Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3 11/11] Remove devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 10/11] HID: amd_sfh: Use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 07/11] PCI: MSI: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 08/11] ata: Use always-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 06/11] vfio/pci: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 04/11] net/ntb: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 03/11] net/ethernet: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 05/11] misc: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 00/11] Remove implicit devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 02/11] drivers/xen: Use never-managed version of pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH v3 01/11] PCI: Prepare removing devres from pci_intx()
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH v3 13/15] context_tracking,x86: Add infrastructure to defer kernel TLBI
- From: Petr Tesarik <ptesarik@xxxxxxxx>
- Re: [RFC PATCH v3 13/15] context_tracking,x86: Add infrastructure to defer kernel TLBI
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] x86: KVM: Advertise FSRS and FSRC on AMD to userspace
- From: Maksim Davydov <davydov-max@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 13/15] context_tracking,x86: Add infrastructure to defer kernel TLBI
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v1 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 2/7] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v1 6/6] selftests: kvm: s390: Add has device attr check to uc_attr_mem_limit selftest
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 4/6] selftests: kvm: s390: Add ucontrol gis routing test
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v1 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: Support newer version of genprotimg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: Support newer version of genprotimg
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: Support newer version of genprotimg
- From: "Marc Hartmayer" <mhartmay@xxxxxxxxxxxxx>
- Re: [PATCH RFC v3 3/3] riscv: KVM: Add Svukte extension support for Guest/VM
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: Support newer version of genprotimg
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: Support newer version of genprotimg
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 3/7] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH 15/16] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 11/16] KVM: TDX: Always block INIT/SIPI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 09/16] KVM: TDX: Complete interrupts after TD exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 16/16] KVM: TDX: Handle EXIT_REASON_OTHER_SMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 08/16] KVM: TDX: Implement methods to inject NMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 14/16] KVM: VMX: Move NMI/exception handler to common helper
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 13/16] KVM: TDX: Add methods to ignore virtual apic related operation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 07/16] KVM: TDX: Wait lapic expire when timer IRQ was injected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 10/16] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 06/16] KVM: x86: Assume timer IRQ was injected if APIC state is protected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 05/16] KVM: TDX: Implement non-NMI interrupt injection
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 04/16] KVM: VMX: Move posted interrupt delivery code to common header
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 03/16] KVM: TDX: Disable PI wakeup for IPIv
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 02/16] KVM: VMX: Remove use of struct vcpu_vmx from posted_intr.c
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 01/16] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 00/16] KVM: TDX: TDX interrupts
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] hyperv: Move hv_connection_id to hyperv-tlfs.h
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Introduce new headers for Hyper-V
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- i want to learn some recent development process about kvm, not robot
- From: 李硕 <shilishuoya@xxxxxxxxx>
- i want to learn some recent development process about kvm, not robot
- From: 李硕 <shilishuoya@xxxxxxxxx>
- i want to learn some recent development process about kvm, not robot
- From: 李硕 <shilishuoya@xxxxxxxxx>
- [PATCH v2 6.1] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn()
- From: Nikolay Kuratov <kniv@xxxxxxxxxxxxxx>
- [PATCH v2 6.6 6.12] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn()
- From: Nikolay Kuratov <kniv@xxxxxxxxxxxxxx>
- Re: [PATCH 00/31] Prepare GHES driver to support error injection
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- [PATCH v6 10/16] acpi/ghes: better name GHES memory error function
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v6 00/16] Prepare GHES driver to support error injection
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/31] Prepare GHES driver to support error injection
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH, RESEND] x86/mtrr: Rename mtrr_overwrite_state() to guest_force_mtrr_state()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 00/31] Prepare GHES driver to support error injection
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH 00/31] Prepare GHES driver to support error injection
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v1 13/13] KVM: Documentation: Add KVM_CAP_USERFAULT and KVM_MEM_USERFAULT details
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 6.6] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/bugs: Don't fill RSB on context switch with eIBRS
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v1 01/13] KVM: Add KVM_MEM_USERFAULT memslot flag and bitmap
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: SVM: Provide helpers to set the error code
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Melody Wang <huibo.wang@xxxxxxx>
- [PATCH 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Melody Wang <huibo.wang@xxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH net v2 0/3] virtio/vsock: Fix memory leaks
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 10/31] acpi/ghes: better name GHES memory error function
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 00/31] Prepare GHES driver to support error injection
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH v2] Documentation: kvm: fix typo in api.rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: Hitting AUTOIBRS WARN_ON_ONCE() in init_amd() booting 32-bit kernel under KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 08/11] x86: document X86_INTEL_MID as 64-bit-only
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- RE: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 08/11] x86: document X86_INTEL_MID as 64-bit-only
- From: Ferry Toth <fntoth@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/bugs: Don't fill RSB on context switch with eIBRS
- From: "Shah, Amit" <Amit.Shah@xxxxxxx>
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- [PATCH 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 0/5] bugfix some driver issues
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH v2 16/25] KVM: TDX: Get system-wide info about TDX module on initialization
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH v3 5/5] hyperv: Remove the now unused hyperv-tlfs.h files
- From: Easwar Hariharan <eahariha@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] hyperv: Switch from hyperv-tlfs.h to hyperv/hvhdk.h
- From: Easwar Hariharan <eahariha@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] hyperv: Add new Hyper-V headers in include/hyperv
- From: Easwar Hariharan <eahariha@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [RFC PATCH v2 3/3] Documentation: kvm: new UAPI when arm64 guest consumes UER
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [RFC PATCH v2 2/3] KVM: arm64: set FnV in vcpu's ESR_ELx when host FAR_EL2 is invalid
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- [RFC PATCH v2 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- Re: [RFC PATCH v1] KVM: arm64: Introduce KVM_CAP_ARM_SIGBUS_ON_SEA
- From: Jiaqi Yan <jiaqiyan@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/bugs: Don't fill RSB on context switch with eIBRS
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v1 06/13] KVM: arm64: Add support for KVM_MEM_USERFAULT
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/bugs: Don't fill RSB on context switch with eIBRS
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v1 06/13] KVM: arm64: Add support for KVM_MEM_USERFAULT
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [GIT PULL] Please pull IOMMUFD subsystem changes
- From: pr-tracker-bot@xxxxxxxxxx
- Hitting AUTOIBRS WARN_ON_ONCE() in init_amd() booting 32-bit kernel under KVM
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH V1] vfio/mlx5: Align the page tracking max message size with the device capability
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [GIT PULL] Please pull IOMMUFD subsystem changes
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/16] KVM: arm64: nv: Shadow stage-2 page table handling
- From: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 5/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [RFC PATCH v3 13/15] context_tracking,x86: Add infrastructure to defer kernel TLBI
- From: Petr Tesarik <ptesarik@xxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 06/11] KVM: arm64: nv: Acceletate EL0 counter accesses from hypervisor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v15 08/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] s390x: Support newer version of genprotimg
- From: Marc Hartmayer <mhartmay@xxxxxxxxxxxxx>
- Re: [PATCH v1 01/13] KVM: Add KVM_MEM_USERFAULT memslot flag and bitmap
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 06/11] KVM: arm64: nv: Acceletate EL0 counter accesses from hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 18/18] vfio/mlx5: Enable the DMA link API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 16/18] vfio/mlx5: Explicitly use number of pages instead of allocated length
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 12/18] mm/hmm: provide generic DMA managing logic
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 14/18] RDMA/core: Convert UMEM ODP DMA mapping to caching IOVA and page linkage
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 17/18] vfio/mlx5: Rewrite create mkey flow to allow better code reuse
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 15/18] RDMA/umem: Separate implicit ODP initialization from explicit ODP
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 11/18] mm/hmm: let users to tag specific PFN with DMA mapped bit
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 10/18] docs: core-api: document the IOVA-based API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 13/18] RDMA/umem: Store ODP access mask information in PFN
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 05/18] dma-mapping: Add check if IOVA can be used
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 09/18] dma-mapping: add a dma_need_unmap helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 08/18] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 06/18] dma: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 07/18] iommu/dma: Factor out a iommu_dma_map_swiotlb helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 03/18] iommu: generalize the batched sync after map interface
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 04/18] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 01/18] PCI/P2PDMA: Refactor the p2pdma mapping helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 02/18] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v4 00/18] Provide a new two step DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3] KVM: make uevents configurable
- From: Bernhard Kauer <bk@xxxxxxxxx>
- [PATCH V1] vfio/mlx5: Align the page tracking max message size with the device capability
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v15 08/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 06/11] KVM: arm64: nv: Acceletate EL0 counter accesses from hypervisor context
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 01/13] KVM: Add KVM_MEM_USERFAULT memslot flag and bitmap
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH 06/11] KVM: arm64: nv: Acceletate EL0 counter accesses from hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- [no subject]
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v15 08/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH] vfio/mlx5: Align the page tracking max message size with the device capability
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH v5 10/16] acpi/ghes: better name GHES memory error function
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH 10/11] x86: remove old STA2x11 support
- From: Davide Ciminaghi <ciminaghi@xxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH 08/11] x86: document X86_INTEL_MID as 64-bit-only
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 06/11] x86: drop SWIOTLB and PHYS_ADDR_T_64BIT for PAE
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v15 08/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 16/27] KVM: VMX: Virtualize FRED nested exception tracking
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v15 02/13] x86/sev: Relocate SNP guest messaging routines to common code
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v2 0/4] RISC-V: KVM: Allow Svvptc/Zabha/Ziccrse exts for guests
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/7] iommu: Prevent pasid attach if no ops->remove_dev_pasid
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 00/11] KVM: arm64: Add NV timer support
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 06/11] KVM: arm64: nv: Acceletate EL0 counter accesses from hypervisor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 02/11] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Convert plain error code numbers to defines
- From: "Melody (Huibo) Wang" <huibo.wang@xxxxxxx>
- Re: [PATCH v1 06/13] KVM: arm64: Add support for KVM_MEM_USERFAULT
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/11] x86: split CPU selection into 32-bit and 64-bit
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v15 02/13] x86/sev: Relocate SNP guest messaging routines to common code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 08/11] x86: document X86_INTEL_MID as 64-bit-only
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 06/11] x86: drop SWIOTLB and PHYS_ADDR_T_64BIT for PAE
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v7 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/11] x86: Kconfig.cpu: split out 64-bit atom
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 06/11] x86: drop SWIOTLB and PHYS_ADDR_T_64BIT for PAE
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 1/2] vfio/pci: Enable iowrite64 and ioread64 for vfio pci
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 5/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 04/11] x86: split CPU selection into 32-bit and 64-bit
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 1/3] driver core: class: add class_pseudo_register
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH 1/3] driver core: class: add class_pseudo_register
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 13/13] KVM: Documentation: Add KVM_CAP_USERFAULT and KVM_MEM_USERFAULT details
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 12/13] KVM: selftests: Add KVM_MEM_USERFAULT + guest_memfd toggle tests
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 11/13] KVM: selftests: Inform set_memory_region_test of KVM_MEM_USERFAULT
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 10/13] KVM: selftests: Add KVM Userfault mode to demand_paging_test
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 08/13] KVM: selftests: Fix prefault_mem logic
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 09/13] KVM: selftests: Add va_start/end into uffd_desc
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 06/13] KVM: arm64: Add support for KVM_MEM_USERFAULT
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 07/13] KVM: selftests: Fix vm_mem_region_set_flags docstring
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 05/13] KVM: x86/mmu: Add support for KVM_MEM_USERFAULT
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 04/13] KVM: Advertise KVM_CAP_USERFAULT in KVM_CHECK_EXTENSION
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 02/13] KVM: Add KVM_MEMORY_EXIT_FLAG_USERFAULT
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 03/13] KVM: Allow late setting of KVM_MEM_USERFAULT on guest_memfd memslot
- From: James Houghton <jthoughton@xxxxxxxxxx>
- [PATCH v1 01/13] KVM: Add KVM_MEM_USERFAULT memslot flag and bitmap
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH 08/11] x86: document X86_INTEL_MID as 64-bit-only
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/3] driver core: class: add class_pseudo_register
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH 11/11] x86: drop 32-bit KVM host support
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 1/2] x86: KVM: Advertise FSRS and FSRC on AMD to userspace
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v5 10/16] acpi/ghes: better name GHES memory error function
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 03/11] x86: Kconfig.cpu: split out 64-bit atom
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Tor Vic <torvic9@xxxxxxxxxxx>
- Re: [PATCH 11/11] x86: drop 32-bit KVM host support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: Brian Gerst <brgerst@xxxxxxxxx>
- [PATCH v3 2/2] x86: KVM: Advertise AMD's speculation control features
- From: Maksim Davydov <davydov-max@xxxxxxxxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: Brian Gerst <brgerst@xxxxxxxxx>
- [no subject]
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH v3 1/2] x86: KVM: Advertise FSRS and FSRC on AMD to userspace
- From: Maksim Davydov <davydov-max@xxxxxxxxxxxxxx>
- [PATCH v3 0/2] x86: KVM: Add missing AMD features
- From: Maksim Davydov <davydov-max@xxxxxxxxxxxxxx>
- Re: [PATCH 03/11] x86: Kconfig.cpu: split out 64-bit atom
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 05/11] x86: remove HIGHMEM64G support
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v2 07/12] fs/proc/vmcore: factor out freeing a list of vmcore ranges
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 12/12] s390/kdump: virtio-mem kdump support (CONFIG_PROC_VMCORE_DEVICE_RAM)
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 11/12] virtio-mem: support CONFIG_PROC_VMCORE_DEVICE_RAM
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 08/12] fs/proc/vmcore: introduce PROC_VMCORE_DEVICE_RAM to detect device RAM ranges in 2nd kernel
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 10/12] virtio-mem: remember usable region size
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 09/12] virtio-mem: mark device ready before registering callbacks in kdump mode
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 06/12] fs/proc/vmcore: factor out allocating a vmcore range and adding it to a list
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 05/12] fs/proc/vmcore: move vmcore definitions out of kcore.h
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 04/12] fs/proc/vmcore: prefix all pr_* with "vmcore:"
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 03/12] fs/proc/vmcore: disallow vmcore modifications while the vmcore is open
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 02/12] fs/proc/vmcore: replace vmcoredd_mutex by vmcore_mutex
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 01/12] fs/proc/vmcore: convert vmcore_cb_lock into vmcore_mutex
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 00/12] fs/proc/vmcore: kdump support for virtio-mem on s390
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v6 7/7] iommu: Remove the remove_dev_pasid op
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 4/7] iommu/arm-smmu-v3: Make the blocked domain support PASID
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 3/7] iommu: Detaching pasid by attaching to the blocked_domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 0/7] Support attaching PASID to the blocked_domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v6 6/7] iommu/amd: Make the blocked domain support PASID
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 5/7] iommu/vt-d: Make the blocked domain support PASID
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 2/7] iommu: Consolidate the ops->remove_dev_pasid usage into a helper
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 1/7] iommu: Prevent pasid attach if no ops->remove_dev_pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 05/11] x86: remove HIGHMEM64G support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/11] x86: 32-bit cleanups
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] riscv: Remove duplicate CLINT_TIMER selections
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- [PATCH 01/11] x86/Kconfig: Geode CPU has cmpxchg8b
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 02/11] x86: drop 32-bit "bigsmp" machine support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 11/11] x86: drop 32-bit KVM host support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 10/11] x86: remove old STA2x11 support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 08/11] x86: document X86_INTEL_MID as 64-bit-only
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 07/11] x86: drop support for CONFIG_HIGHPTE
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 06/11] x86: drop SWIOTLB and PHYS_ADDR_T_64BIT for PAE
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 04/11] x86: split CPU selection into 32-bit and 64-bit
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 03/11] x86: Kconfig.cpu: split out 64-bit atom
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] driver core: class: add class_pseudo_register
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH v5 10/16] acpi/ghes: better name GHES memory error function
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 00/16] Prepare GHES driver to support error injection
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [RFC 1/5] LoongArch: KVM: Add vmid support for stage2 MMU
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC 5/5] LoongArch: KVM: Enable separate vmid feature
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v2 0/6] SEAMCALL Wrappers
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH v2 0/6] SEAMCALL Wrappers
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.13, part #2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2024.12.04 - CANCELED
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Convert plain error code numbers to defines
- From: "Melody (Huibo) Wang" <huibo.wang@xxxxxxx>
- Re: [PATCH 10/15] KVM: SVM: Don't "NULL terminate" the list of possible passthrough MSRs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 09/15] KVM: SVM: Drop "always" flag from list of possible passthrough MSRs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 08/15] KVM: SVM: Pass through GHCB MSR if and only if VM is SEV-ES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 3/3] driver core: class: remove class_compat code
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH 03/15] KVM: SVM: Invert the polarity of the "shadow" MSR interception bitmaps
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- [PATCH v2 1/2] vfio/pci: Enable iowrite64 and ioread64 for vfio pci
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- [PATCH 1/3] driver core: class: add class_pseudo_register
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 0/3] driver core: class: remove class_compat code
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [RFC PATCH 06/22] KVM: x86: INIT may transition from HALTED to RUNNABLE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] riscv: Remove duplicate CLINT_TIMER selections
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH v2 2/2] vfio/pci: Remove #ifdef iowrite64 and #ifdef ioread64
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- [PATCH v2 0/2] Extend 8-byte PCI load/store support to x86 arch
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/3] vfio/pci: Support 8-byte PCI loads and stores
- From: Ramesh Thomas <ramesh.thomas@xxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v2 1/2] KVM: guest_memfd: add generic population via write
- From: Mike Day <michael.day@xxxxxxx>
- Re: [PATCH] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] vfio/mlx5: Align the page tracking max message size with the device capability
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] virt: sev-guest: Remove is_vmpck_empty() helper
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH] vfio/mlx5: Align the page tracking max message size with the device capability
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 01/15] irqchip/riscv-imsic: Use hierarchy to reach irq_set_affinity
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] KVM: SVM: Inject MCEs when restricted injection is active
- From: Philip Li <philip.li@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/bugs: Don't fill RSB on context switch with eIBRS
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH V2 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH V2 2/2] LoongArch: KVM: Protect kvm_io_bus_{read,write}() with SRCU
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/3] lib/on-cpus: A couple of fixes
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 03/11] fs/proc/vmcore: disallow vmcore modifications after the vmcore was opened
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 03/11] fs/proc/vmcore: disallow vmcore modifications after the vmcore was opened
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 07/13] x86/sev: Mark Secure TSC as reliable clocksource
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU
- From: bibo mao <maobibo@xxxxxxxxxxx>
- [PATCH v15 00/13] Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: Deadlock during PCIe hot remove and SPDK exit
- From: fengnan chang <fengnanchang@xxxxxxxxx>
- Re: [PATCH 2/2] LoongArch: KVM: Protect kvm_io_bus_{read,write}() with SRCU
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH v15 02/13] x86/sev: Relocate SNP guest messaging routines to common code
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 13/13] x86/sev: Allow Secure TSC feature for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 11/13] tsc: Switch to native sched clock
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 05/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH 2/2] LoongArch: KVM: Protect kvm_io_bus_{read,write}() with SRCU
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] KVM: x86: Bump hypercall stat prior to fully completing hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: x86: Move "emulate hypercall" function declarations to x86.h
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] KVM: x86: Play nice with protected guests in complete_hypercall_exit()
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 2/2] LoongArch: KVM: Protect kvm_io_bus_{read,write}() with SRCU
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: Deadlock during PCIe hot remove and SPDK exit
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions
- From: Xin Li <xin@xxxxxxxxx>
- [PATCH 04/11] tools headers: Sync x86 kvm and cpufeature headers with the kernel
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH 03/11] tools headers: Sync uapi/linux/kvm.h with the kernel sources
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- RE: [PATCH, RESEND] x86/mtrr: Rename mtrr_overwrite_state() to guest_force_mtrr_state()
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [RFC 5/5] LoongArch: KVM: Enable separate vmid feature
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [RFC 1/5] LoongArch: KVM: Add vmid support for stage2 MMU
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 3/8] drivers/perf: riscv: Add raw event v2 support
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- [RFC PATCH v2 4/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v2 5/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX VM/vCPU field access
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v2 3/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX vCPU creation
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v2 0/6] SEAMCALL Wrappers
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v2 6/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX flush operations
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v2 2/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX TD creation
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v2 1/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- [RFC PATCH 2/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- [RFC PATCH 0/2] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
- From: Kevin Loughlin <kevinloughlin@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/8] drivers/perf: riscv: Add raw event v2 support
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v4 5/6] KVM: x86: Always complete hypercall via function callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/8] RISC-V: KVM: Implement get event info function
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH 5/8] drivers/perf: riscv: Implement PMU event info function
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH 3/8] drivers/perf: riscv: Add raw event v2 support
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- [PATCH v2] KVM: SVM: Convert plain error code numbers to defines
- From: Melody Wang <huibo.wang@xxxxxxx>
- Re: [PATCH v4 5/6] KVM: x86: Always complete hypercall via function callback
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 4/6] KVM: x86: Bump hypercall stat prior to fully completing hypercall
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 5/6] KVM: x86: Always complete hypercall via function callback
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 4/6] KVM: x86: Bump hypercall stat prior to fully completing hypercall
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 3/6] KVM: x86: Move "emulate hypercall" function declarations to x86.h
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/11] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/11] KVM: arm64: nv: Add trap routing for CNTHCTL_EL2.EL1{NVPCT,NVVCT,TVT,TVCT}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] KVM: x86: Always complete hypercall via function callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86: Add a helper to check for user interception of KVM hypercalls
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 1/6] KVM: x86: Play nice with protected guests in complete_hypercall_exit()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v3 1/2] x86: cpu/bugs: add AMD ERAPS support; hardware flushes RSB
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 15/16] KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directories
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] x86: cpu/bugs: add AMD ERAPS support; hardware flushes RSB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [no subject]
- Re: [RFC PATCH v3 2/2] x86: kvm: svm: advertise ERAPS (larger RSB) support to guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/8] drivers/perf: riscv: Fix Platform firmware event data
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] x86: cpu/bugs: add AMD ERAPS support; hardware flushes RSB
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 07/11] KVM: arm64: Handle counter access early in non-HYP context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] x86: cpu/bugs: add AMD ERAPS support; hardware flushes RSB
- From: Amit Shah <amit@xxxxxxxxxx>
- [PATCH 01/11] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/11] KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/11] KVM: arm64: nv: Sanitise CNTHCTL_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 09/11] KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/11] KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV in use
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/11] KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/11] KVM: arm64: nv: Acceletate EL0 counter accesses from hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/11] KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/11] KVM: arm64: Add NV timer support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 0/7] hugetlbfs memory HW error fixes
- From: William Roche <william.roche@xxxxxxxxxx>
- [PATCH v2 4/4] Documentation/kernel-parameters: Fix a typo in kvm.enable_virt_at_load text
- From: Borislav Petkov <bp@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace
- From: Borislav Petkov <bp@xxxxxxxxxx>
- [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Borislav Petkov <bp@xxxxxxxxxx>
- [PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
- From: Borislav Petkov <bp@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: "Shah, Amit" <Amit.Shah@xxxxxxx>
- Re: [PATCH v2] KVM: make uevents configurable
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [PATCH v5 00/43] arm64: Support for Arm CCA in KVM
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- Re: [PATCH v2] KVM: make uevents configurable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 00/43] arm64: Support for Arm CCA in KVM
- From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx>
- [PATCH v2] KVM: make uevents configurable
- From: Bernhard Kauer <bk@xxxxxxxxx>
- Re: [PATCH v5 00/43] arm64: Support for Arm CCA in KVM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH, RESEND] x86/mtrr: Rename mtrr_overwrite_state() to guest_force_mtrr_state()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v5 00/43] arm64: Support for Arm CCA in KVM
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- Re: [PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: Deadlock during PCIe hot remove and SPDK exit
- From: fengnan chang <fengnanchang@xxxxxxxxx>
- [PATCH v2 4/4] KVM: riscv: selftests: Add Svvptc/Zabha/Ziccrse exts to get-reg-list test
- From: zhouquan@xxxxxxxxxxx
- [PATCH v2 3/4] RISC-V: KVM: Allow Ziccrse extension for Guest/VM
- From: zhouquan@xxxxxxxxxxx
- [PATCH v2 2/4] RISC-V: KVM: Allow Zabha extension for Guest/VM
- From: zhouquan@xxxxxxxxxxx
- [PATCH v2 1/4] RISC-V: KVM: Allow Svvptc extension for Guest/VM
- From: zhouquan@xxxxxxxxxxx
- [PATCH v2 0/4] RISC-V: KVM: Allow Svvptc/Zabha/Ziccrse exts for guests
- From: zhouquan@xxxxxxxxxxx
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH 14/39] KVM: guest_memfd: hugetlb: initialization and cleanup
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH 7/7] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 6/7] KVM: TDX: Handle TDX PV port I/O hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 3/7] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 2/7] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 0/7] KVM: TDX: TDX hypercalls may exit to userspace
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Second batch of KVM changes for Linux 6.13
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Second batch of KVM changes for Linux 6.13
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] Second batch of KVM changes for Linux 6.13
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Second batch of KVM changes for Linux 6.13
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] KVM: SVM: Inject MCEs when restricted injection is active
- From: "Melody (Huibo) Wang" <huibo.wang@xxxxxxx>
- Re: [PATCH] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 6.6] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn()
- From: Nikolay Kuratov <kniv@xxxxxxxxxxxxxx>
- [GIT PULL] Second batch of KVM changes for Linux 6.13
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v3 11/15] context-tracking: Introduce work deferral infrastructure
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [RFC PATCH v3 11/15] context-tracking: Introduce work deferral infrastructure
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v4 08/12] iommu/arm-smmu-v3: Support IOMMU_VIOMMU_ALLOC
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 18/43] arm64: RME: Handle realm enter/exit
- From: Steven Price <steven.price@xxxxxxx>
- RE: [PATCH v4 08/12] iommu/arm-smmu-v3: Support IOMMU_VIOMMU_ALLOC
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v5 18/43] arm64: RME: Handle realm enter/exit
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- [RFC PATCH v2 2/2] KVM: selftests: update guest_memfd write tests
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [RFC PATCH v2 1/2] KVM: guest_memfd: add generic population via write
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- [RFC PATCH v2 0/2] KVM: guest_memfd: use write for population
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [PATCH v5 18/43] arm64: RME: Handle realm enter/exit
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] i386/kvm: Fix kvm_enable_x2apic link error in non-KVM builds
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 03/11] fs/proc/vmcore: disallow vmcore modifications after the vmcore was opened
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 1/6] KVM: x86: Play nice with protected guests in complete_hypercall_exit()
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: Deadlock during PCIe hot remove and SPDK exit
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH kvmtool v2] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
- From: Cyril Bur <cyrilbur@xxxxxxxxxxxxxxx>
- Re: [PATCH] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Yury Norov <yury.norov@xxxxxxxxx>
- RE: [PATCH] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- [PATCH] net: mana: Fix memory leak in mana_gd_setup_irqs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] i386/kvm: Fix kvm_enable_x2apic link error in non-KVM builds
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 1/7] KVM: SVM: Implement GET_AP_APIC_IDS NAE event
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH kvmtool 2/4] arm: Check return value for host_to_guest_flat()
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [RFC PATCH kvmtool 4/4] arm64: Increase the payload memory region size to 512MB
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 3/4] arm64: Use the kernel header image_size when loading into memory
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 2/4] arm: Check return value for host_to_guest_flat()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 1/4] arm: Fix off-by-one errors when computing payload memory layout
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RESEND kvmtool 0/4] arm: Payload memory layout change
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 0/4] arm: Payload memory layout change
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v4 0/4] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v1 0/4] KVM selftests enhancements
- From: Manali Shukla <manali.shukla@xxxxxxx>
- M&E- Consult-RQ387690
- From: Ethan Allen <admln@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH kvmtool] builtin-run: Allow octal and hex numbers for -m/--mem
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v3 5/7] KVM: SVM: Inject MCEs when restricted injection is active
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH v3 2/2] x86: kvm: svm: advertise ERAPS (larger RSB) support to guests
- From: Amit Shah <amit@xxxxxxxxxx>
- [RFC PATCH v3 1/2] x86: cpu/bugs: add AMD ERAPS support; hardware flushes RSB
- From: Amit Shah <amit@xxxxxxxxxx>
- [RFC PATCH v3 0/2] Add support for the ERAPS feature
- From: Amit Shah <amit@xxxxxxxxxx>
- Re: [PATCH 2/8] drivers/perf: riscv: Fix Platform firmware event data
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [RFC PATCH 0/4] KVM: ioctl for populating guest_memfd
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFCv1 0/7] vfio: Allow userspace to specify the address for each MSI vector
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 4/4] KVM: riscv: selftests: Add Svvptc/Zabha/Ziccrse exts to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] RISC-V: KVM: Allow Ziccrse extension for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] RISC-V: KVM: Allow Zabha extension for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] RISC-V: KVM: Allow Svvptc extension for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 15/16] KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directories
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 14/16] KVM: selftests: Provide empty 'all' and 'clean' targets for unsupported ARCHs
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v4 15/16] KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directories
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/16] KVM: selftests: Return a value from vcpu_get_reg() instead of using an out-param
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/16] KVM: selftests: Override ARCH for x86_64 instead of using ARCH_DIR
- From: Muhammad Usama Anjum <Usama.Anjum@xxxxxxxxxxxxx>
- Re: [PATCH v4 15/16] KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directories
- From: Muhammad Usama Anjum <Usama.Anjum@xxxxxxxxxxxxx>
- Re: [PATCH v4 14/16] KVM: selftests: Provide empty 'all' and 'clean' targets for unsupported ARCHs
- From: Muhammad Usama Anjum <Usama.Anjum@xxxxxxxxxxxxx>
- Re: [PATCH v4 01/16] KVM: Move KVM_REG_SIZE() definition to common uAPI header
- From: Muhammad Usama Anjum <Usama.Anjum@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: Deadlock during PCIe hot remove and SPDK exit
- From: fengnan chang <fengnanchang@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: VMX: Initialize TDX during KVM module load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH 4/4] KVM: riscv: selftests: Add Svvptc/Zabha/Ziccrse exts to get-reg-list test
- From: zhouquan@xxxxxxxxxxx
- [PATCH 3/4] RISC-V: KVM: Allow Ziccrse extension for Guest/VM
- From: zhouquan@xxxxxxxxxxx
- Re: [PATCH v4 4/6] KVM: x86: Bump hypercall stat prior to fully completing hypercall
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: x86: Move "emulate hypercall" function declarations to x86.h
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH 2/4] RISC-V: KVM: Allow Zabha extension for Guest/VM
- From: zhouquan@xxxxxxxxxxx
- [PATCH 1/4] RISC-V: KVM: Allow Svvptc extension for Guest/VM
- From: zhouquan@xxxxxxxxxxx
- [PATCH 0/4] RISC-V: KVM: Allow Svvptc/Zabha/Ziccrse exts for guests
- From: zhouquan@xxxxxxxxxxx
- Re: [PATCH v4 1/6] KVM: x86: Play nice with protected guests in complete_hypercall_exit()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v4 5/6] KVM: x86: Always complete hypercall via function callback
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH 3/3] KVM: VMX: Initialize TDX during KVM module load
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: VMX: Initialize TDX during KVM module load
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 21/24] KVM: TDX: Add an ioctl to create initial guest memory
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v3 57/57] KVM: x86: Use only local variables (no bitmask) to init kvm_cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 56/57] KVM: x86: Explicitly track feature flags that are enabled at runtime
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 52/57] KVM: x86: Add a macro for features that are synthesized into boot_cpu_data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 54/57] KVM: x86: Rename "SF" macro to "SCATTERED_F"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 55/57] KVM: x86: Explicitly track feature flags that require vendor enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 53/57] KVM: x86: Pull CPUID capabilities from boot_cpu_data only as needed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 51/57] KVM: x86: Drop superfluous host XSAVE check when adjusting guest XSAVES caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 49/57] KVM: x86: Shuffle code to prepare for dropping guest_cpuid_has()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 48/57] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 47/57] KVM: x86: Update OS{XSAVE,PKE} bits in guest CPUID irrespective of host support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 46/57] KVM: x86: Drop unnecessary check that cpuid_entry2_find() returns right leaf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 45/57] KVM: x86: Avoid double CPUID lookup when updating MWAIT at runtime
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 44/57] KVM: x86: Initialize guest cpu_caps based on KVM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 43/57] KVM: x86: Treat MONTIOR/MWAIT as a "partially emulated" feature
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 42/57] KVM: x86: Extract code for generating per-entry emulated CPUID information
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 41/57] KVM: x86: Initialize guest cpu_caps based on guest CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 40/57] KVM: x86: Replace guts of "governed" features with comprehensive cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 39/57] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 38/57] KVM: x86: Advertise HYPERVISOR in KVM_GET_SUPPORTED_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 37/57] KVM: x86: Advertise TSC_DEADLINE_TIMER in KVM_GET_SUPPORTED_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 36/57] KVM: x86: Remove all direct usage of cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 35/57] KVM: x86: Move kvm_find_cpuid_entry{,_index}() up near cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 34/57] KVM: x86: Always operate on kvm_vcpu data in cpuid_entry2_find()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 33/57] KVM: x86: Remove unnecessary caching of KVM's PV CPUID base
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 32/57] KVM: x86: Clear PV_UNHALT for !HLT-exiting only when userspace sets CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 31/57] KVM: x86: Swap incoming guest CPUID into vCPU before massaging in KVM_SET_CPUID2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 30/57] KVM: x86: Add a macro to init CPUID features that KVM emulates in software
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 29/57] KVM: x86: Add a macro to init CPUID features that ignore host kernel support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 28/57] KVM: x86: Harden CPU capabilities processing against out-of-scope features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 27/57] KVM: x86: #undef SPEC_CTRL_SSBD in cpuid.c to avoid macro collisions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 26/57] KVM: x86: Handle kernel- and KVM-defined CPUID words in a single helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 25/57] KVM: x86: Add a macro to precisely handle aliased 0x1.EDX CPUID features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 24/57] KVM: x86: Add a macro to init CPUID features that are 64-bit only
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 23/57] KVM: x86: Rename kvm_cpu_cap_mask() to kvm_cpu_cap_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 22/57] KVM: x86: Unpack F() CPUID feature flag macros to one flag per line of code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 21/57] KVM: x86: Account for max supported CPUID leaf when getting raw host CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 20/57] KVM: x86: Do reverse CPUID sanity checks in __feature_leaf()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 19/57] KVM: x86: Don't update PV features caches when enabling enforcement capability
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 18/57] KVM: x86: Zero out PV features cache when the CPUID leaf is not present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 17/57] KVM: selftests: Update x86's KVM PV test to match KVM's disabling exits behavior
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 16/57] KVM: selftests: Fix a bad TEST_REQUIRE() in x86's KVM PV test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 15/57] KVM: x86: Drop the now unused KVM_X86_DISABLE_VALID_EXITS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 14/57] KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 13/57] KVM: x86: Disallow KVM_CAP_X86_DISABLE_EXITS after vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 12/57] KVM: x86: Drop now-redundant MAXPHYADDR and GPA rsvd bits from vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 11/57] KVM: x86/pmu: Drop now-redundant refresh() during init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 10/57] KVM: x86: Move __kvm_is_valid_cr4() definition to x86.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 09/57] KVM: selftests: Verify KVM stuffs runtime CPUID OS bits on CR4 writes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 08/57] KVM: selftests: Refresh vCPU CPUID cache in __vcpu_get_cpuid_entry()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 07/57] KVM: selftests: Assert that vcpu->cpuid is non-NULL when getting CPUID entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 06/57] KVM: selftests: Update x86's set_sregs_test to match KVM's CPUID enforcement
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 05/57] KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 04/57] KVM: x86: Explicitly do runtime CPUID updates "after" initial setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 03/57] KVM: x86: Do all post-set CPUID processing during vCPU creation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 02/57] KVM: x86: Limit use of F() and SF() to kvm_cpu_cap_{mask,init_kvm_defined}()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 01/57] KVM: x86: Use feature_bit() to clear CONSTANT_TSC when emulating CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v4 15/16] KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directories
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 16/16] KVM: selftests: Override ARCH for x86_64 instead of using ARCH_DIR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 14/16] KVM: selftests: Provide empty 'all' and 'clean' targets for unsupported ARCHs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]