Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v2 38/38] x86/paravirt: kvmclock: Setup kvmclock early iff it's sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 36/38] x86/kvmclock: Stuff local APIC bus period when core crystal freq comes from CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 35/38] x86/kvmclock: Get TSC frequency from CPUID when its available
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 33/38] x86/kvmclock: Mark TSC as reliable when it's constant and nonstop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 32/38] x86/tsc: Rejects attempts to override TSC calibration with lesser routine
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 31/38] x86/tsc: Pass KNOWN_FREQ and RELIABLE as params to registration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 30/38] x86/paravirt: Don't use a PV sched_clock in CoCo guests with trusted TSC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 29/38] x86/paravirt: Plumb a return code into __paravirt_set_sched_clock()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 34/38] x86/kvmclock: Get CPU base frequency from CPUID when it's available
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 28/38] x86/paravirt: Mark __paravirt_set_sched_clock() as __init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 27/38] x86/kvmclock: Enable kvmclock on APs during onlining if kvmclock isn't sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 26/38] x86/kvmclock: WARN if wall clock is read while kvmclock is suspended
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 25/38] x86/kvmclock: Hook clocksource.suspend/resume when kvmclock isn't sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 24/38] timekeeping: Resume clocksources before reading persistent clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 23/38] x86/kvmclock: Refactor handling of PVCLOCK_TSC_STABLE_BIT during kvmclock_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 21/38] x86/pvclock: Mark setup helpers and related various as __init/__ro_after_init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/38] x86/xen/time: Mark xen_setup_vsyscall_time_info() as __init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/38] x86/paravirt: Pass sched_clock save/restore helpers during registration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 22/38] x86/pvclock: WARN if pvclock's valid_flags are overwritten
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/38] x86/kvmclock: Move kvm_sched_clock_init() down in kvmclock.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/38] x86/tsc: WARN if TSC sched_clock save/restore used with PV sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/38] x86/vmware: Nullify save/restore hooks when using VMware's sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/38] x86/xen/time: Nullify x86_platform's sched_clock save/restore hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/38] x86/paravirt: Move handling of unstable PV clocks into paravirt_set_sched_clock()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/38] x86/kvm: Don't disable kvmclock on BSP in syscore_suspend()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/38] x86/kvmclock: Move sched_clock save/restore helpers up in kvmclock.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/38] x86/kvmclock: Setup kvmclock for secondary CPUs iff CONFIG_SMP=y
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/38] clocksource: hyper-v: Don't save/restore TSC offset when using HV sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/38] clocksource: hyper-v: Register sched_clock save/restore iff it's necessary
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/38] x86/acrn: Mark TSC frequency as known when using ACRN for calibration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/38] x86/sev: Move check for SNP Secure TSC support to tsc_early_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/38] x86/tdx: Override PV calibration routines with CPUID-based calibration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/38] x86/sev: Mark TSC as reliable when configuring Secure TSC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/38] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/38] x86/tsc: Add standalone helper for getting CPU frequency from CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/38] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/38] x86: Try to wrangle PV clocks vs. TSC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: x86: Use wbinvd_on_cpu() instead of an open-coded equivalent
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] x86, KVM: Optimize SEV cache flushing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU switch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] x86, lib: Add WBNOINVD helper functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/7] x86, lib: Add wbinvd and wbnoinvd helpers to target multiple CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] x86, lib: Drop the unused return value from wbinvd_on_all_cpus()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: SVM: Remove wbinvd in sev_vm_destroy()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/6] x86/bugs: Remove the X86_FEATURE_USE_IBPB check in ib_prctl_set()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH v2 0/6] IBPB cleanups and a fixup
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH v2 2/6] x86/mm: Remove X86_FEATURE_USE_IBPB checks in cond_mitigation()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH v2 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH v2 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU switch
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH v2 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH v2 05/10] KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/10] KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/10] KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest has an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/10] KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/6] x86/bugs: Remove X86_FEATURE_USE_IBPB
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH v2 07/10] KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/10] KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/10] KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/10] KVM: SVM: Save host DR masks on CPUs with DebugSwap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/20] KVM: TDX: Make TDX VM type supported
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 18/20] KVM: TDX: Enable guest access to MTRR MSRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 17/20] KVM: TDX: Add a method to ignore hypercall patching
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 20/20] Documentation/virt/kvm: Document on Trust Domain Extensions (TDX)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 16/20] KVM: TDX: Ignore setting up mce
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 15/20] KVM: TDX: Add methods to ignore accesses to TSC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 13/20] KVM: TDX: Add method to ignore guest instruction emulation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 14/20] KVM: TDX: Add methods to ignore VMX preemption timer
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 12/20] KVM: TDX: Add methods to ignore accesses to CPU state
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 11/20] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 10/20] KVM: TDX: Enable guest access to LMCE related MSRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 08/20] KVM: TDX: Implement callbacks for MSR operations
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 09/20] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 07/20] KVM: x86: Move KVM_MAX_MCE_BANKS to header file
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 06/20] KVM: TDX: Handle TDX PV HLT hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 05/20] KVM: TDX: Handle TDX PV CPUID hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 04/20] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 03/20] KVM: TDX: Retry locally in TDX EPT violation handler on RET_PF_RETRY
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 02/20] KVM: TDX: Detect unexpected SEPT violations due to pending SPTEs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 01/20] KVM: TDX: Handle EPT violation/misconfig exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 00/20] KVM: TDX: TDX "the rest" part
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/msr: Rename the WRMSRNS opcode macro to ASM_WRMSRNS (for KVM)
- From: Xin Li <xin@xxxxxxxxx>
- [PATCH v2 5/5] KVM: SVM: Treat DEBUGCTL[5:2] as reserved
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: SVM: Manually context switch DEBUGCTL if LBR virtualization is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: x86: Snapshot the host's DEBUGCTL in common x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: SVM: Fix DEBUGCTL bugs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 12/21] RISC-V: perf: Modify the counter discovery mechanism
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- [PATCH 2/2] KVM: x86: Advertise support for WRMSRNS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] x86/msr: Rename the WRMSRNS opcode macro to ASM_WRMSRNS (for KVM)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: Advertise support for WRMSRNS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH] KVM: VMX: Extract checks on entry/exit control pairs to a helper macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v7 09/11] arm64: Enable memory encrypt for Realms
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: nVMX: Decouple EPT RWX bits from EPT Violation protection bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: Remove EPT_VIOLATIONS_ACC_*_BIT defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: VMX: Clean up EPT_VIOLATIONS_xxx #defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 09/21] RISC-V: Add Ssccfg ISA extension definition and parsing
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v4 08/21] RISC-V: Add Sscfg extension CSR definition
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v7 3/3] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Relax assertion on HLT exits if CPU supports Idle HLT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Resend] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v5 04/15] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH 25/33] KVM: x86: expose cpuid_entry2_find for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCHv2 0/2] kvm/x86: vhost task creation failure handling
- From: Keith Busch <kbusch@xxxxxxxx>
- [PATCHv2 2/2] kvm: retry nx_huge_page_recovery_thread creation
- From: Keith Busch <kbusch@xxxxxxxx>
- [PATCHv2 1/2] vhost: return task creation error instead of NULL
- From: Keith Busch <kbusch@xxxxxxxx>
- Re: [RFC PATCH 0/3] kvm,sched: Add gtime halted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
- From: "Moger, Babu" <babu.moger@xxxxxxx>
- Re: [RFC PATCH 0/3] kvm,sched: Add gtime halted
- From: "Sieber, Fernand" <sieberf@xxxxxxxxxx>
- [PATCH 4/4] KVM: riscv: selftests: Allow number of interrupts to be configurable
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 3/4] KVM: riscv: selftests: Change command line option
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 1/4] RISC-V: KVM: Disable the kernel perf counter during configure
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 2/4] KVM: riscv: selftests: Do not start the counter in the overflow handler
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 0/4] RISC-V KVM PMU fix and selftest improvement
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [RFC 2/2] kvm: retry nx_huge_page_recovery_thread creation
- From: Keith Busch <kbusch@xxxxxxxxxx>
- [PATCH v1 4/4] iommu: Turn iova_cookie to dma-iommu private pointer
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v1 0/4] iommu: Isolate iova_cookie to actual owners
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v1 1/4] iommu: Define iommu_get/put_msi_cookie() under CONFIG_IRQ_MSI_IOMMU
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v1 2/4] iommu: Add iommu_default_domain_free helper
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v1 3/4] iommu: Request iova_cookie owner to put cookie explicitly
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFC 2/2] kvm: retry nx_huge_page_recovery_thread creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/6] mm: Provide address mask in struct follow_pfnmap_args
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH 29/29] KVM: TDX: Handle SEPT zap error due to page add error in premap
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 27/29] KVM: x86: Make cpu_dirty_log_size a per-VM value
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 26/29] KVM: x86/mmu: Add parameter "kvm" to kvm_mmu_page_ad_need_write_protect()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 28/29] KVM: TDX: Skip updating CPU dirty logging request for TDs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 25/29] KVM: Add parameter "kvm" to kvm_cpu_dirty_log_size() and its callers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 23/29] KVM: TDX: Finalize VM initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 22/29] KVM: TDX: Add an ioctl to create initial guest memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 24/29] KVM: TDX: Handle vCPU dissociation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 20/29] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 21/29] KVM: x86/mmu: Export kvm_tdp_map_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 19/29] KVM: TDX: Implement hook to get max mapping level of private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/29] KVM: TDX: Implement hooks to propagate changes of TDP MMU mirror page table
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/29] KVM: x86/mmu: Add setter for shadow_mmio_value
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 17/29] KVM: TDX: Handle TLB tracking for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/29] KVM: TDX: Set per-VM shadow_mmio_value to 0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/29] KVM: TDX: Add load_mmu_pgd method for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/29] KVM: TDX: Require TDP MMU, mmio caching and EPT A/D bits for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/29] KVM: TDX: Set gfn_direct_bits to shared bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/29] KVM: VMX: Teach EPT violation helper about private mem
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/29] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/29] KVM: TDX: Add accessors VMX VMCS helpers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/29] x86/virt/tdx: Add SEAMCALL wrappers to manage TDX TLB tracking
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/29] KVM: x86/mmu: Do not enable page track for TD guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/29] KVM: x86/mmu: Implement memslot deletion for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/29] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/29] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/29] x86/virt/tdx: Add SEAMCALL wrappers to remove a TD private page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/29] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/29] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_sept_add() to add SEPT pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/29] TDX MMU part 2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 5/6] mm: Provide address mask in struct follow_pfnmap_args
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH final?] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 6.14
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: Enable memory encrypt for Realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH 14/39] KVM: guest_memfd: hugetlb: initialization and cleanup
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH final?] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: x86: nVMX IRQ fix and VM teardown cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Wei Lin Guay <wguay@xxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Wei Lin Guay <wguay@xxxxxxxx>
- [PATCH 32/33] KVM: x86/mmu: Taking guest pa into consideration when calculate tdp level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 31/33] KVM: x86: Introduce KVM_TDX_GET_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 29/33] KVM: TDX: create/free TDX vcpu structure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 33/33] KVM: TDX: Register TDX host key IDs to cgroup misc controller
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 30/33] KVM: TDX: Do TDX specific vcpu initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 19/33] KVM: TDX: Add TDX "architectural" error codes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 21/33] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 28/33] KVM: TDX: Don't offline the last cpu of one package when there's TDX guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 27/33] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/33] KVM: VMX: Initialize TDX during KVM module load
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 25/33] KVM: x86: expose cpuid_entry2_find for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/33] KVM: TDX: Define TDX architectural definitions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 24/33] KVM: TDX: Support per-VM KVM_CAP_MAX_VCPUS extension check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 26/33] KVM: TDX: add ioctl to initialize VM with TDX specific parameters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 23/33] KVM: TDX: create/destroy VM structure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 22/33] KVM: TDX: Get system-wide info about TDX module on initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 20/33] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/33] x86/virt/tdx: Add SEAMCALL wrappers for TDX flush operations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 17/33] KVM: TDX: Add placeholders for TDX VM/vCPU structures
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/33] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/33] KVM: TDX: Get TDX global information
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/33] KVM: VMX: Refactor VMX module init/exit functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/33] x86/virt/tdx: Add tdx_guest_keyid_alloc/free() to alloc and free TDX guest KeyID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/33] KVM: x86: Don't load/put vCPU when unloading its MMU during teardown
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/33] KVM: Export hardware virtualization enabling/disabling functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/33] x86/virt/tdx: Read essential global metadata for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/33] x86/virt/tdx: allocate tdx_sys_info in static memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/33] KVM: x86: Free vCPUs before freeing VM state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/33] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/33] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/33] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/33] x86/virt/tdx: Add SEAMCALL wrappers for TDX vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v4 00/33] TDX initialization + vCPU/VM creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/33] KVM: x86: move vm_destroy callback at end of kvm_arch_destroy_vm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH v3 2/2] s390/vfio-ap: Adding mdev remove notification
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v3 1/2] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v3 0/2] Eventfd signal on guest AP configuration change
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] Eventfd signal on guest AP configuration change
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/2] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v2 2/2] s390/vfio-ap: Fixing mdev remove notification
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/2] Eventfd signal on guest AP configuration change
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in __kvm_gpc_refresh (3)
- From: syzbot <syzbot+cde12433b6c56f55d9ed@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: fix race when making a page secure
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: fix race when making a page secure
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: fix race when making a page secure
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: SVM: Manually zero/restore DEBUGCTL if LBR virtualization is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 03/12] KVM: guest_memfd: Add flag to remove from direct map
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 06/14] acpi/ghes: create an ancillary acpi_ghes_get_state() function
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [PATCH v4 03/12] KVM: guest_memfd: Add flag to remove from direct map
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v5 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: fix race when making a page secure
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v5 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/2] x86, lib: Add WBNOINVD helper functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/2] s390/vfio-ap: Fixing mdev remove notification
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] mm/mempolicy: export memory policy symbols
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 0/1] KVM: s390: fix a newly introduced bug
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 1/1] KVM: s390: pv: fix race when making a page secure
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 6.14
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v7 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v7 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v7 3/3] PCI: s390: Support mmap() of PCI resources except for ISM devices
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v7 2/3] PCI: s390: Introduce pdev->non_mappable_bars and replace VFIO_PCI_MMAP
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH vfio] vfio/virtio: Enable support for virtio-block live migration
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 7/9] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v3 7/9] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH v4 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC v2 17/17] x86/sev: Indicate SEV-SNP guest supports Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 15/17] x86/apic: Enable Secure AVIC in Control MSR
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 16/17] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 13/17] x86/apic: Handle EOI writes for SAVIC guests
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 12/17] x86/apic: Read and write LVT* APIC registers from HV for SAVIC guests
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 14/17] x86/apic: Add kexec support for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 11/17] x86/sev: Enable NMI support for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 10/17] x86/apic: Allow NMI to be injected from hypervisor for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 09/17] x86/apic: Add support to send NMI IPI for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH v4 03/12] KVM: guest_memfd: Add flag to remove from direct map
- From: David Hildenbrand <david@xxxxxxxxxx>
- [RFC v2 08/17] x86/sev: Initialize VGIF for secondary VCPUs for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH v7 19/52] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [RFC v2 07/17] x86/apic: Support LAPIC timer for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH v7 19/52] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [RFC v2 06/17] x86/apic: Add support to send IPI for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 05/17] x86/apic: Add update_vector callback for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 04/17] x86/apic: Initialize APIC ID for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 03/17] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 02/17] x86/apic: Initialize Secure AVIC APIC backing page
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 01/17] x86/apic: Add new driver for Secure AVIC
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- [RFC v2 00/17] AMD: Add Secure AVIC Guest Support
- From: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
- Re: [PATCH v4 03/12] KVM: guest_memfd: Add flag to remove from direct map
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v4 02/12] mm/secretmem: set AS_NO_DIRECT_MAP instead of special-casing
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v4 04/12] KVM: Add capability to discover KVM_GMEM_NO_DIRECT_MAP support
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v6 5/5] KVM: guest_memfd: selftests: add tests for mmap and NUMA policy support
- From: Shivank Garg <shivankg@xxxxxxx>
- [PATCH v6 3/5] KVM: guest_memfd: Pass file pointer instead of inode pointer
- From: Shivank Garg <shivankg@xxxxxxx>
- [PATCH v6 4/5] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: Shivank Garg <shivankg@xxxxxxx>
- [PATCH v6 2/5] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- [PATCH v6 1/5] mm/filemap: add mempolicy support to the filemap layer
- From: Shivank Garg <shivankg@xxxxxxx>
- [PATCH v6 0/5] Add NUMA mempolicy support for KVM guest-memfd
- From: Shivank Garg <shivankg@xxxxxxx>
- RE: [PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH vfio] vfio/virtio: Enable support for virtio-block live migration
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- [PATCH] KVM: VMX: Remove EPT_VIOLATIONS_ACC_*_BIT defines
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- [PATCH] KVM: x86/tdp_mmu: Remove tdp_mmu_for_each_pte()
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: SVM: Manually zero/restore DEBUGCTL if LBR virtualization is disabled
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v3 04/16] KVM: TDX: Implement non-NMI interrupt injection
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v7 3/3] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Zheyun Shen <szy0127@xxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC 2/2] kvm: retry nx_huge_page_recovery_thread creation
- From: Keith Busch <kbusch@xxxxxxxx>
- [RFC 1/2] vhost: return error instead of NULL on create
- From: Keith Busch <kbusch@xxxxxxxx>
- [RFC 0/2] kvm/x86: more huge page recovery fallout
- From: Keith Busch <kbusch@xxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] kvm,sched: Add gtime halted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 0/3] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/2] x86, lib: Add WBNOINVD helper functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/3] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v7 1/3] KVM: x86: Add a wbinvd helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/3] KVM: selftests: Add self IPI HLT test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KVM: SVM: Provide helpers to set the error code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/3] KVM: SVM: Add Idle HLT intercept support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RFC] x86: avoid one cpu limit for kvm
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v5 2/2] KVM: SVM: Provide helpers to set the error code
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH v5 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH v5 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Melody Wang <huibo.wang@xxxxxxx>
- Re: [PATCH 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: "Yosry Ahmed" <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: "Yosry Ahmed" <yosry.ahmed@xxxxxxxxx>
- [PATCH v5 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 4/4] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <ashish.kalra@xxxxxxx>
- [PATCH v5 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v5 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [RFC PATCH v2 2/2] s390/vfio-ap: Fixing mdev remove notification
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/2] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/2] Eventfd signal on guest AP configuration change
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- Re: [PATCH v3 24/27] KVM: nVMX: Add a prerequisite to existence of VMCS fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v10 08/11] governors/haltpoll: drop kvm_para_available() check
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH v4 11/16] KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 04/16] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 09/16] KVM: arm64: nv: Handle L2->L1 transition on interrupt injection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v4 02/16] arm64: sysreg: Add layout for ICH_VTR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 23/30] KVM: TDX: initialize VM with TDX specific parameters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v4 03/16] arm64: sysreg: Add layout for ICH_MISR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH v4 16/16] KVM: arm64: nv: Fail KVM init if asking for NV without GICv3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 06/16] KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 13/16] KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 05/16] KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 14/16] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 08/16] KVM: arm64: nv: Nested GICv3 emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 10/16] KVM: arm64: nv: Add Maintenance Interrupt emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 07/16] KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 01/16] arm64: sysreg: Add layout for ICH_HCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 03/27] KVM: VMX: Add support for the secondary VM exit controls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 15/16] KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 12/16] KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 00/16] KVM: arm64: Add NV GICv3 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: VMX: Extract checks on entry/exit control pairs to a helper macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v4 02/12] mm/secretmem: set AS_NO_DIRECT_MAP instead of special-casing
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 04/12] KVM: Add capability to discover KVM_GMEM_NO_DIRECT_MAP support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 03/12] KVM: guest_memfd: Add flag to remove from direct map
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 01/12] mm: introduce AS_NO_DIRECT_MAP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- Re: [PATCH v3 24/27] KVM: nVMX: Add a prerequisite to existence of VMCS fields
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 24/27] KVM: nVMX: Add a prerequisite to existence of VMCS fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: Drop kvm_arch_sync_events() now that all implementations are nops
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Snapshot the host's DEBUGCTL in common x86
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 21/27] KVM: VMX: Invoke vmx_set_cpu_caps() before nested setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: SVM: Zero DEBUGCTL before VMRUN if necessary
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 20/27] KVM: x86: Allow WRMSRNS to be advertised to guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 4/7] KVM: x86: Don't load/put vCPU when unloading its MMU during teardown
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: Assert that a destroyed/freed vCPU is no longer visible
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 08/12] KVM: selftests: Add guest_memfd based vm_mem_backing_src_types
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH 01/10] KVM: SVM: Save host DR masks but NOT DRs on CPUs with DebugSwap
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC kvm-unit-tests PATCH 1/4] x86/apic: Move ioapic tests together and add them to apic test group
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 2/4] x86/apic: Disable PIT for x2apic test to allow SVM AVIC to be tested
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 3/4] x86/apic: Disable PIT for ioapic test to allow SVM AVIC to be tested
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 4/4] x86/apic: Add test for xapic-split
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [RFC kvm-unit-tests PATCH 0/4] x86/apic: SVM AVIC tests and some cleanups
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- Re: [RFC kvm-unit-tests PATCH] lib: Use __ASSEMBLER__ instead of __ASSEMBLY__
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH net-next v5 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: s390: Don't use %pK through tracepoints
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: s390: Don't use %pK through debug printing
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: Drop kvm_arch_sync_events() now that all implementations are nops
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v7 16/52] i386/tdvf: Introduce function to parse TDVF metadata
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 18/30] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v7 08/52] i386/tdx: Initialize TDX before creating TD vcpus
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/52] i386/tdx: Get tdx_capabilities via KVM_TDX_CAPABILITIES
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: x86: Don't load/put vCPU when unloading its MMU during teardown
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 3/7] KVM: Assert that a destroyed/freed vCPU is no longer visible
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH V2 09/12] KVM: TDX: restore user ret MSRs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH V2 08/12] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH Resend] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: weizijie <zijie.wei@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 07/12] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 0/5] bugfix some driver issues
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 3/3] migration: adapt to new migration configuration
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH 1/3] migration: update BAR space size
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH net-next v5 0/9] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v5 0/9] Device memory TCP TX
- From: Lei Yang <leiyang@xxxxxxxxxx>
- Re: [PATCH 01/10] KVM: SVM: Save host DR masks but NOT DRs on CPUs with DebugSwap
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Provide a capability to disable APERF/MPERF read intercepts
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/6] vfio/type1: Use consistent types for page counts
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 10/10] KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 6/7] KVM: x86: Fold guts of kvm_arch_sync_events() into kvm_arch_pre_destroy_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: Drop kvm_arch_sync_events() now that all implementations are nops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: x86: Unload MMUs during vCPU destruction, not before
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: x86: Don't load/put vCPU when unloading its MMU during teardown
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] KVM: Assert that a destroyed/freed vCPU is no longer visible
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: nVMX: Process events on nested VM-Exit if injectable IRQ or NMI is pending
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Free vCPUs before freeing VM state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: x86: nVMX IRQ fix and VM teardown cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] virtio_blk: add length check for device writable portion
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- [PATCH 2/2] virtio_fs: add length check for device writable portion
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- [PATCH v1 0/2] virtio: Add length checks for device writable portions
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [PATCH 09/10] KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/10] KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 07/10] KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 05/10] KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/10] KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: (subset) [PATCH v2 00/14] KVM: arm64: NV userspace ABI
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 01/10] KVM: SVM: Save host DR masks but NOT DRs on CPUs with DebugSwap
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/2] two KVM MMU fixes for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 6.14 take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.14, take #3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Snapshot the host's DEBUGCTL in common x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: SVM: Manually zero/restore DEBUGCTL if LBR virtualization is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: SVM: Zero DEBUGCTL before VMRUN if necessary
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 08/11] governors/haltpoll: drop kvm_para_available() check
- From: "Christoph Lameter (Ampere)" <cl@xxxxxxxxxx>
- Re: [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- [PATCH] KVM: SVM: Inject #GP if memory operand for INVPCID is non-canonical
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Always set mp_state to RUNNABLE on wakeup from HLT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] x86/bugs: Add explicit BP_SPEC_REDUCE cmdline
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- Re: [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Drop "enabled" field from "struct kvm_vcpu_pv_apf_data"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Assert that STI blocking isn't set after event injection
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/2] x86: Add split/bus lock smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 0/5] x86: Add test cases for LAM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Move SMP #defines from apic-defs.h to smp.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-test PATCH 1/3] nVMX: fixed-function performance counters could be not contiguous
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Force host-phys-bits for normal maxphyaddr access tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 00/18] x86/pmu: Fixes and improvements
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Increase the timeout for the test "vmx_apicv_test"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] nVMX: Clear A/D enable bit in EPTP after negative testcase on non-A/D host
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] x86: Use macros for selectors in asm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] x86: Bump per-CPU stack/data to 12KiB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/6] x86: LA57 canonical testcases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] Collection of tests for canonical checks on LA57 enabled CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Make set/clear_bit() atomic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH] KVM: VMX: Reject KVM_RUN if userspace forces emulation during nested VM-Enter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v5 6/9] net: enable driver support for netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL] x86: Fixes, new tests, and more!
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Assert that STI blocking isn't set after event injection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: SVM: Fix an STI shadow on VMRUN bug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH] include/linux/log2.h: mark is_power_of_2() with __always_inline
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests RFC] x86: Fix "debug" test on AMD uArch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 5/6] powerpc/kvm-hv-pmu: Implement GSB message-ops for hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 3/6] kvm powerpc/book3s-apiv2: Add kunit tests for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 6/6] powerpc/kvm-hv-pmu: Add perf-events for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 2/6] kvm powerpc/book3s-apiv2: Add support for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 1/6] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v4 0/6] kvm powerpc/book3s-hv: Expose Hostwide counters as perf-events
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- Re: [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH vfio] vfio/virtio: Enable support for virtio-block live migration
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v6 3/3] PCI: s390: Enable HAVE_PCI_MMAP on s390 and restrict mmap() of resources to mappable BARs
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [kvm-unit-tests RFC] x86: Fix "debug" test on AMD uArch
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [no subject]
- [PATCH 3/3] LoongArch: KVM: Register perf callback for guest
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 2/3] LoongArch: KVM: Implement arch specified functions for guest perf
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 1/3] LoongArch: KVM: Add stub for kvm_arch_vcpu_preempted_in_kernel
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/3] Add perf event support for guest VM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v2 10/14] KVM: arm64: Allow userspace to limit NV support to nVHE
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- [PATCH kvmtool v2 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT in KVM_RUN ioctl return
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- [PATCH kvmtool v2 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 03/14] KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH 03/14] KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- [PATCH 3/3] KVM: TDX: Always honor guest PAT on TDX enabled platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/3] KVM: x86: Introduce Intel specific quirk KVM_X86_QUIRK_EPT_IGNORE_GUEST_PAT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/3] KVM: x86: Introduce supported_quirks for platform-specific valid quirks
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/3] KVM: x86: Introduce quirk KVM_X86_QUIRK_EPT_IGNORE_GUEST_PAT
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Drop "enabled" field from "struct kvm_vcpu_pv_apf_data"
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [kvm:kvm-coco-queue 30/121] arch/x86/include/asm/tdx.h:183:12: error: unused function 'tdx_get_nr_guest_keyids'
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC]: Zeroing out mem immediately when the vm closes
- From: kinshuk <kinshukkataria4@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH net-next v5 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 8/9] net: check for driver support in netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 7/9] gve: add netmem TX support to GVE DQO-RDA mode
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 6/9] net: enable driver support for netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 5/9] net: add devmem TCP TX documentation
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 2/9] net: devmem: TCP tx netlink api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 1/9] net: add get_netmem/put_netmem support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v5 0/9] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [PATCH v3 16/16] KVM: TDX: Handle EXIT_REASON_OTHER_SMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 14/16] KVM: VMX: Add a helper for NMI handling
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 15/16] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 13/16] KVM: VMX: Move emulation_required to struct vcpu_vt
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 10/16] KVM: TDX: Enforce KVM_IRQCHIP_SPLIT for TDX guests
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 12/16] KVM: TDX: Add methods to ignore virtual apic related operation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 11/16] KVM: TDX: Force APICv active for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 08/16] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 09/16] KVM: TDX: Always block INIT/SIPI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 07/16] KVM: TDX: Implement methods to inject NMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 06/16] KVM: TDX: Wait lapic expire when timer IRQ was injected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 05/16] KVM: x86: Assume timer IRQ was injected if APIC state is protected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 04/16] KVM: TDX: Implement non-NMI interrupt injection
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 03/16] KVM: VMX: Move posted interrupt delivery code to common header
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 02/16] KVM: TDX: Disable PI wakeup for IPIv
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 01/16] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 00/16] KVM: TDX: TDX interrupts
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [RFC kvm-unit-tests PATCH] lib: Use __ASSEMBLER__ instead of __ASSEMBLY__
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL] x86: Fixes, new tests, and more!
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 9/9] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 8/9] KVM: TDX: Handle TDX PV port I/O hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 7/9] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 6/9] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 5/9] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 4/9] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/9] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/9] KVM: x86: Move pv_unhaulted check out of kvm_vcpu_has_events()
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/9] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/9] KVM: TDX: TDX hypercalls may exit to userspace
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Create KVM selftest runner
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 1/2] KVM: selftests: Add default testfiles for KVM selftests runner
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 0/2] Add KVM selftest runner
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Move SMP #defines from apic-defs.h to smp.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: replace segment selector magic number with macro definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Drop "enabled" field from "struct kvm_vcpu_pv_apf_data"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: Commit to using __ASSEMBLER__ instead of __ASSEMBLY__
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: replace segment selector magic number with macro definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Move descriptor table selector #defines to the top of desc.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] x86: Use macros for selectors in asm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH] vfio/pci: add PCIe TPH to device feature ioctl
- From: Wathsala Vithanage <wathsala.vithanage@xxxxxxx>
- [PATCH v7 07/10] KVM: selftests: Add library support for interacting with SNP
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 10/10] KVM: selftests: Add a basic SEV-SNP smoke test
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 06/10] KVM: selftests: Introduce SEV VM type check
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 09/10] KVM: selftests: Abstractions for SEV to decouple policy from type
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 08/10] KVM: selftests: Force GUEST_MEMFD flag for SNP VM type
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 05/10] KVM: selftests: Replace assert() with TEST_ASSERT_EQ()
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 04/10] KVM: selftests: Add SMT control state helper
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 03/10] KVM: selftests: Add vmgexit helper
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 02/10] KVM: selftests: SEV-SNP test for KVM_SEV_INIT2
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 00/10] Basic SEV-SNP Selftests
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [PATCH v7 01/10] KVM: SEV: Disable SEV-SNP support on initialization failure
- From: "Pratik R. Sampat" <prsampat@xxxxxxx>
- [kvm-unit-tests PATCH 2/2] x86/debug: Add a split-lock #AC / bus-lock #DB testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] x86: Include libcflat.h in atomic.h for u64 typedef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] x86: Add split/bus lock smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/9] vhost-scsi: log write descriptors for live migration (and two bugfix)
- From: dongli.zhang@xxxxxxxxxx
- Re: [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 6.14 take #1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Propagate AMD's IbrsSameMode to the guest
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/2] riscv: Introduce MACHINE_OVERRIDE
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: Generalize IBRS virtualization on emulated VM-exit
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBRS_SAME_MODE
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 0/3] Unify IBRS virtualization
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] riscv: Run with other QEMU models
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] configure: Allow earlycon for all architectures
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v4 08/12] KVM: selftests: Add guest_memfd based vm_mem_backing_src_types
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 06/12] KVM: selftests: load elf via bounce buffer
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 12/12] KVM: selftests: Test guest execution from direct map removed gmem
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 10/12] KVM: selftests: adjust test_create_guest_memfd_invalid
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 04/12] KVM: Add capability to discover KVM_GMEM_NO_DIRECT_MAP support
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 02/12] mm/secretmem: set AS_NO_DIRECT_MAP instead of special-casing
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 11/12] KVM: selftests: set KVM_GMEM_NO_DIRECT_MAP in mem conversion tests
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 01/12] mm: introduce AS_NO_DIRECT_MAP
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v4 07/12] KVM: selftests: set KVM_MEM_GUEST_MEMFD in vm_mem_add() if guest_memfd != -1
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]