Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v4 00/12] Initial support for SMMUv3 nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Patrick Bellasi <derkling@xxxxxxxxxx>
- Re: [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 14/39] KVM: guest_memfd: hugetlb: initialization and cleanup
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/5] riscv: sbi: Add SSE extension tests
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net-next] tun: Pad virtio headers
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v2 08/17] KVM: TDX: Complete interrupts after TD exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 08/17] KVM: TDX: Complete interrupts after TD exit
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v4 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v2 05/17] KVM: x86: Assume timer IRQ was injected if APIC state is protected
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH net-next] tun: Pad virtio headers
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 04/17] KVM: TDX: Implement non-NMI interrupt injection
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 03/17] KVM: VMX: Move posted interrupt delivery code to common header
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH net-next] tun: Pad virtio headers
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] kvm: Introduce kvm_total_suspend_ns().
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- RE: Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH v9 05/11] KVM: x86/mmu: Rename spte_has_volatile_bits() to spte_needs_atomic_write()
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v9 04/11] KVM: x86/mmu: Relax locking for kvm_test_age_gfn() and kvm_age_gfn()
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v9 05/11] KVM: x86/mmu: Rename spte_has_volatile_bits() to spte_needs_atomic_write()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 04/11] KVM: x86/mmu: Relax locking for kvm_test_age_gfn() and kvm_age_gfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Nikita Kalyazin <kalyazin@xxxxxxxxxx>
- Re: [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [GIT PULL v2 09/20] KVM: s390: move pv gmap functions into kvm
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Clear pv_unhalted on all transitions to KVM_MP_STATE_RUNNABLE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Introduce kvm_set_mp_state()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/18] Add kvmtool_params to test specification
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/18] Add kvmtool_params to test specification
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 04/18] run_tests: Introduce unittest parameter 'qemu_params'
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v5 1/2] s390/pci: Fix s390_mmio_read/write syscall page fault handling
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v5 0/2] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v5 2/2] PCI: s390: Support mmap() of BARs and replace VFIO_PCI_MMAP by a device flag
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 04/18] run_tests: Introduce unittest parameter 'qemu_params'
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Vasily Gorbik <gor@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/3] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v4 1/3] mm/filemap: add mempolicy support to the filemap layer
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 05/11] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [linus:master] [treewide] b04e317b52: INFO:task_blocked_for_more_than#seconds
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 9/9] KVM: selftests: Add a basic SEV-SNP smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/9] KVM: selftests: Add library support for interacting with SNP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 4/9] KVM: selftests: Add VMGEXIT helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/9] KVM: SEV: Disable SEV on platform init failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/9] KVM: SEV: Disable SEV-SNP on FW validation failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/17] KVM: VMX: Add a helper for NMI handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/9] vhost-scsi: log control queue write descriptors
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH v2 16/17] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/11] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 0/3] Poisoned memory recovery on reboot
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix broken SNP support with KVM module built-in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 3/3] target/arm/kvm: Report memory errors injection
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v8 1/3] system/physmem: handle hugetlb correctly in qemu_ram_remap()
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v8 2/3] system/physmem: poisoned memory discard on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v8 0/3] Poisoned memory recovery on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: x86: async PF user
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: async_pf: determine x86 user as cpl == 3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 1/2] KVM: x86: async_pf: remove support for KVM_ASYNC_PF_SEND_ALWAYS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 00/16] x86/tsc: Try to wrangle PV clocks vs. TSC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [RFC PATCH v5 02/15] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [kvmtool PATCH] riscv: Fix no params with nodefault segfault
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/18] Add kvmtool_params to test specification
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 00/16] x86/tsc: Try to wrangle PV clocks vs. TSC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/3] LoongArch: KVM: Some tiny code cleanup
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Decouple APICv activation state from apicv_inhibit_reasons
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/cpufeatures: Add SNP Secure TSC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- [syzbot] Monthly kvm report (Feb 2025)
- From: syzbot <syzbot+list2039ca2416c8ea9fe8ef@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 03/18] KVM: arm64: Handle trapping of FEAT_LS64* instructions
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 02/18] arm64: Add syndrome information for trapped LD64B/ST64B{,V,V0}
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] LoongArch: KVM: remove unnecessary header include path
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v3 08/11] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 11/11] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 06/11] KVM: x86: Mark KVM_X86_SW_PROTECTED_VM as supporting guest_memfd shared memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 10/11] KVM: arm64: Enable mapping guest_memfd in arm64
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 05/11] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 09/11] KVM: arm64: Introduce KVM_VM_TYPE_ARM_SW_PROTECTED machine type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 07/11] KVM: arm64: Refactor user_mem_abort() calculation of force_pte
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 04/11] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 02/11] KVM: guest_memfd: Handle final folio_put() of guest_memfd pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 01/11] mm: Consolidate freeing of typed folios on final folio_put()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 00/11] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvmtool PATCH 2/6] Add __KERNEL_DIV_ROUND_UP() macro
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [kvmtool PATCH 0/6] Add RISC-V ISA extensions based on Linux-6.13
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 0/2] Error handling fixes
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH 1/2] drm/i915/gvt: Store ->kvm reference in intel_vgpu struct.
- From: Andrey Ryabinin <arbn@xxxxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH 2/2] vfio: Release KVM pointer after the first device open.
- From: Andrey Ryabinin <arbn@xxxxxxxxxxxxxxx>
- Re: [kvmtool PATCH 2/6] Add __KERNEL_DIV_ROUND_UP() macro
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool] riscv: Allow initrd to be above 256MB on 64 bit
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: switch to using kvm_lock/unlock_all_vcpus
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: switch to using kvm_lock/unlock_all_vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH V4] KVM: SEV: fix wrong pinning of pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [Patch net 0/2] vsock suspend/resume fix
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [Patch net 2/2] vsock/virtio: Don't reset the created SOCKET during suspend to ram
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: SVM: Enable Secure TSC for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- [PATCH kvmtool 2/2] cpu: vmexit: Handle KVM_EXIT_MEMORY_FAULT correctly
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- [PATCH kvmtool 1/2] cpu: vmexit: Handle KVM_EXIT_UNKNOWN exit reason correctly
- From: "Aneesh Kumar K.V (Arm)" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [Patch net 2/2] vsock/virtio: Don't reset the created SOCKET during suspend to ram
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- [Patch net 1/2] vsock/virtio: initialize rx_buf_nr and rx_buf_max_nr when resuming
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- [Patch net 0/2] vsock suspend/resume fix
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 15/15] RISC-V: KVM: add support for SBI_FWFT_MISALIGNED_DELEG
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 01/15] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [PATCH v2 01/15] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Deepak Gupta <debug@xxxxxxxxxxxx>
- Re: [PATCH net-next v6 0/7] tun: Unify vnet implementation
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v2 17/17] KVM: TDX: Handle EXIT_REASON_OTHER_SMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 16/17] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 15/17] KVM: VMX: Add a helper for NMI handling
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 14/17] KVM: VMX: Move emulation_required to struct vcpu_vt
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 13/17] KVM: TDX: Add methods to ignore virtual apic related operation
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [no subject]
- [PATCH v2 12/17] KVM: TDX: Force APICv active for TDX guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 11/17] KVM: TDX: Enforce KVM_IRQCHIP_SPLIT for TDX guests
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 10/17] KVM: TDX: Always block INIT/SIPI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 09/17] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 08/17] KVM: TDX: Complete interrupts after TD exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 07/17] KVM: TDX: Implement methods to inject NMI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 05/17] KVM: x86: Assume timer IRQ was injected if APIC state is protected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 06/17] KVM: TDX: Wait lapic expire when timer IRQ was injected
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 04/17] KVM: TDX: Implement non-NMI interrupt injection
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 03/17] KVM: VMX: Move posted interrupt delivery code to common header
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 02/17] KVM: TDX: Disable PI wakeup for IPIv
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 01/17] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 00/17] KVM: TDX: TDX interrupts
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 8/8] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 7/8] KVM: TDX: Handle TDX PV port I/O hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 6/8] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 5/8] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 4/8] KVM: TDX: Handle KVM hypercall with TDG.VP.VMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 3/8] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 2/8] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86: Have ____kvm_emulate_hypercall() read the GPRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2 0/8] KVM: TDX: TDX hypercalls may exit to userspace
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH V4] KVM: SEV: fix wrong pinning of pages
- Re: [PATCH v2 0/6] Introduce CET supervisor state support
- From: Xin Li <xin@xxxxxxxxx>
- [PATCH v2 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 2/3] LoongArch: KVM: Remove duplicated cache attribute setting
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 0/3] LoongArch: KVM: Some tiny code cleanup
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 15/39] KVM: guest_memfd: hugetlb: allocate and truncate from hugetlb
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 3/3] RISC-V: KVM: switch to kvm_lock/unlock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: switch to using kvm_lock/unlock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: move sev_lock/unlock_vcpus_for_migration to kvm_main.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/3] KVM: extract lock_all_vcpus/unlock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: Question about lock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: selftests: Fix PMC checks in PMU counters test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 4/4] KVM: arm64: Make guests see only counters they can access
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] perf: arm_pmuv3: Introduce module param to partition the PMU
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v4 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 2/3] KVM: SVM: Ensure PSP module is initialized if KVM module is built-in
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 1/3] crypto: ccp: Add external API interface for PSP module initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v4 0/3] Fix broken SNP support with KVM module built-in
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH V3] KVM: SEV: fix wrong pinning of pages
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 15/15] RISC-V: KVM: add support for SBI_FWFT_MISALIGNED_DELEG
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 14/15] RISC-V: KVM: add support for FWFT SBI extension
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 13/15] RISC-V: KVM: add SBI extension reset callback
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 12/15] RISC-V: KVM: add SBI extension init()/deinit() functions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 11/15] selftests: riscv: add misaligned access testing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 10/15] Documentation/sysctl: add riscv to unaligned-trap supported archs
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 09/15] riscv: misaligned: use get_user() instead of __get_user()
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 07/15] riscv: misaligned: factorize trap handling
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 08/15] riscv: misaligned: enable IRQs while handling misaligned accesses
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 06/15] riscv: misaligned: add a function to check misalign trap delegability
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 05/15] riscv: misaligned: move emulated access uniformity check in a function
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 04/15] riscv: misaligned: use correct CONFIG_ ifdef for misaligned_access_speed
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 03/15] riscv: misaligned: use on_each_cpu() for scalar misaligned access probing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 02/15] riscv: misaligned: request misaligned exception from SBI
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 00/15] riscv: add SBI FWFT misaligned exception delegation support
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- [PATCH v2 01/15] riscv: add Firmware Feature (FWFT) SBI extensions definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: SVM: Enable Secure TSC for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/9] vhost-scsi: cache log buffer in I/O queue vhost_scsi_cmd
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 18/18] KVM: arm64: Use FGT feature maps to drive RES0 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 17/18] KVM: arm64: Validate FGT register descriptions against RES0 masks
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 15/18] KVM: arm64: Handle PSB CSYNC traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 16/18] KVM: arm64: Switch to table-driven FGU configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 14/18] KVM: arm64: Use KVM-specific HCRX_EL2 RES0 mask
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/18] KVM: arm64: Remove most hand-crafted masks for FGT registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/18] KVM: arm64: Propagate FGT masks to the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/18] KVM: arm64: Use computed FGT masks to setup FGT registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 09/18] KVM: arm64: Use computed masks as sanitisers for FGT registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/18] KVM: arm64: Compute FGT masks from KVM's own FGT tables
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/18] KVM: arm64: Restrict ACCDATA_EL1 undef to FEAT_ST64_ACCDATA being disabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/18] KVM: arm64: Unconditionally configure fine-grain traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/18] KVM: arm64: Add description of FGT bits leading to EC!=0x18
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/18] KVM: arm64: Plug FEAT_GCS handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/18] arm64: Add syndrome information for trapped LD64B/ST64B{,V,V0}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/18] KVM: arm64: Revamp Fine Grained Trap handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/18] KVM: arm64: Don't treat HCRX_EL2 as a FGT register
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/18] KVM: arm64: Handle trapping of FEAT_LS64* instructions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/18] arm64: Add ID_AA64ISAR1_EL1.LS64 encoding for FEAT_LS64WB
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 29/30] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/18] scripts: Refuse to run the tests if not configured for qemu
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v4 22/30] context_tracking: Exit CT_STATE_IDLE upon irq/nmi entry
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/cpufeatures: Add "Allowed SEV Features" Feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] vsock/virtio: Move rx_buf_nr and rx_buf_max_nr initialization position
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: Question about lock_all_vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/18] scripts: Refuse to run the tests if not configured for qemu
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: Question about lock_all_vcpus
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: leonardi@xxxxxxxxxx
- Re: [PATCH 1/2] vsock/virtio: Move rx_buf_nr and rx_buf_max_nr initialization position
- From: Luigi Leonardi <leonardi@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/18] scripts: Refuse to run the tests if not configured for qemu
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH] LoongArch: KVM: remove unnecessary header include path
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v2 4/4] KVM: SVM: Enable Secure TSC for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 3/4] KVM: SVM: Prevent writes to TSC MSR when Secure TSC is enabled
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 2/4] KVM: SVM: Add GUEST_TSC_FREQ MSR for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 1/4] x86/cpufeatures: Add SNP Secure TSC
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v2 0/4] Enable Secure TSC for SEV-SNP
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [RFC PATCH v2 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 2/7] target/i386/kvm: introduce 'pmu-cap-disabled' to set KVM_PMU_CAP_DISABLE
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/4] KVM: arm64: Make guests see only counters they can access
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v2 2/4] perf: arm_pmuv3: Introduce module param to partition the PMU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [RFC PATCH v4 3/3] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v4 1/3] mm/filemap: add mempolicy support to the filemap layer
- From: Shivank Garg <shivankg@xxxxxxx>
- [RFC PATCH v4 0/3] Add NUMA mempolicy support for KVM guest-memfd
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v6 0/3] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH V2] target/loongarch: fix vcpu reset command word issue
- From: lixianglai <lixianglai@xxxxxxxxxxx>
- Re: [PATCH 2/7] target/i386/kvm: introduce 'pmu-cap-disabled' to set KVM_PMU_CAP_DISABLE
- From: dongli.zhang@xxxxxxxxxx
- Re: [GIT PULL] KVM changes for Linux 6.14-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] accel: Only include qdev-realized vCPUs in global &cpus_queue
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH V2] target/loongarch: fix vcpu reset command word issue
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [GIT PULL] KVM changes for Linux 6.14-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: The business loan-
- From: David Song <chrispinerick@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- [PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: ccp: Add external API interface for PSP module initialization
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 4/4] KVM: arm64: Make guests see only counters they can access
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 3/4] perf: arm_pmuv3: Keep out of guest counter partition
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 2/4] perf: arm_pmuv3: Introduce module param to partition the PMU
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 1/4] perf: arm_pmuv3: Generalize counter bitmasks
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [RFC PATCH v2 0/4] PMU partitioning driver support
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: Problem with vmrun in an interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v3 1/2] x86/cpufeatures: Add "Allowed SEV Features" Feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v3 0/2] KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [RFC] target/i386: sev: Add cmdline option to enable the Allowed SEV Features feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v3 2/3] KVM: SVM: Ensure PSP module is initialized if KVM module is built-in
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 1/3] crypto: ccp: Add external API interface for PSP module initialization
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/2] i386/xen: Move KVM_XEN_HVM_CONFIG ioctl to kvm_xen_init_vcpu()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3] PCI: account for sysfs-disabled reset in pci_{slot,bus}_resettable()
- From: Nishanth Aravamudan <naravamudan@xxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH 9/9] vhost-scsi: Fix vhost_scsi_send_bad_target()
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 8/9] vhost-scsi: protect vq->log_used with vq->mutex
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 7/9] vhost: add WARNING if log_num is more than limit
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 3/9] vhost-scsi: cache log buffer in I/O queue vhost_scsi_cmd
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 6/9] vhost-scsi: log event queue write descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 0/9] vhost-scsi: log write descriptors for live migration (and two bugfix)
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 5/9] vhost-scsi: log control queue write descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 4/9] vhost-scsi: log I/O queue write descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 2/9] vhost-scsi: adjust vhost_scsi_get_desc() to log vring descriptors
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 1/9] vhost: modify vhost_log_write() for broader users
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v4 22/30] context_tracking: Exit CT_STATE_IDLE upon irq/nmi entry
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v6 6/7] tap: Keep hdr_len in tap_get_user()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH net-next v6 5/7] tun: Extract the vnet handling code
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v4 22/30] context_tracking: Exit CT_STATE_IDLE upon irq/nmi entry
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v4 11/21] RISC-V: perf: Restructure the SBI PMU code
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 03/11] KVM: guest_memfd: Allow host to map guest_memfd() pages
- From: Patrick Roy <roypat@xxxxxxxxxxxx>
- [PATCH v2 09/10] accel/kvm: Assert vCPU is created when calling kvm_dirty_ring_reap*()
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- [PATCH v2 10/10] accel/kvm: Remove unreachable assertion in kvm_dirty_ring_reap*()
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] accel: Only include qdev-realized vCPUs in global &cpus_queue
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH 1/2] i386/xen: Move KVM_XEN_HVM_CONFIG ioctl to kvm_xen_init_vcpu()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFCv2 00/13] iommu: Add MSI mapping support with nested SMMU
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH 2/2] hw/xen: Add "mode" parameter to xen-block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/2] i386/xen: Move KVM_XEN_HVM_CONFIG ioctl to kvm_xen_init_vcpu()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RFCv2 00/13] iommu: Add MSI mapping support with nested SMMU
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Matias Ezequiel Vara Larsen <mvaralar@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Matias Ezequiel Vara Larsen <mvaralar@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Hanna Czenczek <hreitz@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [RFC v2 1/5] qapi/qom: Introduce kvm-pmu-filter object
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Problem with vmrun in an interrupt shadow
- From: Doug Covelli <doug.covelli@xxxxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Hanna Czenczek <hreitz@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: "Huang, Honglei1" <Honglei1.Huang@xxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v4 12/21] RISC-V: perf: Modify the counter discovery mechanism
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v3 00/18] vDSO: Introduce generic data storage
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/21] RISC-V: perf: Restructure the SBI PMU code
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH 2/7] target/i386/kvm: introduce 'pmu-cap-disabled' to set KVM_PMU_CAP_DISABLE
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/21] RISC-V: Add Sscfg extension CSR definition
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 06/21] RISC-V: Add Smcntrpmf extension parsing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 09/21] RISC-V: Add Ssccfg ISA extension definition and parsing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 09/21] RISC-V: Add Ssccfg ISA extension definition and parsing
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [PATCH v4 02/21] RISC-V: Add Sxcsrind ISA extension CSR definitions
- From: Clément Léger <cleger@xxxxxxxxxxxx>
- Re: [RFC PATCH 00/39] 1G page support for guest_memfd
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [PATCH net-next v6 7/7] tap: Use tun's vnet-related code
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 6/7] tap: Keep hdr_len in tap_get_user()
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 5/7] tun: Extract the vnet handling code
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 4/7] tun: Decouple vnet handling
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 3/7] tun: Decouple vnet from tun_struct
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 2/7] tun: Keep hdr_len in tun_get_user()
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 1/7] tun: Refactor CONFIG_TUN_VNET_CROSS_LE
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH net-next v6 0/7] tun: Unify vnet implementation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 1/2] vsock/virtio: Move rx_buf_nr and rx_buf_max_nr initialization position
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- [PATCH 2/2] vsock/virtio: Don't reset the created SOCKET during s2r
- From: Junnan Wu <junnan01.wu@xxxxxxxxxxx>
- Re: [PATCH RFCv2 09/13] iommufd: Add IOMMU_OPTION_SW_MSI_START/SIZE ioctls
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH 3/3] LoongArch: KVM: Set host with kernel mode when switch to VM mode
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 2/3] LoongArch: KVM: Remove duplicated cache attribute setting
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 1/3] LoongArch: KVM: Fix typo issue about GCFG feature detection
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/3] LoongArch: KVM: Some tiny code cleanup
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 4/4] KVM: x86/mmu: Free obsolete roots when pre-faulting SPTEs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 3/4] KVM: x86/mmu: Make sure pfn is not changed for spurious fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/4] KVM: x86/tdp_mmu: Merge the prefetch into the is_access_allowed() check
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/4] KVM: x86/mmu: Further check old SPTE is leaf for spurious prefetch fault
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/4] Small changes related to prefetch and spurious faults
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 0/5] vfio: Improve DMA mapping performance for huge pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] vfio/type1: Use mapping page mask for pfnmaps
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] vfio/type1: Use vfio_batch for vaddr_get_pfns()
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] vfio/type1: Convert all vaddr_get_pfns() callers to use vfio_batch
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] vfio/type1: Catch zero from pin_user_pages_remote()
- From: Mitchell Augustin <mitchell.augustin@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [kvm:kvm-coco-queue-20250129 43/129] arch/x86/kvm/vmx/main.c:176:13: error: 'vt_exit' undeclared; did you mean 'vmx_exit'?
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 2/3] KVM: SVM: Remove wbinvd in sev_vm_destroy()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 3/3] KVM: SVM: Flush cache only on CPUs running SEV guest
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 1/3] KVM: x86: Add a wbinvd helper
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [kvm:kvm-coco-queue 39/125] WARNING: modpost: vmlinux: section mismatch in reference: vt_init+0x2f (section: .init.text) -> vmx_exit (section: .exit.text)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Question about lock_all_vcpus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v5 6/6] target/i386: Add support for EPYC-Turin model
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v5 5/6] target/i386: Update EPYC-Genoa for Cache property, perfmon-v2, RAS and SVM feature bits
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v5 4/6] target/i386: Add feature that indicates WRMSR to BASE reg is non-serializing
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v5 3/6] target/i386: Update EPYC-Milan CPU model for Cache property, RAS, SVM feature bits
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v5 2/6] target/i386: Update EPYC-Rome CPU model for Cache property, RAS, SVM feature bits
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v5 0/6] target/i386: Update EPYC CPU models for Cache property, RAS, SVM feature and add EPYC-Turin CPU model
- From: Babu Moger <babu.moger@xxxxxxx>
- Re: [PATCH 0/5] vfio: Improve DMA mapping performance for huge pfnmaps
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH] KVM: x86/xen: Only write Xen hypercall page for guest writes to MSR
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: arm64: nv: selftests: Access VNCR mapped registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] lib: s390x: css: Cleanup chsc inline assembly
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] lib: s390x: css: Name inline assembly arguments and clean them up
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] Add NV Selftest cases
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] KVM: arm64: nv: selftests: Access VNCR mapped registers
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/2] KVM: arm64: nv: selftests: Add guest hypervisor test
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 0/2] Add NV Selftest cases
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/xen: Move kvm_xen_hvm_config field into kvm_xen
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/xen: Bury xen_hvm_config behind CONFIG_KVM_XEN=y
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/xen: Consult kvm_xen_enabled when checking for Xen MSR writes
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] KVM: x86/xen: Add an #ifdef'd helper to detect writes to Xen MSR
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH net-next v5 6/7] tap: Keep hdr_len in tap_get_user()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- [PATCH v3 16/16] KVM: arm64: nv: Fail KVM init if asking for NV without GICv3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 15/16] KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 13/16] KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 14/16] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 10/16] KVM: arm64: nv: Add Maintenance Interrupt emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 11/16] KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 12/16] KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 08/16] KVM: arm64: nv: Nested GICv3 emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 07/16] KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 09/16] KVM: arm64: nv: Handle L2->L1 transition on interrupt injection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 05/16] KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 06/16] KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 04/16] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 02/16] arm64: sysreg: Add layout for ICH_VTR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 03/16] arm64: sysreg: Add layout for ICH_MISR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 00/16] KVM: arm64: Add NV GICv3 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 01/16] arm64: sysreg: Add layout for ICH_HCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH] lib: s390x: css: Cleanup chsc inline assembly
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] kvm: delete unused variables iommu_noncoherent in struct kvm_arch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 1/5] qapi/qom: Introduce kvm-pmu-filter object
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] lib: s390x: css: Name inline assembly arguments and clean them up
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: [RFC v2 1/5] qapi/qom: Introduce kvm-pmu-filter object
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] lib: s390x: css: Name inline assembly arguments and clean them up
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/39] 1G page support for guest_memfd
- From: Amit Shah <amit@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/18] vDSO: Introduce generic data storage
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] drm/virtio: implement blob userptr resource object
- From: "Huang, Honglei1" <Honglei1.Huang@xxxxxxx>
- Re: [PATCH v4 11/21] RISC-V: perf: Restructure the SBI PMU code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] lib: s390x: css: Name inline assembly arguments and clean them up
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [RFC v2 1/5] qapi/qom: Introduce kvm-pmu-filter object
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC v2 1/5] qapi/qom: Introduce kvm-pmu-filter object
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v5 05/15] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v7 RESEND 1/5] hw/core/machine: Reject thread level cache
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [GIT PULL v2 00/20] KVM: s390: some non-trivial fixes and cleanups for 6.14
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.14, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 00/18] vDSO: Introduce generic data storage
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC v2 3/5] i386/kvm: Support event with select & umask format in KVM PMU filter
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: Call for GSoC internship project ideas
- From: Matias Ezequiel Vara Larsen <mvaralar@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 RESEND 0/5] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v7 RESEND 0/5] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v4 10/21] dt-bindings: riscv: add Counter delegation ISA extensions description
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- [PATCH v4 20/21] tools/perf: Pass the Counter constraint values in the pmu events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 21/21] Sync empty-pmu-events.c with autogenerated one
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 18/21] RISC-V: perf: Add Qemu virt machine events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 19/21] tools/perf: Support event code for arch standard events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 17/21] RISC-V: perf: Add legacy event encodings via sysfs
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 16/21] RISC-V: perf: Use config2/vendor table for event to counter mapping
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 14/21] RISC-V: perf: Implement supervisor counter delegation support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 15/21] RISC-V: perf: Skip PMU SBI extension when not implemented
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 13/21] RISC-V: perf: Add a mechanism to defined legacy event encoding
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 11/21] RISC-V: perf: Restructure the SBI PMU code
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 12/21] RISC-V: perf: Modify the counter discovery mechanism
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 10/21] dt-bindings: riscv: add Counter delegation ISA extensions description
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 09/21] RISC-V: Add Ssccfg ISA extension definition and parsing
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 07/21] dt-bindings: riscv: add Smcntrpmf ISA extension description
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 08/21] RISC-V: Add Sscfg extension CSR definition
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 06/21] RISC-V: Add Smcntrpmf extension parsing
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 05/21] RISC-V: Define indirect CSR access helpers
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 04/21] dt-bindings: riscv: add Sxcsrind ISA extension description
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 03/21] RISC-V: Add Sxcsrind ISA extension definition and parsing
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 02/21] RISC-V: Add Sxcsrind ISA extension CSR definitions
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 01/21] perf pmu-events: Add functions in jevent.py to parse counter and event info for hardware aware grouping
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 00/21] Add Counter delegation ISA extension support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH net-next v5 6/7] tap: Keep hdr_len in tap_get_user()
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH net-next v5 5/7] tun: Extract the vnet handling code
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH net-next v5 1/7] tun: Refactor CONFIG_TUN_VNET_CROSS_LE
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RFC PATCH v5 05/15] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [PATCH] kvm: delete unused variables iommu_noncoherent in struct kvm_arch
- From: fuqiang wang <fuqiang.wng@xxxxxxxxx>
- Re: [PATCH net-next v3 0/6] Device memory TCP TX
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v3 1/3] kvm: Introduce kvm_total_suspend_ns().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] KVM: arm64: Remove cyclical dependency in arm_pmuv3.h
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 5/5] vfio/type1: Use mapping page mask for pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 4/5] mm: Provide page mask in struct follow_pfnmap_args
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 3/5] vfio/type1: Use vfio_batch for vaddr_get_pfns()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 0/5] vfio: Improve DMA mapping performance for huge pfnmaps
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 2/5] vfio/type1: Convert all vaddr_get_pfns() callers to use vfio_batch
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 1/5] vfio/type1: Catch zero from pin_user_pages_remote()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFCv2 00/13] iommu: Add MSI mapping support with nested SMMU
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH RFCv2 00/13] iommu: Add MSI mapping support with nested SMMU
- From: Jacob Pan <jacob.pan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [RFC PATCH 09/13] KVM: nSVM: Handle nested TLB flush requests through TLB_CONTROL
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH net-next v5 6/7] tap: Keep hdr_len in tap_get_user()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH net-next v5 7/7] tap: Use tun's vnet-related code
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH net-next v5 6/7] tap: Keep hdr_len in tap_get_user()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH net-next v5 5/7] tun: Extract the vnet handling code
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH net-next v5 1/7] tun: Refactor CONFIG_TUN_VNET_CROSS_LE
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v3 0/6] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH net-next v3 0/6] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Invitation] bi-weekly guest_memfd upstream call on 2025-02-06
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 2/2] perf: arm_pmuv3: Uninvert dependency between {asm,perf}/arm_pmuv3.h
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 1/2] perf: arm_pmuv3: Remove cyclical dependency with kvm_host.h
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Clear pv_unhalted on all transitions to KVM_MP_STATE_RUNNABLE
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [RFC PATCH 13/13] KVM: nSVM: Stop bombing the TLB on nested transitions
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 12/13] KVM: nSVM: Service local TLB flushes before nested transitions
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 11/13] KVM: nSVM: Do not reset TLB_CONTROL in VMCB02 on nested entry
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 10/13] KVM: nSVM: Flush the TLB if L1 changes L2's ASID
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 09/13] KVM: nSVM: Handle nested TLB flush requests through TLB_CONTROL
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 08/13] KVM: nSVM: Flush both L1 and L2 ASIDs on KVM_REQ_TLB_FLUSH
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 07/13] KVM: nSVM: Handle INVLPGA interception correctly
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 06/13] KVM: x86/mmu: Allow skipping the gva flush in kvm_mmu_invalidate_addr()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 05/13] KVM: x86/mmu: rename __kvm_mmu_invalidate_addr()
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 04/13] KVM: SVM: Introduce helpers for updating TLB_CONTROL
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 03/13] KVM: nSVM: Split nested_svm_transition_tlb_flush() into entry/exit fns
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 02/13] KVM: nSVM: Rework svm_flush_tlb_asid() to operate on a given VMCB
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 00/13] Optimize nSVM TLB flushes
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- [RFC PATCH 01/13] KVM: nSVM: Track the ASID per-VMCB
- From: Yosry Ahmed <yosry.ahmed@xxxxxxxxx>
- Re: [PATCH v7 6/6] hostmem: Handle remapping of RAM
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [RFC PATCH v5 06/15] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: Signal eventfd when guest AP configuration is changed
- From: Rorie Reyes <rreyes@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v7 6/6] hostmem: Handle remapping of RAM
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v7 2/6] system/physmem: poisoned memory discard on reboot
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v7 3/6] accel/kvm: Report the loss of a large memory page
- From: William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 6.14
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] iommu/amd: Enable Host SNP support after enabling IOMMU SNP support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]