Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [RFC PATCH v3 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 06/14] acpi/ghes: create an ancillary acpi_ghes_get_state() function
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [RFC PATCH v5 0/4] Add NUMA mempolicy support for KVM guest-memfd
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2] riscv: KVM: Remove unnecessary vcpu kick
- From: "BillXiang" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v2] RISC-V: KVM: Optimize comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- [PATCH] include/linux/log2.h: mark is_power_of_2() with __always_inline
- From: Su Hui <suhui@xxxxxxxxxxxx>
- Re: [PATCH v3 00/14] Change ghes to use HEST-based offsets and add support for error inject
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [kvm:kvm-coco-queue 30/121] arch/x86/include/asm/tdx.h:183:12: warning: 'tdx_get_nr_guest_keyids' defined but not used
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v4 2/2] KVM: x86: Include host suspended time in steal time
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH v4 1/2] KVM: x86: Advance guest TSC after deep suspend.
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH v4 0/2] KVM: x86: Include host suspended time in steal time
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- RE: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v2] RISC-V: KVM: Optimize comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Chao Du <duchao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 23/30] KVM: TDX: initialize VM with TDX specific parameters
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix comments in kvm_riscv_vcpu_isa_disable_allowed
- From: "Chao Du" <duchao@xxxxxxxxxxxxxxxxxx>
- [Bug 219009] Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH vhost v2] vdpa/mlx5: Fix oversized null mkey longer than 32bit
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Interest in contributing to KVM TODO
- From: Aaron Ang <a1ang@xxxxxxxx>
- Re: [PATCH v5 6/6] target/i386: Add support for EPYC-Turin model
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 5/6] target/i386: Update EPYC-Genoa for Cache property, perfmon-v2, RAS and SVM feature bits
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 4/6] target/i386: Add feature that indicates WRMSR to BASE reg is non-serializing
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 3/6] target/i386: Update EPYC-Milan CPU model for Cache property, RAS, SVM feature bits
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH v5 2/6] target/i386: Update EPYC-Rome CPU model for Cache property, RAS, SVM feature bits
- From: "Moger, Babu" <bmoger@xxxxxxx>
- Re: [PATCH 13/30] KVM: TDX: Get TDX global information
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 07/30] x86/virt/tdx: allocate tdx_sys_info in static memory
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v3 3/3] Documentation: kvm: new UAPI when arm64 guest consumes UER
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [RFC PATCH v3 2/3] KVM: arm64: set FnV in vcpu's ESR_ELx when host FAR_EL2 is invalid
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [RFC PATCH v3 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- Re: [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: powerpc: Enable commented out BUILD_BUG_ON() assertion
- From: Thorsten Blum <thorsten.blum@xxxxxxxxx>
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 07/30] x86/virt/tdx: allocate tdx_sys_info in static memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 11/30] KVM: VMX: Refactor VMX module init/exit functions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH net-next v4 8/9] net: check for driver support in netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 5/9] net: add devmem TCP TX documentation
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 3/9] net: devmem: Implement TX path
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH v4 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH vhost v2] vdpa/mlx5: Fix oversized null mkey longer than 32bit
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- Re: [PATCH net-next v4 1/9] net: add get_netmem/put_netmem support
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH v4 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH v4 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/6] IBPB cleanups and a fixup
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Interest in contributing to KVM TODO
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [PATCH v4 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.14, take #3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH 30/30] KVM: TDX: Register TDX host key IDs to cgroup misc controller
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 26/30] KVM: TDX: create/free TDX vcpu structure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 20/30] KVM: TDX: create/destroy VM structure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 27/30] KVM: TDX: Do TDX specific vcpu initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 19/30] KVM: TDX: Get system-wide info about TDX module on initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 24/30] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/30] KVM: VMX: Initialize TDX during KVM module load
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 23/30] KVM: TDX: initialize VM with TDX specific parameters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 21/30] KVM: TDX: Support per-VM KVM_CAP_MAX_VCPUS extension check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/30] KVM: TDX: Add placeholders for TDX VM/vCPU structures
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 28/30] KVM: x86: Introduce KVM_TDX_GET_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 29/30] KVM: x86/mmu: Taking guest pa into consideration when calculate tdp level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/30] x86/virt/tdx: Read essential global metadata for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/30] x86/virt/tdx: Add tdx_guest_keyid_alloc/free() to alloc and free TDX guest KeyID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 25/30] KVM: TDX: Don't offline the last cpu of one package when there's TDX guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/30] x86/virt/tdx: allocate tdx_sys_info in static memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 22/30] KVM: x86: expose cpuid_entry2_find for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 17/30] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/30] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/30] KVM: TDX: Add TDX "architectural" error codes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/30] KVM: TDX: Define TDX architectural definitions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/30] KVM: Export hardware virtualization enabling/disabling functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/30] KVM: VMX: Refactor VMX module init/exit functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/30] KVM: TDX: Get TDX global information
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX flush operations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/30] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/30] TDX initialization + vCPU/VM creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 6/9] KVM: selftests: Add library support for interacting with SNP
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v4 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 06/14] KVM: arm64: Consolidate idreg callbacks
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 7/7] arm64: run at EL2 if supported
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/7] arm64: drop to EL1 if booted at EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 6/7] arm64: pmu: count EL2 cycles
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 5/7] arm64: selftest: update test for running at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 4/7] arm64: micro-bench: use smc when at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 1/7] arm64: drop to EL1 if booted at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 3/7] arm64: micro-bench: fix timer IRQ
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 2/7] arm64: timer: use hypervisor timers when at EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 7/7] arm64: run at EL2 if supported
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [kvm-unit-tests PATCH v1 0/7] arm64: support EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v2 00/14] KVM: arm64: NV userspace ABI
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v2 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [PATCH v2 12/14] KVM: arm64: Advertise FEAT_ECV when possible
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/14] KVM: arm64: Document NV caps and vcpu flags
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/14] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/14] KVM: arm64: Allow userspace to limit NV support to nVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/14] KVM: arm64: Make ID_REG_LIMIT_FIELD_ENUM() more widely available
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/14] KVM: arm64: Make ID_AA64MMFR4_EL1.NV_frac writable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/14] KVM: arm64: Enforce NV limits on a per-idregs basis
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/14] KVM: arm64: Move NV-specific capping to idreg sanitisation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/14] KVM: arm64: Consolidate idreg callbacks
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/14] KVM: arm64: Mark HCR.EL2.{NV*,AT} RES0 when ID_AA64MMFR4_EL1.NV_frac is 0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/14] KVM: arm64: Advertise NV2 in the boot messages
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/14] KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/14] KVM: arm64: NV userspace ABI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 00/14] KVM: arm64: NV userspace ABI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Provide a new two step DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH V2 03/12] KVM: TDX: Set arch.has_protected_state to true
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 0/5] riscv: KVM: Fix a few SBI issues
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 02/10] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 01/10] mm: Consolidate freeing of typed folios on final folio_put()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 6/6] target/i386: Add support for EPYC-Turin model
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] target/i386: Update EPYC-Genoa for Cache property, perfmon-v2, RAS and SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 4/6] target/i386: Add feature that indicates WRMSR to BASE reg is non-serializing
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 01/11] mm: Consolidate freeing of typed folios on final folio_put()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 3/6] target/i386: Update EPYC-Milan CPU model for Cache property, RAS, SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 2/6] target/i386: Update EPYC-Rome CPU model for Cache property, RAS, SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v2 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 1/2] KVM: TDX: Handle SEPT zap error due to page add error in premap
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 0/2] two KVM MMU fixes for TDX
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 Resend] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: weizijie <zijie.wei@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/15] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [RFC] LoongArch: KVM: Handle interrupt early before enabling irq
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: "xiangwencheng" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v4 5/9] net: add devmem TCP TX documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2] tun: Pad virtio headers
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix comments in kvm_riscv_vcpu_isa_disable_allowed
- From: Chao Du <duchao@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v3 1/2] KVM: SVM: Increase X2AVIC limit to 4096 vcpus
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v3 0/2] KVM: SVM: Add support for 4096 vcpus with x2AVIC
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: "xiangwencheng" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v3] KVM: PPC: Enable CAP_SPAPR_TCE_VFIO on pSeries KVM guests
- From: Amit Machhiwal <amachhiw@xxxxxxxxxxxxx>
- RE: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH net-next v4 9/9] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 8/9] net: check for driver support in netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 7/9] gve: add netmem TX support to GVE DQO-RDA mode
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 6/9] net: enable driver support for netmem TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 5/9] net: add devmem TCP TX documentation
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 4/9] net: devmem: make dmabuf unbinding scheduled work
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 3/9] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 2/9] net: devmem: TCP tx netlink api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 1/9] net: add get_netmem/put_netmem support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH net-next v4 0/9] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: gmem: Don't rely on __kvm_gmem_get_pfn() for preparedness
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] KVM: x86: hyper-v: Inhibit APICv with VP Assist on SPR/EMR
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH] s390/vio-ap: Fix no AP queue sharing allowed message written to kernel log
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/15] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH 14/14] KVM: arm64: Document NV caps and vcpu flags
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 13/14] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 00/14] KVM: arm64: NV userspace ABI
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [PATCH 6/6] x86/bugs: Remove X86_FEATURE_USE_IBPB
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 3/6] x86/bugs: Remove the X86_FEATURE_USE_IBPB check in ib_prctl_set()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 2/6] x86/mm: Remove X86_FEATURE_USE_IBPB checks in cond_mitigation()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 0/6] IBPB cleanups and a fixup
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v4 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v7 19/52] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH v4 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Joel Fernandes <joelagnelf@xxxxxxxxxx>
- Re: [PATCH v6 6/9] KVM: selftests: Add library support for interacting with SNP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v5 1/1] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v5 0/1] SEV-SNP: Add KVM support for SNP certificate fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Joel Fernandes <joelagnelf@xxxxxxxxxx>
- Re: [RFC PATCH] KVM: x86: hyper-v: Inhibit APICv with VP Assist on SPR/EMR
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v6 9/9] KVM: selftests: Add a basic SEV-SNP smoke test
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v7 09/11] arm64: Enable memory encrypt for Realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 04/21] dt-bindings: riscv: add Sxcsrind ISA extension description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v4 07/21] dt-bindings: riscv: add Smcntrpmf ISA extension description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH RFC v2 03/29] mm: asi: Introduce ASI core API
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 19/52] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v7 16/52] i386/tdvf: Introduce function to parse TDVF metadata
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH RFC v2 03/29] mm: asi: Introduce ASI core API
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [RFC PATCH v5 4/4] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 3/4] KVM: guest_memfd: Pass file pointer instead of inode pointer
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 2/4] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 1/4] mm/filemap: add mempolicy support to the filemap layer
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v5 0/4] Add NUMA mempolicy support for KVM guest-memfd
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH v7 08/52] i386/tdx: Initialize TDX before creating TD vcpus
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 00/18] x86/pmu: Fixes and improvements
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- [no subject]
- RE: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] mm: Provide address mask in struct follow_pfnmap_args
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH v2 0/2] LoongArch: KVM: Enhancement about PGD saving
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 2/2] LoongArch: KVM: Fix GPA size issue about VM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 1/2] LoongArch: KVM: Remove PGD saving during VM context switch
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- kvm-coco-queue 2nd round regression test report
- From: "Chen, Farrah" <farrah.chen@xxxxxxxxx>
- Re: [PATCH v2 0/6] vfio: Improve DMA mapping performance for huge pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: "BillXiang" <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] memory-attribute-manager: Introduce a callback to notify the shared/private state change
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 15/18] x86: pmu: Adjust lower boundary of llc-misses event to 0 for legacy CPUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Introduce CET supervisor state support
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 04/18] x86: pmu: Align fields in pmu_counter_t to better pack the struct
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH 10/10] KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/10] KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/10] KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/10] KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/10] KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/10] KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/10] KVM: SVM: Terminate the VM if a SEV-ES+ guest is run with an invalid VMSA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/10] KVM: SVM: Save host DR masks but NOT DRs on CPUs with DebugSwap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 9/9] KVM: selftests: Add a basic SEV-SNP smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/6] vfio/type1: Use consistent types for page counts
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH kvmtool v3] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/27] Enable FRED with KVM VMX
- From: Xin Li <xin@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/6] x86: LA57 canonical testcases
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH kvmtool v3] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
- From: Cyril Bur <cyrilbur@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 4/6] vfio/type1: Use consistent types for page counts
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v2 4/6] vfio/type1: Use consistent types for page counts
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 5/6] mm: Provide address mask in struct follow_pfnmap_args
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 0/6] vfio: Improve DMA mapping performance for huge pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 3/6] vfio/type1: Use vfio_batch for vaddr_get_pfns()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 2/6] vfio/type1: Convert all vaddr_get_pfns() callers to use vfio_batch
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 1/6] vfio/type1: Catch zero from pin_user_pages_remote()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v10 11/11] arm64: support cpuidle-haltpoll
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 06/11] ACPI: processor_idle: Support polling state for LPI
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 05/11] arm64: add support for poll_idle()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 04/11] arm64: define TIF_POLLING_NRFLAG
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 10/11] arm64: idle: export arch_cpu_idle()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 03/11] Kconfig: move ARCH_HAS_OPTIMIZED_POLL to arch/Kconfig
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 09/11] cpuidle-haltpoll: condition on ARCH_CPUIDLE_HALTPOLL
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 08/11] governors/haltpoll: drop kvm_para_available() check
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 07/11] cpuidle-haltpoll: define arch_haltpoll_want()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 02/11] cpuidle: rename ARCH_HAS_CPU_RELAX to ARCH_HAS_OPTIMIZED_POLL
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 00/11] arm64: support poll_idle()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- [PATCH v10 01/11] cpuidle/poll_state: poll via smp_cond_load_relaxed_timewait()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool v2] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
- From: Cyril Bur <cyrilbur@xxxxxxxxxxxxxxx>
- [RFC PATCH 3/3] sched,x86: Make the scheduler guest unhalted aware
- From: Fernand Sieber <sieberf@xxxxxxxxxx>
- [PATCH AUTOSEL 6.12 25/31] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [RFC PATCH 1/3] fs/proc: Add gtime halted to proc/<pid>/stat
- From: Fernand Sieber <sieberf@xxxxxxxxxx>
- [RFC PATCH 2/3] kvm/x86: Add support for gtime halted
- From: Fernand Sieber <sieberf@xxxxxxxxxx>
- [RFC PATCH 0/3] kvm,sched: Add gtime halted
- From: Fernand Sieber <sieberf@xxxxxxxxxx>
- [PATCH AUTOSEL 6.13 25/31] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH vhost] vdpa/mlx5: Fix oversized null mkey longer than 32bit
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v7 05/52] i386/tdx: Get tdx_capabilities via KVM_TDX_CAPABILITIES
- From: Francesco Lavra <francescolavra.fl@xxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v4 09/10] KVM: arm64: Enable mapping guest_memfd in arm64
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 05/10] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 07/10] KVM: arm64: Refactor user_mem_abort() calculation of force_pte
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 04/10] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 03/10] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 02/10] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 10/10] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 01/10] mm: Consolidate freeing of typed folios on final folio_put()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 08/10] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 00/10] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v4 06/10] KVM: x86: Mark KVM_X86_SW_PROTECTED_VM as supporting guest_memfd shared memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: async_pf: remove support for KVM_ASYNC_PF_SEND_ALWAYS
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] s390/vfio-*: make mdev_types unlike a fake flex array
- From: Vasily Gorbik <gor@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 05/18] x86: pmu: Enlarge cnt[] length to 48 in check_counters_many()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH final?] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: async_pf: remove support for KVM_ASYNC_PF_SEND_ALWAYS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 07/18] x86: pmu: Fix potential out of bound access for fixed events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH final?] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] KVM: PPC: Enable CAP_SPAPR_TCE_VFIO on pSeries KVM guests
- From: Amit Machhiwal <amachhiw@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [RFC PATCH v2 19/22] RFC: pci: Add BUS_NOTIFY_PCI_BUS_MASTER event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 17/22] resource: Mark encrypted MMIO resource on validation
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 20/22] sev-guest: Stop changing encrypted page state for TDISP devices
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 15/22] KVM: X86: Handle private MMIO as shared
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 22/22] pci: Define pci_iomap_range_encrypted
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 16/22] coco/tsm: Add tsm-guest module
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 21/22] pci: Allow encrypted MMIO mapping via sysfs
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 18/22] coco/sev-guest: Implement the guest support for SEV TIO
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 13/22] iommufd: amd-iommu: Add vdevice support
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 14/22] iommufd: Add TIO calls
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 11/22] KVM: SEV: Add TIO VMGEXIT
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 08/22] pci/tsm: Add PCI driver for TSM
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH final?] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 09/22] crypto/ccp: Implement SEV TIO firmware interface
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 10/22] KVM: SVM: Add uAPI to change RMP for MMIO
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 06/22] KVM: X86: Define tsm_get_vmid
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 05/22] crypto: ccp: Enable SEV-TIO feature in the PSP when supported
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 03/22] PCI/IDE: Init IDs on all IDE streams beforehand
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 04/22] iommu/amd: Report SEV-TIO support
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 02/22] PCI/IDE: Fixes to make it work on AMD SNP-SEV
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 01/22] pci/doe: Define protocol types and make those public
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- RE: [PATCH 3/3] migration: adapt to new migration configuration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2 2/6] memory: Change memory_region_set_ram_discard_manager() to return the result
- From: David Hildenbrand <david@xxxxxxxxxx>
- RE: [PATCH 1/3] migration: update BAR space size
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 17/18] x86: pmu: Adjust lower boundary of branch-misses event
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] memory: Change memory_region_set_ram_discard_manager() to return the result
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [kvm-unit-tests patch v6 13/18] x86: pmu: Improve instruction and branches events verification
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 08/18] x86: pmu: Fix cycles event validation failure
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 07/18] x86: pmu: Fix potential out of bound access for fixed events
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 05/18] x86: pmu: Enlarge cnt[] length to 48 in check_counters_many()
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] memory-attribute-manager: Introduce a callback to notify the shared/private state change
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 5/6] memory: Attach MemoryAttributeManager to guest_memfd-backed RAMBlocks
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 2/6] memory: Change memory_region_set_ram_discard_manager() to return the result
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v3 4/5] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [kvm-unit-tests patch v6 04/18] x86: pmu: Fix the issue that pmu_counter_t.config crosses cache line
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [Invitation] bi-weekly guest_memfd upstream call on 2025-02-20
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH vhost] vdpa/mlx5: Fix oversized null mkey longer than 32bit
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v3 5/5] KVM: SVM: Enable Secure TSC for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v3 3/5] KVM: SVM: Add GUEST_TSC_FREQ MSR for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [no subject]
- [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: 项文成 <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] crypto: ccp: Add missing member in SNP_LAUNCH_START command structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH] riscv: KVM: Remove unnecessary vcpu kick
- From: BillXiang <xiangwencheng@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] migration: adapt to new migration configuration
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 2/3] migration: qm updates BAR configuration
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 1/3] migration: update BAR space size
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 0/3] update live migration configuration region
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 5/5] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: "Yosry Ahmed" <yosry.ahmed@xxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [RFC PATCH v4 1/3] mm/filemap: add mempolicy support to the filemap layer
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH vhost] vdpa/mlx5: Fix oversized null mkey longer than 32bit
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- Re: [PATCH 5/5] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 16/20] cpus: Restrict cpu_common_post_load() code to TCG
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH v3 2/5] crypto: ccp: Add missing member in SNP_LAUNCH_START command structure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 4/5] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 5/5] KVM: SVM: Enable Secure TSC for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 3/5] KVM: SVM: Add GUEST_TSC_FREQ MSR for Secure TSC enabled guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 16/20] cpus: Restrict cpu_common_post_load() code to TCG
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Bounce probe for kvm@xxxxxxxxxxxxxxx (no action required)
- From: kvm+owner@xxxxxxxxxxxxxxx
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 2/2] KVM: s390: Don't use %pK through debug printing
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- [PATCH 1/2] KVM: s390: Don't use %pK through tracepoints
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- [PATCH 0/2] KVM: s390: Don't use %pK through debug printing or tracepoints
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: async_pf: remove support for KVM_ASYNC_PF_SEND_ALWAYS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [RFC] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 5/5] riscv: KVM: Fix SBI sleep_type use
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] riscv: KVM: Fix SBI TIME error generation
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] riscv: KVM: Fix SBI IPI error generation
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] riscv: KVM: Fix hart suspend_type use
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] riscv: KVM: Fix hart suspend status check
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH v3 4/5] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v3 3/5] KVM: SVM: Add GUEST_TSC_FREQ MSR for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v3 1/5] x86/cpufeatures: Add SNP Secure TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v3 5/5] KVM: SVM: Enable Secure TSC for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v3 2/5] crypto: ccp: Add missing member in SNP_LAUNCH_START command structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v3 0/5] Enable Secure TSC for SEV-SNP
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH 2/2] s390/vfio-ccw: make mdev_types not look like a fake flex array
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- [PATCH 0/2] s390/vfio-*: make mdev_types unlike a fake flex array
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- [PATCH 1/2] s390/vfio-ap: make mdev_types not look like a fake flex array
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 01/11] mm: Consolidate freeing of typed folios on final folio_put()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH 1/2] KVM: TDX: Handle SEPT zap error due to page add error in premap
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/2] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/2] two KVM MMU fixes for TDX
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 5/5] riscv: KVM: Fix SBI sleep_type use
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 4/5] riscv: KVM: Fix SBI TIME error generation
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 2/5] riscv: KVM: Fix hart suspend_type use
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 3/5] riscv: KVM: Fix SBI IPI error generation
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 1/5] riscv: KVM: Fix hart suspend status check
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 0/5] riscv: KVM: Fix a few SBI issues
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] RAMBlock: Make guest_memfd require coordinate discard
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v2 2/6] memory: Change memory_region_set_ram_discard_manager() to return the result
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v2 5/6] memory: Attach MemoryAttributeManager to guest_memfd-backed RAMBlocks
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v2 4/6] memory-attribute-manager: Introduce a callback to notify the shared/private state change
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v2 3/6] memory-attribute-manager: Introduce MemoryAttributeManager to manage RAMBLock with guest_memfd
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v2 1/6] memory: Export a helper to get intersection of a MemoryRegionSection with a given range
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v2 0/6] Enable shared device assignment
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH] MIPS: Don't use %pK through printk
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH v6 0/3] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v2] KVM: PPC: Enable CAP_SPAPR_TCE_VFIO on pSeries KVM guests
- From: "Ritesh Harjani (IBM)" <ritesh.list@xxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next] tun: Pad virtio headers
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [GIT PULL] KVM fixes for Linux 6.14-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [Bug 219787] New: Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH V2 01/12] x86/virt/tdx: Make tdh_vp_enter() noinstr
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Bug 219787] Guest's applications crash with EXCEPTION_SINGLE_STEP (0x80000004)
- From: bugzilla-daemon@xxxxxxxxxx
- [GIT PULL] KVM fixes for Linux 6.14-rc3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 5/5] iommufd/selftest: Add coverage for reporting max_pasid_log2 via IOMMU_HW_INFO
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 4/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 3/5] vfio: VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT support pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 2/5] vfio-iommufd: Support pasid [at|de]tach for physical VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 1/5] ida: Add ida_find_first_range()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 0/5] vfio-pci support pasid attach/detach
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 14/14] KVM: arm64: Document NV caps and vcpu flags
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/14] KVM: arm64: Advertise FEAT_ECV when possible
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/14] KVM: arm64: Allow userspace to limit NV support to nVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 09/14] KVM: arm64: Move NV-specific capping to idreg sanitisation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/14] KVM: arm64: Enforce NV limits on a per-idregs basis
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/14] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/14] KVM: arm64: Make ID_AA64MMFR4_EL1.NV_frac writable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/14] KVM: arm64: Advertise NV2 in the boot messages
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/14] KVM: arm64: Make ID_REG_LIMIT_FIELD_ENUM() more widely available
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/14] KVM: arm64: Consolidate idreg reset method
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/14] arm64: cpufeature: Handle NV_frac as a synonym of NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/14] KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/14] KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/14] KVM: arm64: Mark HCR.EL2.{NV*,AT} RES0 when ID_AA64MMFR4_EL1.NV_frac is 0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/14] KVM: arm64: NV userspace ABI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [no subject]
- [PATCH 14/14] KVM: arm64: nv: Plumb TLBI S1E2 into system instruction dispatch
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/14] KVM: arm64: nv: Add S1 TLB invalidation primitive for VNCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/14] KVM: arm64: nv: Handle VNCR_EL2 invalidation from MMU notifiers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/14] KVM: arm64: nv: Handle mapping of VNCR_EL2 at EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/14] KVM: arm64: nv: Program host's VNCR_EL2 to the fixmap address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/14] KVM: arm64: nv: Don't adjust PSTATE.M when L2 is nesting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/14] KVM: arm64: nv: Add userspace and guest handling of VNCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 09/14] KVM: arm64: nv: Handle VNCR_EL2-triggered faults
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/14] KVM: arm64: nv: Move TLBI range decoding to a helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/14] KVM: arm64: nv: Add pseudo-TLB backing VNCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/14] KVM: arm64: nv: Snapshot S1 ASID tagging information during walk
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/14] KVM: arm64: Recursive NV support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/14] KVM: arm64: nv: Allocate VNCR page when required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/14] KVM: arm64: nv: Extract translation helper from the AT code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/14] arm64: sysreg: Add layout for VNCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [Patch net 2/2] vsock/virtio: Don't reset the created SOCKET during suspend to ram
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH net-next v2] tun: Pad virtio headers
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH net-next] tun: Pad virtio headers
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [Patch net v3] vsock/virtio: fix variables initialization during resuming
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [kvm-unit-tests PATCH v7 14/18] x86: pmu: Improve LLC misses event verification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 13/18] x86: pmu: Improve instruction and branches events verification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 18/18] x86: pmu: Optimize emulated instruction validation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 09/18] x86: pmu: Use macro to replace hard-coded branches event index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 17/18] x86: pmu: Adjust lower boundary of branch-misses event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 16/18] x86: pmu: Add IBPB indirect jump asm blob
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 08/18] x86: pmu: Fix cycles event validation failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 15/18] x86: pmu: Adjust lower boundary of llc-misses event to 0 for legacy CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 12/18] x86: pmu: Enable and disable PMCs in loop() asm blob
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 11/18] x86: pmu: Use macro to replace hard-coded instructions event index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 10/18] x86: pmu: Use macro to replace hard-coded ref-cycles event index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 03/18] x86: pmu: Refine fixed_events[] names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 07/18] x86: pmu: Fix potential out of bound access for fixed events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 06/18] x86: pmu: Print measured event count if test fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 05/18] x86: pmu: Enlarge cnt[] length to 48 in check_counters_many()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 04/18] x86: pmu: Align fields in pmu_counter_t to better pack the struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 02/18] x86: pmu: Remove blank line and redundant space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 01/18] x86: pmu: Remove duplicate code in pmu_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 00/18] x86/pmu: Fixes and improvements
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 6/6] nVMX: add a test for canonical checks of various host state vmcs12 fields.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/6] x86: Add testcases for writing (non)canonical LA57 values to MSRs and bases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/6] x86: Expand LA57 test to 64-bit mode (to prep for canonical testing)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/6] x86: Move struct invpcid_desc descriptor to processor.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/6] x86: Add a few functions for gdt manipulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/6] x86: Add _safe() and _fep_safe() variants to segment base load instructions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/6] x86: LA57 canonical testcases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: Increase per-CPU stack/data area to 12KiB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: Add a macro for the size of the per-CPU stack/data area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Make per-CPU stacks page-aligned
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] x86: Bump per-CPU stack/data to 12KiB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Make set/clear_bit() atomic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: x86/xen: Consult kvm_xen_enabled when checking for Xen MSR writes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/5] KVM: x86/xen: Move kvm_xen_hvm_config field into kvm_xen
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: x86/xen: Bury xen_hvm_config behind CONFIG_KVM_XEN=y
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: x86/xen: Add an #ifdef'd helper to detect writes to Xen MSR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: x86/xen: Restrict hypercall MSR index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Assert that STI blocking isn't set after event injection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: SVM: Fix an STI shadow on VMRUN bug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Don't inject PV async #PF if SEND_ALWAYS=0 and guest state is protected
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86: Rename and invert async #PF's send_user_only flag to send_always
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Re: Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [PATCH 0/2] KVM: x86: Fix and a cleanup for async #PFs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V4] KVM: SEV: fix wrong pinning of pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Use to_kvm_sev_info() for fetching kvm_sev_info struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Only write Xen hypercall page for guest writes to MSR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] KVM: selftests: Binary stats fixes and infra updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/20] KVM: selftests: Fixes and cleanups for dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Actually emit forced emulation prefix for kvm_asm_safe_fep()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: selftests: Fix PMC checks in PMU counters test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/11] KVM: x86: pvclock fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Remove unused iommu_domain and iommu_noncoherent from kvm_arch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2] KVM:x86:Fix an interrupt injection logic error during PIC interrupt simulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: use kvfree_rcu to simplify the code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Clean up MP_STATE transitions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/cpuid: add type suffix to decimal const 48 fix building warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: x86: Hyper-V SEND_IPI fix and partial testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nSVM: Enter guest mode before initializing nested NPT MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix broken SNP support with KVM module built-in
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.14, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/5] nVMX: add a test for canonical checks of various host state vmcs12 fields.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/5] Add a test for writing canonical values to various msrs and fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] Collection of tests for canonical checks on LA57 enabled CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 17/18] x86: pmu: Adjust lower boundary of branch-misses event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 13/18] x86: pmu: Improve instruction and branches events verification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 08/18] x86: pmu: Fix cycles event validation failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 07/18] x86: pmu: Fix potential out of bound access for fixed events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests patch v6 05/18] x86: pmu: Enlarge cnt[] length to 48 in check_counters_many()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]