Linux KVM for ARM Processors
[Prev Page][Next Page]
- [FINAL WARNING] kvmarm@xxxxxxxxxxxxxxxxxxxxx going away
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v5 5/7] KVM: arm64: Always set HCR_TID2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v5 6/7] KVM: arm64: Mask FEAT_CCIDX
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 6/7] KVM: arm64: Mask FEAT_CCIDX
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 7/7] KVM: arm64: Normalize cache configuration
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.2, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH rcu 02/27] arch/arm64/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH rcu 02/27] arch/arm64/kvm: Remove "select SRCU"
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH rcu 02/27] arch/arm64/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: KVM: arm64: A new approach for SPE support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: KVM: arm64: A new approach for SPE support
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: vgic: Add Apple M2 cpus to the list of broken SEIS implementations
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: KVM: arm64: A new approach for SPE support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] MAINTAINERS: Add Zenghui Yu as a KVM/arm64 reviewer
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH 12/14] KVM: selftests: Use wildcards to find library source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: vgic: Add Apple M2 cpus to the list of broken SEIS implementations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: (subset) [PATCH 0/3] KVM: arm64: M2 vgic maintenance interrupt rework pre-NV
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add Zenghui Yu as a KVM/arm64 reviewer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: KVM: arm64: A new approach for SPE support
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: KVM/arm64: SPE: Translate VA to IPA on a stage 2 fault instead of pinning VM memory
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove myself as a KVM/arm64 reviewer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Add Zenghui Yu as a KVM/arm64 reviewer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/3] KVM: arm64: Document the behaviour of S1PTW faults on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: arm64: Fix handling of S1PTW S2 fault on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/3] irqchip/apple-aic: Register vgic maintenance interrupt with KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: vgic: Allow registration of a non-maskable maintenance interrupt
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: vgic: Add Apple M2 cpus to the list of broken SEIS implementations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: M2 vgic maintenance interrupt rework pre-NV
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: M2 vgic maintenance interrupt rework pre-NV
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: nv: Avoid block mapping if max_map_size is smaller than block size.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- [PATCH v5 7/7] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v5 6/7] KVM: arm64: Mask FEAT_CCIDX
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v5 5/7] KVM: arm64: Always set HCR_TID2
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v5 4/7] arm64/cache: Move CLIDR macro definitions
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v5 3/7] arm64/sysreg: Add CCSIDR2_EL1
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v5 2/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v5 1/7] arm64: Allow the definition of UNKNOWN system register fields
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v5 0/7] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 7/7] KVM: selftests: aarch64: vPMU register test for unimplemented counters
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 6/7] KVM: selftests: aarch64: vPMU register test for implemented counters
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 5/7] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 4/7] tools: arm64: Import perf_event.h
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 3/7] KVM: arm64: PMU: Preserve vCPU's PMCR_EL0.N value on vCPU reset
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 2/7] KVM: arm64: PMU: Use reset_pmu_reg() for PMUSERENR_EL0 and PMCCFILTR_EL0
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 1/7] KVM: arm64: PMU: Have reset_pmu_reg() to clear a register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: nv: Avoid block mapping if max_map_size is smaller than block size.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: nv: only emulate timers that have not yet fired
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: running openbsd on KVM running on fedora over raspberry pi 4
- From: Sandeep Gupta <gupta.sandeep@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: running openbsd on KVM running on fedora over raspberry pi 4
- From: Marc Zyngier <maz@xxxxxxxxxx>
- running openbsd on KVM running on fedora over raspberry pi 4
- From: Sandeep Gupta <gupta.sandeep@xxxxxxxxx>
- Re: [PATCH v4 7/7] KVM: arm64: Normalize cache configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 12/14] KVM: selftests: Use wildcards to find library source files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/14] KVM: selftests: Include lib.mk before consuming $(CC)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/14] KVM: selftests: Explicitly disable builtins for mem*() overrides
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Remove use of ARM64_FEATURE_MASK()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Remove use of ARM64_FEATURE_MASK()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: arm64: Synchronize SMEN on vcpu schedule out
- From: Dong Bo <dongbo4@xxxxxxxxxx>
- Re: [PATCH v4 2/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 7/7] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v4 6/7] KVM: arm64: Mask FEAT_CCIDX
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v4 5/7] KVM: arm64: Always set HCR_TID2
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v4 4/7] arm64/cache: Move CLIDR macro definitions
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v4 3/7] arm64/sysreg: Add CCSIDR2_EL1
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v4 2/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v4 1/7] arm64: Allow the definition of UNKNOWN system register fields
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v4 0/7] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/2] KVM: arm64: Remove use of ARM64_FEATURE_MASK()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH 1/2] KVM: arm64: Convert non-GIC code to SYS_FIELD_{GET,PREP}
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH 0/2] KVM: arm64: syreg cleanups/fixes
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Synchronize SMEN on vcpu schedule out
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Fix handling of S1PTW S2 fault on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v1 10/12] KVM: arm64: Rework logic to en/decode VTCR_EL2.{SL0, SL2} fields
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] KVM: arm64: Synchronize SMEN on vcpu schedule out
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1 10/12] KVM: arm64: Rework logic to en/decode VTCR_EL2.{SL0, SL2} fields
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [kvm-unit-tests PATCH v2 4/4] arm: pmu: Print counter values as hexadecimals
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/4] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/4] arm: pmu: Prepare for testing 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/4] arm: pmu: Add support for PMUv3p5
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v1 10/12] KVM: arm64: Rework logic to en/decode VTCR_EL2.{SL0, SL2} fields
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v1 05/12] KVM: arm64: Maintain page-table format info in struct kvm_pgtable
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v3 1/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 1/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] arm64/sysreg: Add CCSIDR2_EL1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 2/7] arm64/sysreg: Add CCSIDR2_EL1
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 1/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/3] arm64/sysreg: Add CCSIDR2_EL1
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/3] arm64/sysreg: Add CCSIDR2_EL1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] arm64/sysreg: Add CCSIDR2_EL1
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 5/7] KVM: arm64: Allow user to set CCSIDR_EL1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 1/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 1/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v3 1/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 7/7] KVM: arm64: Normalize cache configuration
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v3 7/7] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 6/7] KVM: arm64: Mask FEAT_CCIDX
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 5/7] KVM: arm64: Allow user to set CCSIDR_EL1
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 4/7] KVM: arm64: Always set HCR_TID2
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 3/7] arm64/cache: Move CLIDR macro definitions
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 1/7] arm64/sysreg: Convert CCSIDR_EL1 to automatic generation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 0/7] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 2/7] arm64/sysreg: Add CCSIDR2_EL1
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v1 01/12] arm64/mm: Add FEAT_LPA2 specific ID_AA64MMFR0.TGRAN[2]
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 01/12] arm64/mm: Add FEAT_LPA2 specific ID_AA64MMFR0.TGRAN[2]
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Normalize cache configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Normalize cache configuration
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 01/14] KVM: selftests: Define literal to asm constraint in aarch64 as unsigned long
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 07/14] KVM: selftests: Use proper function prototypes in probing code
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 05/14] KVM: selftests: Fix a typo in x86-64's kvm_get_cpu_address_width()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 03/14] KVM: selftests: Fix divide-by-zero bug in memslot_perf_test
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/14] KVM: selftests: Enable RSEQ test for RISC-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/14] KVM: selftests: Use wildcards to find targets and test source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/14] KVM: selftests: Use wildcards to find library source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/14] KVM: selftests: Include lib.mk before consuming $(CC)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/14] KVM: selftests: Explicitly disable builtins for mem*() overrides
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/14] KVM: selftests: Probe -no-pie with actual CFLAGS used to compile
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/14] KVM: selftests: Use proper function prototypes in probing code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/14] KVM: selftests: Fix a typo in x86-64's kvm_get_cpu_address_width()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/14] KVM: selftests: Use pattern matching in .gitignore
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/14] KVM: selftests: Fix divide-by-zero bug in memslot_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/14] KVM: selftests: Delete dead code in x86_64/vmx_tsc_adjust_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/14] KVM: selftests: Define literal to asm constraint in aarch64 as unsigned long
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/14] KVM: selftests: Clang fixes, Makefile cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 2/3] arm64/cache: Move CLIDR macro definitions
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 1/3] arm64/sysreg: Add CCSIDR2_EL1
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Normalize cache configuration
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: James Clark <james.clark@xxxxxxx>
- [PATCH 0/1] KVM: arm64: PMU: Fix PMCR_EL0 reset value
- From: James Clark <james.clark@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 6/7] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 5/7] KVM: arm64: selftests: Don't identity map the ucall MMIO hole
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 3/7] KVM: selftests: Mark correct page as mapped in virt_map()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 2/7] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 1/7] KVM: selftests: Fix build due to ucall_uninit() removal
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 37/37] KVM: MMU: Move the TDP MMU to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 36/37] KVM: x86/mmu: Move is_tdp_mmu_page() to mmu_internal.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 35/37] KVM: x86/mmu: Move tdp_mmu_max_gfn_exclusive() to tdp_pgtable.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 34/37] KVM: MMU: Move the TDP iterator to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 30/37] KVM: x86/mmu: Rename kvm_flush_remote_tlbs_with_address()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 31/37] KVM: x86/MMU: Use gfn_t in kvm_flush_remote_tlbs_range()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 26/37] KVM: Move page table cache to struct kvm_vcpu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 29/37] KVM: x86/mmu: Collapse kvm_flush_remote_tlbs_with_{range, address}() together
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 25/37] KVM: x86/mmu: Pass root role to kvm_tdp_mmu_get_vcpu_root_hpa()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 27/37] KVM: MMU: Move mmu_page_header_cache to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 28/37] KVM: MMU: Stub out tracepoints on non-x86 architectures
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 24/37] KVM: x86/mmu: Move kvm_mmu_hugepage_adjust() up to fault handler
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 21/37] KVM: Introduce CONFIG_HAVE_TDP_MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 22/37] KVM: x86: Select HAVE_TDP_MMU if X86_64
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 18/37] KVM: x86/mmu: Add common API for creating TDP PTEs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 19/37] KVM: x86/mmu: Add arch hooks for NX Huge Pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 15/37] KVM: x86/mmu: Add a common API for inspecting/modifying TDP PTEs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 14/37] KVM: MMU: Introduce common macros for TDP page tables
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 16/37] KVM: x86/mmu: Abstract away TDP MMU root lookup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 12/37] KVM: x86/mmu: Use PG_LEVEL_{PTE, PMD, PUD} in the TDP MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 13/37] KVM: MMU: Move sptep_to_sp() to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 11/37] KVM: MMU: Move RET_PF_* into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 08/37] KVM: selftests: Stop assuming stats are contiguous in kvm_binary_stats_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 07/37] mm: Introduce architecture-neutral PG_LEVEL macros
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 09/37] KVM: Move page size stats into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 05/37] KVM: x86/mmu: Unify TDP MMU and Shadow MMU root refcounts
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 03/37] KVM: MMU: Move tdp_ptep_t into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 16/39] arm64/sme: Implement traps and syscall handling for SME
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 4/4] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/4] KVM: selftests: Fix build due to ucall_uninit() removal
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/4] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 7/8] perf: Add perf_event_attr::config3
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v14 16/39] arm64/sme: Implement traps and syscall handling for SME
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v14 16/39] arm64/sme: Implement traps and syscall handling for SME
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH 1/2] ACPI/AEST: Initial AEST driver
- From: Ruidong Tian <tianruidong@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 7/8] perf: Add perf_event_attr::config3
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v1 12/12] KVM: arm64: Allow guests with >48-bit IPA size on FEAT_LPA2 systems
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 10/12] KVM: arm64: Rework logic to en/decode VTCR_EL2.{SL0, SL2} fields
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 11/12] KVM: arm64: Support upto 5 levels of translation in kvm_pgtable
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 09/12] KVM: arm64: Convert translation level parameter to s8
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 08/12] KVM: arm64: Insert PS field at TCR_EL2 assembly time
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 07/12] KVM: arm64: Use LPA2 page-tables for hyp stage1 if HW supports it
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 06/12] KVM: arm64: Use LPA2 page-tables for stage2 if HW supports it
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 05/12] KVM: arm64: Maintain page-table format info in struct kvm_pgtable
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 04/12] KVM: arm64: Plumbing to enable multiple pgtable formats
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 01/12] arm64/mm: Add FEAT_LPA2 specific ID_AA64MMFR0.TGRAN[2]
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 02/12] arm64/mm: Update tlb invalidation routines for FEAT_LPA2
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 03/12] KVM: arm64: Add new (V)TCR_EL2 field definitions for FEAT_LPA2
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v1 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v2 31/50] KVM: x86: Do CPU compatibility checks in x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 39/50] KVM: x86: Move CPU compat checks hook to kvm_x86_ops (from kvm_x86_init_ops)
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 31/50] KVM: x86: Do CPU compatibility checks in x86 code
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v4 04/16] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 6.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1] KVM: arm64: Fix benign bug with incorrect use of VA_BITS.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1] KVM: arm64: Fix benign bug with incorrect use of VA_BITS.
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v1] KVM: arm64: Fix benign bug with incorrect use of VA_BITS.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [External] Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH v4 04/16] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v1] KVM: arm64: Fix benign bug with incorrect use of VA_BITS.
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Always mask CCSIDR associativity bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 6/6] KVM: arm64: Condition HW AF updates on config option
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 5/6] KVM: arm64: Handle access faults behind the read lock
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 4/6] KVM: arm64: Don't serialize if the access flag isn't set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 3/6] KVM: arm64: Return EAGAIN for invalid PTE in attr walker
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 2/6] KVM: arm64: Ignore EAGAIN for walks outside of a fault
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 1/6] KVM: arm64: Use KVM's pte type/helpers in handle_access_fault()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 0/6] KVM: arm64: Parallel access faults
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 5/9] perf tools: Use dedicated non-atomic clear/set bit helpers
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [PATCH 0/9] tools: Make {clear,set}_bit() atomic for reals
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/9] perf tools: Use dedicated non-atomic clear/set bit helpers
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v2 42/50] KVM: Disable CPU hotplug during hardware enabling/disabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 41/50] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 40/50] KVM: x86: Do compatibility checks when onlining CPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxx>
- Re: [PATCH v2 40/50] KVM: x86: Do compatibility checks when onlining CPU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 41/50] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 40/50] KVM: x86: Do compatibility checks when onlining CPU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 39/50] KVM: x86: Move CPU compat checks hook to kvm_x86_ops (from kvm_x86_init_ops)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 42/50] KVM: Disable CPU hotplug during hardware enabling/disabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 35/50] KVM: VMX: Use current CPU's info to perform "disabled by BIOS?" checks
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 32/50] KVM: Drop kvm_arch_check_processor_compat() hook
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 31/50] KVM: x86: Do CPU compatibility checks in x86 code
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 00/12] KVM: arm64: FF-A proxy for pKVM
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: arm64: Always mask CCSIDR associativity bits
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] arm: pmu: Prepare for testing 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] arm: pmu: Add support for PMUv3p5
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 21/50] KVM: MIPS: Hardcode callbacks to hardware virtualization extensions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 21/50] KVM: MIPS: Hardcode callbacks to hardware virtualization extensions
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v4 04/16] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v4 04/16] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 26/50] KVM: PPC: Move processor compatibility check to module init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 2/3] arm64: errata: Check for mismatched cache associativity
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Make CCSIDRs consistent
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v2 34/50] KVM: x86: Unify pr_fmt to use module name for all KVM modules
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 02/12] firmware: arm_ffa: Move comment before the field it is documenting
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 10/50] KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 12/50] KVM: VMX: Move Hyper-V eVMCS initialization to helper
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 02/12] firmware: arm_ffa: Move comment before the field it is documenting
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 01/12] firmware: arm_ffa: Move constants to header file
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 26/50] KVM: PPC: Move processor compatibility check to module init
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 32/44] KVM: x86: Unify pr_fmt to use module name for all KVM modules
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 49/50] KVM: Opt out of generic hardware enabling on s390 and PPC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 50/50] KVM: Clean up error labels in kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 48/50] KVM: Register syscore (suspend/resume) ops early in kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 47/50] KVM: Make hardware_enable_failed a local variable in the "enable all" path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 44/50] KVM: Drop kvm_count_lock and instead protect kvm_usage_count with kvm_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 46/50] KVM: Use a per-CPU variable to track which CPUs have enabled virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 45/50] KVM: Remove on_each_cpu(hardware_disable_nolock) in kvm_exit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 43/50] KVM: Ensure CPU is stable during low level hardware enable/disable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 41/50] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 42/50] KVM: Disable CPU hotplug during hardware enabling/disabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 40/50] KVM: x86: Do compatibility checks when onlining CPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 39/50] KVM: x86: Move CPU compat checks hook to kvm_x86_ops (from kvm_x86_init_ops)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 38/50] KVM: SVM: Check for SVM support in CPU compatibility checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 36/50] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 37/50] KVM: VMX: Shuffle support checks and hardware enabling code around
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 35/50] KVM: VMX: Use current CPU's info to perform "disabled by BIOS?" checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 34/50] KVM: x86: Unify pr_fmt to use module name for all KVM modules
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 33/50] KVM: x86: Use KBUILD_MODNAME to specify vendor module name
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 32/50] KVM: Drop kvm_arch_check_processor_compat() hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 31/50] KVM: x86: Do CPU compatibility checks in x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 28/50] KVM: s390: Mark __kvm_s390_init() and its descendants as __init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 29/50] KVM: Drop kvm_arch_{init,exit}() hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 30/50] KVM: VMX: Make VMCS configuration/capabilities structs read-only after init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 27/50] KVM: s390: Do s390 specific init without bouncing through kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 26/50] KVM: PPC: Move processor compatibility check to module init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 25/50] KVM: RISC-V: Tag init functions and data with __init, __ro_after_init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 24/50] KVM: RISC-V: Do arch init directly in riscv_kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 23/50] KVM: MIPS: Register die notifier prior to kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 22/50] KVM: MIPS: Setup VZ emulation? directly from kvm_mips_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/50] KVM: arm64: Mark kvm_arm_init() and its unique descendants as __init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 21/50] KVM: MIPS: Hardcode callbacks to hardware virtualization extensions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/50] KVM: arm64: Do arm/arch initialization without bouncing through kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/50] KVM: arm64: Free hypervisor allocations if vector slot init fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/50] KVM: arm64: Unregister perf callbacks if hypervisor finalization fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/50] KVM: arm64: Simplify the CPUHP logic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/50] KVM: x86: Serialize vendor module initialization (hardware setup)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/50] KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/50] KVM: VMX: Don't bother disabling eVMCS static key on module exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/50] KVM: x86: Move guts of kvm_arch_init() to standalone helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/50] KVM: VMX: Move Hyper-V eVMCS initialization to helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/50] KVM: Drop arch hardware (un)setup hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/50] KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/50] KVM: x86: Move hardware setup/unsetup to init/exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/50] KVM: x86: Do timer initialization after XCR0 configuration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/50] KVM: s390: Move hardware setup/unsetup to init/exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/50] KVM: s390: Unwind kvm_arch_init() piece-by-piece() if a step fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/50] KVM: Teardown VFIO ops earlier in kvm_exit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/50] KVM: Allocate cpus_hardware_enabled after arch hardware setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/50] KVM: Initialize IRQ FD after arch hardware setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/50] KVM: Register /dev/kvm as the _very_ last thing during initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 32/44] KVM: x86: Unify pr_fmt to use module name for all KVM modules
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: Parallel access faults
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: Handle access faults behind the read lock
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 4/4] KVM: arm64: Condition HW AF updates on config option
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 3/4] KVM: arm64: Handle access faults behind the read lock
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/4] KVM: arm64: Parallel access faults
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/4] KVM: arm64: Use KVM's pte type/helpers in handle_access_fault()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: selftests: Enable access_tracking_perf_test for arm64
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 7/8] perf: Add perf_event_attr::config3
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3 7/8] perf: Add perf_event_attr::config3
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 7/8] perf: Add perf_event_attr::config3
- From: Rob Herring <robh@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] arm/arm64: mmu: Rename mmu_get_pte() -> follow_pte()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] arm/arm64: teach virt_to_pte_phys() about block descriptors
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] arm/arm64: mmu: Teach virt_to_pte_phys() about block descriptors
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [External] Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- KVM: arm64: A new approach for SPE support
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 15/16] KVM: arm64: PMU: Simplify vcpu computation on perf overflow notification
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 14/16] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: selftests: Have perf_test_util signal when to stop vCPUs
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 11/16] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 9/9] tools: KVM: selftests: Convert clear/set_bit() to actual atomics
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/9] tools: Drop "atomic_" prefix from atomic test_and_set_bit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] tools: Drop conflicting non-atomic test_and_{clear, set}_bit() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: selftests: Use non-atomic clear/set bit helpers in KVM tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] tools: Take @bit as an "unsigned long" in {clear,set}_bit() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/9] perf tools: Use dedicated non-atomic clear/set bit helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: arm64: selftests: Enable single-step without a "full" ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] KVM: selftests: Remove unused "vcpu" param to fix build error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: selftests: Add rdmsr_from_l2() implementation in Hyper-V eVMCS test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] tools: Make {clear,set}_bit() atomic for reals
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Have perf_test_util signal when to stop vCPUs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Build access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 0/2] KVM: selftests: Enable access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 3/3] KVM: arm64: Reject shared table walks in the hyp code
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 2/3] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 1/3] KVM: arm64: Take a pointer to walker data in kvm_dereference_pteref()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 0/8] perf: Arm SPEv1.2 support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 7/8] perf: Add perf_event_attr::config3
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 07/16] KVM: arm64: PMU: Add counter_index_to_*reg() helpers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: disabling halt polling broken? (was Re: [PATCH 00/14] KVM: Halt-polling fixes, cleanups and a new stat)
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [External] Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: selftests: Disable single-step without relying on ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: selftests: Disable single-step without relying on ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/8] perf: Arm SPEv1.2 support
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: arm64: selftests: Fixes for single-step test
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: selftests: Disable single-step without relying on ucall()
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 06/16] KVM: arm64: PMU: Only narrow counters that are not 64bit wide
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 05/16] KVM: arm64: PMU: Narrow the overflow checking when required
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: selftests: Disable single-step with correct KVM define
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: selftests: Disable single-step without relying on ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: selftests: Disable single-step without relying on ucall()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: selftests: Disable single-step with correct KVM define
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/2] KVM: arm64: selftests: Disable single-step without relying on ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: arm64: selftests: Fixes for single-step test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: arm64: selftests: Disable single-step with correct KVM define
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/12] KVM: arm64: Block unsafe FF-A calls from the host
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 03/12] KVM: arm64: Block unsafe FF-A calls from the host
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: disabling halt polling broken? (was Re: [PATCH 00/14] KVM: Halt-polling fixes, cleanups and a new stat)
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 12/12] ANDROID: KVM: arm64: pkvm: Add support for fragmented FF-A descriptors
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 12/12] ANDROID: KVM: arm64: pkvm: Add support for fragmented FF-A descriptors
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 11/12] KVM: arm64: Handle FFA_MEM_LEND calls from the host
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 09/12] KVM: arm64: Handle FFA_MEM_SHARE calls from the host
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 10/12] KVM: arm64: Handle FFA_MEM_RECLAIM calls from the host
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 08/12] KVM: arm64: Add FF-A helpers to share/unshare memory with secure world
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 07/12] KVM: arm64: Handle FFA_RXTX_MAP and FFA_RXTX_UNMAP calls from the host
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 06/12] KVM: arm64: Allocate pages for hypervisor FF-A mailboxes
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 05/12] KVM: arm64: Handle FFA_FEATURES call from the host
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 04/12] KVM: arm64: Probe FF-A version and host/hyp partition ID during init
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 03/12] KVM: arm64: Block unsafe FF-A calls from the host
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 02/12] firmware: arm_ffa: Move comment before the field it is documenting
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 01/12] firmware: arm_ffa: Move constants to header file
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 00/12] KVM: arm64: FF-A proxy for pKVM
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 0/2] KVM: arm64: Fixes for parallel faults series
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 1/2] KVM: arm64: Take a pointer to walker data in kvm_dereference_pteref()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 13/44] KVM: x86: Serialize vendor module initialization (hardware setup)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 02/16] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 13/44] KVM: x86: Serialize vendor module initialization (hardware setup)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: Use a separate function for hyp stage-1 walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: Use a separate function for hyp stage-1 walks
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 10/44] KVM: VMX: Clean up eVMCS enabling if KVM initialization fails
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: disabling halt polling broken? (was Re: [PATCH 00/14] KVM: Halt-polling fixes, cleanups and a new stat)
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: selftests: Allow >1 guest mode in access_tracking_perf_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 01/12] KVM: arm64: Relax WARN check in stage2_make_pte()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/1] KVM: arm64: Use a separate function for hyp stage-1 walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/1] KVM: arm64: Skip RCU protection for hyp stage-1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 06/12] KVM: arm64: Split block PTEs without using break-before-make
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 02/12] KVM: arm64: Allow visiting block PTEs in post-order
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 00/12] KVM: arm64: Eager huge-page splitting for dirty-logging
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: selftests: Allow >1 guest mode in access_tracking_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Marek Szyprowski <m.szyprowski@xxxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 16/16] KVM: arm64: PMU: Make kvm_pmc the main data structure
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 11/16] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 10/16] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 14/16] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 15/16] KVM: arm64: PMU: Simplify vcpu computation on perf overflow notification
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 04/16] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 08/16] KVM: arm64: PMU: Simplify setting a counter to a specific value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 06/16] KVM: arm64: PMU: Only narrow counters that are not 64bit wide
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 07/16] KVM: arm64: PMU: Add counter_index_to_*reg() helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 00/16] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 01/16] arm64: Add ID_DFR0_EL1.PerfMon values for PMUv3p7 and IMP_DEF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 03/16] KVM: arm64: PMU: Always advertise the CHAIN event
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 02/16] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 05/16] KVM: arm64: PMU: Narrow the overflow checking when required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 02/14] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3 02/14] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: selftests: Build access_tracking_perf_test for arm64
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: selftests: Allow >1 guest mode in access_tracking_perf_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH for-next] KVM: Push dirty information unconditionally to backup bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [RFC PATCH 12/12] KVM: arm64: Use local TLBI on permission relaxation
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 11/12] KVM: arm64: Split huge pages during KVM_CLEAR_DIRTY_LOG
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 10/12] KVM: arm64: Open-code kvm_mmu_write_protect_pt_masked()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 09/12] KVM: arm64: Split huge pages when dirty logging is enabled
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 08/12] KVM: arm64: Add kvm_uninit_stage2_mmu()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 07/12] KVM: arm64: Refactor kvm_arch_commit_memory_region()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 06/12] KVM: arm64: Split block PTEs without using break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 05/12] arm64: Add a capability for FEAT_BBM level 2
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 03/12] KVM: arm64: Add stage2_create_removed()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 02/12] KVM: arm64: Allow visiting block PTEs in post-order
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 01/12] KVM: arm64: Relax WARN check in stage2_make_pte()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC PATCH 00/12] KVM: arm64: Eager huge-page splitting for dirty-logging
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 03/14] KVM: arm64: PMU: Always advertise the CHAIN event
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3 02/14] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Build access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/2] KVM: selftests: Enable access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/2] KVM: selftests: Allow >1 guest mode in access_tracking_perf_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Update comment of create_hyp_mappings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 00/14] KVM: arm64: Parallel stage-2 fault handling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 10/44] KVM: VMX: Clean up eVMCS enabling if KVM initialization fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v1 0/2] KVM fixes for exotic configurations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 00/14] KVM: selftests: Add aarch64/page_fault_test
- From: Marc Zyngier <maz@xxxxxxxxxx>
[Index of Archives]
[Linux KVM]
[Spice Development]
[Libvirt]
[Libvirt Users]
[Linux USB Devel]
[Linux SCSI]
[Samba]
[Yosemite News]