Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v3 4/6] KVM: arm64: Make ID_AA64PFR0_EL1.RAS writable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/4] KVM: arm64: Live system register access fixes
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Bug 220453] kvm/arm64: nv - guest with hypervisor hangs
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v3 2/4] LoongArch: KVM: Access mailbox directly in mail_send()
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: Re: [syzbot ci] Re: Support "generic" CPUID timing leaf as KVM guest and host.
- From: syzbot ci <syzbot@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] RISC-V: KVM: Write hgatp register with valid mode bits
- From: fangyu.yu@xxxxxxxxxxxxxxxxx
- Re: [PATCH] KVM: arm64: Correctly populate FAR_EL2 on nested SEA injection
- From: Ben Horgan <ben.horgan@xxxxxxx>
- Re: [PATCH] KVM: arm64: Correctly populate FAR_EL2 on nested SEA injection
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 4/4] LoongArch: KVM: Make function kvm_own_lbt() robust
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/4] LoongArch: KVM: Small enhancements about IPI and LBT
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v8 06/30] KVM: selftests: Add helper functions to create TDX VMs
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH v2 2/3] crypto: ccp - Add new HV-Fixed page allocation/free API.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v6 1/7] x86/kexec: Consolidate relocate_kernel() function parameters
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v2 22/23] KVM: TDX: Handle Dynamic PAMT on page split
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 1/1] KVM: VMX: Use Hyper-V EPT flush for local TLB flushes
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH v2 3/4] KVM: arm64: Fix vcpu_{read,write}_sys_reg() accessors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v9 19/43] arm64: RME: Allow populating initial contents
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v1 5/6] vfio-pci/zdev: Perform platform specific function reset for zPCI
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- [PATCH v2 4/4] KVM: arm64: Remove __vcpu_{read,write}_sys_reg_{from,to}_cpu()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 06/30] KVM: selftests: Add helper functions to create TDX VMs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v12 00/24] Enable CET Virtualization
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: K Prateek Nayak <kprateek.nayak@xxxxxxx>
- Re: [PATCH v1 5/6] vfio-pci/zdev: Perform platform specific function reset for zPCI
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [RESEND PATCH v2 1/3] x86/sev: Add new quiet parameter to snp_leak_pages() API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 6.6.y 13/20] KVM: x86: Fully defer to vendor code to decide how to force immediate exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/3] x86/sev: Add new quiet parameter to snp_leak_pages() API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v12 18/24] KVM: VMX: Set host constant supervisor states to VMCS fields
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v1 5/6] vfio-pci/zdev: Perform platform specific function reset for zPCI
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/18] x86/apic: Initialize Secure AVIC APIC backing page
- From: "Upadhyay, Neeraj" <neeraj.upadhyay@xxxxxxx>
- RE: [PATCH 2/2] vfio/platform: Mark for removal
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v12 00/24] Enable CET Virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 3/4] x86/cpu/topology: Always try cpu_parse_topology_ext() on AMD/Hygon
- From: K Prateek Nayak <kprateek.nayak@xxxxxxx>
- Re: [PATCH v9 19/43] arm64: RME: Allow populating initial contents
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- RE: [PATCH 1/2] vfio/fsl-mc: Mark for removal
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 6.12.y 7/7] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 08/21] KVM: x86/pmu: Gate all "unimplemented MSR" prints on report_ignored_msrs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RESEND PATCH v2 0/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 0/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH 6.1.y 21/21] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 20/20] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 4/4] x86/cpu/topology: Check for X86_FEATURE_XTOPOLOGY instead of passing has_topoext
- From: K Prateek Nayak <kprateek.nayak@xxxxxxx>
- [PATCH v3 1/4] x86/msr-index: Define AMD64_CPUID_FN_EXT MSR
- From: K Prateek Nayak <kprateek.nayak@xxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 04/30] KVM: selftests: Add vCPU descriptor table initialization utility
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH v8 00/30] TDX KVM selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: x86: Restore caching of KVM CPUID base
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] kvm/kvm-all: declare kvm_park_vcpu static and make it local to kvm-all.c
- From: Ani Sinha <anisinha@xxxxxxxxxx>
- Re: [syzbot ci] Re: Support "generic" CPUID timing leaf as KVM guest and host.
- From: Aleksandr Nogikh <nogikh@xxxxxxxxxx>
- Re: [PATCH][v2] x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of PV_UNHALT
- From: "Guo, Wangyang" <wangyang.guo@xxxxxxxxx>
- Re: [PATCH v1 6/6] vfio: Allow error notification and recovery for ISM device
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v8 26/30] KVM: selftests: TDX: Add support for TDG.MEM.PAGE.ACCEPT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 5/6] selftests: kvm: s390: fixed spelling mistake in output
- From: Soham Metha <sohammetha01@xxxxxxxxx>
- Re: [PATCH 0/6] ONE_REG interface for SBI FWFT extension
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- [PATCH 6.1.y 10/21] KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 09/20] KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 1/4] LoongArch: KVM: Fix stack protector issue in send_ipi_data()
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [????] RE: [PATCH RESEND^2] x86/paravirt: add backoff mechanism to virt_spin_lock
- From: "Guo, Wangyang" <wangyang.guo@xxxxxxxxx>
- Re: [PATCH][v2] x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of PV_UNHALT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 07/16] x86/kvm/emulate: Introduce EM_ASM_1SRC2
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/18] x86/apic: Initialize Secure AVIC APIC backing page
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3 1/6] arm64: Add capability denoting FEAT_RASv1p1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 14/16] x86/fred: Play nice with invoking asm_fred_entry_from_kvm() on non-FRED hardware
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 0/3] Support "generic" CPUID timing leaf as KVM guest and host
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [syzbot ci] Re: Support "generic" CPUID timing leaf as KVM guest and host.
- From: syzbot ci <syzbot+ci156aec4dff349a40@xxxxxxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/4] KVM: Avoid synchronize_srcu() in kvm_io_bus_register_dev()
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- [PATCH v3 3/4] LoongArch: KVM: Add implementation with IOCSR_IPI_SET
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: arm64: Handle RASv1p1 registers
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v3 1/6] arm64: Add capability denoting FEAT_RASv1p1
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v2] KVM: x86: allow CPUID 0xC000_0000 to proceed on Zhaoxin CPUs
- From: Ewan Hai <ewanhai-oc@xxxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [BUG] vhost: perf tools build error after syncing vhost.h
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH RFC 0/2] KVM: TDX: MWAIT in guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v3 12/16] x86_64,hyperv: Use direct call to hypercall-page
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Fix vcpu_{read,write}_sys_reg() accessors
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [BUG] vhost: perf tools build error after syncing vhost.h
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 6.12.y 0/7] KVM: x86: Backports for 6.12.y
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [RESEND PATCH v2 3/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 3/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v8 06/30] KVM: selftests: Add helper functions to create TDX VMs
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 3/6] RISC-V: KVM: Introduce optional ONE_REG callbacks for SBI extensions
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 22/33] vfio: selftests: Add driver for Intel DSA
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH 3/6] RISC-V: KVM: Introduce optional ONE_REG callbacks for SBI extensions
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2 3/6] RISC-V: KVM: Introduce optional ONE_REG callbacks for SBI extensions
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 28/30] KVM: selftests: TDX: Add TDX UPM selftest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [RESEND PATCH v2 2/3] crypto: ccp - Add new HV-Fixed page allocation/free API.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH v3 6/6] KVM: arm64: Get rid of ARM64_FEATURE_MASK()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v12 22/24] KVM: nVMX: Enable CET support for nested guest
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v2 5/6] RISC-V: KVM: Implement ONE_REG interface for SBI FWFT state
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCHv2 00/12] TDX: Enable Dynamic PAMT
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH RFC 2/2] KVM: TDX: Add flag to support MWAIT instruction only
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 6.1.y 14/21] KVM: x86: Fully defer to vendor code to decide how to force immediate exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/4] x86/cpu/topology: Use initial APICID from XTOPOEXT on AMD/HYGON
- From: K Prateek Nayak <kprateek.nayak@xxxxxxx>
- Re: [PATCH v8 06/30] KVM: selftests: Add helper functions to create TDX VMs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: riscv: selftests: Add bfloat16 extension to get-reg-list test
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH 2/2] vfio/platform: Mark for removal
- From: Mostafa Saleh <smostafa@xxxxxxxxxx>
- Re: [PATCH v9 19/43] arm64: RME: Allow populating initial contents
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 02/30] KVM: selftests: Expose function that sets up sregs based on VM's mode
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Correct kvm_riscv_check_vcpu_requests() comment
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v2 2/6] RISC-V: KVM: Provide UAPI for Zicbop block size
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] RISC-V: KVM: Allow bfloat16 extension for Guest/VM
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH v10 0/2] Enable Secure TSC for SEV-SNP
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH 6.1.y 02/21] KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/6] RISC-V: KVM: Change zicbom/zicboz block size to depend on the host isa
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: riscv: selftests: Add Zicbop extension to get-reg-list test
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- [PATCH] vfio/pci: drop redundant conversion to bool
- From: Xichao Zhao <zhao.xichao@xxxxxxxx>
- [PATCH 6.6.y 19/20] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 20/21] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.12.y 6/7] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 04/20] KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 04/21] KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 6/6] vfio: Allow error notification and recovery for ISM device
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] RISC-V: KVM: Move copy_sbi_ext_reg_indices() to SBI implementation
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] KVM: riscv: selftests: Add SBI FWFT to get-reg-list test
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] vfio: Deprecate fsl-mc, platform, and amba
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- [PATCH 6.12.y 2/7] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Korakit Seemakhupt <korakit@xxxxxxxxxx>
- [PATCH v2 4/6] RISC-V: KVM: Move copy_sbi_ext_reg_indices() to SBI implementation
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 6.6.y 15/20] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 16/21] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Fix the interaction between SMM and the asynchronous pagefault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.12.y 1/7] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/33] vfio: Introduce selftests for VFIO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 00/33] vfio: Introduce selftests for VFIO
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 5/6] selftests: kvm: s390: fixed spelling mistake in output
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v8 06/30] KVM: selftests: Add helper functions to create TDX VMs
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH 6.6.y 18/20] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 00/24] Enable CET Virtualization
- From: Xin Li <xin@xxxxxxxxx>
- [PATCH 6.1.y 19/21] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.12.y 5/7] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [RFC PATCH v2 02/51] KVM: guest_memfd: Introduce and use shareability to guard faulting
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [PATCH 6.1.y 15/21] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 14/20] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 05/30] KVM: selftests: Update kvm_init_vm_address_properties() for TDX
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH 6.1.y 09/21] KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 08/20] KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.1.y 01/21] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 02/20] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/platform: Mark for removal
- From: Mostafa Saleh <smostafa@xxxxxxxxxx>
- Re: [PATCH 2/6] RISC-V: KVM: Introduce feature specific reset for SBI FWFT
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 6.6.y 03/20] KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 03/21] KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/33] vfio: Introduce selftests for VFIO
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 2/6] RISC-V: KVM: Introduce feature specific reset for SBI FWFT
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 6.1.y 00/21] KVM: x86: Backports for 6.1.y
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/platform: Mark for removal
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 6.6.y 00/20] KVM: x86: Backports for 6.6.y
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RESEND PATCH v2 1/3] x86/sev: Add new quiet parameter to snp_leak_pages() API
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 12/33] tools headers: Import iosubmit_cmds512()
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH v1 6/6] vfio: Allow error notification and recovery for ISM device
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH v9 03/18] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 4/6] selftests: kvm: riscv: fix spelling mistakes in comments
- From: Soham Metha <sohammetha01@xxxxxxxxx>
- [Bug 220453] New: kvm/arm64: nv - guest with hypervisor hangs
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH 6.1.y 06/21] KVM: x86: Snapshot the host's DEBUGCTL in common x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 06/20] KVM: x86: Snapshot the host's DEBUGCTL in common x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: loongarch: selftests: Remove common tests built by TEST_GEN_PROGS_COMMON
- From: Dong Yang <dayss1224@xxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 01/20] KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 6/6] vfio: Allow error notification and recovery for ISM device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 6.6.y 17/20] KVM: VMX: Extract checking of guest's DEBUGCTL into helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 18/21] KVM: VMX: Extract checking of guest's DEBUGCTL into helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.12.y 4/7] KVM: VMX: Extract checking of guest's DEBUGCTL into helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: loongarch: selftests: Remove common tests built by TEST_GEN_PROGS_COMMON
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: riscv: selftests: Add common supported test cases
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- [PATCH v3 5/6] KVM: arm64: Make ID_AA64PFR1_EL1.RAS_frac writable
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 1/6] RISC-V: KVM: Change zicbom/zicboz block size to depend on the host isa
- From: Troy Mitchell <troy.mitchell@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Using user-mode pte within kvm_riscv_gstage_ioremap
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [BUG] vhost: perf tools build error after syncing vhost.h
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH 6.1.y 12/21] KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] kvm/kvm-all: make kvm_park/unpark_vcpu local to kvm-all.c
- From: Ani Sinha <anisinha@xxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 29/30] KVM: selftests: TDX: Add TDX UPM selftests for implicit conversion
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 22/23] KVM: TDX: Handle Dynamic PAMT on page split
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: expose CPUID 0xC000_0000 for Zhaoxin "Shanghai" vendor
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Write hgatp register with valid mode bits
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Write hgatp register with valid mode bits
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 05/20] KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: riscv: selftests: Use the existing RISCV_FENCE macro in `rseq-riscv.h`
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 6.6.y 11/20] KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 05/21] KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: loongarch: selftests: Remove common tests built by TEST_GEN_PROGS_COMMON
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: riscv: selftests: Add missing headers for new testcases
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 6.1.y 13/21] KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 12/20] KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/3] x86/kvm: Obtain TSC frequency from CPUID if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: Hillf Danton <hdanton@xxxxxxxx>
- [PATCH 6.6.y 16/20] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.12.y 3/7] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 17/21] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: Set initial value of hedeleg in kvm_arch_vcpu_create()
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 00/30] TDX KVM selftests
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v2 0/6] ONE_REG interface for SBI FWFT extension
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] RISC-V: KVM: Set initial value of hedeleg in kvm_arch_vcpu_create()
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 6.12.y 0/7] KVM: x86: Backports for 6.12.y
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: Prevent HGATP_MODE_BARE passed
- From: fangyu.yu@xxxxxxxxxxxxxxxxx
- Re: [PATCH v2 0/3] KVM: riscv: selftests: Enable supported test cases
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 12/33] tools headers: Import iosubmit_cmds512()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH 6.6.y 10/20] KVM: VMX: Handle forced exit due to preemption timer in fastpath
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.1.y 11/21] KVM: VMX: Handle forced exit due to preemption timer in fastpath
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 23/30] KVM: selftests: Add functions to allow mapping as shared
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/7] x86/kexec: Consolidate relocate_kernel() function parameters
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2] RISC-V: KVM: Write hgatp register with valid mode bits
- From: Troy Mitchell <troy.mitchell@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/30] KVM: selftests: Add function to allow one-to-one GVA to GPA mappings
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Correct kvm_riscv_check_vcpu_requests() comment
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] KVM: x86: Provide TSC frequency in "generic" timing infomation CPUID leaf
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH V2] RISC-V: KVM: Write hgatp register with valid mode bits
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v2 2/6] RISC-V: KVM: Provide UAPI for Zicbop block size
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 6.1.y 07/21] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6.6.y 07/20] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm/kvm-all: declare kvm_park_vcpu static and make it local to kvm-all.c
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH v2 1/6] RISC-V: KVM: Change zicbom/zicboz block size to depend on the host isa
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH] RISC-V: KVM: Prevent HGATP_MODE_BARE passed
- Re: [PATCH 21/33] dmaengine: idxd: Allow registers.h to be included from tools/
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH V2] RISC-V: KVM: Write hgatp register with valid mode bits
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v5 09/44] perf/x86: Switch LVTPC to/from mediated PMI vector on guest load/put context
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 0/6] KVM: arm64: FEAT_RASv1p1 support and RAS selection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 5/5] LoongArch: KVM: Add address alignment check in pch_pic register access
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH v3 2/6] KVM: arm64: Handle RASv1p1 registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Using user-mode pte within kvm_riscv_gstage_ioremap
- From: fangyu.yu@xxxxxxxxxxxxxxxxx
- [PATCH v2 2/4] KVM: arm64: Simplify sysreg access on exception delivery
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot ci] Re: Support "generic" CPUID timing leaf as KVM guest and host.
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/18] x86/apic: Initialize Secure AVIC APIC backing page
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 5/6] KVM: arm64: Make ID_AA64PFR1_EL1.RAS_frac writable
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [RESEND PATCH v2 0/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] KVM: arm64: selftests: Sync ID_AA64MMFR3_EL1 in set_id_regs
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 0/4] LoongArch: KVM: Small enhancements about IPI and LBT
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Make ID_AA64PFR0_EL1.RAS writable
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v8 25/30] KVM: selftests: KVM: selftests: Expose new vm_vaddr_alloc_private()
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/6] KVM: arm64: Ignore HCR_EL2.FIEN set by L1 guest's EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: arm64: Check for SYSREGS_ON_CPU before accessing the 32bit state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] WARNING in virtio_transport_send_pkt_info
- From: syzbot <syzbot+b4d960daf7a3c7c2b7b1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 03/18] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
- From: "Upadhyay, Neeraj" <neeraj.upadhyay@xxxxxxx>
- Re: [PATCH V2] RISC-V: KVM: Write hgatp register with valid mode bits
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH v2 3/6] RISC-V: KVM: Allow Zicbop extension for Guest/VM
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Fix a semi theoretical bug in kvm_arch_async_page_present_queued
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] ONE_REG interface for SBI FWFT extension
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hw/ppc/spapr_hcall: Return host mitigation characteristics in KVM mode
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- [PATCH] vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH] RISC-V KVM: Remove unnecessary HGATP csr_read
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v2] hw/ppc/spapr_hcall: Return host mitigation characteristics in KVM mode
- From: Gautam Menghani <gautam@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Prevent HGATP_MODE_BARE passed
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: Set initial value of hedeleg in kvm_arch_vcpu_create()
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH 2/6] RISC-V: KVM: Introduce feature specific reset for SBI FWFT
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- [PATCH v3 3/4] KVM: Implement barriers before accessing kvm->buses[] on SRCU read paths
- From: Keir Fraser <keirf@xxxxxxxxxx>
- [PATCH v3 4/4] KVM: Avoid synchronize_srcu() in kvm_io_bus_register_dev()
- From: Keir Fraser <keirf@xxxxxxxxxx>
- [PATCH v3 1/4] KVM: arm64: vgic-init: Remove vgic_ready() macro
- From: Keir Fraser <keirf@xxxxxxxxxx>
- [PATCH v3 2/4] KVM: arm64: vgic: Explicitly implement vgic_dist::ready ordering
- From: Keir Fraser <keirf@xxxxxxxxxx>
- Re: [PATCH v7 2/3] migration: qm updates BAR configuration
- From: liulongfang <liulongfang@xxxxxxxxxx>
- [PATCH v3 0/4] KVM: Speed up MMIO registrations
- From: Keir Fraser <keirf@xxxxxxxxxx>
- Re: [PATCH v7 0/3] update live migration configuration region
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/platform: Mark for removal
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Using user-mode pte within kvm_riscv_gstage_ioremap
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/3] migration: qm updates BAR configuration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] KVM: arm64: Ignore HCR_EL2.FIEN set by L1 guest's EL2
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH 0/6] ONE_REG interface for SBI FWFT extension
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH kvmtool] virtio/pci: explicit zero unknown devices features
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 2/3] migration: qm updates BAR configuration
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH 00/33] vfio: Introduce selftests for VFIO
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [syzbot ci] Re: KVM: Speed up MMIO registrations
- From: syzbot ci <syzbot+cidf4b445961d44cba@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v2 3/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 03/18] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 1/2] LoongArch: KVM: Add sign extension with kernel MMIO read emulation
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/2] KVM: SVM: Fix missing LAPIC TPR sync into VMCB::V_TPR with AVIC on
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] LoongArch: KVM: Add sign extension with kernel IOCSR read emulation
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH 0/2] Add sign extension with kernel MMIO read emulation
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: K Prateek Nayak <kprateek.nayak@xxxxxxx>
- Re: [PATCH 0/6] ONE_REG interface for SBI FWFT extension
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Test TPR / CR8 sync and interrupt masking
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [EARLY RFC] KVM: SVM: Enable AVIC by default from Zen 4
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/3] Revert "x86: kvm: introduce periodic global clock updates"
- From: Lei Chen <lei.chen@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v1 2/3] Revert "x86: kvm: rate-limit global clock updates"
- From: Lei Chen <lei.chen@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/3] kvm:x86: simplify kvmclock update logic
- From: Lei Chen <lei.chen@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER
- From: Lei Yang <leiyang@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Micro-optimize SPEC_CTRL handling in __vmx_vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Prevent HGATP_MODE_BARE passed
- From: Troy Mitchell <troy.mitchell@xxxxxxxxx>
- [PATCH v1 3/3] KVM: x86: remove comment about ntp correction sync for
- From: Lei Chen <lei.chen@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] KVM: x86: Remove space before \n newline
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR when setting LAPIC regs
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH V7 3/3] x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V7 1/3] x86/tdx: Eliminate duplicate code in tdx_clear_page()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: Micro-optimize SPEC_CTRL handling in __vmx_vcpu_run()
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] riscv: skip csr restore if vcpu preempted reload
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH RESEND V2 2/2] x86/mce: Remove MCI_ADDR_PHYSADDR
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v12 17/24] KVM: VMX: Set up interception for CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 22/33] vfio: selftests: Add driver for Intel DSA
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V7 2/3] x86/tdx: Tidy reset_pamt functions
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH RESEND V2 0/2] Fixes for recovery for machine check in TDX/SEAM non-root mode
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V7 0/3] x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Yazen Ghannam <yazen.ghannam@xxxxxxx>
- Re: [PATCH 0/6] ONE_REG interface for SBI FWFT extension
- From: Radim Krčmář <rkrcmar@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 06/24] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 22/24] KVM: nVMX: Enable CET support for nested guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/33] vfio: Introduce selftests for VFIO
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v12 23/24] KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- RE: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v12 17/24] KVM: VMX: Set up interception for CET MSRs
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v12 17/24] KVM: VMX: Set up interception for CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 2/2] KVM: SVM: Enable Secure TSC for SNP guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/7] KVM: x86/mmu: Track TDP MMU NX huge pages separately
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 22/33] vfio: selftests: Add driver for Intel DSA
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH v12 20/24] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V7 3/3] x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v6 2/7] x86/sme: Use percpu boolean to control WBINVD during kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: Micro-optimize SPEC_CTRL handling in __vmx_vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V7 1/3] x86/tdx: Eliminate duplicate code in tdx_clear_page()
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [RESEND PATCH v2 1/3] x86/sev: Add new quiet parameter to snp_leak_pages() API
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH V7 2/3] x86/tdx: Tidy reset_pamt functions
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v7 3/3] migration: adapt to new migration configuration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 2/7] x86/sme: Use percpu boolean to control WBINVD during kexec
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 20/33] vfio: selftests: Add driver for Intel CBDMA
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [RFC PATCH 1/1] KVM: VMX: Use Hyper-V EPT flush for local TLB flushes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 19/33] dmaengine: ioat: Move system_has_dca_enabled() to dma.h
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH v9 04/18] x86/apic: Initialize APIC ID for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 05/18] x86/apic: Add update_vector() callback for apic drivers
- From: Borislav Petkov <bp@xxxxxxxxx>
- Questions about FUSE_NOTIFY_INVAL_ENTRY
- From: Jim Harris <jiharris@xxxxxxxxxx>
- [PATCH v11 5/8] KVM: SEV: Move init of SNP guest state into sev_init_vmcb()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 8/8] KVM: SVM: Enable Secure TSC for SNP guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 4/8] KVM: SVM: Move SEV-ES VMSA allocation to a dedicated sev_vcpu_create() helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/18] KVM: x86: Fastpath cleanups and PMU prep work
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 6/8] KVM: SEV: Set RESET GHCB MSR value during sev_es_init_vmcb()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 2/8] KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 1/8] KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 7/8] KVM: SEV: Fold sev_es_vcpu_reset() into sev_vcpu_create()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v11 3/8] x86/cpufeatures: Add SNP Secure TSC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 00/24] Enable CET Virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/6] KVM: VMX: Handle the immediate form of MSR instructions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86/mmu: Run TDP MMU NX huge page recovery under MMU read lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] arch/x86/kvm/ioapic: Remove license boilerplate with bad FSF address
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: fixes for SEV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix signedness issue with vCPU mmap size check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: x86: simplify kvm_vector_to_index()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: VMX: Add host MSR read/write helpers to consolidate preemption handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: allow CPUID 0xC000_0000 to proceed on Zhaoxin CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: remove redundant __GFP_NOWARN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: TDX: Remove redundant __GFP_ZERO
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: use array_index_nospec with indices that come from guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: VMX: Fix an indentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Move Intel and AMD module param helpers to x86/processor.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [EARLY RFC] KVM: SVM: Enable AVIC by default from Zen 4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Move kvm_iocsr tracepoint out of generic code
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v7 3/3] migration: adapt to new migration configuration
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH RFC 1/2] KVM: TDX: Disable general support for MWAIT in guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v12 17/24] KVM: VMX: Set up interception for CET MSRs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v9 03/18] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
- From: "Upadhyay, Neeraj" <neeraj.upadhyay@xxxxxxx>
- Re: [PATCH v9 04/18] x86/apic: Initialize APIC ID for Secure AVIC
- From: "Upadhyay, Neeraj" <neeraj.upadhyay@xxxxxxx>
- Re: [PATCH v9 05/18] x86/apic: Add update_vector() callback for apic drivers
- From: "Upadhyay, Neeraj" <neeraj.upadhyay@xxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Move kvm_iocsr tracepoint out of generic code
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v11 8/8] KVM: SVM: Enable Secure TSC for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v10 2/2] KVM: SVM: Enable Secure TSC for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v3 2/2] KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH] KVM: VMX: Micro-optimize SPEC_CTRL handling in __vmx_vcpu_run()
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v12 23/24] KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v8 3/3] hisi_acc_vfio_pci: adapt to new migration configuration
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v8 1/3] hisi_acc_vfio_pci: update BAR space size
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v8 2/3] crypto: hisilicon - qm updates BAR configuration
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: allow CPUID 0xC000_0000 to proceed on Zhaoxin CPUs
- From: Ewan Hai <ewanhai-oc@xxxxxxxxxxx>
- [PATCH v8 0/3] update live migration configuration region
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH v12 06/24] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v11 5/8] KVM: SEV: Move init of SNP guest state into sev_init_vmcb()
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v11 6/8] KVM: SEV: Set RESET GHCB MSR value during sev_es_init_vmcb()
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v11 7/8] KVM: SEV: Fold sev_es_vcpu_reset() into sev_vcpu_create()
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: K Prateek Nayak <kprateek.nayak@xxxxxxx>
- Re: Questions about FUSE_NOTIFY_INVAL_ENTRY
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [PATCH v11 4/8] KVM: SVM: Move SEV-ES VMSA allocation to a dedicated sev_vcpu_create() helper
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: "Gautham R. Shenoy" <gautham.shenoy@xxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH] KVM: VMX: Fix SPEC_CTRL handling
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: Micro-optimize SPEC_CTRL handling in __vmx_vcpu_run()
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 8/8] KVM: SVM: Enable Secure TSC for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v11 8/8] KVM: SVM: Enable Secure TSC for SNP guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: x86: simplify kvm_vector_to_index()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v3 1/2] RISC-V: KVM: Write hgatp register with valid mode bits
- From: fangyu.yu@xxxxxxxxxxxxxxxxx
- Re: [PATCH] LoongArch: KVM: Move kvm_iocsr tracepoint out of generic code
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH v3 2/2] RISC-V KVM: Remove unnecessary HGATP csr_read
- From: fangyu.yu@xxxxxxxxxxxxxxxxx
- [PATCH v3 0/2] Fix hgatp mode settings within kvm_riscv_gstage_vmid_detect
- From: fangyu.yu@xxxxxxxxxxxxxxxxx
- Re: [PATCH] kvm: x86: simplify kvm_vector_to_index()
- From: Jürgen Groß <jgross@xxxxxxxx>
- Re: [PATCH] kvm: x86: simplify kvm_vector_to_index()
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v8 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v8 0/2] Add SEV-SNP CipherTextHiding feature support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v8 1/2] KVM: SEV: Introduce new min,max sev_es and sev_snp asid variables
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [Invitation] bi-weekly guest_memfd upstream call on 2025-08-21
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] kvm: x86: simplify kvm_vector_to_index()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] RISC-V KVM: Remove unnecessary HGATP csr_read
- From: Troy Mitchell <troy.mitchell@xxxxxxxxx>
- [PATCH v10 15/43] arm64: RME: Allow VMM to set RIPAS
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 07/43] arm64: RME: ioctls to create and configure realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 20/43] arm64: RME: Runtime faulting of memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 04/43] arm64: RME: Add wrappers for RMI calls
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 11/43] arm64: RME: Allocate/free RECs to match vCPUs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 16/43] arm64: RME: Handle realm enter/exit
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v7 0/7] Add SEV-SNP CipherTextHiding feature support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v10 00/43] arm64: Support for Arm CCA in KVM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 03/43] arm64: RME: Add SMC definitions for calling the RMM
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 2/2] vfio/platform: Mark for removal
- From: Mostafa Saleh <smostafa@xxxxxxxxxx>
- [PATCH v10 05/43] arm64: RME: Check for RME support at KVM init
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 06/43] arm64: RME: Define the user ABI
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 10/43] arm64: RME: RTT tear down
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 13/43] arm64: RME: Support for the VGIC in realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 19/43] arm64: RME: Allow populating initial contents
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 32/43] arm64: RME: Enable PMU support with a realm guest
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 40/43] arm64: RME: Provide accurate register list
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v2 2/2] KVM: arm64: Reschedule as needed when destroying the stage-2 page-tables
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH v10 09/43] KVM: arm64: Allow passing machine type in KVM creation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 23/43] KVM: arm64: Handle Realm PSCI requests
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCHv2 00/12] TDX: Enable Dynamic PAMT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v10 14/43] KVM: arm64: Support timers in realm RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 18/43] KVM: arm64: Handle realm MMIO emulation
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 37/43] arm64: RME: Propagate max SVE vector length from RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v9 07/18] x86/apic: Add support to send IPI for Secure AVIC
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v10 22/43] KVM: arm64: Validate register access for a Realm VM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 38/43] arm64: RME: Configure max SVE vector length for a Realm
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v10 02/43] arm64: RME: Handle Granule Protection Faults (GPFs)
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 41/43] KVM: arm64: Expose support for private memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 39/43] arm64: RME: Provide register list for unfinalized RME RECs
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 26/43] arm64: RME: allow userspace to inject aborts
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 12/43] KVM: arm64: vgic: Provide helper for number of list registers
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 28/43] arm64: RME: Allow checking SVE on VM instance
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 08/43] kvm: arm64: Don't expose debug capabilities for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 21/43] KVM: arm64: Handle realm VCPU load
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 29/43] arm64: RME: Always use 4k pages for realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 25/43] arm64: Don't expose stolen time for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 30/43] arm64: RME: Prevent Device mappings for Realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 27/43] arm64: RME: support RSI_HOST_CALL
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 43/43] KVM: arm64: Allow activating realms
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 01/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 24/43] KVM: arm64: WARN on injected undef exceptions
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v10 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCHv2 00/12] TDX: Enable Dynamic PAMT
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- RE: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/platform: Mark for removal
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: arm64: Split kvm_pgtable_stage2_destroy()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: nSVM: Add test for EPT A/D bits
- From: Kevin Cheng <chengkev@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: nSVM: Add tests for instruction interrupts
- From: Kevin Cheng <chengkev@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: arm64: Reschedule as needed when destroying the stage-2 page-tables
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v5 1/1] x86: kvm: svm: set up ERAPS support for guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 10/16] PCI: Add pci_mfd_isolation()
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v5 1/1] x86: kvm: svm: set up ERAPS support for guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Yazen Ghannam <yazen.ghannam@xxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Questions about FUSE_NOTIFY_INVAL_ENTRY
- From: Jim Harris <jiharris@xxxxxxxxxx>
- [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v9 0/2] Add SEV-SNP CipherTextHiding feature support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v9 1/2] KVM: SEV: Introduce new min,max sev_es and sev_snp asid variables
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH 2/2] vfio/platform: Mark for removal
- From: Mostafa Saleh <smostafa@xxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Add myself as VFIO-platform reviewer
- From: Mostafa Saleh <smostafa@xxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 07/30] KVM: selftests: TDX: Use KVM_TDX_CAPABILITIES to validate TDs' attribute configuration
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH v8 07/30] KVM: selftests: TDX: Use KVM_TDX_CAPABILITIES to validate TDs' attribute configuration
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v3 3/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 2/3] crypto: ccp - Add new HV-Fixed page allocation/free API.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 0/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 1/3] x86/sev: Add new dump_rmp parameter to snp_leak_pages() API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v8 2/3] KVM: x86: Include host suspended duration in steal time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/3] KVM: x86: Advance guest TSC after deep suspend.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 3/3] KVM: x86: Add "suspendsteal" cmdline to request host to add suspend duration in steal time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] RISC-V KVM: Remove unnecessary HGATP csr_read
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 2/2] RISC-V KVM: Remove unnecessary HGATP csr_read
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 2/2] RISC-V KVM: Remove unnecessary HGATP csr_read
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] RISC-V KVM: Remove unnecessary HGATP csr_read
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH V2] RISC-V: KVM: Write hgatp register with valid mode bits
- [PATCH V4 3/3] RISC-V: KVM: Prevent HGATP_MODE_BARE passed
- [PATCH V4 1/3] RISC-V: KVM: Write hgatp register with valid mode bits
- [PATCH V4 2/3] RISC-V: KVM: Remove unnecessary HGATP csr_read
- [PATCH V4 0/3] Fixup & optimize hgatp mode & vmid detect functions
- Re: [PATCH v8 06/30] KVM: selftests: Add helper functions to create TDX VMs
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH v8 09/30] KVM: selftests: TDX: Add TDX lifecycle test
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 08/19] KVM: selftests: Define structs to pass parameters to TDX boot code
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 12/19] KVM: selftests: Add helper to initialize TDX VM
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 16/19] KVM: selftests: Add support for TDX TDCALL from guest
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 15/19] KVM: selftests: Hook TDX support to vm and vcpu creation
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 09/19] KVM: selftests: Add TDX boot code
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 14/19] KVM: selftests: Add helpers to init TDX memory and finalize VM
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 00/19] TDX KVM selftests
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 11/19] KVM: selftests: Set up TDX boot parameters region
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 10/19] KVM: selftests: Set up TDX boot code region
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH v8 06/30] KVM: selftests: Add helper functions to create TDX VMs
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 19/19] KVM: selftests: Add TDX lifecycle test
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 18/19] KVM: selftests: Add ucall support for TDX
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 03/19] KVM: selftests: Expose functions to get default sregs values
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 04/19] KVM: selftests: Expose function to allocate guest vCPU stack
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 05/19] KVM: selftests: Update kvm_init_vm_address_properties() for TDX
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 17/19] KVM: selftests: Add wrapper for TDX MMIO from guest
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 06/19] KVM: selftests: Expose segment definitons to assembly files
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 13/19] KVM: selftests: TDX: Use KVM_TDX_CAPABILITIES to validate TDs' attribute configuration
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 01/19] KVM: selftests: Include overflow.h instead of redefining is_signed_type()
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 07/19] KVM: selftests: Add kbuild definitons
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- [PATCH v9 02/19] KVM: selftests: Allocate pgd in virt_map() as necessary
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH v9 07/18] x86/apic: Add support to send IPI for Secure AVIC
- From: "Upadhyay, Neeraj" <neeraj.upadhyay@xxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Jürgen Groß <jgross@xxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 0/6] ONE_REG interface for SBI FWFT extension
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] riscv: skip csr restore if vcpu preempted reload
- From: "Nutty.Liu" <nutty.liu@xxxxxxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: Fix missing LAPIC TPR sync into VMCB::V_TPR with AVIC on
- From: Naveen N Rao <naveen@xxxxxxxxxx>
- Re: [PATCH v5 1/1] x86: kvm: svm: set up ERAPS support for guests
- From: Amit Shah <amit@xxxxxxxxxx>
- Re: [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v3 6/6] KVM: arm64: Get rid of ARM64_FEATURE_MASK()
- From: Ben Horgan <ben.horgan@xxxxxxx>
- Re: [PATCH v5 1/4] iommu/amd: Add support to remap/unmap IOMMU buffers for kdump
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v5 2/4] iommu/amd: Reuse device table for kdump
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v5 4/4] iommu/amd: Skip enabling command/event buffers for kdump
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: Fix missing LAPIC TPR sync into VMCB::V_TPR with AVIC on
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v13 19/21] KVM: nVMX: Add consistency checks for CET states
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 21/21] KVM: selftest: Add tests for KVM_{GET,SET}_ONE_REG
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 09/21] KVM: x86: Enable guest SSP read/write interface with new uAPIs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 12/21] KVM: VMX: Set up interception for CET MSRs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH RESEND V2 1/2] x86/mce: Fix missing address mask in recovery for errors in TDX/SEAM non-root mode
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v13 11/21] KVM: x86: Save and reload SSP to/from SMRAM
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 04/21] KVM: x86: Initialize kvm_caps.supported_xss
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: arm64: Handle RASv1p1 registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v13 18/21] KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 07/21] KVM: x86: Report KVM supported CET MSRs as to-be-saved
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 02/21] KVM: x86: Report XSS as to-be-saved if there are supported features
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 06/21] KVM: x86: Add fault checks for guest CR4.CET setting
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 20/21] KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET state
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: arm64: Handle RASv1p1 registers
- From: Ben Horgan <ben.horgan@xxxxxxx>
- Re: [PATCH v13 00/21] Enable CET Virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: Fix missing LAPIC TPR sync into VMCB::V_TPR with AVIC on
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- [PATCH v13 15/21] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v9 01/19] KVM: selftests: Include overflow.h instead of redefining is_signed_type()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v9 02/19] KVM: selftests: Allocate pgd in virt_map() as necessary
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v13 17/21] KVM: nVMX: Prepare for enabling CET support for nested guest
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v12 06/24] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 10/21] KVM: VMX: Emulate read and write to CET MSRs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 00/21] Enable CET Virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 14/21] KVM: x86: Don't emulate instructions guarded by CET
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 01/21] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 0/2] x86/kvm: Force legacy PCI hole as WB under SNP/TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 05/21] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 08/21] KVM: VMX: Introduce CET VMCS fields and control bits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 03/21] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 13/21] KVM: VMX: Set host constant supervisor states to VMCS fields
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 16/21] KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v9 01/19] KVM: selftests: Include overflow.h instead of redefining is_signed_type()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v1 RESEND 3/5] riscv: hwprobe: export Zilsd and Zclsd ISA extensions
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH 3/5] riscv: hwprobe: export Zilsd and Zclsd ISA extensions
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH v1 RESEND 1/5] dt-bidings: riscv: add Zilsd and Zclsd extension descriptions
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH 1/5] dt-bidings: riscv: add Zilsd and Zclsd extension descriptions
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH v1 RESEND 2/5] riscv: add ISA extension parsing for Zilsd and Zclsd
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH 2/5] riscv: add ISA extension parsing for Zilsd and Zclsd
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH V4 RESEND 3/3] RISC-V: KVM: Prevent HGATP_MODE_BARE passed
- [PATCH v1 RESEND 0/5] RISC-V: Add Zilsd/Zclsd support in hwprobe and KVM
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH 0/5] RISC-V: Add Zilsd/Zclsd support in hwprobe and KVM
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH v1 RESEND 5/5] KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH 5/5] KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: arm64: Get rid of ARM64_FEATURE_MASK()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 01/19] KVM: selftests: Include overflow.h instead of redefining is_signed_type()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v1 RESEND 4/5] riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- [PATCH 4/5] riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM
- From: Pincheng Wang <pincheng.plct@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: arm64: Handle RASv1p1 registers
- From: Ben Horgan <ben.horgan@xxxxxxx>
- [PATCH V4 RESEND 1/3] RISC-V: KVM: Write hgatp register with valid mode bits
- [PATCH V4 RESEND 2/3] RISC-V: KVM: Remove unnecessary HGATP csr_read
- [PATCH V4 RESEND 0/3] Fixup & optimize hgatp mode & vmid detect functions
- Re: [PATCH v9 2/2] KVM: SEV: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH] KVM: s390: Fix access to unavailable adapter indicator pages during postcopy
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Support "generic" CPUID timing leaf as KVM guest and host
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: SNP guest policy support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Support "generic" CPUID timing leaf as KVM guest and host
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/3] hisi_acc_vfio_pci: adapt to new migration configuration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v4 7/7] KVM: SVM: Add AVIC support for 4k vCPUs in x2AVIC mode
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v4 5/7] KVM: SVM: Move AVIC Physical ID table allocation to vcpu_precreate()
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v4 2/7] KVM: SVM: Add a helper to look up the max physical ID for AVIC
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v4 1/7] KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v4 6/7] x86/cpufeatures: Add X86_FEATURE_X2AVIC_EXT
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v4 3/7] KVM: SVM: Replace hard-coded value 0x1FF with the corresponding macro
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v4 4/7] KVM: SVM: Expand AVIC_PHYSICAL_MAX_INDEX_MASK to be a 12-bit field
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- [PATCH v4 0/7] KVM: SVM: Add support for 4k vCPUs with x2AVIC
- From: "Naveen N Rao (AMD)" <naveen@xxxxxxxxxx>
- Re: [PATCHv2 08/12] KVM: TDX: Handle PAMT allocation in fault path
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 13/15] x86/cpu/intel: Bound the non-architectural constant_tsc model checks
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH v3 13/15] x86/cpu/intel: Bound the non-architectural constant_tsc model checks
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCHv2 08/12] KVM: TDX: Handle PAMT allocation in fault path
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCHv2 08/12] KVM: TDX: Handle PAMT allocation in fault path
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Support "generic" CPUID timing leaf as KVM guest and host
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC 00/35] mm: remove nth_page()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 13/15] x86/cpu/intel: Bound the non-architectural constant_tsc model checks
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] KVM: selftests: Expose segment definitons to assembly files
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH RFC 01/35] mm: stop making SPARSEMEM_VMEMMAP user-selectable
- From: Zi Yan <ziy@xxxxxxxxxx>
- [PATCH RFC 21/35] mm/cma: refuse handing out non-contiguous page ranges
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC 06/35] mm/page_alloc: reject unreasonable folio/compound page sizes in alloc_contig_range_noprof()
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [PATCH RFC 11/35] mm: sanity-check maximum folio size in folio_set_order()
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [PATCH 00/33] vfio: Introduce selftests for VFIO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH RFC 31/35] crypto: remove nth_page() usage within SG entry
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH RFC 20/35] mips: mm: convert __flush_dcache_pages() to __flush_dcache_folio_pages()
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH RFC 18/35] io_uring/zcrx: remove "struct io_copy_cache" and one nth_page() usage
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH RFC 10/35] mm/hugetlb: cleanup hugetlb_folio_init_tail_vmemmap()
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH RFC 01/35] mm: stop making SPARSEMEM_VMEMMAP user-selectable
- From: David Hildenbrand <david@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]