/36] KVM: arm64: Add TCR2_EL2 to the sysreg arrays
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 12/36] KVM: arm64: Sanitise TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 10/36] arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 08/36] KVM: arm64: Correctly access TCR2_EL1, PIR_EL1, PIRE0_EL1 with VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 07/36] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 09/36] KVM: arm64: Extend masking facility to arbitrary registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 06/36] KVM: arm64: nv: Handle CNTHCTL_EL2 specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 05/36] KVM: arm64: nv: Add missing EL2->EL1 mappings in get_el2_to_el1_mapping()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 04/36] KVM: arm64: Drop useless struct s2_mmu in __kvm_at_s1e2()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 03/36] arm64: Add encoding for PIRE0_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 02/36] arm64: Remove VNCR definition for PIRE0_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 01/36] arm64: Drop SKL0/SKL1 from TCR2_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 00/36] KVM: arm64: Add EL2 support to FEAT_S1PIE/S1POE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- [PATCH 6/7] KVM: x86: Rename APIC base setters to better capture their relationship
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: x86: Make kvm_recalculate_apic_map() local to lapic.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: x86: Move kvm_set_apic_base() implementation to lapic.c (from x86.c)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: x86: Inline kvm_get_apic_mode() in lapic.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] KVM: x86: Get vcpu->arch.apic_base directly and drop kvm_get_apic_base()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: x86: Drop superfluous kvm_lapic_set_base() call when setting APIC state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Short-circuit all kvm_lapic_set_base() if MSR value isn't changing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [PATCH v4 4/4] KVM: x86: Use '0' for guest RIP if PMI encounters protected guest state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 3/4] KVM: x86: Add lockdep-guarded asserts on register cache usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 2/4] KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 1/4] KVM: x86: Bypass register cache when querying CPL from kvm_sched_out()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 0/4] KVM: x86: Fix and harden reg caching from !TASK context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Initial support for SMMUv3 nested translation
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/mmu: Recover TDP MMU huge page mappings in-place instead of zapping
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [PATCH v3 7/9] iommu/arm-smmu-v3: Expose the arm_smmu_attach interface
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/mmu: Recover TDP MMU huge page mappings in-place instead of zapping
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v3 5/9] iommu/arm-smmu-v3: Support IOMMU_GET_HW_INFO via struct arm_smmu_hw_info
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 1/9] vfio: Remove VFIO_TYPE1_NESTING_IOMMU
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 7/9] iommu/arm-smmu-v3: Expose the arm_smmu_attach interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 6/9] iommu/arm-smmu-v3: Implement IOMMU_HWPT_ALLOC_NEST_PARENT
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 2/9] ACPICA: IORT: Update for revision E.f
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 3/9] ACPI/IORT: Support CANWBS memory access flag
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 0/9] Initial support for SMMUv3 nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 4/9] iommu/arm-smmu-v3: Report IOMMU_CAP_ENFORCE_CACHE_COHERENCY for CANWBS
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 00/19] Add Secure TSC support for SNP guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 14/14] KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 13/14] KVM: selftests: Add a read-only mprotect() phase to mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 12/14] KVM: selftests: Precisely limit the number of guest loops in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 11/14] KVM: selftests: Use vcpu_arch_put_guest() in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 10/14] KVM: selftests: Enable mmu_stress_test on arm64
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 09/14] KVM: sefltests: Explicitly include ucall_common.h in mmu_stress_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 08/14] KVM: selftests: Compute number of extra pages needed in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 07/14] KVM: selftests: Only muck with SREGS on x86 in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 06/14] KVM: selftests: Rename max_guest_memory_test to mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 05/14] KVM: selftests: Check for a potential unhandled exception iff KVM_RUN succeeded
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 04/14] KVM: selftests: Assert that vcpu_{g,s}et_reg() won't truncate
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 03/14] KVM: selftests: Return a value from vcpu_get_reg() instead of using an out-param
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 02/14] KVM: selftests: Disable strict aliasing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 01/14] KVM: Move KVM_REG_SIZE() definition to common uAPI header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 00/14] KVM: selftests: Morph max_guest_mem to mmu_stress
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC RESEND 0/6] hugetlbfs largepage RAS project
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 6/6] KVM: Drop hack that "manually" informs lockdep of kvm->lock vs. vcpu->mutex
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/6] KVM: Don't BUG() the kernel if xa_insert() fails with -EBUSY
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/6] KVM: Grab vcpu->mutex across installing the vCPU's fd and bumping online_vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/6] KVM: Verify there's at least one online vCPU when iterating over all vCPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 18/25] KVM: TDX: Do TDX specific vcpu initialization
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: memslot_perf_test: increase guest sync timeout
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC v5 04/10] tun: Unify vnet implementation
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH RFC v5 01/10] virtio_net: Add functions for hashing
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: KVM default behavior change on module loading in kernel 6.12
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC PATCH 09/13] ata: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH v2 1/1] x86: Add support save/load HWCR MSR
- From: Gao Shiyuan <gaoshiyuan@xxxxxxxxx>
- Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 19/19] x86/sev: Allow Secure TSC feature for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 18/19] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 17/19] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 12/19] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 14/19] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 13/19] x86/sev: Mark Secure TSC as reliable clocksource
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 11/19] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 10/19] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 09/19] x86/cc: Add CC_ATTR_GUEST_SNP_SECURE_TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 08/19] x86/sev: Relocate SNP guest messaging routines to common code
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 07/19] x86/sev: Carve out and export SNP guest messaging init routines
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 06/19] virt: sev-guest: Carve out SNP message context structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 05/19] virt: sev-guest: Reduce the scope of SNP command mutex
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 04/19] virt: sev-guest: Consolidate SNP guest messaging parameters to a struct
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 03/19] x86/sev: Cache the secrets page address
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 02/19] x86/sev: Handle failures from snp_init()
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 01/19] virt: sev-guest: Use AES GCM crypto library
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v12 00/19] Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v1 1/1] x86: Add support save/load HWCR MSR
- From: "Gao,Shiyuan" <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 09/13] ata: Use always-managed version of pci_intx()
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
- From: Juergen Gross <jgross@xxxxxxxx>
- [RFC PATCH 13/13] Remove devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 12/13] HID: amd_sfh: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 11/13] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 09/13] ata: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 08/13] PCI: MSI: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 07/13] vfio/pci: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 06/13] misc: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 05/13] net/ntb: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 04/13] net/ethernet: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 01/13] PCI: Prepare removing devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [RFC PATCH 00/13] Remove implicit devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH v1 1/1] x86: Add support save/load HWCR MSR
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH RFC v5 07/10] tun: Introduce virtio-net RSS
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RFC v5 05/10] tun: Pad virtio header with zero
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 42/43] arm64: kvm: Expose support for private memory
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86: Use user_exit_on_hypercall() instead of opencode
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: x86: Check hypercall's exit to userspace generically
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] nVMX: Simple posted interrupts test
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC v2 00/12] Introduce Hybrid CPU Topology via Custom Topology Tree
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 05/12] hw/core/machine: Introduce custom CPU topology with max limitations
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 01/12] qdev: Allow qdev_device_add() to add specific category device
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 00/12] Introduce Hybrid CPU Topology via Custom Topology Tree
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86: Check hypercall's exit to userspace generically
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: "Manwaring, Derek" <derekmn@xxxxxxxxxx>
- Re: [PATCH v8 00/11] Enable haltpoll on arm64
- From: "zhenglifeng (A)" <zhenglifeng1@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 01/14] x86/apic: Add new driver for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 5/5] KVM: x86: Add fastpath handling of HLT VM-Exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [no subject]
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH] KVM: SVM: Increase X2AVIC limit to 4096 vcpus
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v5 09/43] arm64: RME: ioctls to create and configure realms
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] selftests: kvm: s390: Fix whitespace confusion in ucontrol test
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH net-next v20 04/14] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v6 11/11] arm64: Document Arm Confidential Compute
- From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx>
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 1/2] KVM: x86: Fix a comment inside kvm_vcpu_update_apicv()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 0/2] Fixup two comments
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC v2 00/12] Introduce Hybrid CPU Topology via Custom Topology Tree
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 05/12] hw/core/machine: Introduce custom CPU topology with max limitations
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC v2 01/12] qdev: Allow qdev_device_add() to add specific category device
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Enable shared device assignment
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: "Marc Hartmayer" <mhartmay@xxxxxxxxxxxxx>
- [Bug 218025] Assertion Failure happens in kvm selftest vmx_preemption_timer_test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 1/4] selftests: kvm: s390: Add uc_map_unmap VM test case
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 4/4] selftests: kvm: s390: Fix whitespace confusion in ucontrol test
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 0/4] selftests: kvm: s390: Add ucontrol memory selftests
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v5 2/4] selftests: kvm: s390: Add uc_skey VM test case
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- [PATCH RFC v5 10/10] vhost/net: Support VIRTIO_NET_F_HASH_REPORT
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 09/10] selftest: tun: Add tests for virtio-net hashing
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 08/10] selftest: tun: Test vnet ioctls without device
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 07/10] tun: Introduce virtio-net RSS
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 05/10] tun: Pad virtio header with zero
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 04/10] tun: Unify vnet implementation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 03/10] net: flow_dissector: Export flow_keys_dissector_symmetric
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 02/10] skbuff: Introduce SKB_EXT_TUN_VNET_HASH
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 01/10] virtio_net: Add functions for hashing
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH RFC v5 00/10] tun: Introduce virtio-net hashing feature
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86: Add fastpath handling of HLT VM-Exits
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v6 11/11] arm64: Document Arm Confidential Compute
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v1 1/1] x86: Add support save/load HWCR MSR
- From: "Gao,Shiyuan" <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 09/11] arm64: Enable memory encrypt for Realms
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 08/11] arm64: mm: Avoid TLBI when marking pages as valid
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: Enforce bounce buffers for realm DMA
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 1/1] target/riscv: enable floating point unit
- From: Alistair Francis <alistair23@xxxxxxxxx>
- Re: [PATCH v6 06/11] efi: arm64: Map Device with Prot Shared
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 04/11] arm64: rsi: Add support for checking whether an MMIO is protected
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 03/11] arm64: realm: Query IPA size from the RMM
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 01/11] arm64: rsi: Add RSI definitions
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [GIT PULL] virtio: bugfixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: KVM default behavior change on module loading in kernel 6.12
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 2/5] hyperv: Remove unnecessary #includes
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 1/5] hyperv: Move hv_connection_id to hyperv-tlfs.h
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [GIT PULL] virtio: bugfixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: memslot_perf_test: increase guest sync timeout
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] i386/pc: Support cache topology in -machine for PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 6/7] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 5/7] i386/cpu: Support thread and module level cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 4/7] hw/core: Check smp cache topology support for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2 3/7] hw/core: Add smp cache topology for machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 07/43] arm64: RME: Check for RME support at KVM init
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v2 2/7] qapi/qom: Define cache enumeration and properties
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 19/43] KVM: arm64: Handle realm MMIO emulation
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v2 6/7] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [PATCH v5 05/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 1/4] x86/cpufeatures: Add CPUID feature bit for the Bus Lock Threshold
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v5 19/43] KVM: arm64: Handle realm MMIO emulation
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.12-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH 1/1] virtio_fs: store actual queue index in mq_map
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- [PATCH 1/1] virtio_fs: add informative log for new tag discovery
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- RE: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: David Laight <David.Laight@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.12-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v1 3/3] vfio/nvgrace-gpu: Check the HBM training and C2C link status
- From: <ankita@xxxxxxxxxx>
- [PATCH v1 1/3] vfio/nvgrace-gpu: Read dvsec register to determine need for uncached resmem
- From: <ankita@xxxxxxxxxx>
- [PATCH v1 2/3] vfio/nvgrace-gpu: Expose the blackwell device PF BAR1 to the VM
- From: <ankita@xxxxxxxxxx>
- [PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: <ankita@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.12, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v3 1/4] x86/cpufeatures: Add CPUID feature bit for the Bus Lock Threshold
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 4/4] KVM: selftests: Add bus lock exit test
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: leave kvm.ko out of the build if no vendor module is requested
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 0/2] riscv: Add perf support to collect KVM guest statistics from host side
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/5] Add Svade and Svadu Extensions Support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v5 54/65] q35: Introduce smm_ranges property for q35-pci-host
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- [kvmtool PATCH v2 8/8] riscv: Add Zimop extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 7/8] riscv: Add Zcmop extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 5/8] riscv: Add Zcd extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 6/8] riscv: Add Zcf extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 4/8] riscv: Add Zcb extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 2/8] riscv: Add Zawrs extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 3/8] riscv: Add Zca extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 1/8] Sync-up headers with Linux-6.11 kernel
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvmtool PATCH v2 0/8] Add RISC-V ISA extensions based on Linux-6.11
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] hyperv: Use hvhdk.h instead of hyperv-tlfs.h in Hyper-V code
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: leave kvm.ko out of the build if no vendor module is requested
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 5/5] hyperv: Use hvhdk.h instead of hyperv-tlfs.h in Hyper-V code
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] hyperv: Use hvhdk.h instead of hyperv-tlfs.h in Hyper-V code
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 06/10] kvm: gmem: add tracepoints for gmem share/unshare
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH] KVM: selftests: memslot_perf_test: increase guest sync timeout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 5/5] hyperv: Use hvhdk.h instead of hyperv-tlfs.h in Hyper-V code
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH v2 2/3] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Add a test to invoke MMU shrinker on KVM VMs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: selftests: Add a test to invoke MMU shrinker on KVM VMs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: x86/mmu: Change KVM mmu shrinker to no-op
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: x86/mmu: Repurpose MMU shrinker into page cache shrinker
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 5/5] hyperv: Use hvhdk.h instead of hyperv-tlfs.h in Hyper-V code
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fix Intel PT Host/Guest mode when host tracing also
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] hyperv: Use hvhdk.h instead of hyperv-tlfs.h in Hyper-V code
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 34/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 33/43] arm64: rme: Enable PMU support with a realm guest
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 32/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v5 5/5] perf: Correct perf sampling with guest VMs
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v5 43/43] KVM: arm64: Allow activating realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 42/43] arm64: kvm: Expose support for private memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 41/43] arm64: RME: Provide accurate register list
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 40/43] arm64: RME: Provide register list for unfinalized RME RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 29/43] arm64: rme: Allow checking SVE on VM instance
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 39/43] arm64: RME: Configure max SVE vector length for a Realm
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 38/43] arm64: RME: Propagate max SVE vector length from RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 37/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 36/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 35/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 31/43] arm64: rme: Prevent Device mappings for Realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 30/43] arm64: RME: Always use 4k pages for realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 27/43] arm64: rme: allow userspace to inject aborts
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 28/43] arm64: rme: support RSI_HOST_CALL
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 26/43] arm64: Don't expose stolen time for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 25/43] KVM: arm64: WARN on injected undef exceptions
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 24/43] KVM: arm64: Handle Realm PSCI requests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 23/43] KVM: arm64: Validate register access for a Realm VM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 22/43] KVM: arm64: Handle realm VCPU load
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 21/43] arm64: RME: Runtime faulting of memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 20/43] arm64: RME: Allow populating initial contents
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 19/43] KVM: arm64: Handle realm MMIO emulation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 18/43] arm64: RME: Handle realm enter/exit
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 17/43] arm64: RME: Allow VMM to set RIPAS
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 16/43] KVM: arm64: Support timers in realm RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 15/43] arm64: RME: Support for the VGIC in realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 14/43] arm64: RME: Allocate/free RECs to match vCPUs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 13/43] arm64: RME: RTT tear down
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 12/43] arm64: RME: Keep a spare page delegated to the RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 11/43] arm64: kvm: Allow passing machine type in KVM creation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 10/43] kvm: arm64: Expose debug HW register numbers for Realm
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 09/43] arm64: RME: ioctls to create and configure realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 08/43] arm64: RME: Define the user ABI
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 07/43] arm64: RME: Check for RME support at KVM init
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 06/43] arm64: RME: Add wrappers for RMI calls
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 05/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 04/43] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 03/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 02/43] kvm: arm64: pgtable: Track the number of pages in the entry level
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v5 00/43] arm64: Support for Arm CCA in KVM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v5 2/5] perf: Hoist perf_instruction_pointer() and perf_misc_flags()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 1/5] arm: perf: Drop unused functions
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 11/11] arm64: Document Arm Confidential Compute
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 09/11] arm64: Enable memory encrypt for Realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 08/11] arm64: mm: Avoid TLBI when marking pages as valid
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 07/11] arm64: Enforce bounce buffers for realm DMA
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 06/11] efi: arm64: Map Device with Prot Shared
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 04/11] arm64: rsi: Add support for checking whether an MMIO is protected
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 03/11] arm64: realm: Query IPA size from the RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 01/11] arm64: rsi: Add RSI definitions
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 00/11] arm64: Support for running as a guest in Arm CCA
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 1/2] KVM: x86: leave kvm.ko out of the build if no vendor module is requested
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: selftests: Add tests for KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- [PATCH 6/7] KVM: x86: Add trace events to track Hyper-V suspensions
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- [PATCH 5/7] KVM: x86: Implement KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- [PATCH 4/7] KVM: Introduce KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- [PATCH 3/7] KVM: x86: Check vCPUs before enqueuing TLB flushes in kvm_hv_flush_tlb()
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- [PATCH 2/7] KVM: x86: Implement Hyper-V's vCPU suspended state
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- [PATCH 1/7] KVM: Add API documentation for KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- [PATCH 0/7] KVM: x86: Introduce new ioctl KVM_HYPERV_SET_TLB_FLUSH_INHIBIT
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- Re: [PATCH 05/11] KVM: selftests: Configure XCR0 to max supported value by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: KVM: Fix APLIC in_clrip and clripnum write emulation
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC 00/13] vfio: introduce vfio-cxl to support CXL type-2 accelerator passthrough
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: KVM: Fix APLIC in_clrip and clripnum write emulation
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH 00/15] KVM: x86: Introduce new ioctl KVM_TRANSLATE2
- From: Nikolas Wipper <nikwip@xxxxxxxxx>
- Re: [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- [BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 11/11] KVM: selftests: Ensure KVM supports AVX for SEV-ES VMSA FPU test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 09/11] KVM: selftests: Drop manual XCR0 configuration from state test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 08/11] KVM: selftests: Drop manual XCR0 configuration from AMX test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 07/11] KVM: selftests: Drop manual CR4.OSXSAVE enabling from CR4/CPUID sync test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 06/11] KVM: selftests: Verify XCR0 can be "downgraded" and "upgraded"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 04/11] KVM: selftests: Rework OSXSAVE CR4=>CPUID test to play nice with AVX insns
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 02/11] KVM: selftests: Precisely mask off dynamic fields in CPUID test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 03/11] KVM: selftests: Mask off OSPKE and OSXSAVE when comparing CPUID entries
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 05/11] KVM: selftests: Configure XCR0 to max supported value by default
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 01/11] KVM: selftests: Fix out-of-bounds reads in CPUID test's array lookups
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 4/4] KVM: selftests: Add bus lock exit test
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 2/4] KVM: SVM: Enable Bus lock threshold exit
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 3/4] KVM: X86: Add documentation about behavioral difference for KVM_EXIT_BUS_LOCK
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 0/4] Add support for the Bus Lock Threshold
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v3 1/4] x86/cpufeatures: Add CPUID feature bit for the Bus Lock Threshold
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH 11/11] KVM: selftests: Ensure KVM supports AVX for SEV-ES VMSA FPU test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/11] KVM: selftests: Drop manual XCR0 configuration from SEV smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/11] KVM: selftests: Drop manual XCR0 configuration from state test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/11] KVM: selftests: Drop manual XCR0 configuration from AMX test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/11] KVM: selftests: Drop manual CR4.OSXSAVE enabling from CR4/CPUID sync test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/11] KVM: selftests: Verify XCR0 can be "downgraded" and "upgraded"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/11] KVM: selftests: Configure XCR0 to max supported value by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/11] KVM: selftests: Rework OSXSAVE CR4=>CPUID test to play nice with AVX insns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/11] KVM: selftests: Mask off OSPKE and OSXSAVE when comparing CPUID entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/11] KVM: selftests: Precisely mask off dynamic fields in CPUID test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/11] KVM: selftests: Fix out-of-bounds reads in CPUID test's array lookups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/11] KVM: selftests: AVX support + fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: only build common code if at least one vendor module was picked
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/2] x86/reboot: emergency callbacks are now registered by common KVM code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: leave kvm.ko out of the build if no vendor module is requested
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v2] vhost/vsock: specify module version
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.12, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v7 04/18] KVM: x86/mmu: Relax locking for kvm_test_age_gfn and kvm_age_gfn
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH 3/5] hyperv: Add new Hyper-V headers
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] hyperv: Use hvhdk.h instead of hyperv-tlfs.h in Hyper-V code
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] hyperv: Remove unnecessary #includes
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] hyperv: Add hv_defs.h to conditionally include hyperv-tlfs.h or hvhdk.h
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/5] Add new headers for Hyper-V Dom0
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] hyperv: Move hv_connection_id to hyperv-tlfs.h
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] vhost/vsock: specify module version
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix kvm_has_feat*() handling of negative features
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 49/65] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: Live migrating L1 VMs with nested L2 VMs on AMD
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [no subject]
- [no subject]
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 219009] New: Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Live migrating L1 VMs with nested L2 VMs on AMD
- From: Chinmaya Mahesh <cmahesh@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] powerpc/pseries/iommu: Bring back userspace view for single level TCE tables
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 12/13] iommufd, guestmemfs: Ensure persistent file used for persistent DMA
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 11/13] iommu: Add callback to restore persisted iommu_domain
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 03/13] iommu/intel: zap context table entries on kexec
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/1] KVM: nVMX: update VPPR on vmlaunch/vmresume
- From: Markku Ahvenjärvi <mankku@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/5] KVM: SVM: Enable Bus lock threshold exit
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [RFC PATCH v2 1/5] x86/cpu: Add virt tag in /proc/cpuinfo
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v8 11/11] arm64: support cpuidle-haltpoll
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: Luigi Leonardi <luigix25@xxxxxxxxx>
- [kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 14/25] KVM: TDX: initialize VM with TDX specific parameters
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v8 11/11] arm64: support cpuidle-haltpoll
- From: "Okanovic, Haris" <harisokn@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp: Add support for SNP_FEATURE_INFO command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp: Add support for SNP_FEATURE_INFO command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp: Add support for SNP_FEATURE_INFO command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp: Add support for SNP_FEATURE_INFO command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] KVM: arm64: Fix kvm_has_feat*() handling of negative features
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/3] crypto: ccp: New bit-field definitions for SNP_PLATFORM_STATUS command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/1] KVM: nVMX: update VPPR on vmlaunch/vmresume
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: nVMX: update VPPR on vmlaunch/vmresume
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: add test for diag258
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/2] s390x: edat: move LC_SIZE to arch_def.h
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] KVM: nVMX: update VPPR on vmlaunch/vmresume
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: edat: test 2G large page spanning end of memory
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: edat: test 2G large page spanning end of memory
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: edat: test 2G large page spanning end of memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: edat: test 2G large page spanning end of memory
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/2] s390x: add test for diag258
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/2] s390x: edat: move LC_SIZE to arch_def.h
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/2] s390x: add tests for diag258
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2] vhost/vsock: specify module version
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] s390x: add test for diag258
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v8 3/3] irqchip/loongson-eiointc: Add extioi virt extension support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: nVMX: update VPPR on vmlaunch/vmresume
- From: Markku Ahvenjärvi <mankku@xxxxxxxxx>
- Re: [PATCH RFC v4 0/9] tun: Introduce virtio-net hashing feature
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [RFC PATCH 14/39] KVM: guest_memfd: hugetlb: initialization and cleanup
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Use MMU shrinker to shrink KVM MMU memory caches
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: ccp: New bit-field definitions for SNP_PLATFORM_STATUS command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]