Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v3 1/3] kvm: Introduce kvm_total_suspend_ns().
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [bug report] KVM: x86: Unify TSC logic (sleeping in atomic?)
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Potential Denial-of-Service Vulnerability in KVM When Emulating 'hlt' Instruction in L2 Guests
- From: C CHI <chichen241@xxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: Shivaprasad G Bhat <sbhat@xxxxxxxxxxxxx>
- [PATCH v9 1/2] ppc: Enable 2nd DAWR support on Power10 PowerNV machine
- From: Shivaprasad G Bhat <sbhat@xxxxxxxxxxxxx>
- [PATCH v9 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: Shivaprasad G Bhat <sbhat@xxxxxxxxxxxxx>
- [PATCH v9 0/2] ppc: Enable 2nd DAWR support on Power10
- From: Shivaprasad G Bhat <sbhat@xxxxxxxxxxxxx>
- Re: [linux-next:master] [KVM] 7803339fa9: kernel-selftests.kvm.pmu_counters_test.fail
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [GIT PULL] KVM: x86: VMX change for 6.14
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: SVM changes for 6.14
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Selftests changes for 6.14
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: vcpu_array fixes and cleanups for 6.14
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: Misc/main changes 6.14
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: MMU changes for 6.15
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: Memslots hardening/cleanups for 6.14
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM x86 pull requests for 6.14
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepoints
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/14] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: "Leon Romanovsky" <leon@xxxxxxxxxx>
- Re: [PATCH v6 3/5] vfio: VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT support pasid
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 2/5] vfio-iommufd: Support pasid [at|de]tach for physical VFIO devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH RFCv2 07/13] iommufd: Implement sw_msi support natively
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH 06/22] exec/cpu: Call cpu_remove_sync() once in cpu_common_unrealize()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH 06/22] exec/cpu: Call cpu_remove_sync() once in cpu_common_unrealize()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in kvm_put_kvm (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v16 12/13] x86/tsc: Switch to native sched clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 02/29] x86: Create CONFIG_MITIGATION_ADDRESS_SPACE_ISOLATION
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v16 12/13] x86/tsc: Switch to native sched clock
- From: Borislav Petkov <bp@xxxxxxxxx>
- [no subject]
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: Potential Denial-of-Service Vulnerability in KVM When Emulating 'hlt' Instruction in L2 Guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 13/14] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 13/14] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH RFC v2 01/29] mm: asi: Make some utility functions noinstr compatible
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC v2 01/29] mm: asi: Make some utility functions noinstr compatible
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [PATCH net v3 0/9] tun: Unify vnet implementation
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH v2 04/15] KVM: s390: fake memslot for ucontrol VMs
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/15] KVM: s390: fake memslot for ucontrol VMs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/15] KVM: Do not restrict the size of KVM-internal memory regions
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2 15/15] KVM: s390: remove the last user of page->index
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 09/15] KVM: s390: move some gmap shadowing functions away from mm/gmap.c
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 14/15] KVM: s390: move PGSTE softbits
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 13/15] KVM: s390: remove useless page->index usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 11/15] KVM: s390: stop using lists to keep track of used dat tables
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 03/15] KVM: s390: move pv gmap functions into kvm
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 10/15] KVM: s390: stop using page->index for non-shadow gmaps
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 06/15] KVM: s390: use __kvm_faultin_pfn()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 12/15] KVM: s390: move gmap_shadow_pgt_lookup() into kvm
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 05/15] KVM: s390: selftests: fix ucontrol memory region test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 07/15] KVM: s390: get rid of gmap_fault()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 00/15] KVM: s390: Stop using page->index and other things
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 02/15] KVM: s390: wrapper for KVM_BUG
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 04/15] KVM: s390: fake memslot for ucontrol VMs
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 01/15] KVM: Do not restrict the size of KVM-internal memory regions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2 08/15] KVM: s390: get rid of gmap_translate()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] KVM: TDX SEPT SEAMCALL retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm_config: add CONFIG_VIRTIO_FS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v2 01/29] mm: asi: Make some utility functions noinstr compatible
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] kvm_config: add CONFIG_VIRTIO_FS
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH] kvm_config: add CONFIG_VIRTIO_FS
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [PATCH kvmtool] kvmtool: virtio: fix endian for big endian hosts
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v6 56/60] i386/tdx: Don't treat SYSCALL as unavailable
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH net v3 0/9] tun: Unify vnet implementation
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH net v3 9/9] tap: Use tun's vnet-related code
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 8/9] tap: Keep hdr_len in tap_get_user()
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 7/9] tap: Avoid double-tracking iov_iter length changes
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 6/9] tun: Extract the vnet handling code
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 5/9] tun: Decouple vnet handling
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 4/9] tun: Decouple vnet from tun_struct
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 3/9] tun: Keep hdr_len in tun_get_user()
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 2/9] tun: Avoid double-tracking iov_iter length changes
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 1/9] tun: Refactor CONFIG_TUN_VNET_CROSS_LE
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net v3 0/9] tun: Unify vnet implementation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH 5/7] fixup! KVM: TDX: Implement hooks to propagate changes of TDP MMU mirror page table
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 3/3] tun: Set num_buffers for virtio 1.0
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 8/9] KVM: selftests: Add infrastructure for getting vCPU binary stats
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [PATCH] KVM: nVMX: Always use TLB_FLUSH_GUEST for nested VM-Enter/VM-Exit
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tun: Set num_buffers for virtio 1.0
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH 1/3] vhost-scsi: Avoid accessing a freed vs_tpg when no tpgs are found
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: TDX SEPT SEAMCALL retry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH RFC v2 01/29] mm: asi: Make some utility functions noinstr compatible
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [tip: sched/core] sched/clock/x86: Mark sched_clock() noinstr
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 1/3] kvm: Introduce kvm_total_suspend_ns().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v16 12/13] x86/tsc: Switch to native sched clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/14] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 00/14] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/14] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v2 03/17] arm64: sysreg: Add layout for ICH_MISR_EL2
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2 02/17] arm64: sysreg: Add layout for ICH_VTR_EL2
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2 01/17] arm64: sysreg: Add layout for ICH_HCR_EL2
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH v2 7/9] RISC-V: KVM: Use the new gpa range validate helper function
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 9/9] RISC-V: KVM: Upgrade the supported SBI version to 3.0
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 8/9] RISC-V: KVM: Implement get event info function
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 6/9] KVM: Add a helper function to validate vcpu gpa range
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 5/9] drivers/perf: riscv: Export PMU event info function
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 3/9] RISC-V: KVM: Add support for Raw event v2
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 4/9] drivers/perf: riscv: Implement PMU event info function
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 1/9] drivers/perf: riscv: Add SBI v3.0 flag
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 2/9] drivers/perf: riscv: Add raw event v2 support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 0/9] Add SBI v3.0 PMU enhancements
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PULL 36/48] acpi/ghes: better name GHES memory error function
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3 12/14] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: TDX SEPT SEAMCALL retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 00/14] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 04/14] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v3 14/14] x86/virt/tdx: Add tdx_guest_keyid_alloc/free() to alloc and free TDX guest KeyID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 12/14] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 13/14] x86/virt/tdx: Read essential global metadata for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 11/14] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 10/14] x86/virt/tdx: Add SEAMCALL wrappers to remove a TD private page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 09/14] x86/virt/tdx: Add SEAMCALL wrappers to manage TDX TLB tracking
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 08/14] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 07/14] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_sept_add() to add SEPT pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 06/14] x86/virt/tdx: Add SEAMCALL wrappers for TDX flush operations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 04/14] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 05/14] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 02/14] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 03/14] x86/virt/tdx: Add SEAMCALL wrappers for TDX vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 01/14] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/14] x86/virt/tdx: Add SEAMCALL wrappers for KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvmtool] kvmtool: virtio: fix endian for big endian hosts
- From: Ben Dooks <ben.dooks@xxxxxxxxxxxxxxx>
- [PATCH v2 5/6] powerpc/book3s-hv-pmu: Implement GSB message-ops for hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2 6/6] kvm powerpc/book3s-hv-pmu: Add perf-events for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2 2/6] kvm powerpc/book3s-apiv2: Add support for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2 3/6] kvm powerpc/book3s-apiv2: Add kunit tests for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2 0/5] kvm powerpc/book3s-hv: Expose Hostwide counters as perf-events
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2 1/6] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH kvmtool] kvmtool: virtio: fix endian for big endian hosts
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 04/13] KVM: s390: move pv gmap functions into kvm
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 5/5] riscv: sbi: Add SSE extension tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 04/13] KVM: s390: move pv gmap functions into kvm
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/2] riscv: Add tests for SBI FWFT extension
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v6 00/16] Prepare GHES driver to support error injection
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v7 10/16] acpi/ghes: better name GHES memory error function
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v7 00/16] Prepare GHES driver to support error injection
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 0/7] Enable shared device assignment
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 04/13] KVM: s390: move pv gmap functions into kvm
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v1 13/13] KVM: s390: remove the last user of page->index
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v1 13/13] KVM: s390: remove the last user of page->index
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 4/5] riscv: lib: Add SBI SSE extension definitions
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 2/5] riscv: use asm-offsets to generate SBI_EXT_HSM values
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v1 07/13] KVM: s390: move some gmap shadowing functions away from mm/gmap.c
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 07/18] KVM: TDX: Implement callbacks for MSR operations
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 00/16] Prepare GHES driver to support error injection
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v6 5/5] iommufd/selftest: Add coverage for reporting max_pasid_log2 via IOMMU_HW_INFO
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH kvmtool] kvmtool: virtio: fix endian for big endian hosts
- From: Ben Dooks <ben.dooks@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 07/13] KVM: s390: move some gmap shadowing functions away from mm/gmap.c
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v1 09/13] KVM: s390: stop using lists to keep track of used dat tables
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v1 07/13] KVM: s390: move some gmap shadowing functions away from mm/gmap.c
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Simona Vetter <simona.vetter@xxxxxxxx>
- Re: [PATCH v7 RESEND 0/5] i386: Support SMP Cache Topology
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v5 05/17] dma-mapping: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- RE: [PATCH v6 5/5] iommufd/selftest: Add coverage for reporting max_pasid_log2 via IOMMU_HW_INFO
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 4/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 3/5] vfio: VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT support pasid
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 11/18] KVM: TDX: Add methods to ignore accesses to CPU state
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v5 05/17] dma-mapping: Provide an interface to allow allocate IOVA
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 3/3] tun: Set num_buffers for virtio 1.0
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Return -EBUSY when tdh_mem_page_add() encounters TDX_OPERAND_BUSY
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/mmu: Return RET_PF* instead of 1 in kvm_mmu_page_fault()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH RFCv2 07/13] iommufd: Implement sw_msi support natively
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 0/7] Enable shared device assignment
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Use str_enabled_disabled() helper in svm_hardware_setup()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/5] KVM: kvm_set_memory_region() cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v3 18/58] KVM: x86/pmu: Introduce enable_passthrough_pmu module parameter
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [linux-next:master] [KVM] 7803339fa9: kernel-selftests.kvm.pmu_counters_test.fail
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [GIT PULL] LoongArch KVM changes for v6.14
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 11/13] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 0/5] vfio-pci support pasid attach/detach
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 10/21] dt-bindings: riscv: add Smcntrpmf ISA extension description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v2 08/21] dt-bindings: riscv: add Ssccfg ISA extension description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v2 04/21] dt-bindings: riscv: add Sxcsrind ISA extension description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v6 0/5] vfio-pci support pasid attach/detach
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v6 0/5] vfio-pci support pasid attach/detach
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC PATCH v3 18/58] KVM: x86/pmu: Introduce enable_passthrough_pmu module parameter
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 08/13] x86/virt/tdx: Add SEAMCALL wrappers to add TD private pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- [PATCH v2 21/21] Sync empty-pmu-events.c with autogenerated one
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 20/21] tools/perf: Pass the Counter constraint values in the pmu events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 19/21] tools/perf: Support event code for arch standard events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 18/21] RISC-V: perf: Add Qemu virt machine events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 17/21] RISC-V: perf: Add legacy event encodings via sysfs
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 16/21] RISC-V: perf: Use config2/vendor table for event to counter mapping
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 15/21] RISC-V: perf: Skip PMU SBI extension when not implemented
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 14/21] RISC-V: perf: Implement supervisor counter delegation support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 13/21] RISC-V: perf: Add a mechanism to defined legacy event encoding
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 12/21] RISC-V: perf: Modify the counter discovery mechanism
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 11/21] RISC-V: perf: Restructure the SBI PMU code
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 10/21] dt-bindings: riscv: add Smcntrpmf ISA extension description
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 09/21] RISC-V: Add Smcntrpmf extension parsing
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 08/21] dt-bindings: riscv: add Ssccfg ISA extension description
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 07/21] RISC-V: Add Ssccfg ISA extension definition and parsing
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 06/21] RISC-V: Add Sscfg extension CSR definition
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 05/21] RISC-V: Define indirect CSR access helpers
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 04/21] dt-bindings: riscv: add Sxcsrind ISA extension description
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 01/21] perf pmu-events: Add functions in jevent.py to parse counter and event info for hardware aware grouping
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 03/21] RISC-V: Add Sxcsrind ISA extension definition and parsing
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 02/21] RISC-V: Add Sxcsrind ISA extension CSR definitions
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 00/21] Add Counter delegation ISA extension support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: TDX SEPT SEAMCALL retry
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/mmu: Return RET_PF* instead of 1 in kvm_mmu_page_fault()
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Return -EBUSY when tdh_mem_page_add() encounters TDX_OPERAND_BUSY
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 11/13] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 11/13] x86/virt/tdx: Add SEAMCALL wrappers for TD measurement of initial contents
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 25/30] context_tracking,x86: Defer kernel text patching IPIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 26/30] x86,tlb: Make __flush_tlb_global() noinstr-compliant
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 25/30] context_tracking,x86: Defer kernel text patching IPIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 27/30] x86/tlb: Make __flush_tlb_local() noinstr-compliant
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 18/30] x86/kvm/vmx: Mark vmx_l1d_should flush and vmx_l1d_flush_cond keys as allowed in .noinstr
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 25/30] context_tracking,x86: Defer kernel text patching IPIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v5 05/17] dma-mapping: Provide an interface to allow allocate IOVA
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [linux-next:master] [KVM] 7803339fa9: kernel-selftests.kvm.pmu_counters_test.fail
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 10/30] riscv/paravirt: Mark pv_steal_clock static call as __ro_after_init
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH] kvm: defer huge page recovery vhost task to later
- From: Keith Busch <kbusch@xxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v4 28/30] x86/tlb: Make __flush_tlb_all() noinstr
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 30/30] context-tracking: Add a Kconfig to enable IPI deferral for NO_HZ_IDLE
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 27/30] x86/tlb: Make __flush_tlb_local() noinstr-compliant
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 26/30] x86,tlb: Make __flush_tlb_global() noinstr-compliant
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 25/30] context_tracking,x86: Defer kernel text patching IPIs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 22/30] context_tracking: Exit CT_STATE_IDLE upon irq/nmi entry
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 24/30] context-tracking: Introduce work deferral infrastructure
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 20/30] objtool: Add noinstr validation for static branches/calls
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 23/30] context_tracking: Turn CT_STATE_* into bits
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 19/30] stackleack: Mark stack_erasing_bypass key as allowed in .noinstr
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 21/30] context_tracking: Explicitely use CT_STATE_KERNEL where it is missing
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 17/30] sched/clock, x86: Mark __sched_clock_stable key as allowed in .noinstr
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 18/30] x86/kvm/vmx: Mark vmx_l1d_should flush and vmx_l1d_flush_cond keys as allowed in .noinstr
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 14/30] perf/x86/amd: Mark perf_lopwr_cb static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 16/30] x86/speculation/mds: Mark mds_idle_clear key as allowed in .noinstr
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 15/30] sched/clock: Mark sched_clock_running key as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 13/30] arm/paravirt: Mark pv_steal_clock static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 12/30] arm64/paravirt: Mark pv_steal_clock static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 11/30] loongarch/paravirt: Mark pv_steal_clock static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 10/30] riscv/paravirt: Mark pv_steal_clock static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 09/30] x86/paravirt: Mark pv_steal_clock static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 08/30] x86/idle: Mark x86_idle static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v1 03/13] KVM: s390: use __kvm_faultin_pfn()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v4 07/30] x86/paravirt: Mark pv_sched_clock static call as __ro_after_init
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 06/30] static_call: Add read-only-after-init static calls
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 05/30] jump_label: Add annotations for validating noinstr usage
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 04/30] rcutorture: Make TREE04 use CONFIG_RCU_DYNTICKS_TORTURE
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 03/30] rcu: Add a small-width RCU watching counter debug option
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 02/30] objtool: Flesh out warning related to pv_ops[] calls
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 01/30] objtool: Make validate_call() recognize indirect calls to pv_ops[]
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [PATCH v4 00/30] context_tracking,x86: Defer some IPIs until a user->kernel transition
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH v1 03/13] KVM: s390: use __kvm_faultin_pfn()
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: Bail from the dirty ring reset flow if a signal is pending
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v2 2/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] selftests/rseq: Fix rseq for cases without glibc support
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: guest_memfd: use filemap_grab_folios in write
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] mm: filemap: add filemap_grab_folios
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Simona Vetter <simona.vetter@xxxxxxxx>
- Re: [PATCH] selftests/rseq: Fix rseq for cases without glibc support
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Poisoned memory recovery on reboot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 3/6] accel/kvm: Report the loss of a large memory page
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 6/6] hostmem: Handle remapping of RAM
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 2/6] system/physmem: poisoned memory discard on reboot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] selftests/rseq: Fix rseq for cases without glibc support
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] system/physmem: handle hugetlb correctly in qemu_ram_remap()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 7/7] system/physmem: Memory settings applied on remap notification
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 2/7] system/physmem: poisoned memory discard on reboot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 0/5] vfio-pci support pasid attach/detach
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 1/7] hwpoison_page_list and qemu_ram_remap are based on pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 34/60] i386/tdx: implement tdx_cpu_realizefn()
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v6 55/60] i386/tdx: Fetch and validate CPUID of TD guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 41/60] hw/i386: add option to forcibly report edge trigger in acpi tables
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 36/60] i386/tdx: Force exposing CPUID 0x1f
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 35/60] i386/cpu: Introduce enable_cpuid_0x1f to force exposing CPUID 0x1f
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/5] riscv: sbi: Add SSE extension tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH net v2 0/5] vsock: some fixes due to transport de-assignment
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH 0/2] KVM: arm64: nv: Fix sysreg RESx-ication
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: arm64: nv: Fix sysreg RESx-ication
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v1 0/4] KVM: s390: vsie: vsie page handling fixes + rework
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Makefile: add portable mode
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v1 0/4] KVM: s390: vsie: vsie page handling fixes + rework
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v6 34/60] i386/tdx: implement tdx_cpu_realizefn()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: 张浩然 <wh1sper@xxxxxxxxxx>
- Re: [PATCH v5 00/17] Provide a new two step DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] KVM: Check for empty mask of harvested dirty ring entries in caller
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Conditionally reschedule when resetting the dirty ring
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: 张浩然 <wh1sper@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: Bail from the dirty ring reset flow if a signal is pending
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: liulongfang <liulongfang@xxxxxxxxxx>
- [linux-next:master] [KVM] 7803339fa9: kernel-selftests.kvm.pmu_counters_test.fail
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: Lei Yang <leiyang@xxxxxxxxxx>
- Re: [PATCH v2 0/5] KVM: kvm_set_memory_region() cleanups
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 6/7] RAMBlock: make guest_memfd require coordinate discard
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] pci: account for sysfs-disabled reset in pci_{slot,bus}_resettable
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH] selftests/rseq: Fix rseq for cases without glibc support
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: selftests: Add CPUID tests for Hyper-V features that need in-kernel APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: selftests: Explicitly free CPUID array at end of Hyper-V CPUID test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: selftests: Manage CPUID array in Hyper-V CPUID test's core helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: selftests: Mark test_hv_cpuid_e2big() static in Hyper-V CPUID test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86: Hyper-V SEND_IPI fix and partial testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Makefile: add portable mode
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH] pci: account for sysfs-disabled reset in pci_{slot,bus}_resettable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 4/8] KVM: selftests: Introduce SEV VM type check
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v4 5/8] KVM: selftests: Add library support for interacting with SNP
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- [PATCH 2/2] KVM: x86: Clear pv_unhalted on all transitions to KVM_MP_STATE_RUNNABLE
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Introduce kvm_set_mp_state()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: Clean up MP_STATE transitions
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/5] KVM: kvm_set_memory_region() cleanups
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/5] riscv: sbi: Add SSE extension tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/5] riscv: sbi: Add SSE extension tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: Check for empty mask of harvested dirty ring entries in caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFCv2 08/13] iommu: Turn iova_cookie to dma-iommu private pointer
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Conditionally reschedule when resetting the dirty ring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] KVM: Bail from the dirty ring reset flow if a signal is pending
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Makefile: add portable mode
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Makefile: add portable mode
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 0/5] riscv: add SBI SSE extension tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Makefile: add portable mode
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC PATCH 0/2] mm: filemap: add filemap_grab_folios
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 0/5] KVM: kvm_set_memory_region() cleanups
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 6/7] RAMBlock: make guest_memfd require coordinate discard
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: David Hildenbrand <david@xxxxxxxxxx>
- [syzbot] Monthly kvm report (Jan 2025)
- From: syzbot <syzbot+lista788bc975da7a9b14bc2@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] KVM: Check for empty mask of harvested dirty ring entries in caller
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] KVM: Dirty ring fixes and cleanups
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: Bail from the dirty ring reset flow if a signal is pending
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 5/8] KVM: selftests: Add library support for interacting with SNP
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v4 4/8] KVM: selftests: Introduce SEV VM type check
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 3/5] KVM: Conditionally reschedule when resetting the dirty ring
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 1/5] KVM: Bound the number of dirty ring entries in a single reset at INT_MAX
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 1/5] KVM: Bound the number of dirty ring entries in a single reset at INT_MAX
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [sos-linux-ext-patches] [PATCH v4 1/8] KVM: SEV: Disable SEV-SNP on FW validation failure
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v2 3/3] tun: Set num_buffers for virtio 1.0
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH 7/7] fixup! KVM: TDX: Implement TDX vcpu enter/exit path
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 6/7] fixup! KVM: TDX: Implement hooks to propagate changes of TDP MMU mirror page table
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 5/7] fixup! KVM: TDX: Implement hooks to propagate changes of TDP MMU mirror page table
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 4/7] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 3/7] KVM: TDX: Retry locally in TDX EPT violation handler on RET_PF_RETRY
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/7] KVM: x86/mmu: Return RET_PF* instead of 1 in kvm_mmu_page_fault()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/7] KVM: TDX: Return -EBUSY when tdh_mem_page_add() encounters TDX_OPERAND_BUSY
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/7] KVM: TDX SEPT SEAMCALL retry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for 6.13-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: michael.christie@xxxxxxxxxx
- [PATCH v2 17/17] KVM: arm64: nv: Fail KVM init if asking for NV without GICv3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 15/17] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 16/17] KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/17] KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/17] KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 12/17] KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/17] KVM: arm64: nv: Add Maintenance Interrupt emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/17] KVM: arm64: nv: Handle L2->L1 transition on interrupt injection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/17] KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/17] KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/17] KVM: arm64: nv: Nested GICv3 emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/17] KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/17] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/17] KVM: arm64: Move host SVE/SME state flags out of vCPU
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/17] arm64: sysreg: Add layout for ICH_VTR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/17] arm64: sysreg: Add layout for ICH_MISR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/17] arm64: sysreg: Add layout for ICH_HCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/17] KVM: arm64: Add NV GICv3 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/2] KVM: arm64: nv: Fix sysreg RESx-ication
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/2] KVM: arm64: nv: Always evaluate HCR_EL2 using sanitising accessors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/2] KVM: arm64: nv: Apply RESx settings to sysreg reset values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] KVM fixes for 6.13-rc7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 5/5] KVM: e500: perform hugepage check after looking up the PFN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 4/5] KVM: e500: map readonly host pages for read
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/5] KVM: e500: track host-writability of pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/5] KVM: e500: use shadow TLB entry as witness for writability
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/5] KVM: e500: always restore irqs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: e500: map readonly host pages for read, and cleanup
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- [PATCH] KVM: allow NULL writable argument to __kvm_faultin_pfn
- From: Christian Zigotzky <chzigotzky@xxxxxxxxxxx>
- [PATCH] KVM: allow NULL writable argument to __kvm_faultin_pfn
- From: Christian Zigotzky <chzigotzky@xxxxxxxxxxx>
- [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: 张浩然 <wh1sper@xxxxxxxxxx>
- Re: [PATCH] KVM: PPC: Enable CAP_SPAPR_TCE_VFIO on pSeries KVM guests
- From: "Ritesh Harjani (IBM)" <ritesh.list@xxxxxxxxx>
- [PATCH V3] KVM: SEV: fix wrong pinning of pages
- Re: [PATCH V2] KVM: SEV: fix wrong pinning of pages
- From: Ge Yang <yangge1116@xxxxxxx>
- Re: [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: Kuan-Wei Chiu <visitorckw@xxxxxxxxx>
- [PATCH] vhost/scsi: Fix improper cleanup in vhost_scsi_set_endpoint()
- From: Haoran Zhang <wh1sper@xxxxxxxxxx>
- [PATCH RFCv2 13/13] vfio/pci: Allow preset MSI IOVAs via VFIO_IRQ_SET_ACTION_PREPARE
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 12/13] vfio-iommufd: Provide another layer of msi_iova helpers
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 11/13] iommufd/device: Allow setting IOVAs for MSI(x) vectors
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 10/13] iommufd/selftes: Add coverage for IOMMU_OPTION_SW_MSI_START/SIZE
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 07/13] iommufd: Implement sw_msi support natively
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 08/13] iommu: Turn iova_cookie to dma-iommu private pointer
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 06/13] iommufd: Make attach_handle generic
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 05/13] iommu: Turn fault_data to iommufd private pointer
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 03/13] iommu: Make iommu_dma_prepare_msi() into a generic operation
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 04/13] irqchip: Have CONFIG_IRQ_MSI_IOMMU be selected by the irqchips that need it
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 02/13] genirq/msi: Rename iommu_dma_compose_msi_msg() to msi_msg_set_msi_addr()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 01/13] genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH RFCv2 00/13] iommu: Add MSI mapping support with nested SMMU
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 0/6] Introduce CET supervisor state support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: selftests: Provide separate helper for KVM_RUN with immediate_exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: selftests: Rely on KVM_RUN_NEEDS_COMPLETION to complete userspace exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: Add a common kvm_run flag to communicate an exit needs completion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: Clear vcpu->run->flags at start of KVM_RUN for all architectures
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86: Document that KVM_EXIT_HYPERCALL requires completion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: Add a kvm_run flag to signal need for completion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: Check for empty mask of harvested dirty ring entries in caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: Use mask of harvested dirty ring entries to coalesce dirty ring resets
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: Conditionally reschedule when resetting the dirty ring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: Bail from the dirty ring reset flow if a signal is pending
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: Bound the number of dirty ring entries in a single reset at INT_MAX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: Dirty ring fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 9/9] KVM: selftests: Add compile-time assertions to guard against stats typos
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/9] KVM: selftests: Adjust number of files rlimit for all "standard" VMs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 8/9] KVM: selftests: Add infrastructure for getting vCPU binary stats
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/9] KVM: selftests: Get VM's binary stats FD when opening VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/9] KVM: selftests: Add struct and helpers to wrap binary stats cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/9] KVM: selftests: Assert that __vm_get_stat() actually finds a stat
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/9] KVM: selftests: Macrofy vm_get_stat() to auto-generate stat name string
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/9] KVM: selftests: Close VM's binary stats FD when releasing VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/9] KVM: selftests: Fix mostly theoretical leak of VM's binary stats FD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/9] KVM: selftests: Binary stats fixes and infra updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 2/2] RISC-V: KVM: Add support for SBI_FWFT_POINTER_MASKING_PMLEN
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- [RFC PATCH 1/2] RISC-V: KVM: Fix inclusion of Smnpm in the guest ISA bitmap
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- [RFC PATCH 0/2] RISC-V: KVM: Pointer Masking Support
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/20] KVM: selftests: Allow running a single iteration of dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/20] KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/20] KVM: selftests: Set per-iteration variables at the start of each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/20] KVM: selftests: Tighten checks around prev iter's last dirty page in ring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/20] KVM: selftests: Ensure guest writes min number of pages in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/20] KVM: sefltests: Verify value of dirty_log_test last page isn't bogus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/20] KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/20] KVM: selftests: Print (previous) last_page on dirty page value mismatch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/20] KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/20] KVM: selftests: Limit dirty_log_test's s390x workaround to s390x
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/20] KVM: selftests: Read per-page value into local var when verifying dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/20] KVM: selftests: Drop stale srandom() initialization from dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/20] KVM: selftests: Drop signal/kick from dirty ring testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/20] KVM: selftests: Support multiple write retires in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/20] KVM: selftests: Fixes and cleanups for dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v8 11/11] KVM: selftests: Add multi-gen LRU aging to access_tracking_perf_test
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- [PATCH v2 5/5] KVM: Disallow all flags for KVM-internal memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: x86: Drop double-underscores from __kvm_set_memory_region()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: Add a dedicated API for setting KVM-internal memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: Assert slots_lock is held when setting memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: Open code kvm_set_memory_region() into its sole caller (ioctl() API)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: kvm_set_memory_region() cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 11/11] KVM: selftests: Add multi-gen LRU aging to access_tracking_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 6/6] RISC-V: KVM: add support for SBI_FWFT_MISALIGNED_DELEG
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH 4/6] RISC-V: KVM: add support for FWFT SBI extension
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH 3/6] RISC-V: KVM: add SBI extension init()/deinit() functions
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH 2/6] riscv: request misaligned exception delegation from SBI
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH 1/6] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH v8 08/11] KVM: x86/mmu: Add infrastructure to allow walking rmaps outside of mmu_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 06/11] KVM: x86/mmu: Only check gfn age in shadow MMU if indirect_shadow_pages > 0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 05/11] KVM: x86/mmu: Rearrange kvm_{test_,}age_gfn
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net v2 5/5] vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- From: Hyunwoo Kim <v4bel@xxxxxxxxx>
- Re: [PATCH net v2 3/5] vsock/virtio: cancel close work in the destructor
- From: Hyunwoo Kim <v4bel@xxxxxxxxx>
- Re: [PATCH v8 04/11] KVM: x86/mmu: Relax locking for kvm_test_age_gfn and kvm_age_gfn
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
- From: Hyunwoo Kim <v4bel@xxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v8 03/11] KVM: x86/mmu: Factor out spte atomic bit clearing routine
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 02/11] KVM: Add lockless memslot walk to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 01/11] KVM: Remove kvm_handle_hva_range helper functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [sos-linux-ext-patches] [PATCH v4 2/8] KVM: selftests: SEV-SNP test for KVM_SEV_INIT2
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [sos-linux-ext-patches] [PATCH v4 1/8] KVM: SEV: Disable SEV-SNP on FW validation failure
- From: Pratik Rajesh Sampat <prsampat@xxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- [PATCH v5 3/6] accel/kvm: Report the loss of a large memory page
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v5 5/6] hostmem: Factor out applying settings
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v5 0/6] Poisoned memory recovery on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v5 1/6] system/physmem: handle hugetlb correctly in qemu_ram_remap()
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v5 4/6] numa: Introduce and use ram_block_notify_remap()
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v5 2/6] system/physmem: poisoned memory discard on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v5 6/6] hostmem: Handle remapping of RAM
- From: “William Roche <william.roche@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: guest_memfd: use filemap_grab_folios in write
- From: Mike Day <michael.day@xxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v4 7/7] system/physmem: Memory settings applied on remap notification
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v4 6/7] hostmem: Handle remapping of RAM
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v4 5/7] hostmem: Factor out applying settings
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v4 2/7] system/physmem: poisoned memory discard on reboot
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v4 1/7] hwpoison_page_list and qemu_ram_remap are based on pages
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v4 0/7] Poisoned memory recovery on reboot
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Simona Vetter <simona.vetter@xxxxxxxx>
- Re: [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
- From: Simona Vetter <simona.vetter@xxxxxxxx>
- [PATCH RFC v2 11/29] mm: asi: Functions to map/unmap a memory range into ASI page tables
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] mm: filemap: add filemap_grab_folios
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [PATCH RFC v2 29/29] mm: asi: Stop ignoring asi=on cmdline flag
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 18/29] mm: asi: Map dynamic percpu memory as nonsensitive
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH TEMP WORKAROUND RFC v2 15/29] mm: asi: Workaround missing partial-unmap support
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 20/29] mm: asi: Make TLB flushing correct under ASI
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 14/29] mm: asi: Map non-user buddy allocations as nonsensitive
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 17/29] mm: asi: Map vmalloc/vmap data as nonsensitive
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 10/29] mm: asi: asi_exit() on PF, skip handling if address is accessible
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 19/29] mm: asi: Stabilize CR3 in switch_mm_irqs_off()
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 25/29] mm: asi: Restricted execution fore bare-metal processes
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 24/29] mm: asi: Add infrastructure for mapping userspace addresses
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 21/29] KVM: x86: asi: Restricted address space for VM execution
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 13/29] mm: Add __PAGEFLAG_FALSE
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 05/29] mm: asi: ASI support in interrupts/exceptions
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 16/29] mm: asi: Map kernel text and static data as nonsensitive
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 09/29] mm: asi: ASI page table allocation functions
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 07/29] mm: asi: Make __get_current_cr3_fast() ASI-aware
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 08/29] mm: asi: Avoid warning from NMI userspace accesses in ASI context
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 06/29] mm: asi: Use separate PCIDs for restricted address spaces
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 03/29] mm: asi: Introduce ASI core API
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 12/29] mm: asi: Add basic infrastructure for global non-sensitive mappings
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 28/29] x86/pti: Disable PTI when ASI is on
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 27/29] mm: asi: Add some mitigations on address space transitions
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 22/29] mm: asi: exit ASI before accessing CR3 from C code where appropriate
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 26/29] x86: Create library for flushing L1D for L1TF
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 23/29] mm: asi: exit ASI before suspend-like operations
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 04/29] mm: asi: Add infrastructure for boot-time enablement
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 02/29] x86: Create CONFIG_MITIGATION_ADDRESS_SPACE_ISOLATION
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 01/29] mm: asi: Make some utility functions noinstr compatible
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- [PATCH RFC v2 00/29] Address Space Isolation (ASI)
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [PATCH v1 02/13] KVM: s390: fake memslots for ucontrol VMs
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v1 02/13] KVM: s390: fake memslots for ucontrol VMs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 02/13] KVM: s390: fake memslots for ucontrol VMs
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] mm: filemap: add filemap_grab_folios
- From: David Hildenbrand <david@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]