Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: "Paluri, PavanKumar" <papaluri@xxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Introduce SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH 16/16] KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/16] KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 09/16] KVM: arm64: nv: Nested GICv3 emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/16] KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/16] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/16] KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/16] arm64: sysreg: Add layout for ICH_MISR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 15/16] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 14/16] KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/16] KVM: arm64: nv: Add Maintenance Interrupt emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/16] KVM: arm64: nv: Handle L2->L1 transition on interrupt injection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/16] KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/16] KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/16] arm64: sysreg: Add layout for ICH_VTR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/16] arm64: sysreg: Add layout for ICH_HCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/16] KVM: arm64: Move host SVE/SME state flags out of vCPU
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/16] KVM: arm64: Add NV GICv3 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Introduce SMP Cache Topology
- From: Alireza Sanaee <alireza.sanaee@xxxxxxxxxx>
- [PATCH v2 12/12] KVM: arm64: nv: Document EL2 timer API
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/12] KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/12] KVM: arm64: nv: Sanitise CNTHCTL_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/12] KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/12] KVM: arm64: nv: Add trap routing for CNTHCTL_EL2.EL1{NVPCT,NVVCT,TVT,TVCT}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/12] KVM: arm64: Handle counter access early in non-HYP context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/12] KVM: arm64: nv: Accelerate EL0 counter accesses from hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/12] KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV in use
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/12] KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/12] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/12] KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/12] KVM: arm64: Add NV timer support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- [PATCH v5 17/17] vfio/mlx5: Enable the DMA link API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 15/17] vfio/mlx5: Explicitly use number of pages instead of allocated length
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 16/17] vfio/mlx5: Rewrite create mkey flow to allow better code reuse
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 14/17] RDMA/umem: Separate implicit ODP initialization from explicit ODP
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 13/17] RDMA/core: Convert UMEM ODP DMA mapping to caching IOVA and page linkage
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 10/17] mm/hmm: let users to tag specific PFN with DMA mapped bit
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 11/17] mm/hmm: provide generic DMA managing logic
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 12/17] RDMA/umem: Store ODP access mask information in PFN
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 04/17] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 09/17] docs: core-api: document the IOVA-based API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 06/17] iommu/dma: Factor out a iommu_dma_map_swiotlb helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 08/17] dma-mapping: add a dma_need_unmap helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 02/17] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 05/17] dma-mapping: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 03/17] iommu: generalize the batched sync after map interface
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 01/17] PCI/P2PDMA: Refactor the p2pdma mapping helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 00/17] Provide a new two step DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Wei Lin Guay <wguay@xxxxxxxx>
- Re: [PATCH v15 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Wei Lin Guay <wguay@xxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v6 43/60] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Juri Lelli <juri.lelli@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 219602] New: Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: SVM: Provide helpers to set the error code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Juri Lelli <juri.lelli@xxxxxxxxxx>
- RE: [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: "Li, Yunxiang (Teddy)" <Yunxiang.Li@xxxxxxx>
- Re: [PATCH v2 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- [PATCH 1/4] vfio: Add vfio_device_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 2/4] dma-buf: Add dma_buf_try_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 1/4] vfio: Add vfio_device_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 2/4] dma-buf: Add dma_buf_try_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219602] Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 6/6] selftests: kvm: s390: Add has device attr check to uc_attr_mem_limit selftest
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [Bug 219602] New: Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
- From: bugzilla-daemon@xxxxxxxxxx
- RE: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2] PCI: Remove redundant macro
- From: zhangdongdong@xxxxxxxxxxxxxxxxxx
- Re: Re: [PATCH] PCI: Remove redundant macro
- From: DongdongZhang <zhangdongdong@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 6.13-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] KVM changes for Linux 6.13-rc3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 10/13] KVM: selftests: Add KVM Userfault mode to demand_paging_test
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v4 6/7] hostmem: Handle remapping of RAM
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 4/7] numa: Introduce and use ram_block_notify_remap()
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 7/7] system/physmem: Memory settings applied on remap notification
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 2/7] system/physmem: poisoned memory discard on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 5/7] hostmem: Factor out applying settings
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 3/7] accel/kvm: Report the loss of a large memory page
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 0/7] Poisoned memory recovery on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 1/7] hwpoison_page_list and qemu_ram_remap are based on pages
- From: “William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH 20/20] KVM: selftests: Allow running a single iteration of dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 19/20] KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 18/20] KVM: selftests: Set per-iteration variables at the start of each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/20] KVM: selftests: Tighten checks around prev iter's last dirty page in ring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/20] KVM: selftests: Ensure guest writes min number of pages in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/20] KVM: sefltests: Verify value of dirty_log_test last page isn't bogus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/20] KVM: selftests: Print (previous) last_page on dirty page value mismatch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/20] KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/20] KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/20] KVM: selftests: Limit dirty_log_test's s390x workaround to s390x
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/20] KVM: selftests: Read per-page value into local var when verifying dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/20] KVM: selftests: Drop stale srandom() initialization from dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/20] KVM: selftests: Drop signal/kick from dirty ring testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/20] KVM: selftests: Support multiple write retires in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/20] KVM: selftests: Fixes and cleanups for dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: clear vcpu->run->hypercall.ret before exiting for KVM_EXIT_HYPERCALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: vmx_pmu_caps_test fails on Skylake based CPUS due to read only LBRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] Collection of tests for canonical checks on LA57 enabled CPUs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Add printf attribute to _no_printf()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/18] KVM: x86/mmu: Prevent aliased memslot GFNs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/18] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/18] KVM: x86/tdp_mmu: Take root in tdp_mmu_for_each_pte()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/18] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/18] KVM: x86/tdp_mmu: Propagate tearing down mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/18] KVM: x86/tdp_mmu: Propagate building mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/18] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/18] KVM: x86/tdp_mmu: Take struct kvm in iter loops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/18] KVM: x86/mmu: Support GFN direct bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/18] KVM: Add member to struct kvm_gfn_range for target alias
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/18] KVM: x86: Add a VM type define for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/18] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v5 00/18] TDX MMU prep series part 1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock holding for write at uninit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: clear vcpu->run->hypercall.ret before exiting for KVM_EXIT_HYPERCALL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 6.13 take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 17/27] KVM: x86: Mark CR4.FRED as not reserved when guest can use FRED
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [PATCH] PCI: Remove redundant macro
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [RFC PATCH v4 13/14] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 12/14] KVM: arm64: Skip VMA checks for slots without userspace address
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 11/14] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 07/14] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 05/14] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 04/14] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 14/14] KVM: arm64: Enable guest_memfd private memory when pKVM is enabled
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 10/14] KVM: guest_memfd: Add a guest_memfd() flag to initialize it as mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 09/14] KVM: guest_memfd: Add KVM capability to check if guest_memfd is host mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 08/14] KVM: guest_memfd: Add guest_memfd support to kvm_(read|/write)_guest_page()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 06/14] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 03/14] KVM: guest_memfd: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 02/14] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 01/14] mm: Consolidate freeing of typed folios on final folio_put()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 6.13 take #1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [PATCH v6 43/60] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [syzbot] [tipc?] kernel BUG in __pskb_pull_tail
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [syzbot] [tipc?] kernel BUG in __pskb_pull_tail
- From: syzbot <syzbot+4f66250f6663c0c1d67e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH RFC v4 3/3] riscv: KVM: Add Svukte extension support for Guest/VM
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- [PATCH RFC v4 2/3] riscv: Add Svukte extension support
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- [PATCH RFC v4 0/3] riscv: add Svukte extension
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- [PATCH RFC v4 1/3] dt-bindings: riscv: Add Svukte entry
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- Re: [PATCH v3 01/57] KVM: x86: Use feature_bit() to clear CONSTANT_TSC when emulating CPUID
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC 2/5] powerpc: kvm: drop 32-bit booke
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] PCI: Remove redundant macro
- From: zhangdongdong@xxxxxxxxxxxxxxxxxx
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: Sandipan Das <sandipan.das@xxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC 1/5] mips: kvm: drop support for 32-bit hosts
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC 5/5] x86: kvm drop 32-bit host support
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH RFC/RFT] vfio/pci: Create feature to disable MSI virtualization
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 0/5] KVM: drop 32-bit host support on all architectures
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC 0/5] KVM: drop 32-bit host support on all architectures
- From: "A. Wilcox" <AWilcox@xxxxxxxxxxxxxxx>
- Re: [RFC 0/5] KVM: drop 32-bit host support on all architectures
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 0/5] KVM: drop 32-bit host support on all architectures
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- RE: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 05/11] misc: Use never-managed version of pci_intx()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC PATCH 7/7] memory: Add a new argument to indicate the request attribute in RamDismcardManager helpers
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH 5/7] memory: Register the RamDiscardManager instance upon guest_memfd creation
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH 6/7] RAMBlock: make guest_memfd require coordinate discard
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH 3/7] guest_memfd: Introduce a callback to notify the shared/private state change
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH 4/7] KVM: Notify the state change event during shared/private conversion
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH 1/7] memory: Export a helper to get intersection of a MemoryRegionSection with a given range
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH 0/7] Enable shared device assignment
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [RFC 2/5] powerpc: kvm: drop 32-bit booke
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/11] Remove implicit devres from pci_intx()
- From: Niklas Cassel <cassel@xxxxxxxxxx>
- Re: [RFC 0/5] KVM: drop 32-bit host support on all architectures
- From: "A. Wilcox" <AWilcox@xxxxxxxxxxxxxxx>
- RE: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/57] KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH 0/2] SEPT SEAMCALL retry proposal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 3/3] vfio/pci: Expose setup ROM at ROM bar when needed
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio/pci: Remove shadow rom specific code paths
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 41/60] hw/i386: add option to forcibly report edge trigger in acpi tables
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 6.1] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 36/60] i386/tdx: Force exposing CPUID 0x1f
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v6 35/60] i386/cpu: Introduce enable_cpuid_0x1f to force exposing CPUID 0x1f
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 34/60] i386/tdx: implement tdx_cpu_realizefn()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC 2/5] powerpc: kvm: drop 32-bit booke
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 2/3] RISC-V: KVM: Update firmware counters for various events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 1/3] RISC-V: KVM: Redirect instruction access fault trap to guest
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 0/3] Collect guest/host statistics during the redirected traps
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH 3/3] vfio/pci: Expose setup ROM at ROM bar when needed
- From: Yunxiang Li <Yunxiang.Li@xxxxxxx>
- [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: Yunxiang Li <Yunxiang.Li@xxxxxxx>
- [PATCH 1/3] vfio/pci: Remove shadow rom specific code paths
- From: Yunxiang Li <Yunxiang.Li@xxxxxxx>
- Re: [PATCH v3 06/11] vfio/pci: Use never-managed version of pci_intx()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v3 05/11] misc: Use never-managed version of pci_intx()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v3 03/11] net/ethernet: Use never-managed version of pci_intx()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v3 06/11] vfio/pci: Use never-managed version of pci_intx()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v3 00/11] Remove implicit devres from pci_intx()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 17/27] KVM: x86: Mark CR4.FRED as not reserved when guest can use FRED
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 17/27] KVM: x86: Mark CR4.FRED as not reserved when guest can use FRED
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC 2/5] powerpc: kvm: drop 32-bit booke
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH] Make TDX look more like VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 19/60] i386/tdx: Parse TDVF metadata for TDX VM
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v6 55/60] i386/tdx: Fetch and validate CPUID of TD guest
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Add test case for MMIO during vectoring
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v4 0/4] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [RFC 5/5] x86: kvm drop 32-bit host support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 43/43] KVM: arm64: Allow activating realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- [PATCH v6 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 37/43] arm64: RME: Propagate max SVE vector length from RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 41/43] arm64: kvm: Expose support for private memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 33/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 23/43] KVM: arm64: Handle Realm PSCI requests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 19/43] arm64: RME: Allow populating initial contents
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 40/43] arm64: RME: Provide accurate register list
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 17/43] arm64: RME: Handle realm enter/exit
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 39/43] arm64: RME: Provide register list for unfinalized RME RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 38/43] arm64: RME: Configure max SVE vector length for a Realm
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 18/43] KVM: arm64: Handle realm MMIO emulation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 16/43] arm64: RME: Allow VMM to set RIPAS
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 15/43] KVM: arm64: Support timers in realm RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 13/43] KVM: arm64: vgic: Provide helper for number of list registers
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 10/43] arm64: kvm: Allow passing machine type in KVM creation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 11/43] arm64: RME: RTT tear down
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 07/43] arm64: RME: Define the user ABI
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 09/43] kvm: arm64: Expose debug HW register numbers for Realm
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 26/43] arm64: rme: allow userspace to inject aborts
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 06/43] arm64: RME: Check for RME support at KVM init
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 24/43] KVM: arm64: WARN on injected undef exceptions
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 05/43] arm64: RME: Add wrappers for RMI calls
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 02/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 21/43] KVM: arm64: Handle realm VCPU load
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 00/43] arm64: Support for Arm CCA in KVM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 14/43] arm64: RME: Support for the VGIC in realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 12/43] arm64: RME: Allocate/free RECs to match vCPUs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 08/43] arm64: RME: ioctls to create and configure realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/6] s390x: Add library functions for exiting from snippet
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 11/11] Remove devres from pci_intx()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH v3 03/11] net/ethernet: Use never-managed version of pci_intx()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC 1/5] mips: kvm: drop support for 32-bit hosts
- From: Andreas Schwab <schwab@xxxxxxx>
- [RFC 5/5] x86: kvm drop 32-bit host support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC 4/5] riscv: kvm: drop 32-bit host support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC 2/5] powerpc: kvm: drop 32-bit booke
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC 1/5] mips: kvm: drop support for 32-bit hosts
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC 0/5] KVM: drop 32-bit host support on all architectures
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Add support for VMware guest specific hypercalls
- From: Doug Covelli <doug.covelli@xxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [PATCH RESEND kvmtool 0/4] arm: Payload memory layout change
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 11/18] mm/hmm: let users to tag specific PFN with DMA mapped bit
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v4 12/18] mm/hmm: provide generic DMA managing logic
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 11/18] mm/hmm: let users to tag specific PFN with DMA mapped bit
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 06/18] dma: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v4 05/18] dma-mapping: Add check if IOVA can be used
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v4 08/18] dma-mapping: Implement link/unlink ranges API
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 06/18] dma: Provide an interface to allow allocate IOVA
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 05/18] dma-mapping: Add check if IOVA can be used
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 04/18] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 5/5] KVM: Add hugepage support for dedicated guest memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 4/5] KVM: SEV: Improve handling of large ranges in gmem prepare callback
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 2/5] KVM: gmem: Don't clear pages that have already been prepared
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 1/5] KVM: gmem: Don't rely on __kvm_gmem_get_pfn() for preparedness
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
- From: Michael Roth <michael.roth@xxxxxxx>
- RE: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v15 07/13] x86/sev: Mark Secure TSC as reliable clocksource
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH 0/3] driver core: class: remove class_compat code
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Yao Yuan <yaoyuan@xxxxxxxxxxxxxxxxx>
- [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [kvmtool] Reset all VCPUs before any entering run loops
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH RESEND kvmtool 0/4] arm: Payload memory layout change
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool] builtin-run: Allow octal and hex numbers for -m/--mem
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- Re: [PATCH RESEND kvmtool 0/4] arm: Payload memory layout change
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.13
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.13
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v2 1/1] RISC-V: KVM: Fix APLIC in_clrip and clripnum write emulation
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v5 0/2] riscv: Add perf support to collect KVM guest statistics from host side
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v8 0/5] Add Svade and Svadu Extensions Support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 04/18] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [GIT PULL] VFIO fixes for v6.13-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 14/15] KVM: x86: Implement KVM_TRANSLATE2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- Re: [PATCH 00/15] KVM: x86: Introduce new ioctl KVM_TRANSLATE2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 0/6] Enhance event delivery error handling
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- Re: [PATCH v13] PCI/ASPM: Make pci_save_aspm_l1ss_state save both child and parent's L1SS configuration
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [GIT PULL] VFIO fixes for v6.13-rc3
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 07/13] x86/sev: Mark Secure TSC as reliable clocksource
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 4/4] KVM: selftests: dirty_log_test: support multiple write retires
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 3/4] KVM: selftests: dirty_log_test: run the guest until some dirty ring entries were harvested
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/4] KVM: selftests: dirty_log_test: Limit s390x workaround to s390x
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/4] KVM: selftests: dirty_log_test: fixes for running the test nested
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v2 0/6] Enhance event delivery error handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Add test case for MMIO during vectoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: SVM: Handle MMIO during vectroing error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Add function for vectoring error generation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Simon Pilkington <simonp.git@xxxxxxxxxxx>
- [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [syzbot] [kvm?] WARNING in __srcu_check_read_flavor
- From: syzbot <syzbot+4a606091891fbc6811cf@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Bug 219588] New: [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Invitation] bi-weekly guest_memfd upstream call on 2024-12-12
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: syzbot <syzbot+ac0bc3a70282b4d586cc@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [syzbot] Monthly kvm report (Dec 2024)
- From: syzbot <syzbot+listd945ff1949b51baab774@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [kvmtool] Reset all VCPUs before any entering run loops
- From: Keir Fraser <keirf@xxxxxxxxxx>
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Simon Pilkington <simonp.git@xxxxxxxxxxx>
- RE: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 1/7] iommu: Prevent pasid attach if no ops->remove_dev_pasid
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Redirect instruction access fault trap to guest
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [Bug 219588] New: [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v5 5/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v5 5/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 5/5] KVM: x86: Defer runtime updates of dynamic CPUID bits until CPUID emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86: Query X86_FEATURE_MWAIT iff userspace owns the CPUID feature bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86: Use for-loop to iterate over XSTATE size entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/18] KVM: TDX: TDX "the rest" part
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] selftests/rseq: Fix rseq for cases without glibc support
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Simon Pilkington <simonp.git@xxxxxxxxxxx>
- Re: [PATCH v9 05/15] arm64: barrier: add support for smp_cond_relaxed_timeout()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/18] KVM: TDX: TDX "the rest" part
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/16] KVM: TDX: TDX interrupts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: TDX: TDX hypercalls may exit to userspace
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: TDX: TD vcpu enter/exit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/25] TDX vCPU/VM creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/24] TDX MMU Part 2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
- From: Donald Dutile <ddutile@xxxxxxxxxx>
- Re: [PATCH 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH v3 13/15] context_tracking,x86: Add infrastructure to defer kernel TLBI
- From: Petr Tesarik <ptesarik@xxxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [Invitation] bi-weekly guest_memfd upstream call on 2024-12-12
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 2/2] vfio/pci: Remove #ifdef iowrite64 and #ifdef ioread64
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] vfio/pci: Enable iowrite64 and ioread64 for vfio pci
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.13, part #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v3 13/15] context_tracking,x86: Add infrastructure to defer kernel TLBI
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v9 05/15] arm64: barrier: add support for smp_cond_relaxed_timeout()
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v3 2/2] vfio/pci: Remove #ifdef iowrite64 and #ifdef ioread64
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- [PATCH v3 1/2] vfio/pci: Enable iowrite64 and ioread64 for vfio pci
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- [PATCH v3 0/2] Extend 8-byte PCI load/store support to x86 arch
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH v2 2/2] vfio/pci: Remove #ifdef iowrite64 and #ifdef ioread64
- From: "Thomas, Ramesh" <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: s390: VSIE: fix virtual/physical address in unpin_scb()
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 05/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: s390: VSIE: fix virtual/physical address in unpin_scb()
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/6] s390x: Add library functions for exiting from snippet
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] KVM: TDX: Handle TDX PV port I/O hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] KVM: TDX: Handle TDX PV port I/O hypercall
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vcpu_run
- From: syzbot <syzbot+1522459a74d26b0ac33a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 16/25] KVM: TDX: Get system-wide info about TDX module on initialization
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
- From: Simon Pilkington <simonp.git@xxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v1 1/1] KVM: s390: VSIE: fix virtual/physical address in unpin_scb()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [PATCH v2 2/2] net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs
- From: Kalesh Anakkur Purayil <kalesh-anakkur.purayil@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Kalesh Anakkur Purayil <kalesh-anakkur.purayil@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs
- From: Michal Swiatkowski <michal.swiatkowski@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs
- From: Michal Swiatkowski <michal.swiatkowski@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Michal Swiatkowski <michal.swiatkowski@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Michal Swiatkowski <michal.swiatkowski@xxxxxxxxxxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [kvm-unit-tests PATCH 3/3] riscv: Support UARTs with different I/O widths
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] riscv: Rate limit UART output to avoid FIFO overflows
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] riscv: Add Image header to flat binaries
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] riscv: Improved bare metal support
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/8] drivers/perf: riscv: Implement PMU event info function
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH 7/8] RISC-V: KVM: Implement get event info function
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 17/18] KVM: TDX: Make TDX VM type supported
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 16/18] KVM: TDX: Add a method to ignore hypercall patching
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 15/18] KVM: TDX: Ignore setting up mce
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 14/18] KVM: TDX: Add methods to ignore accesses to TSC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 13/18] KVM: TDX: Add methods to ignore VMX preemption timer
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 12/18] KVM: TDX: Add method to ignore guest instruction emulation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 11/18] KVM: TDX: Add methods to ignore accesses to CPU state
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 10/18] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 09/18] KVM: TDX: Enable guest access to LMCE related MSRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 08/18] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 07/18] KVM: TDX: Implement callbacks for MSR operations
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 06/18] KVM: x86: Move KVM_MAX_MCE_BANKS to header file
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 05/18] KVM: TDX: Handle TDX PV HLT hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 04/18] KVM: TDX: Handle TDX PV CPUID hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 03/18] KVM: TDX: Detect unexpected SEPT violations due to pending SPTEs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 02/18] KVM: TDX: Handle EPT violation/misconfig exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 01/18] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 00/18] KVM: TDX: TDX "the rest" part
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: Hitting AUTOIBRS WARN_ON_ONCE() in init_amd() booting 32-bit kernel under KVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Hitting AUTOIBRS WARN_ON_ONCE() in init_amd() booting 32-bit kernel under KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/bugs: Don't fill RSB on context switch with eIBRS
- From: "jpoimboe@xxxxxxxxxx" <jpoimboe@xxxxxxxxxx>
- Re: Hitting AUTOIBRS WARN_ON_ONCE() in init_amd() booting 32-bit kernel under KVM
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v3 1/2] x86: KVM: Advertise FSRS and FSRC on AMD to userspace
- From: "Moger, Babu" <babu.moger@xxxxxxx>
- Re: [PATCH v3 1/5] hyperv: Move hv_connection_id to hyperv-tlfs.h
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/8] drivers/perf: riscv: Add raw event v2 support
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] vfio/pci: Remove #ifdef iowrite64 and #ifdef ioread64
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v1 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 2/2] net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/2] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v1 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH 00/11] KVM: arm64: Add NV timer support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [linus:master] [KVM] d96c77bd4e: stress-ng.kvm.ops_per_sec 11.1% improvement
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [RFC PATCH v3 13/15] context_tracking,x86: Add infrastructure to defer kernel TLBI
- From: Petr Tesarik <ptesarik@xxxxxxxx>
- Re: [PATCH 00/11] KVM: arm64: Add NV timer support
- From: Chase Conklin <chase.conklin@xxxxxxx>
- Re: [PATCH 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]