Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v3] KVM: nVMX: Advertise ENCLS_EXITING to L1 iff SGX is fully supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] WARNING in vcpu_enter_guest (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Increase timeout for vmx_vmcs_shadow_test to 10 mins
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] target/i386: Set maximum APIC ID to KVM prior to vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 1/2] arm/kvm: add support for MTE
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v3 2/2] qtests/arm: add some mte tests
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v3 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/15] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [syzbot] riscv/fixes build error
- From: syzbot <syzbot+9d8dc6c2d48bbc419bb4@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] WARNING in vcpu_enter_guest (2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v4 0/1] KVM: s390: pv: fix clock comparator late after suspend/resume
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] vfio: Decrement open_count before close_device()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [kvm-unit-tests PATCH] x86: Increase timeout for vmx_vmcs_shadow_test to 10 mins
- From: Po-Hsu Lin <po-hsu.lin@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH V1] vfio: Add an option to get migration data size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH v3] KVM: nVMX: Advertise ENCLS_EXITING to L1 iff SGX is fully supported
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH] KVM: x86: fire timer when it is migrated and expired, and in oneshot mode
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [PATCH v3 04/15] iommufd: Overview documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- RE: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v6 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [syzbot] WARNING in vcpu_enter_guest (2)
- From: syzbot <syzbot+dbef12497aa912c8e7ba@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Rafael Mendonca <rafaelmendsr@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/pmu: Disable inlining of measure()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH] vfio: Decrement open_count before close_device()
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v1 2/2] vfio/iova_bitmap: Fix PAGE_SIZE unaligned bitmaps
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v1 1/2] vfio/iova_bitmap: Explicitly include linux/slab.h
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v1 0/2] vfio/iova_bitmap: bug fixes
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH] x86/pmu: Disable inlining of measure()
- From: Bill Wendling <morbo@xxxxxxxxxx>
- [PATCH 08/10] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 07/10] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 09/10] vfio: Make vfio_container optionally compiled
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 03/10] vfio: Rename vfio_device_assign/unassign_container()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 01/10] vfio: Move vfio_device driver open/close code to a function
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 04/15] iommufd: Overview documentation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 06/15] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 15/15] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 02/15] iommu: Add device-centric DMA ownership interfaces
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 08/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 11/15] iommufd: Add a HW pagetable object
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 07/15] iommufd: PFN handling for iopt_pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 13/15] iommufd: Add kAPI toward external drivers for kernel access
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 01/15] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 00/15] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable halt polling when powersave governor is used
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio: Add an option to get migration data size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL 00/22] s390x: tests and fixes for PV, timing
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] vfio: Add an option to get migration data size
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH RESEND v4 15/23] KVM: x86: smm: check for failures on smm entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 22/23] KVM: x86: SVM: don't save SVM state to SMRAM when VM is not long mode capable
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 17/23] KVM: x86: smm: use smram structs in the common code
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 19/23] KVM: x86: smm: use smram struct for 64 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 18/23] KVM: x86: smm: use smram struct for 32 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 21/23] KVM: x86: SVM: use smram structs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 20/23] KVM: svm: drop explicit return value of kvm_vcpu_map
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 13/23] KVM: x86: emulator: update the emulation mode after CR0 write
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 12/23] KVM: x86: emulator: update the emulation mode after rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 09/23] bug: introduce ASSERT_STRUCT_OFFSET
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 05/23] KVM: allow compiling out SMM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 06/23] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 07/23] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 03/23] KVM: x86: move SMM exit to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 01/23] KVM: x86: start moving SMM-related functions to new files
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 04/23] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 02/23] KVM: x86: move SMM entry to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 17/23] KVM: x86: smm: use smram structs in the common code
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 13/23] KVM: x86: emulator: update the emulation mode after CR0 write
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 15/23] KVM: x86: smm: check for failures on smm entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 07/23] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 09/23] bug: introduce ASSERT_STRUCT_OFFSET
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 06/23] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 12/23] KVM: x86: emulator: update the emulation mode after rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 00/23] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 05/23] KVM: allow compiling out SMM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 03/23] KVM: x86: move SMM exit to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 04/23] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 01/23] KVM: x86: start moving SMM-related functions to new files
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 02/23] KVM: x86: move SMM entry to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [v2] KVM: s390: pv: fix external interruption loop not always detected
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 22/22] lib: s390x: sie: Properly populate SCA
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 21/22] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 18/22] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 20/22] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 19/22] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 13/22] s390x: uv-host: Fence against being run as a PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 14/22] s390x: uv-host: Fix init storage origin and length check
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 17/22] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 15/22] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 16/22] s390x: uv-host: fix allocation of UV memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 12/22] s390x: uv-host: Remove duplicated +
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 05/22] s390x: add exittime tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 11/22] s390x: uv-host: Add a set secure config parameters test function
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 10/22] s390x: uv-host: Add access exception test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 07/22] s390x: uv-host: Add access checks for donated memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 09/22] s390x: uv-host: Test uv immediate parameter
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 04/22] s390x: add migration TOD clock test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 03/22] lib/s390x: move TOD clock related functions to library
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 06/22] s390x: do not enable PV dump support by default
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 08/22] s390x: uv-host: Add uninitialized UV tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 01/22] s390x: Add specification exception test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 02/22] s390x: Test specification exceptions during transaction
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 00/22] s390x: tests and fixes for PV, timing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [v2 0/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Yujie Liu <yujie.liu@xxxxxxxxx>
- Re: [GIT PULL] KVM patches for Linux 6.1-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v2 0/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/13] x86/pmu: Update testcases to cover Intel Arch PMU Version 1
- From: Sandipan Das <sandipan.das@xxxxxxx>
- Re: [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [v1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v2 0/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [v1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/6] KVM: selftests: memslot_perf_test: aarch64 cleanup/fixes
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: x86: move SMM exit to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 07/16] x86: Add a simple test for SYSENTER instruction.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/9] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- (Extra) KVM call for 2022-10-25
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/2] S390x: CPU Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: SVM: Name and check reserved fields with structs offset
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [kvm-unit-tests PATCH 15/16] svm: introduce svm_vcpu
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [RFC PATCH] x86/sev-es: Include XSS value in GHCB CPUID request
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <John.Allen@xxxxxxx>
- [v1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: x86: move SMM entry to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/2] s390x: topology: Check the Perform Topology Function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 13/16] svm: move vmcb_ident to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 11/16] svm: add svm_suported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: start moving SMM-related functions to new files
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: allow compiling out SMM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v1 12/18] KVM: selftests/rseq_test: name the migration thread and some cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 18/18] KVM: selftests/kvm_create_max_vcpus: check KVM_MAX_VCPUS
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 11/18] KVM: selftest/xapic_ipi_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 17/18] KVM: selftests: remove the *vcpu[] input from __vm_create_with_vcpus
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 13/18] KVM: selftests/perf_test_util: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 15/18] KVM: selftests/vgic_init: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 14/18] KVM: selftest/memslot_perf_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 16/18] KVM: selftest/arch_timer: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 10/18] KVM: selftests/tsc_scaling_sync: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 09/18] KVM: selftests/steal_time: vcpu related code consolidation and cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 02/18] KVM: selftests/kvm_util: use vm->vcpus[] when create vm with vcpus
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 08/18] KVM: selftests/set_memory_region_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 07/18] KVM: selftests/max_guest_memory_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 04/18] KVM: selftests/kvm_page_table_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 06/18] KVM: selftests/dirty_log_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- Re: [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- [kvm-unit-tests PATCH v4 17/24] x86/pmu: Add GP/Fixed counters reset helpers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 21/24] x86/pmu: Add gp_events pointer to route different event tables
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 20/24] x86/pmu: Add global helpers to cover Intel Arch PMU Version 1
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 18/24] x86/pmu: Add a set of helpers related to global registers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 22/24] x86/pmu: Add nr_gp_counters to limit the number of test counters
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 24/24] x86/pmu: Add AMD Guest PerfMonV2 testcases
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 23/24] x86/pmu: Update testcases to cover AMD PMU
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 16/24] x86/pmu: Add GP counter related helpers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 19/24] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 13/24] x86/pmu: Add lib/x86/pmu.[c.h] and move common code to header files
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 15/24] x86/pmu: Initialize PMU perf_capabilities at pmu_init()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 14/24] x86/pmu: Read cpuid(10) in the pmu_init() to reduce VM-Exit
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 12/24] x86/pmu: Rename PC_VECTOR to PMI_VECTOR for better readability
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 10/24] x86/pmu: Refine info to clarify the current support
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 11/24] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 01/24] x86/pmu: Add PDCM check before accessing PERF_CAP register
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 05/24] x86/pmu: Fix printed messages for emulated instruction test
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 09/24] x86: create pmu group for quick pmu-scope testing
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 02/24] x86/pmu: Test emulation instructions on full-width counters
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 08/24] x86/pmu: Reset the expected count of the fixed counter 0 when i386
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 06/24] x86/pmu: Introduce __start_event() to drop all of the manual zeroing
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 07/24] x86/pmu: Introduce multiple_{one, many}() to improve readability
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 00/24] x86/pmu: Test case optimization, fixes and additions
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 03/24] x86/pmu: Pop up FW prefix to avoid out-of-context propagation
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 04/24] x86/pmu: Report SKIP when testing Intel LBR on AMD platforms
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH] kvm: x86: keep srcu writer side operation mutually exclusive
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH v1] KVM: selftests: name the threads
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [GIT PULL] KVM patches for Linux 6.1-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] KVM patches for Linux 6.1-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- linux-next: Fixes tag needs some work in the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [BUG] KVM USB passthrough did not claim interface before use
- From: Peter Geis <pgwipeout@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM patches for Linux 6.1-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH 1/2] linux-headers/linux/kvm.h: introduce kvm_userspace_memory_region_list ioctl
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 2/2] accel/kvm: introduce begin/commit listener callbacks
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 0/2] KVM: stop all vcpus before modifying memslots
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 1/4] linux-headers/linux/kvm.h: introduce kvm_userspace_memory_region_list ioctl
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 2/4] KVM: introduce kvm_clear_all_cpus_request
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH] tools: include: sync include/api/linux/kvm.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] tools: include: sync include/api/linux/kvm.h
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] tools: include: sync include/api/linux/kvm.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: use helper macro SPTE_ENT_PER_PAGE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: git://github -> https://github.com for kvm-riscv
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix some comment typos
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 6.1, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: remove obsolete kvm_mmu_gva_to_gpa_fetch()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: Mask off reserved bits in CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: debugfs: Return retval of simple_attr_open() if it fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/6] KVM: x86: Mask off reserved bits in CPUID.8000001FH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.1, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.1, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v1] KVM: selftests: name the threads
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v6 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 0/5] dirty_log_perf_test vCPU pinning
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 1/5] KVM: selftests: Add missing break between -e and -g option in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v6 7/7] selftests: kvm/x86: Test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 6/7] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 3/7] kvm: x86/pmu: prepare the pmu event filter for masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 5/7] selftests: kvm/x86: Add flags when creating a pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 0/7] Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 2/7] kvm: x86/pmu: Remove impossible events from the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] x86: efi: set up the IDT before accessing MSRs.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: QEMU Advent Calendar 2022 Call for Images
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/13] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 4/5] vfio: Remove CONFIG_VFIO_SPAPR_EEH
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/5] vfio: Move vfio_spapr_iommu_eeh_ioctl into vfio_iommu_spapr_tce.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 03/13] x86/pmu: Reset the expected count of the fixed counter 0 when i386
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 12/13] x86/pmu: Add assignment framework for Intel-specific HW resources
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/5] x86/cpuid: refactor setup_clear_cpu_cap()/clear_cpu_cap()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- QEMU Advent Calendar 2022 Call for Images
- From: Eldon Stegall <eldon-qemu@xxxxxxxxxxxx>
- [PATCH v12 46/46] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 45/46] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 42/46] KVM: selftests: Create a vendor independent helper to allocate Hyper-V specific test pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 41/46] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 43/46] KVM: selftests: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 40/46] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 37/46] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 38/46] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 39/46] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 31/46] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 17/46] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 32/46] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 12/46] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 15/46] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 28/46] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 34/46] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 11/46] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 04/46] x86/hyperv: KVM: Rename "hv_enlightenments" to "hv_vmcb_enlightenments"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 06/46] KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 27/46] KVM: x86: Make kvm_hv_get_assist_page() return 0/-errno
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 30/46] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 29/46] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 20/46] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 26/46] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 25/46] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 14/46] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 22/46] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 23/46] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 08/46] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 10/46] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 24/46] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 36/46] KVM: selftests: Drop helpers to read/write page table entries
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 05/46] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 35/46] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 19/46] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 07/46] KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_flush_tlb_all()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 09/46] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 21/46] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 18/46] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 03/46] KVM: SVM: Add a proper field for Hyper-V VMCB enlightenments
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 02/46] KVM: selftests: Move "struct hv_enlightenments" to x86_64/svm.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 01/46] x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Release the pfn in handle_abnormal_pfn() error path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86/ioapic: Fix oneshot interrupts forwarding
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Release the pfn in handle_abnormal_pfn() error path
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 5/6] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/6] s390x: PV fixups
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 6.1, take #1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/6] s390x: PV fixups
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/13] x86/pmu: Update testcases to cover Intel Arch PMU Version 1
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 12/13] x86/pmu: Add assignment framework for Intel-specific HW resources
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 4/6] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix kvm_riscv_vcpu_timer_pending() for Sstc
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 6/6] lib: s390x: sie: Properly populate SCA
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 5/6] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/6] lib: s390x: Use a new asce for each PV guest
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/6] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/6] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/6] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/6] s390x: PV fixups
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 5/8] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 7/8] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix kvm_riscv_vcpu_timer_pending() for Sstc
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] KVM: x86/mmu: WARN if TDP MMU SP disallows hugepage after being zapped
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 1/9] KVM: arm64: selftests: Use FIELD_GET() to extract ID register fields
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: Fix NULL pointer dereference in kvm_xen_set_evtchn_fast()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 00/15] Introduce Architectural LBR for vPMU
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH] x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init()
- From: Rafael Mendonca <rafaelmendsr@xxxxxxxxx>
- Re: [PATCH v5 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v5 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH] kvm: vmenter: Use tabs instead of spaces for indentation
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- Re: [V3 PATCH 4/4] KVM: selftests: x86: Precompute the cpu type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v5 0/5] dirty_log_perf_test vCPU pinning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 5/5] KVM: selftests: Run dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 5/5] KVM: selftests: Run dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 07/16] x86: Add a simple test for SYSENTER instruction.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: arm64: selftests: Stop unnecessary test stage tracking of debug-exceptions
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 3/9] KVM: arm64: selftests: Remove the hard-coded {b,w}pn#0 from debug-exceptions
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 09/16] svm: move svm spec definitions to lib/x86/svm.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/9] KVM: arm64: selftests: Use FIELD_GET() to extract ID register fields
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 15/16] svm: introduce svm_vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 13/16] svm: move vmcb_ident to svm_lib.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 11/16] svm: add svm_suported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH linux-next] KVM: x86: Replace IS_ERR() with IS_ERR_VALUE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH kvmtool v2] pci: Disable writes to Status register
- From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: Fix NULL pointer dereference in kvm_xen_set_evtchn_fast()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: Fix NULL pointer dereference in kvm_xen_set_evtchn_fast()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 4/4] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 15/16] svm: introduce svm_vcpu
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 10/16] svm: move some svm support functions into lib/x86/svm_lib.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 13/16] svm: move vmcb_ident to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 12/16] svm: move setup_svm to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 11/16] svm: add svm_suported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 09/16] svm: move svm spec definitions to lib/x86/svm.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 03/16] svm: use irq_enable instead of sti/nop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 07/16] x86: Add a simple test for SYSENTER instruction.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 06/16] x86: Add test for #SMI during interrupt window
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 05/16] svm: use apic_start_timer/apic_stop_timer instead of open coding it
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 04/16] svm: make svm_intr_intercept_mix_if/gif test a bit more robust
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 00/16] kvm-unit-tests: set of fixes and new tests
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [v1 4/5] KVM: s390: sida: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [v1 3/5] KVM: s390: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 5/5] KVM: s390: pv: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 1/5] s390/mm: gmap: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 2/5] s390/entry: sort out physical vs virtual pointers usage in sie64a
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 0/5] KVM: s390: Fix virtual-real address confusions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v5 19/25] KVM: arm64: Instantiate guest stage-2 page-tables at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH v5 25/25] KVM: arm64: Use the pKVM hyp vCPU structure in handle___kvm_vcpu_run()
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 18/25] KVM: arm64: Consolidate stage-2 initialisation into a single function
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 22/25] KVM: arm64: Maintain a copy of 'kvm_arm_vmid_bits' at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 23/25] KVM: arm64: Explicitly map 'kvm_vgic_global_state' at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 24/25] KVM: arm64: Don't unnecessarily map host kernel sections at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 21/25] KVM: arm64: Unmap 'kvm_arm_hyp_percpu_base' from the host
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 16/25] KVM: arm64: Provide I-cache invalidation by virtual address at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 17/25] KVM: arm64: Add generic hyp_memcache helpers
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 15/25] KVM: arm64: Initialise hypervisor copies of host symbols unconditionally
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 14/25] KVM: arm64: Add per-cpu fixmap infrastructure at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 13/25] KVM: arm64: Instantiate pKVM hypervisor VM and vCPU structures from EL1
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 11/25] KVM: arm64: Rename 'host_kvm' to 'host_mmu'
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 10/25] KVM: arm64: Add hyp_spinlock_t static initializer
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 09/25] KVM: arm64: Include asm/kvm_mmu.h in nvhe/mem_protect.h
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 08/25] KVM: arm64: Add helpers to pin memory shared with the hypervisor at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 07/25] KVM: arm64: Prevent the donation of no-map pages
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 06/25] KVM: arm64: Implement do_donate() helper for donating memory
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 05/25] KVM: arm64: Unify identifiers used to distinguish host and hypervisor
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 04/25] KVM: arm64: Fix-up hyp stage-1 refcounts for all pages mapped at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 03/25] KVM: arm64: Back the hypervisor 'struct hyp_page' array for all memory
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 01/25] KVM: arm64: Move hyp refcount manipulation helpers to common header file
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 00/25] KVM: arm64: Introduce pKVM hyp VM and vCPU state at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] vfio: Add an option to get migration data size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] s390x misc fixes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] s390x: uv-host: fix allocation of UV memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v1 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH linux-next] KVM: x86: Replace IS_ERR() with IS_ERR_VALUE()
- From: yexingchen116@xxxxxxxxx
- RE: [PATCH v1] KVM: selftests: name the threads
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH] kvm: vmx: Fix indentation coding style issue
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/7] s390x: Add a linker script to assembly snippets
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.1, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 7/7] lib: s390x: sie: Properly populate SCA
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH 4/4] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 3/4] KVM: x86: add kvm_leave_nested
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/4] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/4] KVM: x86: nSVM: leave nested mode on vCPU free
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/4] nSVM: fix L0 crash if L2 has shutdown condtion which L1 doesn't intercept
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 6/7] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/7] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH 16/17] arm64: Allow arm64_sw.hvhe on command line
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/17] KVM: arm64: Disable TTBR1_EL2 when using ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/17] KVM: arm64: Force HCR_EL2.E2H when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/17] KVM: arm64: Rework CPTR_EL2 programming for HVHE configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 15/17] KVM: arm64: Force HCR_E2H in guest context when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 14/17] KVM: arm64: Program the timer traps with VHE layout in hVHE mode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/17] KVM: arm64: Adjust EL2 stage-1 leaf AP bits when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 17/17] KVM: arm64: Terrible timer hack for M1 with hVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/7] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/7] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/8] s390x: uv-host: Access check extensions and improvements
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH 09/17] KVM: arm64: Key use of VHE instructions in nVHE code off ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/17] KVM: arm64: Remove alternatives from sysreg accessors in VHE hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/17] KVM: arm64: Elide kern_hyp_va() in VHE-specific parts of the hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/17] arm64: Allow EL1 physical timer access when running VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/17] arm64: Use CPACR_EL1 format to set CPTR_EL2 when E2H is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/17] arm64: Turn kaslr_feature_override into a generic SW feature override
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/7] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/7] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/7] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/7] s390x: PV fixups
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 6/7] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/7] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 7/7] lib: s390x: sie: Properly populate SCA
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/15] KVM: arm64: Handle stage-2 faults in parallel
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 07/15] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v11 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: uv-host: fix allocation of UV memory
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/8] s390x: uv-host: Add access checks for donated memory
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: "Chen, Jiaxi" <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 6/6] KVM: selftests: memslot_perf_test: Report optimal memory slots
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: "Chen, Jiaxi" <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 3/6] KVM: selftests: memslot_perf_test: Probe memory slots for once
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 5/6] KVM: selftests: memslot_perf_test: Consolidate memory
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 2/6] KVM: selftests: memslot_perf_test: Consolidate loop conditions in prepare_vm()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 1/6] KVM: selftests: memslot_perf_test: Use data->nslots in prepare_vm()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 0/6] KVM: selftests: memslot_perf_test: aarch64 cleanup/fixes
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: do not enable PV dump support by default
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 9/9] KVM: arm64: selftests: Test with every breakpoint/watchpoint
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 8/9] KVM: arm64: selftests: Add a test case for a linked watchpoint
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 7/9] KVM: arm64: selftests: Add a test case for a linked breakpoint
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 6/9] KVM: arm64: selftests: Change debug_version() to take ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 5/9] KVM: arm64: selftests: Stop unnecessary test stage tracking of debug-exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 4/9] KVM: arm64: selftests: Add helpers to enable debug exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 3/9] KVM: arm64: selftests: Remove the hard-coded {b,w}pn#0 from debug-exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 2/9] KVM: arm64: selftests: Add write_dbg{b,w}{c,v}r helpers in debug-exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 1/9] KVM: arm64: selftests: Use FIELD_GET() to extract ID register fields
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 0/9] KVM: arm64: selftests: Test linked {break,watch}points
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH][RFC] KVM: x86: Don't reset deadline to period when timer is in one shot mode
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [PATCH v10 00/14] KVM: selftests: Add aarch64/page_fault_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Introduce a selftest to measure execution performance
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: Split huge pages mapped by the TDP MMU on fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 01/14] KVM: selftests: Add a userfaultfd library
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 15/15] KVM: arm64: Handle stage-2 faults in parallel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/15] KVM: arm64: Use an opaque type for pteps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: Mask off reserved bits in CPUID.8000001EH
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: x86: Mask off reserved bits in CPUID.80000008H
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]