Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v2 0/3] Collect guest/host statistics during the redirected traps
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v5 05/11] target/i386/kvm: Save/load MSRs of kvmclock2 (KVM_FEATURE_CLOCKSOURCE2)
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 04/11] target/i386/kvm: Only save/load kvmclock MSRs when kvmclock enabled
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 11/11] target/i386/kvm: Replace ARRAY_SIZE(msr_handlers) with KVM_MSR_FILTER_MAX_RANGES
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v5 10/11] target/i386/kvm: Clean up error handling in kvm_arch_init()
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH v2 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 0/3] Collect guest/host statistics during the redirected traps
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 2/3] RISC-V: KVM: Update firmware counters for various events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 1/3] RISC-V: KVM: Redirect instruction access fault trap to guest
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Athul Krishna <athul.krishna.kr@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 00/11] i386: miscellaneous cleanup
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 11/11] target/i386/kvm: Replace ARRAY_SIZE(msr_handlers) with KVM_MSR_FILTER_MAX_RANGES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 10/11] target/i386/kvm: Clean up error handling in kvm_arch_init()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 05/11] target/i386/kvm: Save/load MSRs of kvmclock2 (KVM_FEATURE_CLOCKSOURCE2)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 04/11] target/i386/kvm: Only save/load kvmclock MSRs when kvmclock enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] SEAMCALL Wrappers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/24] TDX MMU Part 2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 22/24] KVM: TDX: Finalize VM initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
- From: David Hildenbrand <david@xxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 00/25] TDX vCPU/VM creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] RISC-V: KVM: Update firmware counters for various events
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] RISC-V: KVM: Redirect instruction access fault trap to guest
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v6 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Only zap valid non-mirror roots in kvm_zap_gfn_range()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v4 0/4] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v4 0/4] Add support for the Idle HLT intercept feature
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: bibo mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH] LoongArch: KVM: Add hypercall service support for usermode VMM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v6 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock held for write at uninit
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: TDX: Test dirty ring on a gmemfd slot
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2 0/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Athul Krishna <athul.krishna.kr@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] riscv: kvm: drop 32-bit host support
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: guest_memfd: Remove RCU-protected attribute from slot->gmem.file
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in vmx_handle_exit (2)
- From: syzbot <syzbot+ac0bc3a70282b4d586cc@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [bugzilla-daemon@xxxxxxxxxx: [Bug 219619] New: vfio-pci: screen graphics artifacts after 6.12 kernel upgrade]
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.13-rc4 (or rc5)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] KVM fixes for Linux 6.13-rc4 (or rc5)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 16/18] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 18/18] KVM: x86/mmu: Prevent aliased memslot GFNs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 14/18] KVM: x86/tdp_mmu: Propagate building mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 12/18] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 15/18] KVM: x86/tdp_mmu: Propagate tearing down mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 11/18] KVM: x86/tdp_mmu: Take root in tdp_mmu_for_each_pte()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 10/18] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 08/18] KVM: x86/mmu: Support GFN direct bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 07/18] KVM: x86/tdp_mmu: Take struct kvm in iter loops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 06/18] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 03/18] KVM: x86: Add a VM type define for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 02/18] KVM: Add member to struct kvm_gfn_range to indicate private/shared
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 00/18] TDX MMU prep series part 1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock held for write at uninit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Only zap valid non-mirror roots in kvm_zap_gfn_range()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: guest_memfd: Remove RCU-protected attribute from slot->gmem.file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/6] kvm powerpc/book3s-hv-pmu: Add perf-events for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 3/6] kvm powerpc/book3s-apiv2: Add kunit tests for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 2/6] kvm powerpc/book3s-apiv2: Add support for Hostwide GSB elements
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 5/6] powerpc/book3s-hv-pmu: Implement GSB message-ops for hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 0/6] kvm powerpc/book3s-hv: Expose Hostwide counters as perf-events
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH 1/6] [DOC] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
- From: Vaibhav Jain <vaibhav@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: weizijie <zijie.wei@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- [Bug 219618] [REGRESSION, BISECTED] qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: "A. Wilcox" <AWilcox@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 5/5] x86: kvm drop 32-bit host support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 4/5] powerpc: kvm: drop 32-bit book3s
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 3/5] powerpc: kvm: drop 32-bit booke
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 2/5] riscv: kvm: drop 32-bit host support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 1/5] mips: kvm: drop support for 32-bit hosts
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: drop 32-bit host support on all architectures
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- [Bug 219618] qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219618] New: qemu cannot not start with -cpu hypervisor=off parameter
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 2/5] selftests: ncdevmem: Implement devmem TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 1/5] net: add devmem TCP TX documentation
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH RFC net-next v1 0/5] Device memory TCP TX
- From: Stanislav Fomichev <stfomichev@xxxxxxxxx>
- Re: [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: x86: Avoid double RDPKRU when loading host/guest PKRU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2.1 03/25] x86/virt/tdx: Read essential global metadata for KVM
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH RFC net-next v1 5/5] net: devmem: Implement TX path
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 4/5] net: devmem TCP tx netlink api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 2/5] selftests: ncdevmem: Implement devmem TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 3/5] net: add get_netmem/put_netmem support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 1/5] net: add devmem TCP TX documentation
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH RFC net-next v1 0/5] Device memory TCP TX
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- PKEY syscall number for selftest? (was: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 01/11 for v9.2?] i386/cpu: Mark avx10_version filtered when prefix is NULL
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC v3 26/27] KVM: arm64: selftests: Add SME system registers to get-reg-list
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 23/27] KVM: arm64: Context switch SME state for normal guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC v3 19/27] KVM: arm64: Support SME priority registers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 22/27] KVM: arm64: Expose SME specific state to userspace
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 25/27] KVM: arm64: Provide interface for configuring and enabling SME for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 20/27] KVM: arm64: Provide assembly for SME state restore
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 27/27] KVM: arm64: selftests: Add SME to set_id_regs test
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 24/27] KVM: arm64: Handle SME exceptions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 17/27] KVM: arm64: Support TPIDR2_EL0
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 21/27] KVM: arm64: Support Z and P registers in streaming mode
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 13/27] KVM: arm64: Rename sve_state_reg_region
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 18/27] KVM: arm64: Support SMIDR_EL1 for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 11/27] KVM: arm64: Document the KVM ABI for SME
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 16/27] KVM: arm64: Add definitions for SME control register
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 15/27] KVM: arm64: Implement SME vector length configuration
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 14/27] KVM: arm64: Store vector lengths in an array
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 07/27] KVM: arm64: Convert cpacr_clear_set() to a static inline
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 12/27] KVM: arm64: Define internal features for SME
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 10/27] KVM: arm64: Rename SVE finalization constants to be more general
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 09/27] KVM: arm64: Factor SVE guest exit handling out into a function
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 08/27] KVM: arm64: Move SVE state access macros after feature test macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 06/27] KVM: arm64: Pull ctxt_has_ helpers to start of sysreg-sr.h
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 04/27] arm64/fpsimd: Determine maximum virtualisable SME vector length
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 05/27] KVM: arm64: Introduce non-UNDEF FGT control
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 03/27] arm64/fpsimd: Check enable bit for FA64 when saving EFI state
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 02/27] arm64/fpsimd: Decide to save ZT0 and streaming mode FFR at bind time
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 01/27] arm64/fpsimd: Update FA64 and ZT0 enables when loading SME state
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC v3 00/27] KVM: arm64: Implement support for SME in non-protected guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: "Christoph Schlameuss" <schlameuss@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: "Nico Boehr" <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH] kvm_config: add CONFIG_VIRTIO_FS
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/18] TDX MMU prep series part 1
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: TDX: Test dirty ring on a gmemfd slot
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 1/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 0/2] KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- kvm-coco-queue regression test report
- From: "Chen, Farrah" <farrah.chen@xxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [GIT PULL] KVM: x86: Fixes for 6.13-rcN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/8] KVM: selftests: Add infrastructure for getting vCPU binary stats
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/8] KVM: selftests: Add compile-time assertions to guard against stats typos
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/8] KVM: selftests: Get VM's binary stats FD when opening VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/8] KVM: selftests: Add struct and helpers to wrap binary stats cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/8] KVM: selftests: Macrofy vm_get_stat() to auto-generate stat name string
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/8] KVM: selftests: Assert that __vm_get_stat() actually finds a stat
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/8] KVM: selftests: Close VM's binary stats FD when releasing VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/8] KVM: selftests: Fix mostly theoretical leak of VM's binary stats FD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/8] KVM: selftests: Binary stats fixes and infra updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Add helpers for locally (un)blocking IRQs on x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KVM: selftests: KVM: SVM: Add Idle HLT intercept test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/4] KVM: nSVM: implement the nested idle halt intercept
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 0/4] KVM selftests enhancements
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 4/4] KVM: selftests: Replace previously used vm_get_stat() to macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 2/4] KVM: selftests: Add an interface to read the data of named vcpu stat
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: VMX: read the PML log in the same order as it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: refactor PML terminology
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: x86: read the PML log in the same order it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepoints
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepoints
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1 1/4] KVM: selftests: Add safe_halt() and cli() helpers to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepoints
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: John Stoffel <john@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Lei Yang <leiyang@xxxxxxxxxx>
- Re: [PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 3/5] vfio: VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT support pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 1/5] ida: Add ida_find_first_range()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 5/5] iommufd/selftest: Add coverage for reporting max_pasid_log2 via IOMMU_HW_INFO
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 4/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 2/5] vfio-iommufd: Support pasid [at|de]tach for physical VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 0/5] vfio-pci support pasid attach/detach
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [syzbot] [bcachefs?] WARNING in __srcu_check_read_flavor
- From: syzbot <syzbot+4a606091891fbc6811cf@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: let it be known that ignore_msrs is a bad idea
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: SVM: allow flipping the LFENCE_SERIALIZE bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v2 0/5] bugfix some driver issues
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v8 1/2] ppc: Enable 2nd DAWR support on Power10 PowerNV machine
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- [PATCH v2 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 3/5] hisi_acc_vfio_pci: bugfix cache write-back issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 2/5] hisi_acc_vfio_pci: add eq and aeq interruption restore
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 1/5] hisi_acc_vfio_pci: fix XQE dma address error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v2 0/5] bugfix some driver issues
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] riscv: Add Image header to flat binaries
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v6 4/4] i386/cpu: add has_caches flag to check smp_cache configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 3/4] i386/pc: Support cache topology in -machine for PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 2/4] i386/cpu: Update cache topology with machine's configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 1/4] i386/cpu: Support thread and module level cache topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [PATCH v6 0/4] i386: Support SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 0/5] riscv: add support for Zaamo and Zalrsc extensions
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: riscv: selftests: Add Zaamo/Zalrsc extensions to get-reg-list test
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] RISC-V: KVM: Allow Zaamo/Zalrsc extensions for Guest/VM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v4 0/3] riscv: add Svukte extension
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH v6 06/43] arm64: RME: Check for RME support at KVM init
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [PATCH v6 12/43] arm64: RME: Allocate/free RECs to match vCPUs
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: nVMX: Fix an SVI update bug with passthrough APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: nVMX: Honor event priority for PI ack at VM-Enter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: Mark Intel PT virtualization as BROKEN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Remove hwapic_irr_update() from kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Remove redundant TLB flush on guest CR4.PGE change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Macrofy SEV=n versions of sev_xxx_guest()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM/x86: add comment to kvm_mmu_do_page_fault()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/3] KVM: x86: tracepoint updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: SVM: Disable AVIC on SNP-enabled system without HvInUseWrAllowed feature
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] riscv: Add Image header to flat binaries
- From: Samuel Holland <samuel.holland@xxxxxxxxxx>
- Re: [RFC PATCH 00/22] KVM: x86: Virtualize IA32_APERF and IA32_MPERF MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/7] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- Re: [PATCH 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KVM: x86: add new nested vmexit tracepointsg
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: add more information to the kvm_entry tracepoint
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Enhance event delivery error handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 7/7] selftests: KVM: Add test case for MMIO during vectoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/7] selftests: KVM: extract lidt into helper function
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 5/7] KVM: SVM: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/7] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/7] KVM: x86: Add emulation status for unhandleable vectoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH 2/2] target/i386/sev: Reduce system specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/2] system: Move 'exec/confidential-guest-support.h' to system/
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 0/2] system/confidential-guest-support: Header cleanups
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v3] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v3 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 6/6] selftests: kvm: s390: Add has device attr check to uc_attr_mem_limit selftest
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Hariharan Mari <hari55@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] lib: s390x: add function to test available UV features
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] s390x: pv: Add test for large host pages backing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] lib: s390: add ptlb wrapper
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] s390x: pv: Add test for large host pages backing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/7] memory: Export a helper to get intersection of a MemoryRegionSection with a given range
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Simona Vetter <simona.vetter@xxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] riscv: Add Image header to flat binaries
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] riscv: Improved bare metal support
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v6 0/7] Support attaching PASID to the blocked_domain
- From: Joerg Roedel <joro@xxxxxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH v15 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Add support for VMware guest specific hypercalls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 57/57] KVM: x86: Use only local variables (no bitmask) to init kvm_cpu_caps
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 00/18] TDX MMU prep series part 1
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/20] KVM: selftests: Drop stale srandom() initialization from dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 20/20] KVM: selftests: Allow running a single iteration of dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 19/20] KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 17/20] KVM: selftests: Tighten checks around prev iter's last dirty page in ring
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 16/20] KVM: selftests: Ensure guest writes min number of pages in dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 15/20] KVM: sefltests: Verify value of dirty_log_test last page isn't bogus
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 13/20] KVM: selftests: Print (previous) last_page on dirty page value mismatch
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 12/20] KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 11/20] KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 06/20] KVM: selftests: Read per-page value into local var when verifying dirty_log_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] SEPT SEAMCALL retry proposal
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] selftests: KVM: Add test case for MMIO during vectoring
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 6/7] selftests: KVM: extract lidt into helper function
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 3/7] KVM: x86: Unprotect & retry before unhandleable vectoring check
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 0/7] Enhance event delivery error handling
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 5/7] KVM: SVM: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 4/7] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 2/7] KVM: x86: Add emulation status for unhandleable vectoring
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- [PATCH v3 1/7] KVM: x86: Add function for vectoring error generation
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 11/16] KVM: arm64: nv: Add Maintenance Interrupt emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] SEPT SEAMCALL retry proposal
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: "Paluri, PavanKumar" <papaluri@xxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Introduce SMP Cache Topology
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH 16/16] KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/16] KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 09/16] KVM: arm64: nv: Nested GICv3 emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/16] KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/16] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/16] KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/16] arm64: sysreg: Add layout for ICH_MISR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 15/16] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 14/16] KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/16] KVM: arm64: nv: Add Maintenance Interrupt emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/16] KVM: arm64: nv: Handle L2->L1 transition on interrupt injection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/16] KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/16] KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/16] arm64: sysreg: Add layout for ICH_VTR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/16] arm64: sysreg: Add layout for ICH_HCR_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/16] KVM: arm64: Move host SVE/SME state flags out of vCPU
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/16] KVM: arm64: Add NV GICv3 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Introduce SMP Cache Topology
- From: Alireza Sanaee <alireza.sanaee@xxxxxxxxxx>
- [PATCH v2 12/12] KVM: arm64: nv: Document EL2 timer API
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/12] KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/12] KVM: arm64: nv: Sanitise CNTHCTL_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/12] KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/12] KVM: arm64: nv: Add trap routing for CNTHCTL_EL2.EL1{NVPCT,NVVCT,TVT,TVCT}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/12] KVM: arm64: Handle counter access early in non-HYP context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/12] KVM: arm64: nv: Accelerate EL0 counter accesses from hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/12] KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV in use
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/12] KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/12] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/12] KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/12] KVM: arm64: Add NV timer support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
- From: Tony Lindgren <tony.lindgren@xxxxxxxxxxxxxxx>
- [PATCH v5 17/17] vfio/mlx5: Enable the DMA link API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 15/17] vfio/mlx5: Explicitly use number of pages instead of allocated length
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 16/17] vfio/mlx5: Rewrite create mkey flow to allow better code reuse
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 14/17] RDMA/umem: Separate implicit ODP initialization from explicit ODP
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 13/17] RDMA/core: Convert UMEM ODP DMA mapping to caching IOVA and page linkage
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 10/17] mm/hmm: let users to tag specific PFN with DMA mapped bit
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 11/17] mm/hmm: provide generic DMA managing logic
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 12/17] RDMA/umem: Store ODP access mask information in PFN
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 04/17] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 09/17] docs: core-api: document the IOVA-based API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 06/17] iommu/dma: Factor out a iommu_dma_map_swiotlb helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 08/17] dma-mapping: add a dma_need_unmap helper
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 02/17] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 05/17] dma-mapping: Provide an interface to allow allocate IOVA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 03/17] iommu: generalize the batched sync after map interface
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 01/17] PCI/P2PDMA: Refactor the p2pdma mapping helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH v5 00/17] Provide a new two step DMA mapping API
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Wei Lin Guay <wguay@xxxxxxxx>
- Re: [PATCH v15 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Wei Lin Guay <wguay@xxxxxxxx>
- Re: [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v6 43/60] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Juri Lelli <juri.lelli@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH] KVM: VMX: don't include '<linux/find.h>' directly
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 219602] New: Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: SVM: Provide helpers to set the error code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- RE: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: "Kasireddy, Vivek" <vivek.kasireddy@xxxxxxxxx>
- Re: [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Juri Lelli <juri.lelli@xxxxxxxxxx>
- RE: [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
- From: "Li, Yunxiang (Teddy)" <Yunxiang.Li@xxxxxxx>
- Re: [PATCH v2 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
- From: Christian König <christian.koenig@xxxxxxx>
- [PATCH 1/4] vfio: Add vfio_device_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 2/4] dma-buf: Add dma_buf_try_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 1/4] vfio: Add vfio_device_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [PATCH 2/4] dma-buf: Add dma_buf_try_get()
- From: Wei Lin Guay <wguay@xxxxxx>
- [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 219602] Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 6/6] selftests: kvm: s390: Add has device attr check to uc_attr_mem_limit selftest
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes on ucontrol VMs
- From: Christoph Schlameuss <schlameuss@xxxxxxxxxxxxx>
- [Bug 219602] New: Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
- From: bugzilla-daemon@xxxxxxxxxx
- RE: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [Bug 219588] [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2] PCI: Remove redundant macro
- From: zhangdongdong@xxxxxxxxxxxxxxxxxx
- Re: Re: [PATCH] PCI: Remove redundant macro
- From: DongdongZhang <zhangdongdong@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 6.13-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] KVM changes for Linux 6.13-rc3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 10/13] KVM: selftests: Add KVM Userfault mode to demand_paging_test
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v4 6/7] hostmem: Handle remapping of RAM
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 4/7] numa: Introduce and use ram_block_notify_remap()
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 7/7] system/physmem: Memory settings applied on remap notification
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 2/7] system/physmem: poisoned memory discard on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 5/7] hostmem: Factor out applying settings
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 3/7] accel/kvm: Report the loss of a large memory page
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 0/7] Poisoned memory recovery on reboot
- From: “William Roche <william.roche@xxxxxxxxxx>
- [PATCH v4 1/7] hwpoison_page_list and qemu_ram_remap are based on pages
- From: “William Roche <william.roche@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
- From: Ranguvar <ranguvar@xxxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH 20/20] KVM: selftests: Allow running a single iteration of dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 19/20] KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 18/20] KVM: selftests: Set per-iteration variables at the start of each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/20] KVM: selftests: Tighten checks around prev iter's last dirty page in ring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/20] KVM: selftests: Ensure guest writes min number of pages in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/20] KVM: sefltests: Verify value of dirty_log_test last page isn't bogus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/20] KVM: selftests: Print (previous) last_page on dirty page value mismatch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/20] KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/20] KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/20] KVM: selftests: Limit dirty_log_test's s390x workaround to s390x
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/20] KVM: selftests: Read per-page value into local var when verifying dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/20] KVM: selftests: Drop stale srandom() initialization from dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/20] KVM: selftests: Drop signal/kick from dirty ring testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/20] KVM: selftests: Support multiple write retires in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/20] KVM: selftests: Fixes and cleanups for dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: clear vcpu->run->hypercall.ret before exiting for KVM_EXIT_HYPERCALL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: vmx_pmu_caps_test fails on Skylake based CPUS due to read only LBRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] Collection of tests for canonical checks on LA57 enabled CPUs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Add printf attribute to _no_printf()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/18] KVM: x86/mmu: Prevent aliased memslot GFNs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/18] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/18] KVM: x86/tdp_mmu: Take root in tdp_mmu_for_each_pte()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/18] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/18] KVM: x86/tdp_mmu: Propagate tearing down mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/18] KVM: x86/tdp_mmu: Propagate building mirror page tables
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/18] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/18] KVM: x86/tdp_mmu: Take struct kvm in iter loops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/18] KVM: x86/mmu: Support GFN direct bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/18] KVM: Add member to struct kvm_gfn_range for target alias
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/18] KVM: x86: Add a VM type define for TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/18] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v5 00/18] TDX MMU prep series part 1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock holding for write at uninit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: clear vcpu->run->hypercall.ret before exiting for KVM_EXIT_HYPERCALL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 6.13 take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 17/27] KVM: x86: Mark CR4.FRED as not reserved when guest can use FRED
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
- From: Ivan Orlov <iorlov@xxxxxxxxxx>
- Re: [PATCH] PCI: Remove redundant macro
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 218267] [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [RFC PATCH v4 13/14] KVM: arm64: Handle guest_memfd()-backed guest page faults
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 12/14] KVM: arm64: Skip VMA checks for slots without userspace address
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 11/14] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 07/14] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 05/14] KVM: guest_memfd: Folio mappability states and functions that manage their transition
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 04/14] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 14/14] KVM: arm64: Enable guest_memfd private memory when pKVM is enabled
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 10/14] KVM: guest_memfd: Add a guest_memfd() flag to initialize it as mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 09/14] KVM: guest_memfd: Add KVM capability to check if guest_memfd is host mappable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 08/14] KVM: guest_memfd: Add guest_memfd support to kvm_(read|/write)_guest_page()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 06/14] KVM: guest_memfd: Handle final folio_put() of guestmem pages
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 03/14] KVM: guest_memfd: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 02/14] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [RFC PATCH v4 01/14] mm: Consolidate freeing of typed folios on final folio_put()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 6.13 take #1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] vfio/mdev: inline needed class_compat functionality
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible
- From: Brendan Jackman <jackmanb@xxxxxxxxxx>
- Re: [PATCH v6 43/60] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [syzbot] [tipc?] kernel BUG in __pskb_pull_tail
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [syzbot] [tipc?] kernel BUG in __pskb_pull_tail
- From: syzbot <syzbot+4f66250f6663c0c1d67e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH RFC v4 3/3] riscv: KVM: Add Svukte extension support for Guest/VM
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- [PATCH RFC v4 2/3] riscv: Add Svukte extension support
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- [PATCH RFC v4 0/3] riscv: add Svukte extension
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- [PATCH RFC v4 1/3] dt-bindings: riscv: Add Svukte entry
- From: Max Hsu <max.hsu@xxxxxxxxxx>
- Re: [PATCH v3 01/57] KVM: x86: Use feature_bit() to clear CONSTANT_TSC when emulating CPUID
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC 2/5] powerpc: kvm: drop 32-bit booke
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC 3/5] powerpc: kvm: drop 32-bit book3s
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] PCI: Remove redundant macro
- From: zhangdongdong@xxxxxxxxxxxxxxxxxx
- Re: [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
- From: Sandipan Das <sandipan.das@xxxxxxx>
- Re: [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC 1/5] mips: kvm: drop support for 32-bit hosts
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC 5/5] x86: kvm drop 32-bit host support
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH RFC/RFT] vfio/pci: Create feature to disable MSI virtualization
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]