Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 3/5] powerpc: kvm: drop 32-bit booke
- From: Crystal Wood <crwood@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Only zap valid non-mirror roots in kvm_zap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [PATCH] pci: account for sysfs-disabled reset in pci_{slot,bus}_resettable
- From: Nishanth Aravamudan <naravamudan@xxxxxxxxxx>
- Re: [RFC PATCH 6/7] accel/hvf: Use CPU_FOREACH_HVF()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [RFC PATCH 6/7] accel/hvf: Use CPU_FOREACH_HVF()
- From: Daniel Henrique Barboza <dbarboza@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/7] cpus: Restrict CPU_FOREACH_SAFE() to user emulation
- From: Daniel Henrique Barboza <dbarboza@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/16] KVM: TDX: TDX interrupts
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 7/7] accel/kvm: Use CPU_FOREACH_KVM()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 6/7] accel/hvf: Use CPU_FOREACH_HVF()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 5/7] accel/hw: Implement hw_accel_get_cpus_queue()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 4/7] accel/tcg: Use CPU_FOREACH_TCG()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 3/7] accel/tcg: Implement tcg_get_cpus_queue()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 2/7] cpus: Introduce AccelOpsClass::get_cpus_queue()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 1/7] cpus: Restrict CPU_FOREACH_SAFE() to user emulation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 0/7] accel: Add per-accelerator vCPUs queue
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Raptor Engineering dedicating resources to KVM on PowerNV + KVM CI/CD
- From: Shawn Anastasio <sanastasio@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 18/25] KVM: TDX: Support per-VM KVM_CAP_MAX_VCPUS extension check
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 11/25] KVM: TDX: Add placeholders for TDX VM/vCPU structures
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 09/25] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] KVM: allow NULL writable argument to __kvm_faultin_pfn
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 11/12] x86/mm: enable AMD translation cache extensions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [syzbot] [kvm?] possible deadlock in kvm_arch_pm_notifier
- From: syzbot <syzbot+352e553a86e0d75f5120@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Use setup ROM as fallback for ROM bar
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 0/2] Extend 8-byte PCI load/store support to x86 arch
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [RFC] Para-virtualized TLB flush for PV-waiting vCPUs
- From: Kenta Ishiguro <kentaishiguro@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] RISC-V: KVM: add support for FWFT SBI extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] Add support for SBI FWFT extension testing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH 2/2] riscv: Add tests for SBI FWFT extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] riscv: Add "-deps" handling for tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH 3/6] RISC-V: KVM: add SBI extension init()/deinit() functions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH 6/6] RISC-V: KVM: add support for SBI_FWFT_MISALIGNED_DELEG
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH 5/6] riscv: export unaligned_ctl_available() as a GPL symbol
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH 2/6] riscv: request misaligned exception delegation from SBI
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH 0/6] riscv: add SBI FWFT misaligned exception delegation support
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH 1/6] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [GIT PULL] VFIO fixes for v6.13-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] VFIO fixes for v6.13-rc7
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/5] riscv: add SBI SSE extension tests
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/12] x86/mm: enable AMD translation cache extensions
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v16 13/13] x86/sev: Allow Secure TSC feature for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 12/13] x86/tsc: Switch to native sched clock
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 11/13] x86/tsc: Upgrade TSC clocksource rating for guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 10/13] x86/tsc: Switch Secure TSC guests away from kvm-clock
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 09/13] x86/sev: Mark Secure TSC as reliable clocksource
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 08/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 07/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 06/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 05/13] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 04/13] x86/sev: Relocate SNP guest messaging routines to common code
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 03/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 01/13] virt: sev-guest: Remove is_vmpck_empty() helper
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 02/13] virt: sev-guest: Replace GFP_KERNEL_ACCOUNT with GFP_KERNEL
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v16 00/13] Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Simona Vetter <simona.vetter@xxxxxxxx>
- Re: [PATCH 5/6] powerpc/book3s-hv-pmu: Implement GSB message-ops for hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] [DOC] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- Re: [PATCH 00/16] KVM: TDX: TDX interrupts
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/5] riscv: add SBI SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v2 09/12] KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits
- From: Wei-Lin Chang <r09922117@xxxxxxxxxxxxxxx>
- Re: [PATCH 13/16] KVM: TDX: Add methods to ignore virtual apic related operation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/12] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
- From: Wei-Lin Chang <r09922117@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC 0/5] LoongArch: KVM: Add separate vmid support
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v2 18/25] KVM: TDX: Support per-VM KVM_CAP_MAX_VCPUS extension check
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 00/25] TDX vCPU/VM creation
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- linux-next: Fixes tag needs some work in the kvms390-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] Makefile: add portable mode
- From: Jon Kohler <jon@xxxxxxxxxxx>
- [PATCH v2 2/3] vfio/nvgrace-gpu: Expose the blackwell device PF BAR1 to the VM
- From: <ankita@xxxxxxxxxx>
- [PATCH v2 3/3] vfio/nvgrace-gpu: Check the HBM training and C2C link status
- From: <ankita@xxxxxxxxxx>
- [PATCH v2 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
- From: <ankita@xxxxxxxxxx>
- [PATCH v2 1/3] vfio/nvgrace-gpu: Read dvsec register to determine need for uncached resmem
- From: <ankita@xxxxxxxxxx>
- Re: [PATCH v2 11/25] KVM: TDX: Add placeholders for TDX VM/vCPU structures
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH v2 09/25] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH v2] vfio/pci: update igd matching conditions
- From: Tomita Moeko <tomitamoeko@xxxxxxxxx>
- Re: [RFC 0/5] LoongArch: KVM: Add separate vmid support
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v2] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Clear LLBCTL if secondary mmu mapping is changed
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5] target/arm: Always add pmu property for Armv7-A/R+
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v2 00/25] TDX vCPU/VM creation
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 13/16] KVM: TDX: Add methods to ignore virtual apic related operation
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v2] PCI: Remove redundant macro
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH v3 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH 12/13] x86/virt/tdx: Read essential global metadata for KVM
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 11/13] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2] vfio/pci: update igd matching conditions
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 1/1] KVM: VMX: Fix comment of handle_vmx_instruction
- From: Gao Shiyuan <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH RFC/RFT] vfio/pci: Create feature to disable MSI virtualization
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH RFC/RFT] vfio/pci: Create feature to disable MSI virtualization
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RFC/RFT] vfio/pci: Create feature to disable MSI virtualization
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Alireza Sanaee <alireza.sanaee@xxxxxxxxxx>
- Re: [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH] vfio/pci: Fallback huge faults for unaligned pfn
- From: Precific <precification@xxxxxxxxx>
- Re: [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH v5 2/3] KVM: SVM: Add Idle HLT intercept support
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v5 3/3] KVM: selftests: Add self IPI HLT test
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v5 0/3] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH v5 1/3] x86/cpufeatures: Add CPUID feature bit for Idle HLT intercept
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH] vfio/pci: Fallback huge faults for unaligned pfn
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Re: [PATCH v2] PCI: Remove redundant macro
- From: DongdongZhang <zhangdongdong@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 10/13] x86/virt/tdx: Add SEAMCALL wrappers to remove a TD private page
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 09/13] x86/virt/tdx: Add SEAMCALL wrappers to manage TDX TLB tracking
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2] PCI: Remove redundant macro
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [GIT PULL] Last KVM/arm64 fixes for 6.13
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 07/13] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_sept_add() to add SEPT pages
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 01/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 00/13] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] vfio/pci: Fallback huge faults for unaligned pfn
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 00/12] KVM: arm64: Add NV timer support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 00/12] KVM: arm64: Add NV timer support
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 2/2] vfio/pci: Expose setup ROM at ROM bar when needed
- From: Yunxiang Li <Yunxiang.Li@xxxxxxx>
- [PATCH v2 1/2] vfio/pci: Remove shadow ROM specific code paths
- From: Yunxiang Li <Yunxiang.Li@xxxxxxx>
- [PATCH v2 0/2] Use setup ROM as fallback for ROM bar
- From: Yunxiang Li <Yunxiang.Li@xxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] vfio/pci: Fallback huge faults for unaligned pfn
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Alireza Sanaee <alireza.sanaee@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH] KVM: VMX: Reinstate __exit attribute for vmx_exit
- From: Costas Argyris <costas.argyris@xxxxxxx>
- Re: [PATCH v4 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] KVM: SVM: Use str_enabled_disabled() helper in sev_hardware_setup()
- From: "Paluri, PavanKumar" <papaluri@xxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Alireza Sanaee <alireza.sanaee@xxxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Provide helpers to set the error code
- From: "Paluri, PavanKumar" <papaluri@xxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- [syzbot] [kvm?] WARNING in __kvm_gpc_refresh (3)
- From: syzbot <syzbot+cde12433b6c56f55d9ed@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] LoongArch: KVM: Clear LLBCTL if secondary mmu mapping is changed
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Use str_enabled_disabled() helper in sev_hardware_setup()
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH v3 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v3 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v3 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v3 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v3 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v3 0/5] bugfix some driver issues
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [Bug 219618] [SOLVED] qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH 13/13] x86/virt/tdx: Add tdx_guest_keyid_alloc/free() to alloc and free TDX guest KeyID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/13] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/13] x86/virt/tdx: Read essential global metadata for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/13] x86/virt/tdx: Add SEAMCALL wrappers to remove a TD private page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/13] x86/virt/tdx: Add SEAMCALL wrappers to manage TDX TLB tracking
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/13] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_sept_add() to add SEPT pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX flush operations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/13] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 00/13] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/11] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/11] x86/virt/tdx: Add SEAMCALL wrappers to remove a TD private page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/11] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/11] x86/virt/tdx: Add SEAMCALL wrappers to manage TDX TLB tracking
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/11] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_sept_add() to add SEPT pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/11] x86/virt/tdx: Add SEAMCALL wrappers for TDX flush operations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/11] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/11] x86/virt/tdx: Add SEAMCALL wrappers for TDX vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/11] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/11] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/11] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 00/11] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: allow NULL writable argument to __kvm_faultin_pfn
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Precific <precification@xxxxxxxxx>
- [Bug 219618] [SOLVED] qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219618] [REGRESSION, BISECTED] qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Precific <precification@xxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Precific <precification@xxxxxxxxx>
- [PATCH v4 2/2] KVM: SVM: Provide helpers to set the error code
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH v4 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH v4 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Melody Wang <huibo.wang@xxxxxxx>
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] vfio/pci: update igd matching conditions
- From: Tomita Moeko <tomitamoeko@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/bugs: Don't fill RSB on context switch with eIBRS
- From: "Shah, Amit" <Amit.Shah@xxxxxxx>
- Re: [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Subject: [PATCH] x86: kvmclock: Clean up the usage of the apic_lvt_mask array.
- From: Liam Ni <zhiguangni01@xxxxxxxxx>
- Re: [PATCH 5/6] powerpc/book3s-hv-pmu: Implement GSB message-ops for hostwide counters
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] KVM: nSVM: implement the nested idle halt intercept
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v4 4/4] KVM: selftests: KVM: SVM: Add Idle HLT intercept test
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v4 3/4] KVM: nSVM: implement the nested idle halt intercept
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH 1/6] [DOC] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] vfio/pci: update igd matching conditions
- From: Tomita Moeko <tomitamoeko@xxxxxxxxx>
- Re: [PATCH] vfio/pci: update igd matching conditions
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] vfio/pci: update igd matching conditions
- From: Tomita Moeko <tomitamoeko@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [PATCH] vhost/net: Set num_buffers for virtio 1.0
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH] KVM: SVM: Use str_enabled_disabled() helper in sev_hardware_setup()
- From: Thorsten Blum <thorsten.blum@xxxxxxxxx>
- Re: [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: wzj <zijie.wei@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v2 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH] vhost/net: Set num_buffers for virtio 1.0
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [RFC PATCH v4 07/14] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 2/5] selftests: ncdevmem: Implement devmem TCP TX
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 3/5] net: add get_netmem/put_netmem support
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH] vhost/net: Set num_buffers for virtio 1.0
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Collect guest/host statistics during the redirected traps
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v5 05/11] target/i386/kvm: Save/load MSRs of kvmclock2 (KVM_FEATURE_CLOCKSOURCE2)
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 04/11] target/i386/kvm: Only save/load kvmclock MSRs when kvmclock enabled
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 11/11] target/i386/kvm: Replace ARRAY_SIZE(msr_handlers) with KVM_MSR_FILTER_MAX_RANGES
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 10/11] target/i386/kvm: Clean up error handling in kvm_arch_init()
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH v2 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 0/3] Collect guest/host statistics during the redirected traps
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 2/3] RISC-V: KVM: Update firmware counters for various events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 1/3] RISC-V: KVM: Redirect instruction access fault trap to guest
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Athul Krishna <athul.krishna.kr@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 00/11] i386: miscellaneous cleanup
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 11/11] target/i386/kvm: Replace ARRAY_SIZE(msr_handlers) with KVM_MSR_FILTER_MAX_RANGES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 10/11] target/i386/kvm: Clean up error handling in kvm_arch_init()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 05/11] target/i386/kvm: Save/load MSRs of kvmclock2 (KVM_FEATURE_CLOCKSOURCE2)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 04/11] target/i386/kvm: Only save/load kvmclock MSRs when kvmclock enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] SEAMCALL Wrappers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/24] TDX MMU Part 2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 22/24] KVM: TDX: Finalize VM initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
- From: David Hildenbrand <david@xxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 00/25] TDX vCPU/VM creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] RISC-V: KVM: Update firmware counters for various events
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] RISC-V: KVM: Redirect instruction access fault trap to guest
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v6 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Only zap valid non-mirror roots in kvm_zap_gfn_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v4 0/4] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v4 0/4] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v6 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock held for write at uninit
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: TDX: Test dirty ring on a gmemfd slot
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 0/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Athul Krishna <athul.krishna.kr@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] riscv: kvm: drop 32-bit host support
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: guest_memfd: Remove RCU-protected attribute from slot->gmem.file
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: syzbot <syzbot+ac0bc3a70282b4d586cc@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.13-rc4 (or rc5)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] KVM fixes for Linux 6.13-rc4 (or rc5)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 16/18] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 18/18] KVM: x86/mmu: Prevent aliased memslot GFNs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 14/18] KVM: x86/tdp_mmu: Propagate building mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 12/18] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 15/18] KVM: x86/tdp_mmu: Propagate tearing down mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 11/18] KVM: x86/tdp_mmu: Take root in tdp_mmu_for_each_pte()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 10/18] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 08/18] KVM: x86/mmu: Support GFN direct bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 07/18] KVM: x86/tdp_mmu: Take struct kvm in iter loops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 06/18] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 03/18] KVM: x86: Add a VM type define for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 02/18] KVM: Add member to struct kvm_gfn_range to indicate private/shared
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 00/18] TDX MMU prep series part 1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock held for write at uninit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Only zap valid non-mirror roots in kvm_zap_gfn_range()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: guest_memfd: Remove RCU-protected attribute from slot->gmem.file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/6] kvm powerpc/book3s-hv-pmu: Add perf-events for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 3/6] kvm powerpc/book3s-apiv2: Add kunit tests for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 2/6] kvm powerpc/book3s-apiv2: Add support for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 5/6] powerpc/book3s-hv-pmu: Implement GSB message-ops for hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 0/6] kvm powerpc/book3s-hv: Expose Hostwide counters as perf-events
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 1/6] [DOC] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: weizijie <zijie.wei@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- [Bug 219618] [REGRESSION, BISECTED] qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: "A. Wilcox" <AWilcox@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 5/5] x86: kvm drop 32-bit host support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 3/5] powerpc: kvm: drop 32-bit booke
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 2/5] riscv: kvm: drop 32-bit host support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 1/5] mips: kvm: drop support for 32-bit hosts
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: drop 32-bit host support on all architectures
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- [Bug 219618] qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219618] New: qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 2/5] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 1/5] net: add devmem TCP TX documentation
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 0/5] Device memory TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: x86: Avoid double RDPKRU when loading host/guest PKRU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2.1 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 4/5] net: devmem TCP tx netlink api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 2/5] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 3/5] net: add get_netmem/put_netmem support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 1/5] net: add devmem TCP TX documentation
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 0/5] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- PKEY syscall number for selftest? (was: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 01/11 for v9.2?] i386/cpu: Mark avx10_version filtered when prefix is NULL
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC v3 26/27] KVM: arm64: selftests: Add SME system registers to get-reg-list
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 23/27] KVM: arm64: Context switch SME state for normal guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC v3 19/27] KVM: arm64: Support SME priority registers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 22/27] KVM: arm64: Expose SME specific state to userspace
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 25/27] KVM: arm64: Provide interface for configuring and enabling SME for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 20/27] KVM: arm64: Provide assembly for SME state restore
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 27/27] KVM: arm64: selftests: Add SME to set_id_regs test
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 24/27] KVM: arm64: Handle SME exceptions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 17/27] KVM: arm64: Support TPIDR2_EL0
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 21/27] KVM: arm64: Support Z and P registers in streaming mode
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 13/27] KVM: arm64: Rename sve_state_reg_region
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 18/27] KVM: arm64: Support SMIDR_EL1 for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 11/27] KVM: arm64: Document the KVM ABI for SME
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 16/27] KVM: arm64: Add definitions for SME control register
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 15/27] KVM: arm64: Implement SME vector length configuration
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 14/27] KVM: arm64: Store vector lengths in an array
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 07/27] KVM: arm64: Convert cpacr_clear_set() to a static inline
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 12/27] KVM: arm64: Define internal features for SME
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 10/27] KVM: arm64: Rename SVE finalization constants to be more general
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 09/27] KVM: arm64: Factor SVE guest exit handling out into a function
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 08/27] KVM: arm64: Move SVE state access macros after feature test macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 06/27] KVM: arm64: Pull ctxt_has_ helpers to start of sysreg-sr.h
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 04/27] arm64/fpsimd: Determine maximum virtualisable SME vector length
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 05/27] KVM: arm64: Introduce non-UNDEF FGT control
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 03/27] arm64/fpsimd: Check enable bit for FA64 when saving EFI state
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 02/27] arm64/fpsimd: Decide to save ZT0 and streaming mode FFR at bind time
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 01/27] arm64/fpsimd: Update FA64 and ZT0 enables when loading SME state
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 00/27] KVM: arm64: Implement support for SME in non-protected guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH] kvm_config: add CONFIG_VIRTIO_FS
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/18] TDX MMU prep series part 1
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: TDX: Test dirty ring on a gmemfd slot
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- kvm-coco-queue regression test report
- From: "Chen, Farrah" <farrah.chen@xxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [GIT PULL] KVM: x86: Fixes for 6.13-rcN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/8] KVM: selftests: Add infrastructure for getting vCPU binary stats
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/8] KVM: selftests: Add compile-time assertions to guard against stats typos
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/8] KVM: selftests: Get VM's binary stats FD when opening VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/8] KVM: selftests: Add struct and helpers to wrap binary stats cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/8] KVM: selftests: Macrofy vm_get_stat() to auto-generate stat name string
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/8] KVM: selftests: Assert that __vm_get_stat() actually finds a stat
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/8] KVM: selftests: Close VM's binary stats FD when releasing VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/8] KVM: selftests: Fix mostly theoretical leak of VM's binary stats FD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/8] KVM: selftests: Binary stats fixes and infra updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Add helpers for locally (un)blocking IRQs on x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KVM: selftests: KVM: SVM: Add Idle HLT intercept test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/4] KVM: nSVM: implement the nested idle halt intercept
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 0/4] KVM selftests enhancements
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 4/4] KVM: selftests: Replace previously used vm_get_stat() to macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 2/4] KVM: selftests: Add an interface to read the data of named vcpu stat
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: VMX: read the PML log in the same order as it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: refactor PML terminology
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: x86: read the PML log in the same order it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepoints
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepoints
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1 1/4] KVM: selftests: Add safe_halt() and cli() helpers to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepoints
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: John Stoffel <john@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Lei Yang <leiyang@xxxxxxxxxx>
- Re: [PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 3/5] vfio: VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT support pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 1/5] ida: Add ida_find_first_range()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 5/5] iommufd/selftest: Add coverage for reporting max_pasid_log2 via IOMMU_HW_INFO
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 4/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 2/5] vfio-iommufd: Support pasid [at|de]tach for physical VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 0/5] vfio-pci support pasid attach/detach
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [syzbot] [bcachefs?] WARNING in __srcu_check_read_flavor
- From: syzbot <syzbot+4a606091891fbc6811cf@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: SVM: allow flipping the LFENCE_SERIALIZE bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v2 0/5] bugfix some driver issues
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v8 1/2] ppc: Enable 2nd DAWR support on Power10 PowerNV machine
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- [PATCH v2 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 0/5] bugfix some driver issues
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] riscv: Add Image header to flat binaries
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v6 4/4] i386/cpu: add has_caches flag to check smp_cache configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 3/4] i386/pc: Support cache topology in -machine for PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 2/4] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 1/4] i386/cpu: Support thread and module level cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 0/5] riscv: add support for Zaamo and Zalrsc extensions
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: riscv: selftests: Add Zaamo/Zalrsc extensions to get-reg-list test
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] RISC-V: KVM: Allow Zaamo/Zalrsc extensions for Guest/VM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v4 0/3] riscv: add Svukte extension
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH v6 06/43] arm64: RME: Check for RME support at KVM init
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v6 12/43] arm64: RME: Allocate/free RECs to match vCPUs
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: nVMX: Fix an SVI update bug with passthrough APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: nVMX: Honor event priority for PI ack at VM-Enter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: Mark Intel PT virtualization as BROKEN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Remove hwapic_irr_update() from kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Remove redundant TLB flush on guest CR4.PGE change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Macrofy SEV=n versions of sev_xxx_guest()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM/x86: add comment to kvm_mmu_do_page_fault()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/3] KVM: x86: tracepoint updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: SVM: Disable AVIC on SNP-enabled system without HvInUseWrAllowed feature
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] riscv: Add Image header to flat binaries
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/7] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- Re: [PATCH 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepointsg
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: add more information to the kvm_entry tracepoint
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 7/7] selftests: KVM: Add test case for MMIO during vectoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/7] selftests: KVM: extract lidt into helper function
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 5/7] KVM: SVM: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/7] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/7] KVM: x86: Add emulation status for unhandleable vectoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 0/2] system/confidential-guest-support: Header cleanups
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v3] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v3 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 6/6] selftests: kvm: s390: Add has device attr check to uc_attr_mem_limit selftest
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] lib: s390x: add function to test available UV features
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] s390x: pv: Add test for large host pages backing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] lib: s390: add ptlb wrapper
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/7] memory: Export a helper to get intersection of a MemoryRegionSection with a given range
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Simona Vetter <simona.vetter@xxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] riscv: Add Image header to flat binaries
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] riscv: Improved bare metal support
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v6 0/7] Support attaching PASID to the blocked_domain
- From: Joerg Roedel <joro@xxxxxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH v15 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Add support for VMware guest specific hypercalls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 57/57] KVM: x86: Use only local variables (no bitmask) to init kvm_cpu_caps
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 00/18] TDX MMU prep series part 1
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/20] KVM: selftests: Drop stale srandom() initialization from dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 20/20] KVM: selftests: Allow running a single iteration of dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 19/20] KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 17/20] KVM: selftests: Tighten checks around prev iter's last dirty page in ring
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 16/20] KVM: selftests: Ensure guest writes min number of pages in dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 15/20] KVM: sefltests: Verify value of dirty_log_test last page isn't bogus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 13/20] KVM: selftests: Print (previous) last_page on dirty page value mismatch
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 12/20] KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 11/20] KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 06/20] KVM: selftests: Read per-page value into local var when verifying dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] SEPT SEAMCALL retry proposal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] selftests: KVM: Add test case for MMIO during vectoring
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 6/7] selftests: KVM: extract lidt into helper function
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 3/7] KVM: x86: Unprotect & retry before unhandleable vectoring check
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 0/7] Enhance event delivery error handling
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 5/7] KVM: SVM: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 4/7] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 2/7] KVM: x86: Add emulation status for unhandleable vectoring
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 1/7] KVM: x86: Add function for vectoring error generation
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]