Linux KVM for ARM Processors
[Prev Page][Next Page]
- [RFC PATCH v5 08/38] KVM: arm64: Unlock memslots after stage 2 tables are freed
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [RFC PATCH v5 06/38] KVM: arm64: Delay tag scrubbing for locked memslots until a VCPU runs
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [RFC PATCH v5 05/38] KVM: arm64: Perform CMOs on locked memslots when userspace resets VCPUs
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [RFC PATCH v5 04/38] KVM: arm64: Defer CMOs for locked memslots until a VCPU is run
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [RFC PATCH v5 03/38] KVM: arm64: Implement the memslot lock/unlock functionality
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [RFC PATCH v5 02/38] KVM: arm64: Add lock/unlock memslot user API
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [RFC PATCH v5 01/38] KVM: arm64: Make lock_all_vcpus() available to the rest of KVM
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [RFC PATCH v5 00/38] KVM: arm64: Add Statistical Profiling Extension (SPE) support
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 6/7] KVM: powerpc: Use Makefile.kvm for common files
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] KVM: s390: Use Makefile.kvm for common files
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [RFC PATCH v3 29/29] KVM: arm64: selftests: Introduce id_reg_test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 28/29] KVM: arm64: Add kunit test for trap initialization
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 27/29] KVM: arm64: Initialize trapping of disabled CPU features for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 26/29] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 25/29] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 24/29] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 23/29] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 22/29] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 21/29] KVM: arm64: Introduce framework to trap disabled features
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 20/29] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 18/29] KVM: arm64: Add kunit test for ID register validation
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 19/29] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 17/29] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_CONFIGURABLE capability
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 16/29] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 15/29] KVM: arm64: Make ID registers without id_reg_info writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 14/29] KVM: arm64: Make MVFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 13/29] KVM: arm64: Make ID_MMFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 12/29] KVM: arm64: Make ID_DFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 11/29] KVM: arm64: Make ID_DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 10/29] KVM: arm64: Make ID_AA64DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 09/29] KVM: arm64: Hide IMPLEMENTATION DEFINED PMU support for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 08/29] KVM: arm64: Make ID_AA64MMFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 07/29] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 06/29] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 05/29] KVM: arm64: Make ID_AA64PFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 04/29] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 03/29] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 02/29] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 01/29] KVM: arm64: Add has_reset_once flag for vcpu
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v3 00/29] KVM: arm64: Make CPU ID registers writable by userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: powerpc: Use Makefile.kvm for common files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: RISC-V: Use Makefile.kvm for common files
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/7] KVM: s390: Use Makefile.kvm for common files
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 4/7] KVM: mips: Use Makefile.kvm for common files
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/7] KVM: Add Makefile.kvm for common files, use it for x86
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/7] KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RING
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 6/7] KVM: powerpc: Use Makefile.kvm for common files
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 7/7] KVM: arm64: Use Makefile.kvm for common files
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 0/7] KVM: Add Makefile.kvm for common files
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/7] KVM: Convert kvm_for_each_vcpu() to using xa_for_each_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 6/7] KVM: Use 'unsigned long' as kvm_for_each_vcpu()'s index
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 5/7] KVM: Convert the kvm->vcpus array to a xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 4/7] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/7] KVM: Move wiping of the kvm->vcpus array to common code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/7] KVM: mips: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/7] KVM: s390: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/7] KVM: Turn the vcpu array into an xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: Turn the vcpu array into an xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: Turn the vcpu array into an xarray
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: Turn the vcpu array into an xarray
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH 0/5] KVM: Turn the vcpu array into an xarray
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: Turn the vcpu array into an xarray
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH 4/5] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH kvmtool 8/9] update_headers.sh: Sync headers with Linux v5.16-rc1 + SET_PMU attribute
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 9/9] arm64: Add support for KVM_ARM_VCPU_PMU_V3_SET_PMU
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 7/9] util: Add cpulist_parse()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 6/9] util: Add basic cpumask functions
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 5/9] arm64: Rework set_pmu_attr()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 4/9] arm: Make the PMUv3 emulation code arm64 specific
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 3/9] arm: Get rid of the ARM_VCPU_FEATURE_FLAGS() macro
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 2/9] arm: Move arch specific VCPU features to the arch specific function
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 1/9] linux/err.h: Add missing stdbool.h include
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH kvmtool 0/9] arm64: Improve PMU support on heterogeneous systems
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH 4/4] KVM: arm64: Refuse to run VCPU if the PMU doesn't match the physical CPU
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH 3/4] KVM: arm64: Add KVM_ARM_VCPU_PMU_V3_SET_PMU attribute
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH 2/4] KVM: arm64: Keep a list of probed PMUs
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH 1/4] perf: Fix wrong name in comment for struct perf_cpu_context
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH 0/4] KVM: arm64: Improve PMU support on heterogeneous systems
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH] KVM: arm64: remove unneeded comparison
- From: Jason Wang <wangborong@xxxxxxxxxx>
- Re: [PATCH v5.5 26/30] KVM: Keep memslots in tree-based structures instead of array-based ones
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: remove unneeded comparison
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- [RFC PATCH v2 11/11] selftests: KVM: aarch64: Add the bitmap firmware registers to get-reg-list
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 10/11] selftests: KVM: aarch64: Introduce hypercall ABI test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 09/11] tools: Import ARM SMCCC definitions
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 07/11] Docs: KVM: Add doc for the bitmap firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 08/11] Docs: KVM: Rename psci.rst to hypercalls.rst
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 06/11] KVM: arm64: Add vendor hypervisor firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 05/11] KVM: arm64: Add standard hypervisor firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 04/11] KVM: arm64: Setup a framework for hypercall bitmap firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 03/11] KVM: Introduce kvm_vm_has_run_once
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 02/11] KVM: Introduce kvm_vcpu_has_run_once
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 01/11] KVM: arm64: Factor out firmware register handling from psci.c
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH v2 00/11] KVM: arm64: Add support for hypercall services selection
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 5.16, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 07/15] KVM: arm64: Support page-not-present notification
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] GIC ITS tests
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] GIC ITS tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] GIC ITS tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] GIC ITS tests
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] arch-run: do not process ERRATA when running under TCG
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] arm64: enable its-migration tests for TCG
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] arm64: remove invalid check from its-trigger test
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] GIC ITS tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v5.5 00/30] KVM: Scalable memslots implementation
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 30/30] KVM: Dynamically allocate "new" memslots from the get-go
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 29/30] KVM: Wait 'til the bitter end to initialize the "new" memslot
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 24/30] KVM: Use interval tree to do fast hva lookup in memslots
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 26/30] KVM: Keep memslots in tree-based structures instead of array-based ones
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 23/30] KVM: Resolve memslot ID via a hash table instead of via a static array
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v4 01/17] perf: Protect perf_guest_cbs with RCU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5.5 30/30] KVM: Dynamically allocate "new" memslots from the get-go
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5.5 24/30] KVM: Use interval tree to do fast hva lookup in memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5.5 23/30] KVM: Resolve memslot ID via a hash table instead of via a static array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5.5 26/30] KVM: Keep memslots in tree-based structures instead of array-based ones
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 16/17] KVM: arm64: Drop perf.c and fold its tiny bits of code into arm.c
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 15/17] KVM: arm64: Hide kvm_arm_pmu_available behind CONFIG_HW_PERF_EVENTS=y
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/4] KVM: arm64: Change the return type of kvm_vcpu_preferred_target()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 4/4] KVM: arm64: Fix host stage-2 finalization
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/4] KVM: arm64: Extract ESR_ELx.EC only
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/4] KVM: arm64: nvhe: Fix a non-kernel-doc comment
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/4] KVM/arm64 fixes for 5.16, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 00/17] perf: KVM: Fix, optimize, and clean up callbacks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 01/17] perf: Protect perf_guest_cbs with RCU
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 15/15] KVM: arm64: Add async PF document
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 01/17] perf: Protect perf_guest_cbs with RCU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v4 17/17] perf: Drop guest callback (un)register stubs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 16/17] KVM: arm64: Drop perf.c and fold its tiny bits of code into arm.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 15/17] KVM: arm64: Hide kvm_arm_pmu_available behind CONFIG_HW_PERF_EVENTS=y
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 14/17] KVM: arm64: Convert to the generic perf callbacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 13/17] KVM: x86: Move Intel Processor Trace interrupt handler to vmx.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 12/17] KVM: Move x86's perf guest info callbacks to generic KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 10/17] KVM: x86: Drop current_vcpu for kvm_running_vcpu + kvm_arch_vcpu variable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 11/17] KVM: x86: More precisely identify NMI from guest when handling PMI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 09/17] perf/core: Use static_call to optimize perf_guest_info_callbacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 08/17] perf: Force architectures to opt-in to guest callbacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 07/17] perf: Add wrappers for invoking guest callbacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 06/17] perf/core: Rework guest callbacks to prepare for static_call support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 05/17] perf: Drop dead and useless guest "support" from arm, csky, nds32 and riscv
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 04/17] perf: Stop pretending that perf can handle multiple guest callbacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 03/17] KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 02/17] KVM: x86: Register perf callbacks after calling vendor's hardware_setup()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 01/17] perf: Protect perf_guest_cbs with RCU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 00/17] perf: KVM: Fix, optimize, and clean up callbacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 06/15] KVM: arm64: Add paravirtualization header files
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 05/15] KVM: arm64: Export kvm_handle_user_mem_abort()
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 04/15] KVM: x86: Use generic async PF slot management
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 03/15] KVM: async_pf: Make GFN slot management generic
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 03/15] KVM: async_pf: Make GFN slot management generic
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 01/15] KVM: async_pf: Move struct kvm_async_pf around
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 02/15] KVM: async_pf: Add helper function to check completion queue
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 00/21] Support SDEI Virtualization
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 19/21] KVM: arm64: Support SDEI event cancellation
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 18/21] KVM: arm64: Support SDEI event injection
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 20/21] KVM: arm64: Export SDEI capability
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 16/21] KVM: arm64: Support SDEI ioctl commands on VM
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v4 15/21] KVM: arm64: Support SDEI event notifier
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 06/21] KVM: arm64: Support SDEI_EVENT_CONTEXT hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 13/21] KVM: arm64: Impment SDEI event delivery
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 14/21] KVM: arm64: Support SDEI_EVENT_{COMPLETE, COMPLETE_AND_RESUME} hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v3 08/16] perf: Force architectures to opt-in to guest callbacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 15/16] KVM: arm64: Drop perf.c and fold its tiny bits of code into arm.c / pmu.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 12/21] KVM: arm64: Support SDEI_{PRIVATE, SHARED}_RESET hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 11/21] KVM: arm64: Support SDEI_PE_{MASK, UNMASK} hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 10/21] KVM: arm64: Support SDEI_EVENT_ROUTING_SET hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v5.5 20/30] KVM: x86: Use nr_memslot_pages to avoid traversing the memslots array
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v4 09/21] KVM: arm64: Support SDEI_EVENT_GET_INFO hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 08/21] KVM: arm64: Support SDEI_EVENT_STATUS hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 07/21] KVM: arm64: Support SDEI_EVENT_UNREGISTER hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 05/21] KVM: arm64: Support SDEI_EVENT_{ENABLE, DISABLE} hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 04/21] KVM: arm64: Support SDEI_EVENT_REGISTER hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 02/21] KVM: arm64: Add SDEI virtualization infrastructure
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 03/21] KVM: arm64: Support SDEI_VERSION hypercall
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 01/21] KVM: arm64: Introduce template for inline functions
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v5.5 00/30] KVM: Scalable memslots implementation
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 20/30] KVM: x86: Use nr_memslot_pages to avoid traversing the memslots array
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 18/30] KVM: Don't make a full copy of the old memslot in __kvm_set_memory_region()
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 15/30] KVM: Use prepare/commit hooks to handle generic memslot metadata updates
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 16/30] KVM: x86: Don't assume old/new memslots are non-NULL at memslot commit
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 12/30] KVM: x86: Use "new" memslot instead of userspace memory region
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 14/30] KVM: Stop passing kvm_userspace_memory_region to arch memslot hooks
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 07/30] KVM: Let/force architectures to deal with arch specific memslot data
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 06/30] KVM: Use "new" memslot's address space ID instead of dedicated param
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 05/30] KVM: Resync only arch fields when slots_arch_lock gets reacquired
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 04/30] KVM: Open code kvm_delete_memslot() into its only caller
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 03/30] KVM: Require total number of memslot pages to fit in an unsigned long
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 02/30] KVM: Disallow user memslot with size that exceeds "unsigned long"
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: "Maciej S. Szmigiero" <maciej.szmigiero@xxxxxxxxxx>
- Re: [PATCH v5.5 08/30] KVM: arm64: Use "new" memslot instead of userspace memory region
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 17/17] KVM: selftests: aarch64: add test for restoring active IRQs
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 15/17] KVM: selftests: aarch64: add tests for IRQFD in vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 16/17] KVM: selftests: aarch64: add ISPENDR write tests in vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 14/17] KVM: selftests: add IRQ GSI routing library functions
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 13/17] KVM: selftests: aarch64: add test_inject_fail to vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 12/17] KVM: selftests: aarch64: add tests for LEVEL_INFO in vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 11/17] KVM: selftests: aarch64: level-sensitive interrupts tests in vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 10/17] KVM: selftests: aarch64: add preemption tests in vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 09/17] KVM: selftests: aarch64: cmdline arg to set EOI mode in vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 08/17] KVM: selftests: aarch64: cmdline arg to set number of IRQs in vgic_irq test
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 07/17] KVM: selftests: aarch64: abstract the injection functions in vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 06/17] KVM: selftests: aarch64: add vgic_irq to test userspace IRQ injection
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 05/17] KVM: selftests: aarch64: add vGIC library functions to deal with vIRQ state
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 04/17] KVM: selftests: add kvm_irq_line library function
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 03/17] KVM: selftests: aarch64: add GICv3 register accessor library functions
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 02/17] KVM: selftests: aarch64: add function for accessing GICv3 dist and redist registers
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 01/17] KVM: selftests: aarch64: move gic_v3.h to shared headers
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 00/17] KVM: selftests: aarch64: Test userspace IRQ injection
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v5.5 20/30] KVM: x86: Use nr_memslot_pages to avoid traversing the memslots array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5.5 00/30] KVM: Scalable memslots implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5.5 07/30] KVM: Let/force architectures to deal with arch specific memslot data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: How to translate a VA in Guest to PA in Host?
- From: Chenxu Wang <irakatz51@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix host stage-2 finalization
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: How to translate a VA in Guest to PA in Host?
- From: Marc Zyngier <maz@xxxxxxxxxxxxxxx>
- How to translate a VA in Guest to PA in Host?
- From: Chenxu Wang <irakatz51@xxxxxxxxx>
- [PATCH] KVM: arm64: Fix host stage-2 finalization
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: s390: Use kvm_get_vcpu() instead of open-coded access
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH -next] KVM: arm64: change the return type of kvm_vcpu_preferred_target()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm/hyp/nvhe: fix a non-kernel-doc comment
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH -next] KVM: arm64: change the return type of kvm_vcpu_preferred_target()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v2 04/28] KVM: arm64: Keep consistency of ID registers between vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: mips: Use kvm_get_vcpu() instead of open-coded access
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] arm64: kvm/hyp/nvhe: fix a non-kernel-doc comment
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/5] KVM: s390: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/5] KVM: mips: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/5] KVM: Turn the vcpu array into an xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 18/28] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH -next] KVM: arm64: change the return type of kvm_vcpu_preferred_target()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [RFC PATCH 6/8] tools: Import the firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [RFC PATCH v2 18/28] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 04/28] KVM: arm64: Keep consistency of ID registers between vCPUs
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 01/28] KVM: arm64: Add has_reset_once flag for vcpu
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH v3 0/5] x86/kvm: Virtual suspend time injection support
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- Re: [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5.5 30/30] KVM: Dynamically allocate "new" memslots from the get-go
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 26/30] KVM: Keep memslots in tree-based structures instead of array-based ones
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 29/30] KVM: Wait 'til the bitter end to initialize the "new" memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 28/30] KVM: Optimize overlapping memslots check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 27/30] KVM: Optimize gfn lookup in kvm_zap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 24/30] KVM: Use interval tree to do fast hva lookup in memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 25/30] KVM: s390: Introduce kvm_s390_get_gfn_end()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 23/30] KVM: Resolve memslot ID via a hash table instead of via a static array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 22/30] KVM: Move WARN on invalid memslot index to update_memslots()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 21/30] KVM: Integrate gfn_to_memslot_approx() into search_memslots()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 20/30] KVM: x86: Use nr_memslot_pages to avoid traversing the memslots array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 19/30] KVM: x86: Don't call kvm_mmu_change_mmu_pages() if the count hasn't changed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 18/30] KVM: Don't make a full copy of the old memslot in __kvm_set_memory_region()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 17/30] KVM: s390: Skip gfn/size sanity checks on memslot DELETE or FLAGS_ONLY
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 16/30] KVM: x86: Don't assume old/new memslots are non-NULL at memslot commit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 15/30] KVM: Use prepare/commit hooks to handle generic memslot metadata updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 14/30] KVM: Stop passing kvm_userspace_memory_region to arch memslot hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 13/30] KVM: RISC-V: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 12/30] KVM: x86: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 11/30] KVM: s390: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 10/30] KVM: PPC: Avoid referencing userspace memory region in memslot updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 09/30] KVM: MIPS: Drop pr_debug from memslot commit to avoid using "mem"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 08/30] KVM: arm64: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 05/30] KVM: Resync only arch fields when slots_arch_lock gets reacquired
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 07/30] KVM: Let/force architectures to deal with arch specific memslot data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 06/30] KVM: Use "new" memslot's address space ID instead of dedicated param
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 04/30] KVM: Open code kvm_delete_memslot() into its only caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 03/30] KVM: Require total number of memslot pages to fit in an unsigned long
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 02/30] KVM: Disallow user memslot with size that exceeds "unsigned long"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 00/30] KVM: Scalable memslots implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 6/8] tools: Import the firmware registers
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [RFC PATCH v2 28/28] KVM: arm64: selftests: Introduce id_reg_test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 27/28] KVM: arm64: Activate trapping of disabled CPU features for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 26/28] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 25/28] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 24/28] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 23/28] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 22/28] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 21/28] KVM: arm64: Introduce framework to trap disabled features
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 20/28] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 19/28] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 18/28] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 17/28] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 16/28] KVM: arm64: Make ID registers without id_reg_info writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 15/28] KVM: arm64: Make MVFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 14/28] KVM: arm64: Make ID_MMFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 13/28] KVM: arm64: Make ID_DFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 12/28] KVM: arm64: Make ID_DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 11/28] KVM: arm64: Make ID_AA64DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 10/28] KVM: arm64: Hide IMPLEMENTATION DEFINED PMU support for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 09/28] KVM: arm64: Make ID_AA64MMFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 08/28] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 07/28] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 06/28] KVM: arm64: Make ID_AA64PFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 05/28] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 04/28] KVM: arm64: Keep consistency of ID registers between vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 03/28] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 01/28] KVM: arm64: Add has_reset_once flag for vcpu
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 00/28] KVM: arm64: Make CPU ID registers writable by userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 5/6] selftests: KVM: Add OSLSR_EL1 to the list of blessed regs
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 0/6] KVM: arm64: Emulate the OS lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [RFC PATCH 8/8] selftests: KVM: aarch64: Introduce hypercall ABI test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 7/8] tools: Import ARM SMCCC definitions
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 6/8] tools: Import the firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 5/8] KVM: arm64: Add vendor hypervisor service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 4/8] KVM: arm64: Add standard hypervisor service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 0/8] KVM: arm64: Add support for hypercall services selection
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 43/43] KVM: VMX: Don't do full kick when handling posted interrupt wakeup
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 42/43] KVM: VMX: Fold fallback path into triggering posted IRQ helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 41/43] KVM: VMX: Pass desired vector instead of bool for triggering posted IRQ
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 40/43] KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 38/43] KVM: Drop defunct kvm_arch_vcpu_(un)blocking() hooks
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 36/43] KVM: SVM: Don't bother checking for "running" AVIC when kicking for IPIs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 5.16
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Allow the guest to change the OS Lock status
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 5.16
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Allow the guest to change the OS Lock status
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Fixes for the exposed debug architecture
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 34/43] KVM: x86: Remove defunct pre_block/post_block kvm_x86_ops hooks
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv,sw}_timer() helpers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 32/43] KVM: VMX: Move preemption timer <=> hrtimer dance to common x86
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 30/43] KVM: Drop unused kvm_vcpu.pre_pcpu field
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 29/43] KVM: VMX: Handle PI wakeup shenanigans during vcpu_put/load
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 21/43] KVM: VMX: Clean up PI pre/post-block WARNs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 22/43] KVM: VMX: Drop unnecessary PI logic to handle impossible conditions
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 25/43] KVM: VMX: Save/restore IRQs (instead of CLI/STI) during PI pre/post block
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 24/43] KVM: VMX: Drop pointless PI.NDST update when blocking
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 21/43] KVM: VMX: Clean up PI pre/post-block WARNs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: arm64: Stop mapping current thread_info at EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 5/5] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: arm64: Rework FPSIMD/SVE tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: arm64: Reorder vcpu flag definitions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 20/43] KVM: VMX: Skip Posted Interrupt updates if APICv is hard disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 23/43] KVM: VMX: Use boolean returns for Posted Interrupt "test" helpers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 19/43] KVM: Add helpers to wake/query blocking vCPU
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 18/43] KVM: x86: Invoke kvm_vcpu_block() directly for non-HALTED wait states
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Remove unused TRNG_NO_ENTROPY
- From: Qian Cai <quic_qiancai@xxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Avoid shadowing a previous local
- From: Qian Cai <quic_qiancai@xxxxxxxxxxx>
- Re: [PATCH v2 17/43] KVM: x86: Directly block (instead of "halting") UNINITIALIZED vCPUs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 16/43] KVM: Don't redo ktime_get() when calculating halt-polling stop/deadline
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 12/43] KVM: x86: Tweak halt emulation helper names to free up kvm_vcpu_halt()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 12/43] KVM: x86: Tweak halt emulation helper names to free up kvm_vcpu_halt()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 11/43] KVM: Don't block+unblock when halt-polling is successful
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 40/43] KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 24/43] KVM: VMX: Drop pointless PI.NDST update when blocking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/43] KVM: Reconcile discrepancies in halt-polling stats
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 06/43] KVM: Refactor and document halt-polling stats update helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4/4] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 05/43] KVM: Update halt-polling stats if and only if halt-polling was attempted
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 02/43] KVM: SVM: Ensure target pCPU is read once when signalling AVIC doorbell
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [RFC v16 9/9] iommu/smmuv3: Disallow nested mode in presence of HW MSI regions
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 8/9] iommu/smmuv3: report additional recoverable faults
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 7/9] iommu/smmuv3: Implement cache_invalidate
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 6/9] iommu/smmuv3: Allow stage 1 invalidation with unmanaged ASIDs
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 5/9] iommu/smmuv3: Implement attach/detach_pasid_table
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 4/9] iommu/smmuv3: Get prepared for nested stage support
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 2/9] iommu: Introduce iommu_get_nesting
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 3/9] iommu/smmuv3: Allow s1 and s2 configs to coexist
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [RFC v16 0/9] SMMUv3 Nested Stage Setup (IOMMU part)
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH] KVM: arm64: Avoid shadowing a previous local
- From: Qian Cai <quic_qiancai@xxxxxxxxxxx>
- [PATCH] KVM: arm64: Remove unused TRNG_NO_ENTROPY
- From: Qian Cai <quic_qiancai@xxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Remove unused TRNG_NO_ENTROPY
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Remove unused TRNG_NO_ENTROPY
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Avoid shadowing a previous local
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v2 10/43] KVM: arm64: Move vGIC v4 handling for WFI out arch callback hook
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 10/43] KVM: arm64: Move vGIC v4 handling for WFI out arch callback hook
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 01/18] KVM: arm64: Report corrupted refcount at EL2
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] arm64/kvm: Fix bitrotted comment for SVE handling in handle_exit.c
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 40/43] KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 16/43] KVM: Don't redo ktime_get() when calculating halt-polling stop/deadline
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 43/43] KVM: VMX: Don't do full kick when handling posted interrupt wakeup
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 19/43] KVM: Add helpers to wake/query blocking vCPU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 24/43] KVM: VMX: Drop pointless PI.NDST update when blocking
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 22/43] KVM: VMX: Drop unnecessary PI logic to handle impossible conditions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 20/43] KVM: VMX: Skip Posted Interrupt updates if APICv is hard disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 10/43] KVM: arm64: Move vGIC v4 handling for WFI out arch callback hook
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 02/43] KVM: SVM: Ensure target pCPU is read once when signalling AVIC doorbell
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 13/43] KVM: Rename kvm_vcpu_block() => kvm_vcpu_halt()
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 09/43] KVM: Drop obsolete kvm_arch_vcpu_block_finish()
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH 1/4] KVM: arm64: Reorder vcpu flag definitions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/4] KVM: arm64: Stop mapping current thread_info at EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/4] KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/4] KVM: arm64: Stop mapping current thread_info at EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 4/4] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: selftests: enable the memslot tests in ARM64
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 07/15] KVM: arm64: Introduce kvm_share_hyp()
- From: David Brazdil <dbrazdil@xxxxxxxxxx>
- [RFC PATCH v3 5/5] kvm/x86: virtual suspend time injection: Implement guest side
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- [RFC PATCH v3 4/5] kvm/x86: virtual suspend time injection: Implement host side
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- [RFC PATCH v3 3/5] kvm/x86: virtual suspend time injection: Add common definitions
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- [RFC PATCH v3 2/5] kvm/x86: Include asm/pvclock.h in asm/kvmclock.h
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- [RFC PATCH v3 1/5] timekeeping: Expose tk->offs_boot via ktime_get_offs_boot_ns
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- [RFC PATCH v3 0/5] x86/kvm: Virtual suspend time injection support
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 0/5] x86/kvm: Virtual suspend time injection support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: selftests: enable the memslot tests in ARM64
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 15/15] KVM: arm64: pkvm: Unshare guest structs during teardown
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 14/15] KVM: arm64: Expose unshare hypercall to the host
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 13/15] KVM: arm64: Implement do_unshare() helper for unsharing memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 12/15] KVM: arm64: Implement __pkvm_host_share_hyp() using do_share()
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 11/15] KVM: arm64: Implement do_share() helper for sharing memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 10/15] KVM: arm64: Introduce wrappers for host and hyp spin lock accessors
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 09/15] KVM: arm64: Extend pkvm_page_state enumeration to handle absent pages
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 08/15] KVM: arm64: pkvm: Refcount the pages shared with EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 07/15] KVM: arm64: Introduce kvm_share_hyp()
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 06/15] KVM: arm64: Implement kvm_pgtable_hyp_unmap() at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 05/15] KVM: arm64: Hook up ->page_count() for hypervisor stage-1 page-table
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 04/15] KVM: arm64: Fixup hyp stage-1 refcount
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 03/15] KVM: arm64: Refcount hyp stage-1 pgtable pages
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 02/15] KVM: arm64: Provide {get, put}_page() stubs for early hyp allocator
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 01/15] KVM: arm64: Check if running in VHE from kvm_host_owns_hyp_mappings()
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v2 00/15] KVM: arm64: pkvm: Implement unshare hypercall
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 01/16] KVM: arm64: Introduce do_share() helper for memory sharing between components
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 16/16] KVM: arm64: pkvm: Unshare guest structs during teardown
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [RFC PATCH 03/25] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: arm64: Move SVE state mapping at HYP to finalize-time
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: arm64: Move kvm_arch_vcpu_run_pid_change() out of line
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 5/5] KVM: arm64: Drop vcpu->arch.has_run_once for vcpu->pid
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: arm64: Restructure the point where has_run_once is advertised
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: arm64: Merge kvm_arch_vcpu_run_pid_change() and kvm_vcpu_first_run_init()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: arm64: Reorganise vcpu first run
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Problems about Stage-2 translation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Problems about Stage-2 translation
- From: Chenxu Wang <irakatz51@xxxxxxxxx>
- Re: [RFC PATCH 4/7] arm64: cpufeature: Enable PBHA bits for stage1
- From: James Morse <james.morse@xxxxxxx>
- Re: [RFC PATCH 1/7] KVM: arm64: Detect and enable PBHA for stage2
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH 16/16] KVM: arm64: pkvm: Unshare guest structs during teardown
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 00/11] KVM: arm64: Fixed features for protected VMs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 00/22] KVM: arm64: Fixed features for protected VMs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/39] KVM: arm64: Add lock/unlock memslot user API
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 16/16] KVM: arm64: pkvm: Unshare guest structs during teardown
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [RFC PATCH v4 04/39] KVM: arm64: Defer CMOs for locked memslots until a VCPU is run
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v9 00/22] KVM: arm64: Fixed features for protected VMs
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: arm64: Introduce kvm_share_hyp()
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v9 00/22] KVM: arm64: Fixed features for protected VMs
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: arm64: Avoid remapping the SVE state in the hyp stage-1
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 16/16] KVM: arm64: pkvm: Unshare guest structs during teardown
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: Problems about Stage-2 translation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 00/22] KVM: arm64: Fixed features for protected VMs
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/39] KVM: arm64: Add lock/unlock memslot user API
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: Problems about Stage-2 translation
- From: Chenxu Wang <irakatz51@xxxxxxxxx>
- Re: [RFC PATCH v4 04/39] KVM: arm64: Defer CMOs for locked memslots until a VCPU is run
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: arm64: Introduce kvm_share_hyp()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Add memcg accounting to Arm KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 00/15] KVM: arm64: selftests: Introduce arch_timer selftest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix reporting of endianess when the access originates at EL0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/5] KVM: arm64: Assorted vgic-v3 fixes
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 04/25] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: Problems about Stage-2 translation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 01/25] KVM: arm64: Add has_reset_once flag for vcpu
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH 0/7] arm64: mm: Prototype to allow drivers to request PBHA values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 4/7] arm64: cpufeature: Enable PBHA bits for stage1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 6/7] KVM: arm64: Configure PBHA bits for stage2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 1/7] KVM: arm64: Detect and enable PBHA for stage2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 16/16] KVM: arm64: pkvm: Unshare guest structs during teardown
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Problems about Stage-2 translation
- From: Chenxu Wang <irakatz51@xxxxxxxxx>
- Re: [PATCH 03/16] KVM: arm64: Avoid remapping the SVE state in the hyp stage-1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: arm64: Reorganise vcpu first run
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 01/16] KVM: arm64: Introduce do_share() helper for memory sharing between components
- From: Andrew Walbran <qwandor@xxxxxxxxxx>
- [RFC PATCH 6/7] KVM: arm64: Configure PBHA bits for stage2
- From: James Morse <james.morse@xxxxxxx>
- [RFC PATCH 7/7] Documentation: arm64: Describe the support and expectations for PBHA
- From: James Morse <james.morse@xxxxxxx>
- [RFC PATCH 5/7] arm64: mm: Add pgprot_pbha() to allow drivers to request PBHA values
- From: James Morse <james.morse@xxxxxxx>
- [RFC PATCH 3/7] dt-bindings: arm: Add binding for Page Based Hardware Attributes
- From: James Morse <james.morse@xxxxxxx>
- [RFC PATCH 4/7] arm64: cpufeature: Enable PBHA bits for stage1
- From: James Morse <james.morse@xxxxxxx>
- [RFC PATCH 2/7] dt-bindings: Rename the description of cpu nodes cpu.yaml
- From: James Morse <james.morse@xxxxxxx>
- [RFC PATCH 1/7] KVM: arm64: Detect and enable PBHA for stage2
- From: James Morse <james.morse@xxxxxxx>
- [RFC PATCH 0/7] arm64: mm: Prototype to allow drivers to request PBHA values
- From: James Morse <james.morse@xxxxxxx>
- Re: [RFC PATCH 04/25] KVM: arm64: Introduce struct id_reg_info
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH 03/25] KVM: arm64: Introduce a validation function for an ID register
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH 01/25] KVM: arm64: Add has_reset_once flag for vcpu
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: arm64: Reorganise vcpu first run
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: arm64: Reorganise vcpu first run
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [PATCH 3/5] KVM: arm64: Merge kvm_arch_vcpu_run_pid_change() and kvm_vcpu_first_run_init()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 5/5] KVM: arm64: Drop vcpu->arch.has_run_once for vcpu->pid
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 4/5] KVM: arm64: Restructure the point where has_run_once is advertised
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/5] KVM: arm64: Move kvm_arch_vcpu_run_pid_change() out of line
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/5] KVM: arm64: Move SVE state mapping at HYP to finalize-time
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/5] KVM: arm64: Reorganise vcpu first run
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 5.15, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 5.15, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KVM: mmu: remove over-aggressive warnings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 14/22] KVM: arm64: pkvm: Make the ERR/ERX*_EL1 registers RAZ/WI
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v9 14/22] KVM: arm64: pkvm: Make the ERR/ERX*_EL1 registers RAZ/WI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 17/22] KVM: arm64: pkvm: Handle GICv3 traps as required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 17/22] KVM: arm64: pkvm: Handle GICv3 traps as required
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v9 15/22] KVM: arm64: pkvm: Drop AArch32-specific registers
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v9 14/22] KVM: arm64: pkvm: Make the ERR/ERX*_EL1 registers RAZ/WI
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v9 13/22] KVM: arm64: pkvm: Use a single function to expose all id-regs
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [PATCH 16/16] KVM: arm64: pkvm: Unshare guest structs during teardown
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 15/16] KVM: arm64: pkvm: Introduce an unshare hypercall
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 14/16] KVM: arm64: Refcount shared pages at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 13/16] KVM: arm64: Move double-sharing logic into hyp-specific function
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 12/16] KVM: arm64: Move hyp refcount helpers to header files
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 11/16] KVM: arm64: Back hyp_vmemmap for all of memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 10/16] KVM: arm64: Implement kvm_pgtable_hyp_unmap() at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 09/16] KVM: arm64: Hook up ->page_count() for hypervisor stage-1 page-table
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 08/16] KVM: arm64: Fixup hyp stage-1 refcount
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 07/16] KVM: arm64: Refcount hyp stage-1 pgtable pages
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 06/16] KVM: arm64: Provide {get,put}_page() stubs for early hyp allocator
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 05/16] KVM: arm64: Accept page ranges in pkvm share hypercall
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 04/16] KVM: arm64: Introduce kvm_share_hyp()
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 03/16] KVM: arm64: Avoid remapping the SVE state in the hyp stage-1
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 02/16] KVM: arm64: Implement __pkvm_host_share_hyp() using do_share()
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 01/16] KVM: arm64: Introduce do_share() helper for memory sharing between components
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 00/16] KVM: arm64: Implement unshare hypercall for pkvm
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KVM: mmu: remove over-aggressive warnings
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v9 21/22] KVM: arm64: pkvm: Pass vpcu instead of kvm to kvm_get_exit_handler_array()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 22/22] KVM: arm64: pkvm: Give priority to standard traps over pvm handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 13/22] KVM: arm64: pkvm: Use a single function to expose all id-regs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 19/22] KVM: arm64: pkvm: Consolidate include files
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 20/22] KVM: arm64: pkvm: Move kvm_handle_pvm_restricted around
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 14/22] KVM: arm64: pkvm: Make the ERR/ERX*_EL1 registers RAZ/WI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 18/22] KVM: arm64: pkvm: Preserve pending SError on exit from AArch32
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 17/22] KVM: arm64: pkvm: Handle GICv3 traps as required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 16/22] KVM: arm64: pkvm: Drop sysregs that should never be routed to the host
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 15/22] KVM: arm64: pkvm: Drop AArch32-specific registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 00/22] KVM: arm64: Fixed features for protected VMs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 12/22] KVM: arm64: Fix early exit ptrauth handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH v2 2/2] KVM: arm64: Add memcg accounting to KVM allocations
- From: Justin He <Justin.He@xxxxxxx>
- Re: [PATCH v8 5/8] arm64: cpufeature: Enumerate support for FEAT_ECV >= 0x2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 03/11] KVM: arm64: Encapsulate reset request logic in a helper function
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KVM: mmu: remove over-aggressive warnings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/5] KVM: arm64: vgic-v3: Reduce common group trapping to ICV_DIR_EL1 when possible
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] KVM: arm64: Fix reporting of endianess when the access originates at EL0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix reporting of endianess when the access originates at EL0
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [PATCH] KVM: arm64: Fix reporting of endianess when the access originates at EL0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [RFC PATCH 25/25] KVM: arm64: selftests: Introduce id_reg_test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 24/25] KVM: arm64: Activate trapping of disabled CPU features for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 23/25] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 22/25] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 21/25] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 20/25] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 19/25] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 18/25] KVM: arm64: Introduce framework to trap disabled features
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 17/25] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 16/25] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 15/25] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 14/25] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 13/25] KVM: arm64: Make ID registers without id_reg_info writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 12/25] KVM: arm64: Make MVFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 11/25] KVM: arm64: Make ID_DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 10/25] KVM: arm64: Make ID_AA64DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 09/25] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 08/25] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 07/25] KVM: arm64: Make ID_AA64PFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 05/25] KVM: arm64: Keep consistency of ID registers between vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 06/25] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 04/25] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 03/25] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 01/25] KVM: arm64: Add has_reset_once flag for vcpu
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH 00/25] KVM: arm64: Make CPU ID registers writable by userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v8 03/15] KVM: arm64: selftests: Use read/write definitions from sysreg.h
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH] Documentation: admin-guide: Document side effects when pKVM is enabled
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] Documentation: admin-guide: Document side effects when pKVM is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 12/16] KVM: Move x86's perf guest info callbacks to generic KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 12/16] KVM: Move x86's perf guest info callbacks to generic KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] arm64: Add mmio_addr arg to arm/micro-bench
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v8 11/11] KVM: arm64: Handle protected guests at 32 bits
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: arm64: Minor improvements to RAZ register handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 11/11] KVM: arm64: Handle protected guests at 32 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: arm64: Replace get_raz_id_reg() with get_raz_reg()
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: arm64: Use get_raz_reg() for userspace reads of PMSWINC_EL0
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v8 07/11] KVM: arm64: Add handlers for protected VM System Registers
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 07/11] KVM: arm64: Add handlers for protected VM System Registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: arm64: Replace get_raz_id_reg() with get_raz_reg()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v2 2/3] KVM: arm64: Use get_raz_reg() for userspace reads of PMSWINC_EL0
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v2 1/3] KVM: arm64: Return early from read_id_reg() if register is RAZ
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
[Index of Archives]
[Linux KVM]
[Spice Development]
[Libvirt]
[Libvirt Users]
[Linux USB Devel]
[Linux SCSI]
[Samba]
[Yosemite News]