Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: x86: move SMM exit to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 07/16] x86: Add a simple test for SYSENTER instruction.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/9] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- (Extra) KVM call for 2022-10-25
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/2] S390x: CPU Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: SVM: Name and check reserved fields with structs offset
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [kvm-unit-tests PATCH 15/16] svm: introduce svm_vcpu
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [RFC PATCH] x86/sev-es: Include XSS value in GHCB CPUID request
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <John.Allen@xxxxxxx>
- [v1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: x86: move SMM entry to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/2] s390x: topology: Check the Perform Topology Function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 13/16] svm: move vmcb_ident to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 11/16] svm: add svm_suported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: start moving SMM-related functions to new files
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: allow compiling out SMM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v1 12/18] KVM: selftests/rseq_test: name the migration thread and some cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 18/18] KVM: selftests/kvm_create_max_vcpus: check KVM_MAX_VCPUS
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 11/18] KVM: selftest/xapic_ipi_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 17/18] KVM: selftests: remove the *vcpu[] input from __vm_create_with_vcpus
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 13/18] KVM: selftests/perf_test_util: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 15/18] KVM: selftests/vgic_init: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 14/18] KVM: selftest/memslot_perf_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 16/18] KVM: selftest/arch_timer: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 10/18] KVM: selftests/tsc_scaling_sync: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 09/18] KVM: selftests/steal_time: vcpu related code consolidation and cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 02/18] KVM: selftests/kvm_util: use vm->vcpus[] when create vm with vcpus
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 08/18] KVM: selftests/set_memory_region_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 07/18] KVM: selftests/max_guest_memory_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 04/18] KVM: selftests/kvm_page_table_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 06/18] KVM: selftests/dirty_log_test: vcpu related code consolidation
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- Re: [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- [kvm-unit-tests PATCH v4 17/24] x86/pmu: Add GP/Fixed counters reset helpers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 21/24] x86/pmu: Add gp_events pointer to route different event tables
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 20/24] x86/pmu: Add global helpers to cover Intel Arch PMU Version 1
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 18/24] x86/pmu: Add a set of helpers related to global registers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 22/24] x86/pmu: Add nr_gp_counters to limit the number of test counters
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 24/24] x86/pmu: Add AMD Guest PerfMonV2 testcases
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 23/24] x86/pmu: Update testcases to cover AMD PMU
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 16/24] x86/pmu: Add GP counter related helpers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 19/24] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 13/24] x86/pmu: Add lib/x86/pmu.[c.h] and move common code to header files
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 15/24] x86/pmu: Initialize PMU perf_capabilities at pmu_init()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 14/24] x86/pmu: Read cpuid(10) in the pmu_init() to reduce VM-Exit
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 12/24] x86/pmu: Rename PC_VECTOR to PMI_VECTOR for better readability
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 10/24] x86/pmu: Refine info to clarify the current support
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 11/24] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 01/24] x86/pmu: Add PDCM check before accessing PERF_CAP register
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 05/24] x86/pmu: Fix printed messages for emulated instruction test
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 09/24] x86: create pmu group for quick pmu-scope testing
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 02/24] x86/pmu: Test emulation instructions on full-width counters
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 08/24] x86/pmu: Reset the expected count of the fixed counter 0 when i386
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 06/24] x86/pmu: Introduce __start_event() to drop all of the manual zeroing
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 07/24] x86/pmu: Introduce multiple_{one, many}() to improve readability
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 00/24] x86/pmu: Test case optimization, fixes and additions
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 03/24] x86/pmu: Pop up FW prefix to avoid out-of-context propagation
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 04/24] x86/pmu: Report SKIP when testing Intel LBR on AMD platforms
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH] kvm: x86: keep srcu writer side operation mutually exclusive
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH v1] KVM: selftests: name the threads
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [GIT PULL] KVM patches for Linux 6.1-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] KVM patches for Linux 6.1-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- linux-next: Fixes tag needs some work in the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [BUG] KVM USB passthrough did not claim interface before use
- From: Peter Geis <pgwipeout@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM patches for Linux 6.1-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH 1/2] linux-headers/linux/kvm.h: introduce kvm_userspace_memory_region_list ioctl
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 2/2] accel/kvm: introduce begin/commit listener callbacks
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 0/2] KVM: stop all vcpus before modifying memslots
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 1/4] linux-headers/linux/kvm.h: introduce kvm_userspace_memory_region_list ioctl
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 2/4] KVM: introduce kvm_clear_all_cpus_request
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH] tools: include: sync include/api/linux/kvm.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] tools: include: sync include/api/linux/kvm.h
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] tools: include: sync include/api/linux/kvm.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: use helper macro SPTE_ENT_PER_PAGE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: git://github -> https://github.com for kvm-riscv
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix some comment typos
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 6.1, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: remove obsolete kvm_mmu_gva_to_gpa_fetch()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: Mask off reserved bits in CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: debugfs: Return retval of simple_attr_open() if it fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/6] KVM: x86: Mask off reserved bits in CPUID.8000001FH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.1, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.1, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v1] KVM: selftests: name the threads
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v6 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 0/5] dirty_log_perf_test vCPU pinning
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v6 1/5] KVM: selftests: Add missing break between -e and -g option in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v6 7/7] selftests: kvm/x86: Test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 6/7] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 3/7] kvm: x86/pmu: prepare the pmu event filter for masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 5/7] selftests: kvm/x86: Add flags when creating a pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 0/7] Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v6 2/7] kvm: x86/pmu: Remove impossible events from the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] x86: efi: set up the IDT before accessing MSRs.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: QEMU Advent Calendar 2022 Call for Images
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/13] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 4/5] vfio: Remove CONFIG_VFIO_SPAPR_EEH
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/5] vfio: Move vfio_spapr_iommu_eeh_ioctl into vfio_iommu_spapr_tce.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 03/13] x86/pmu: Reset the expected count of the fixed counter 0 when i386
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 12/13] x86/pmu: Add assignment framework for Intel-specific HW resources
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/5] x86/cpuid: refactor setup_clear_cpu_cap()/clear_cpu_cap()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- QEMU Advent Calendar 2022 Call for Images
- From: Eldon Stegall <eldon-qemu@xxxxxxxxxxxx>
- [PATCH v12 46/46] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 45/46] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 42/46] KVM: selftests: Create a vendor independent helper to allocate Hyper-V specific test pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 41/46] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 43/46] KVM: selftests: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 40/46] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 37/46] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 38/46] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 39/46] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 31/46] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 17/46] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 32/46] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 12/46] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 15/46] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 28/46] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 34/46] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 11/46] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 04/46] x86/hyperv: KVM: Rename "hv_enlightenments" to "hv_vmcb_enlightenments"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 06/46] KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 27/46] KVM: x86: Make kvm_hv_get_assist_page() return 0/-errno
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 30/46] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 29/46] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 20/46] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 26/46] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 25/46] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 14/46] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 22/46] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 23/46] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 08/46] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 10/46] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 24/46] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 36/46] KVM: selftests: Drop helpers to read/write page table entries
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 05/46] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 35/46] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 19/46] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 07/46] KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_flush_tlb_all()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 09/46] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 21/46] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 18/46] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 03/46] KVM: SVM: Add a proper field for Hyper-V VMCB enlightenments
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 02/46] KVM: selftests: Move "struct hv_enlightenments" to x86_64/svm.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 01/46] x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Release the pfn in handle_abnormal_pfn() error path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86/ioapic: Fix oneshot interrupts forwarding
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Release the pfn in handle_abnormal_pfn() error path
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 5/6] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/6] s390x: PV fixups
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 6.1, take #1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/6] s390x: PV fixups
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/13] x86/pmu: Update testcases to cover Intel Arch PMU Version 1
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 12/13] x86/pmu: Add assignment framework for Intel-specific HW resources
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 4/6] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix kvm_riscv_vcpu_timer_pending() for Sstc
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 6/6] lib: s390x: sie: Properly populate SCA
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 5/6] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/6] lib: s390x: Use a new asce for each PV guest
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/6] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/6] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/6] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/6] s390x: PV fixups
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 5/8] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 7/8] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix kvm_riscv_vcpu_timer_pending() for Sstc
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] KVM: x86/mmu: WARN if TDP MMU SP disallows hugepage after being zapped
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 1/9] KVM: arm64: selftests: Use FIELD_GET() to extract ID register fields
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: Fix NULL pointer dereference in kvm_xen_set_evtchn_fast()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 00/15] Introduce Architectural LBR for vPMU
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH] x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init()
- From: Rafael Mendonca <rafaelmendsr@xxxxxxxxx>
- Re: [PATCH v5 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v5 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH] kvm: vmenter: Use tabs instead of spaces for indentation
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- Re: [V3 PATCH 4/4] KVM: selftests: x86: Precompute the cpu type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/8] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v5 0/5] dirty_log_perf_test vCPU pinning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 5/5] KVM: selftests: Run dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 5/5] KVM: selftests: Run dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 07/16] x86: Add a simple test for SYSENTER instruction.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: arm64: selftests: Stop unnecessary test stage tracking of debug-exceptions
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 3/9] KVM: arm64: selftests: Remove the hard-coded {b,w}pn#0 from debug-exceptions
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 09/16] svm: move svm spec definitions to lib/x86/svm.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/9] KVM: arm64: selftests: Use FIELD_GET() to extract ID register fields
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 15/16] svm: introduce svm_vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 13/16] svm: move vmcb_ident to svm_lib.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Zap only the relevant pages when removing a memslot
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 11/16] svm: add svm_suported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH linux-next] KVM: x86: Replace IS_ERR() with IS_ERR_VALUE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH kvmtool v2] pci: Disable writes to Status register
- From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: Fix NULL pointer dereference in kvm_xen_set_evtchn_fast()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: Fix NULL pointer dereference in kvm_xen_set_evtchn_fast()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 4/4] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 08/16] svm: add nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 15/16] svm: introduce svm_vcpu
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 10/16] svm: move some svm support functions into lib/x86/svm_lib.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 13/16] svm: move vmcb_ident to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 12/16] svm: move setup_svm to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 11/16] svm: add svm_suported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 09/16] svm: move svm spec definitions to lib/x86/svm.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 03/16] svm: use irq_enable instead of sti/nop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 07/16] x86: Add a simple test for SYSENTER instruction.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 06/16] x86: Add test for #SMI during interrupt window
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 05/16] svm: use apic_start_timer/apic_stop_timer instead of open coding it
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 04/16] svm: make svm_intr_intercept_mix_if/gif test a bit more robust
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH 00/16] kvm-unit-tests: set of fixes and new tests
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [v1 4/5] KVM: s390: sida: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [v1 3/5] KVM: s390: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 5/5] KVM: s390: pv: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 1/5] s390/mm: gmap: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 2/5] s390/entry: sort out physical vs virtual pointers usage in sie64a
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v1 0/5] KVM: s390: Fix virtual-real address confusions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v5 19/25] KVM: arm64: Instantiate guest stage-2 page-tables at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH v5 25/25] KVM: arm64: Use the pKVM hyp vCPU structure in handle___kvm_vcpu_run()
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 18/25] KVM: arm64: Consolidate stage-2 initialisation into a single function
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 22/25] KVM: arm64: Maintain a copy of 'kvm_arm_vmid_bits' at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 23/25] KVM: arm64: Explicitly map 'kvm_vgic_global_state' at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 24/25] KVM: arm64: Don't unnecessarily map host kernel sections at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 21/25] KVM: arm64: Unmap 'kvm_arm_hyp_percpu_base' from the host
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 16/25] KVM: arm64: Provide I-cache invalidation by virtual address at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 17/25] KVM: arm64: Add generic hyp_memcache helpers
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 15/25] KVM: arm64: Initialise hypervisor copies of host symbols unconditionally
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 14/25] KVM: arm64: Add per-cpu fixmap infrastructure at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 13/25] KVM: arm64: Instantiate pKVM hypervisor VM and vCPU structures from EL1
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 11/25] KVM: arm64: Rename 'host_kvm' to 'host_mmu'
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 10/25] KVM: arm64: Add hyp_spinlock_t static initializer
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 09/25] KVM: arm64: Include asm/kvm_mmu.h in nvhe/mem_protect.h
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 08/25] KVM: arm64: Add helpers to pin memory shared with the hypervisor at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 07/25] KVM: arm64: Prevent the donation of no-map pages
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 06/25] KVM: arm64: Implement do_donate() helper for donating memory
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 05/25] KVM: arm64: Unify identifiers used to distinguish host and hypervisor
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 04/25] KVM: arm64: Fix-up hyp stage-1 refcounts for all pages mapped at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 03/25] KVM: arm64: Back the hypervisor 'struct hyp_page' array for all memory
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 01/25] KVM: arm64: Move hyp refcount manipulation helpers to common header file
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v5 00/25] KVM: arm64: Introduce pKVM hyp VM and vCPU state at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] vfio: Add an option to get migration data size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] s390x misc fixes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] s390x: uv-host: fix allocation of UV memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v1 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH linux-next] KVM: x86: Replace IS_ERR() with IS_ERR_VALUE()
- From: yexingchen116@xxxxxxxxx
- RE: [PATCH v1] KVM: selftests: name the threads
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH] kvm: vmx: Fix indentation coding style issue
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/7] s390x: Add a linker script to assembly snippets
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.1, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 7/7] lib: s390x: sie: Properly populate SCA
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH 4/4] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 3/4] KVM: x86: add kvm_leave_nested
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/4] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/4] KVM: x86: nSVM: leave nested mode on vCPU free
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/4] nSVM: fix L0 crash if L2 has shutdown condtion which L1 doesn't intercept
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 6/7] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/7] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH 16/17] arm64: Allow arm64_sw.hvhe on command line
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 11/17] KVM: arm64: Disable TTBR1_EL2 when using ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 10/17] KVM: arm64: Force HCR_EL2.E2H when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 13/17] KVM: arm64: Rework CPTR_EL2 programming for HVHE configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 15/17] KVM: arm64: Force HCR_E2H in guest context when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 14/17] KVM: arm64: Program the timer traps with VHE layout in hVHE mode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 12/17] KVM: arm64: Adjust EL2 stage-1 leaf AP bits when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 17/17] KVM: arm64: Terrible timer hack for M1 with hVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/7] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/7] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/8] s390x: uv-host: Access check extensions and improvements
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH 09/17] KVM: arm64: Key use of VHE instructions in nVHE code off ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 08/17] KVM: arm64: Remove alternatives from sysreg accessors in VHE hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 03/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 07/17] KVM: arm64: Elide kern_hyp_va() in VHE-specific parts of the hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 04/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 05/17] arm64: Allow EL1 physical timer access when running VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 06/17] arm64: Use CPACR_EL1 format to set CPTR_EL2 when E2H is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 02/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 01/17] arm64: Turn kaslr_feature_override into a generic SW feature override
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/7] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/7] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/7] lib: s390x: Use a new asce for each PV guest
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/7] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/7] s390x: PV fixups
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 6/7] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/7] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 7/7] lib: s390x: sie: Properly populate SCA
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/15] KVM: arm64: Handle stage-2 faults in parallel
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 07/15] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v11 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: uv-host: fix allocation of UV memory
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/8] s390x: uv-host: Add access checks for donated memory
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: "Chen, Jiaxi" <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 6/6] KVM: selftests: memslot_perf_test: Report optimal memory slots
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: "Chen, Jiaxi" <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 3/6] KVM: selftests: memslot_perf_test: Probe memory slots for once
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 5/6] KVM: selftests: memslot_perf_test: Consolidate memory
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 2/6] KVM: selftests: memslot_perf_test: Consolidate loop conditions in prepare_vm()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 1/6] KVM: selftests: memslot_perf_test: Use data->nslots in prepare_vm()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3 0/6] KVM: selftests: memslot_perf_test: aarch64 cleanup/fixes
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: do not enable PV dump support by default
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 9/9] KVM: arm64: selftests: Test with every breakpoint/watchpoint
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 8/9] KVM: arm64: selftests: Add a test case for a linked watchpoint
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 7/9] KVM: arm64: selftests: Add a test case for a linked breakpoint
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 6/9] KVM: arm64: selftests: Change debug_version() to take ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 5/9] KVM: arm64: selftests: Stop unnecessary test stage tracking of debug-exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 4/9] KVM: arm64: selftests: Add helpers to enable debug exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 3/9] KVM: arm64: selftests: Remove the hard-coded {b,w}pn#0 from debug-exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 2/9] KVM: arm64: selftests: Add write_dbg{b,w}{c,v}r helpers in debug-exceptions
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 1/9] KVM: arm64: selftests: Use FIELD_GET() to extract ID register fields
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 0/9] KVM: arm64: selftests: Test linked {break,watch}points
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH][RFC] KVM: x86: Don't reset deadline to period when timer is in one shot mode
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [PATCH v10 00/14] KVM: selftests: Add aarch64/page_fault_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Introduce a selftest to measure execution performance
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: Split huge pages mapped by the TDP MMU on fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 01/14] KVM: selftests: Add a userfaultfd library
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 15/15] KVM: arm64: Handle stage-2 faults in parallel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/15] KVM: arm64: Use an opaque type for pteps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: Mask off reserved bits in CPUID.8000001EH
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: x86: Mask off reserved bits in CPUID.80000008H
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 3/3] KVM: selftests: randomize page access order
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v7 2/3] KVM: selftests: randomize which pages are written vs read
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v7 0/3] KVM: selftests: randomize memory access of dirty_log_perf_test
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v11 37/46] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 23/46] KVM: x86: hyper-v: L2 TLB flush
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: nVMX: Add IBPB between L2 and L1 to
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v11 11/46] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 09/46] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v1 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v1] KVM: selftests: name the threads
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v1] KVM: selftests: name the threads
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v1 0/7] vfio-ccw parent rework
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 7/7] vfio: Remove vfio_free_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v6 4/8] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 6/8] KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 8/8] KVM: x86/mmu: WARN if TDP MMU SP disallows hugepage after being zapped
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 0/8] KVM: x86: Apply NX mitigation more precisely
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 5/8] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 3/8] KVM: x86/mmu: Properly account NX huge page workaround for nonpaging MMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 2/8] KVM: x86/mmu: Rename NX huge pages fields/functions for consistency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 7/8] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 1/8] KVM: x86/mmu: Tag disallowed NX huge pages even if they're not tracked
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 13/25] KVM: arm64: Instantiate pKVM hypervisor VM and vCPU structures from EL1
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v1 4/7] vfio/ccw: move private to mdev lifecycle
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 0/7] vfio-ccw parent rework
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 3/7] vfio/ccw: move private initialization to callback
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 7/7] vfio: Remove vfio_free_device
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 5/7] vfio/ccw: remove release completion
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 2/7] vfio/ccw: remove private->sch
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/1] s390x: do not enable PV dump support by default
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/1] s390x: do not enable PV dump support by default
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/1] s390x: do not enable PV dump support by default
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/1] s390x: do not enable PV dump support by default
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/5] KVM: Implement dirty quota-based throttling of vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 13/25] KVM: arm64: Instantiate pKVM hypervisor VM and vCPU structures from EL1
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH][RFC] KVM: x86: Don't reset deadline to period when timer is in one shot mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v4 13/25] KVM: arm64: Instantiate pKVM hypervisor VM and vCPU structures from EL1
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v6 2/5] KVM: x86: Dirty quota-based throttling of vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/1] s390x: do not enable PV dump support by default
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: do not enable PV dump support by default
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH] virt: Prevent AES-GCM IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/1] s390x: do not enable PV dump support by default
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/1] s390x: do not enable PV dump support by default
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: do not enable PV dump support by default
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: x86: Expose Predictive Store Forwarding Disable on Intel parts
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: 6.1-rc1 regression: virtio-net cpumask and during reboot
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: 6.1-rc1 regression: virtio-net cpumask and during reboot
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 14/25] KVM: arm64: Add per-cpu fixmap infrastructure at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- Re: 6.1-rc1 regression: virtio-net cpumask and during reboot
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: 6.1-rc1 regression: virtio-net cpumask and during reboot
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix kvm_riscv_vcpu_timer_pending() for Sstc
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- 6.1-rc1 regression: virtio-net cpumask and during reboot
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/15] target/arm: ensure KVM traps set appropriate MemTxAttrs
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 15/15] accel/kvm: move kvm_update_guest_debug to inline stub
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/2] x86/pmu: Add AMD Guest PerfMonV2 testcases
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/2] x86/pmu: Update rdpmc testcase to cover #GP and emulation path
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 6/6] x86: KVM: Enable PREFETCHIT0/1 CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH 3/6] x86: KVM: Enable AVX-IFMA CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH 5/6] x86: KVM: Enable AVX-NE-CONVERT CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH 2/6] x86: KVM: Enable AMX-FP16 CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH 0/6] x86: KVM: Expose CPUID to guest for new Intel platform instructions
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: uv-host: fix allocation of UV memory
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 1/8] KVM: selftests: Rename emulator_error_test to smaller_maxphyaddr_emulation_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 8/8] KVM: selftest: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: selftests: Fix and clean up emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 3/8] KVM: selftests: Delete dead ucall code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 5/8] KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 2/8] KVM: selftests: Explicitly require instructions bytes
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 6/8] KVM: selftests: Copy KVM PFERR masks into selftests
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 4/8] KVM: selftests: Move flds instruction emulation failure handling to header
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] perf stat: do not fatal if the leader is errored
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] perf stat: do not fatal if the leader is errored
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH V5 3/7] KVM: selftests: handle protected bits in page tables
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5 7/7] KVM: selftests: Add simple sev vm testing
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5 6/7] KVM: selftests: Update ucall pool to allocate from shared memory
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5 4/7] KVM: selftests: add support for protected vm_vaddr_* allocations
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5 1/7] KVM: selftests: sparsebit: add const where appropriate
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5 2/7] KVM: selftests: add hooks for managing protected guest memory
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5 0/7] KVM: selftests: Add simple SEV test
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v10 6/9] s390x/cpu topology: add topology-disable machine property
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v6 2/5] KVM: x86: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v4 14/25] KVM: arm64: Add per-cpu fixmap infrastructure at EL2
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] vfio: platform: Do not pass return buffer to ACPI _RST method
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 2/5] vfio/spapr: Move VFIO_CHECK_EXTENSION into tce_iommu_ioctl()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] KVM: x86: Allow to use bitmap in ring-based dirty page tracking
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH] vfio: platform: Do not pass return buffer to ACPI _RST method
- From: Rafael Mendonca <rafaelmendsr@xxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: arm64: Add infrastructure to create and track pKVM instances at EL2
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/2] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/2] s390x misc fixes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH kvmtool 6/6] riscv: Add --disable-<xyz> options to allow user disable extensions
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/2] s390x: uv-host: fix allocation of UV memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH kvmtool 5/6] riscv: Add Zicbom extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH kvmtool 1/6] Update UAPI headers based on Linux-6.1-rc1
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH kvmtool 4/6] riscv: Move reg encoding helpers to kvm-cpu-arch.h
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH kvmtool 2/6] riscv: Add Svinval extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH kvmtool 3/6] riscv: Add zihintpause extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH kvmtool 0/6] RISC-V Svinval, Zihintpause, anad Zicbom support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 14/25] KVM: arm64: Add per-cpu fixmap infrastructure at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 10/25] KVM: arm64: Add hyp_spinlock_t static initializer
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v4 11/25] KVM: arm64: Rename 'host_kvm' to 'host_mmu'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v4 07/25] KVM: arm64: Prevent the donation of no-map pages
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- RE: KVM Call for 2022-10-18
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [RFC V3 PATCH 3/6] selftests: kvm: ucall: Allow querying ucall pool gpa
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1] s390x: do not enable PV dump support by default
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v4 14/25] KVM: arm64: Add per-cpu fixmap infrastructure at EL2
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 3/4] KVM: nVMX: Prepare to sanitize tertiary execution controls with eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 1/4] KVM: nVMX: Sanitize primary processor-based VM-execution controls with eVMCS too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/13] x86/pmu: Update testcases to cover Intel Arch PMU Version 1
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 5/6] KVM: selftests: memslot_perf_test: Consolidate memory sizes
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: selftests: memslot_perf_test: Consolidate memory sizes
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 3/7] KVM: x86: Allow to use bitmap in ring-based dirty page tracking
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 3/7] KVM: x86: Allow to use bitmap in ring-based dirty page tracking
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 4/5] vfio: Remove CONFIG_VFIO_SPAPR_EEH
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] vfio: Move vfio_spapr_iommu_eeh_ioctl into vfio_iommu_spapr_tce.c
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] vfio/spapr: Move VFIO_CHECK_EXTENSION into tce_iommu_ioctl()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] vfio/pci: Move all the SPAPR PCI specific logic to vfio_pci_core.ko
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH v2 6/6] KVM: selftests: memslot_perf_test: Report optimal memory slots
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: selftests: memslot_perf_test: Consolidate memory sizes
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: selftests: memslot_perf_test: Support variable guest page size
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: selftests: memslot_perf_test: Probe memory slots for once
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: selftests: memslot_perf_test: Consolidate loop conditions in prepare_vm()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: selftests: memslot_perf_test: Use data->nslots in prepare_vm()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 0/6] KVM: selftests: memslot_perf_test: aarch64 cleanup/fixes
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v2] vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]