Linux KVM Virtualization
[Prev Page][Next Page]
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/19] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v1 22/23] KVM: selftests: Add a new VM guest mode to run user level code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 16/23] KVM: nVMX: Add FRED VMCS fields
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 23/23] KVM: selftests: Add fred exception tests
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 21/23] KVM: selftests: Run debug_regs test with FRED enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 20/23] KVM: selftests: Add FRED VMCS fields to evmcs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 19/23] KVM: x86: Allow FRED/LKGS/WRMSRNS to be exposed to guests
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 18/23] KVM: nVMX: Add VMCS FRED states checking
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 17/23] KVM: nVMX: Add support for VMX FRED controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 13/23] KVM: VMX: Handle VMX nested exception for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 10/23] KVM: VMX: Add support for FRED context save/restore
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 14/23] KVM: VMX: Dump FRED context in dump_vmcs()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 08/23] KVM: VMX: Initialize VMCS FRED fields
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 03/23] KVM: VMX: Add support for the secondary VM exit controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 07/23] KVM: VMX: Disable intercepting FRED MSRs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 04/23] KVM: x86: Mark CR4.FRED as not reserved
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 01/23] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 02/23] KVM: VMX: Cleanup VMX misc information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 00/23] Enable FRED with KVM VMX
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [PATCH v5] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: David Hildenbrand <david@xxxxxxxxxx>
- [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 14/33] KVM: x86: Add VTL to the MMU role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 21/33] KVM: Pass memory attribute array as a MMU notifier argument
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [RFC 18/33] KVM: x86: Decouple kvm_get_memory_attributes() from struct kvm's mem_attr_array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC 25/33] KVM: Introduce a set of new memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm:guestmemfd 59/59] arch/loongarch/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 01/33] KVM: x86: Decouple lapic.h from hyperv.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 05/33] KVM: x86: hyper-v: Introduce VTL call/return prologues in hypercall page
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 09/33] KVM: x86: hyper-v: Introduce per-VTL vcpu helpers
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 32/33] KVM: x86: hyper-v: Implement HVCALL_TRANSLATE_VIRTUAL_ADDRESS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 30/33] KVM: x86: hyper-v: Introduce KVM_REQ_HV_INJECT_INTERCEPT request
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 32/33] KVM: x86: hyper-v: Implement HVCALL_TRANSLATE_VIRTUAL_ADDRESS
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 30/33] KVM: x86: hyper-v: Introduce KVM_REQ_HV_INJECT_INTERCEPT request
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v12 01/37] x86/cpufeatures: Add the cpu feature bit for WRMSRNS
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 25/33] KVM: Introduce a set of new memory attributes
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 09/33] KVM: x86: hyper-v: Introduce per-VTL vcpu helpers
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 11/33] KVM: x86: hyper-v: Handle GET/SET_VP_REGISTER hcall in user-space
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC 05/33] KVM: x86: hyper-v: Introduce VTL call/return prologues in hypercall page
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Alexander Graf <graf@xxxxxxxxxx>
- [RFC 33/33] Documentation: KVM: Introduce "Emulating Hyper-V VSM with KVM"
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 32/33] KVM: x86: hyper-v: Implement HVCALL_TRANSLATE_VIRTUAL_ADDRESS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 31/33] KVM: x86: hyper-v: Inject intercept on VTL memory protection fault
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 30/33] KVM: x86: hyper-v: Introduce KVM_REQ_HV_INJECT_INTERCEPT request
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 28/33] x86/hyper-v: Introduce memory intercept message structure
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 27/33] KVM: x86/mmu/hyper-v: Validate memory faults against per-VTL memprots
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 26/33] KVM: x86: hyper-vsm: Allow setting per-VTL memory attributes
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [RFC 25/33] KVM: Introduce a set of new memory attributes
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 24/33] KVM: x86: hyper-v: Introduce KVM VTL device
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 23/33] KVM: Expose memory attribute helper functions unanimously
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 22/33] KVM: Decouple kvm_ioctl_set_mem_attributes() from kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 21/33] KVM: Pass memory attribute array as a MMU notifier argument
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 20/33] KVM: x86/mmu: Decouple hugepage_has_attrs() from struct kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 19/33] KVM: x86: Decouple kvm_range_has_memory_attributes() from struct kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 18/33] KVM: x86: Decouple kvm_get_memory_attributes() from struct kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 17/33] KVM: x86/mmu: Allow setting memory attributes if VSM enabled
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 16/33] KVM: x86/mmu: Expose R/W/X flags during memory fault exits
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 15/33] KVM: x86/mmu: Introduce infrastructure to handle non-executable faults
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 13/33] KVM: Allow polling vCPUs for events
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 14/33] KVM: x86: Add VTL to the MMU role
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 12/33] KVM: x86: hyper-v: Handle VSM hcalls in user-space
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 11/33] KVM: x86: hyper-v: Handle GET/SET_VP_REGISTER hcall in user-space
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 10/33] KVM: x86: hyper-v: Introduce KVM_HV_GET_VSM_STATE
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 09/33] KVM: x86: hyper-v: Introduce per-VTL vcpu helpers
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 07/33] KVM: x86: hyper-v: Introduce KVM_CAP_HYPERV_VSM
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 08/33] KVM: x86: Don't use hv_timer if CAP_HYPERV_VSM enabled
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 06/33] KVM: x86: hyper-v: Introduce VTL awareness to Hyper-V's PV-IPIs
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 05/33] KVM: x86: hyper-v: Introduce VTL call/return prologues in hypercall page
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 04/33] KVM: x86: hyper-v: Move hypercall page handling into separate function
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 01/33] KVM: x86: Decouple lapic.h from hyperv.h
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: kvm/s390x: use vm_create_barebones()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] selftests: kvm/s390x: use vm_create_barebones()
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH] selftests: kvm/s390x: use vm_create_barebones()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/7] iommufd: Add iommufd_device_bind_pasid()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [RFC 3/7] iommufd: Add iommufd_device_bind_pasid()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/7] iommufd: Add iommufd_device_bind_pasid()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC PATCH v1 2/2] vsock/test: SO_RCVLOWAT + deferred credit update test
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 0/2] send credit update during setting SO_RCVLOWAT
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 1/2] virtio/vsock: send credit update during setting SO_RCVLOWAT
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH net v2] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v4 4/4] KVM: selftests: Add test cases for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 0/4] KVM: selftests: Add LoongArch support
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 2/4] KVM: selftests: Add core KVM selftests support for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 1/4] KVM: selftests: Add KVM selftests header files for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 3/4] KVM: selftests: Add ucall test support for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH] target/i386/kvm: call kvm_put_vcpu_events() before kvm_put_nested_state()
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- Re: [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 02/19] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Drop the single-underscore ioctl() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: selftests: Detect if KVM bugged the VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2023.11.08 - No topic, but still a go
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 19/19] KVM: selftests: Test PMC virtualization with forced emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 18/19] KVM: selftests: Move KVM_FEP macro into common library header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 17/19] KVM: selftests: Query module param to detect FEP in MSR filtering test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 16/19] KVM: selftests: Add helpers to read integer module params
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 15/19] KVM: selftests: Add a helper to query if the PMU module param is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 14/19] KVM: selftests: Expand PMU counters test to verify LLC events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 13/19] KVM: selftests: Add functional test for Intel's fixed PMU counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 12/19] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 11/19] KVM: selftests: Test consistency of CPUID with num of gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 10/19] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 09/19] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 08/19] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/19] KVM: selftests: Extend {kvm,this}_pmu_has() to support fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 06/19] KVM: selftests: Drop the "name" param from KVM_X86_PMU_FEATURE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 05/19] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 02/19] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 01/19] KVM: x86/pmu: Always treat Fixed counters as available when supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 00/19] KVM: x86/pmu: selftests: Fixes and new tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: Performance and correctness fixes for CLEAR_DIRTY_LOG
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: Performance and correctness fixes for CLEAR_DIRTY_LOG
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH net 0/4] vsock: fix server prevents clients from reconnecting
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/1] s390/cio: make sch->lock a spinlock (is a pointer)
- From: Vasily Gorbik <gor@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH 14/14] KVM: VAC: Bring up VAC as a new module
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 13/14] KVM: x86: VAC: Move all hardware enable/disable code into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 12/14] KVM: x86: Move VMX and SVM support checks into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 11/14] KVM: SVM: Move SVM enable and disable into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 10/14] KVM: VMX: Move VMX enable and disable into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 09/14] KVM: x86: Move shared KVM state into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 08/14] KVM: VMX: Move shared VMX data structures into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 07/14] KVM: SVM: Move shared SVM data structures into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 06/14] KVM: x86: Move user return msr operations out of KVM
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 05/14] KVM: x86: Refactor hardware enable/disable operations into a new file
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 04/14] KVM: x86: Create stubs for a new VAC module
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 03/14] KVM: x86: Remove unused exports
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 02/14] KVM: x86: Fold x86 vendor modules into the main KVM modules
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 01/14] KVM: x86: Move common module params from SVM/VMX to x86
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 00/14] Support multiple KVM modules on the same host
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 1/2] KVM: x86: Make the hardcoded APIC bus frequency vm variable
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer configurable
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 2/3] KVM: arm64: selftests: Guarantee interrupts are handled
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 11/14] KVM: nVMX: hyper-v: Introduce nested_vmx_evmptr12() and nested_vmx_is_evmptr12_valid() helpers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 10/14] KVM: x86: Make Hyper-V emulation optional
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 09/14] KVM: selftests: Fix vmxon_pa == vmcs12_pa == -1ull vmx_set_nested_state_test for !eVMCS case
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 08/14] KVM: selftests: Make all Hyper-V tests explicitly dependent on Hyper-V emulation support in KVM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: selftests: Fix MWAIT error message when guest assertion fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 07/14] KVM: x86: hyper-v: Introduce kvm_hv_nested_transtion_tlb_flush() helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/14] KVM: x86: hyper-v: Move Hyper-V partition assist page out of Hyper-V emulation context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 18/25] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 03/20] KVM: x86/pmu: Don't enumerate arch events KVM doesn't support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v17 000/116] KVM TDX basic feature support
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v17 075/116] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 068/116] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 073/116] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 067/116] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 071/116] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 080/116] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 076/116] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 061/116] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 078/116] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 083/116] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 085/116] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 079/116] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 077/116] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 066/116] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 082/116] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 084/116] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 102/116] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 088/116] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 07/16] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 081/116] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 095/116] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 090/116] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 086/116] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 103/116] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 096/116] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 074/116] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 03/16] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 089/116] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 101/116] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 04/16] KVM: TDX: Pass size to tdx_measure_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 08/16] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 00/16] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 097/116] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 087/116] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 099/116] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 093/116] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 091/116] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 094/116] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 106/116] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 06/16] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 098/116] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 100/116] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 01/16] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 05/16] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 065/116] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 16/16] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 092/116] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 13/16] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 112/116] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 12/16] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 15/16] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 115/116] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 114/116] RFC: KVM: x86: Add x86 callback to check cpuid
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 116/116] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 113/116] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 11/16] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 14/16] KVM: x86/tdp_mmu: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 09/16] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 10/16] KVM: x86/tdp_mmu: Allocate private page table for large page split
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 107/116] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 111/116] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 110/116] KVM: TDX: Inhibit APICv for TDX guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 109/116] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 108/116] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 104/116] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 105/116] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 059/116] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 070/116] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 072/116] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 069/116] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 056/116] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 052/116] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 064/116] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 050/116] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 048/116] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 063/116] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 043/116] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 062/116] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 035/116] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 046/116] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 060/116] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 058/116] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 057/116] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 055/116] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 054/116] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 051/116] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 053/116] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 047/116] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 049/116] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 042/116] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 044/116] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 045/116] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 041/116] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 039/116] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 040/116] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 038/116] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 034/116] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 033/116] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 030/116] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 026/116] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 027/116] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 025/116] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 023/116] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 022/116] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 024/116] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 020/116] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 021/116] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 019/116] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 018/116] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 016/116] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 014/116] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 012/116] KVM: TDX: Retry SEAMCALL on the lack of entropy error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 013/116] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 009/116] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 010/116] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 008/116] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 007/116] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 004/116] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 000/116] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH 33/34] KVM: selftests: Test KVM exit behavior for private memory/access
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PULL 00/15] xenfv.for-upstream queue
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH 32/34] KVM: selftests: Add basic selftest for guest_memfd()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 30/34] KVM: selftests: Add KVM_SET_USER_MEMORY_REGION2 helper
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] s390x: sie: ensure guests are aligned to 2GB
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: mvpg-sie: fix virtual-physical address confusion
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v8 7/8] s390x: add a test for SIE without MSO/MSL
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] s390/cio: make sch->lock a spinlock (is a pointer)
- From: Vineeth Vijayan <vneethv@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v8 5/8] s390x: lib: sie: don't reenter SIE on pgm int
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v2 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v2 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v2 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v2 3/3] LoongArch: KVM: Remove kvm_acquire_timer before entering guest
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 2/3] LoongArch: KVM: Allow to access HW timer CSR registers always
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v2 1/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [kvmtool PATCH v2 0/6] RISC-V AIA irqchip and Svnapot support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool] virtio: Cancel and join threads when exiting devices
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 09/20] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: heqiong <heqiong1557@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v4 14/17] net: do not delete nics in net_cleanup()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/17] doc/sphinx/hxtool.py: add optional label argument to SRST directive
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 08/15] hw/xen: do not repeatedly try to create a failing backend device
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 03/15] include: update Xen public headers to Xen 4.17.2 release
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 12/15] hw/xen: update Xen PV NIC to XenDevice model
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 06/15] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 00/15] xenfv.for-upstream queue
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 07/15] hw/xen: add get_frontend_path() method to XenDeviceClass
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 10/15] hw/xen: add support for Xen primary console in emulated mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 14/15] xen-platform: unplug AHCI disks
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 11/15] hw/xen: only remove peers of PCI NICs on unplug
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 05/15] hw/xen: populate store frontend nodes with XenStore PFN/port
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 01/15] i386/xen: Ignore VCPU_SSHOTTMR_future flag in set_singleshot_timer()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 09/15] hw/xen: update Xen console to XenDevice model
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 02/15] hw/xen: Clean up event channel 'type_val' handling to use union
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 15/15] docs: update Xen-on-KVM documentation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 13/15] hw/i386/pc: support '-nic' for xen-net-device
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 04/15] i386/xen: advertise XEN_HVM_CPUID_UPCALL_VECTOR in CPUID
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/3] s390x: Improve console handling
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 00/10] s390x: topology: Fixes and extension
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests RFC PATCH 00/19] arm/arm64: Rework cache maintenance at boot
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PULL 00/60] Misc HW/UI patches for 2023-11-06
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments
- From: Thomas Huth <thuth@xxxxxxxxxx>
- RE: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/20] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 03/20] KVM: x86/pmu: Don't enumerate arch events KVM doesn't support
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] riscv: cleanup assembly usage of ENTRY()/END() and use local labels
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: heqiong <heqiong1557@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] perf build: Generate arm64's sysreg-defs.h and add to include path
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [PATCH 08/34] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PULL 0/7] xenfv-stable queue
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PULL 00/60] Misc HW/UI patches for 2023-11-06
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- Re: [PATCH] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- [PATCH v2] x86/mm: Guard adding .bbs..decrypted section with CONFIG_AMD_MEM_ENCRYPT
- From: Lepton Wu <ytht.net@xxxxxxxxx>
- [PATCH] x86/mm: Guard adding .bbs..decrypted section with CONFIG_AMD_MEM_ENCRYPT
- From: Lepton Wu <ytht.net@xxxxxxxxx>
- Re: [PATCH V11 00/17] riscv: Add Native/Paravirt qspinlock support
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v6 09/20] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 08/20] KVM: selftests: Extend {kvm,this}_pmu_has() to support fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 06/20] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 5/5] riscv: kvm: use ".L" local labels in assembly when applicable
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v2 4/5] riscv: kvm: Use SYM_*() assembly macros instead of deprecated ones
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] s390x: sie: ensure guests are aligned to 2GB
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] s390x: Align SIE tests to 2GB
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] s390x: mvpg-sie: fix virtual-physical address confusion
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] s390x: spec_ex-sie: refactor to use snippet API
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 04/10] s390x: properly format non-kernel-doc comments
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v8 7/8] s390x: add a test for SIE without MSO/MSL
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 11/20] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v8 1/8] lib: s390x: introduce bitfield for PSW mask
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 5/8] s390x: lib: sie: don't reenter SIE on pgm int
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 7/8] s390x: add a test for SIE without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 2/8] s390x: add function to set DAT mode for all interrupts
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 8/8] lib: s390x: interrupt: remove TEID_ASCE defines
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 3/8] s390x: sie: switch to home space mode before entering SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 6/8] s390x: add test source dir to include paths
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 4/8] s390x: lib: don't forward PSW when handling exception in SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v8 0/8] s390x: Add support for running guests without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 5/8] s390x: lib: sie: don't reenter SIE on pgm int
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 25/34] KVM: selftests: Add helpers to convert guest memory b/w private and shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 25/34] KVM: selftests: Add helpers to convert guest memory b/w private and shared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 17/17] docs: update Xen-on-KVM documentation
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v4 16/17] doc/sphinx/hxtool.py: add optional label argument to SRST directive
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v4 13/17] hw/i386/pc: support '-nic' for xen-net-device
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v4 06/17] hw/xen: automatically assign device index to block devices
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v13 20/35] KVM: x86/mmu: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 7/8] s390x: add a test for SIE without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] Add class property to configure KVM device node to use
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 02/20] KVM: x86/pmu: Don't enumerate support for fixed counters KVM can't virtualize
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] Add class property to configure KVM device node to use
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [PATCH 14/34] fs: Rename anon_inode_getfile_secure() and anon_inode_getfd_secure()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v6 01/20] KVM: x86/pmu: Don't allow exposing unsupported architectural events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 17/17] docs: update Xen-on-KVM documentation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 14/17] net: do not delete nics in net_cleanup()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 11/17] hw/xen: only remove peers of PCI NICs on unplug
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 16/17] doc/sphinx/hxtool.py: add optional label argument to SRST directive
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 15/17] xen-platform: unplug AHCI disks
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 12/17] hw/xen: update Xen PV NIC to XenDevice model
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 13/17] hw/i386/pc: support '-nic' for xen-net-device
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 10/17] hw/xen: add support for Xen primary console in emulated mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 08/17] hw/xen: do not repeatedly try to create a failing backend device
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 09/17] hw/xen: update Xen console to XenDevice model
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 07/17] hw/xen: add get_frontend_path() method to XenDeviceClass
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 06/17] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 03/17] include: update Xen public headers to Xen 4.17.2 release
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 05/17] hw/xen: populate store frontend nodes with XenStore PFN/port
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 02/17] hw/xen: Clean up event channel 'type_val' handling to use union
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 04/17] i386/xen: advertise XEN_HVM_CPUID_UPCALL_VECTOR in CPUID
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 00/17] Get Xen PV shim running in QEMU, add net and console
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v4 01/17] i386/xen: Ignore VCPU_SSHOTTMR_future flag in set_singleshot_timer()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 31/34] KVM: selftests: Expand set_memory_region_test to validate guest_memfd()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v13 20/35] KVM: x86/mmu: Handle page fault for private memory
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 01/10] make: add target to check kernel-doc comments
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 09/10] add clang-format configuration file
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 05/10] s390x: ensure kernel-doc parameters are properly formated
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 10/10] add make format
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 07/10] s390x: cpumodel: list tcg_fail explicitly
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 08/10] s390x: gs: turn off formatter for inline assembly
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 03/10] lib: s390x: cpacf: move kernel-doc comment to correct function
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 04/10] s390x: properly format non-kernel-doc comments
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 06/10] x86: properly format non-kernel-doc comments
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 00/10] RFC: Add clang-format and kerneldoc check
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 28/34] KVM: selftests: Add GUEST_SYNC[1-6] macros for synchronizing more data
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 26/34] KVM: selftests: Add helpers to do KVM_HC_MAP_GPA_RANGE hypercalls (x86)
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 14/34] fs: Rename anon_inode_getfile_secure() and anon_inode_getfd_secure()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v13 27/35] KVM: selftests: Add helpers to convert guest memory b/w private and shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 25/34] KVM: selftests: Add helpers to convert guest memory b/w private and shared
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PULL 60/60] ui/sdl2: use correct key names in win title on mac
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 24/34] KVM: selftests: Add support for creating private memslots
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PULL 59/60] MAINTAINERS: update libvirt devel mailing list address
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 58/60] MAINTAINERS: Add the CAN documentation file to the CAN section
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 57/60] MAINTAINERS: Add include/hw/timer/tmu012.h to the SH4 R2D section
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 56/60] hw/i2c: pmbus: reset page register for out of range reads
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 55/60] hw/i2c: pmbus: immediately clear faults on request
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 54/60] tests/qtest: add tests for ADM1266
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 53/60] hw/sensor: add ADM1266 device model
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 52/60] hw/i2c: pmbus: add VCAP register
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 51/60] hw/i2c: pmbus: add fan support
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 50/60] hw/i2c: pmbus: add vout mode bitfields
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 49/60] hw/i2c: pmbus add support for block receive
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 48/60] tests/qtest: ahci-test: add test exposing reset issue with pending callback
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 47/60] hw/ide: reset: cancel async DMA operation before resetting state
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 46/60] hw/cpu: Update the comments of nr_cores and nr_dies
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 45/60] system/cpus: Fix CPUState.nr_cores' calculation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 44/60] tests/unit: Rename test-x86-cpuid.c to test-x86-topo.c
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 43/60] hw/i386: Fix comment style in topology.h
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 42/60] hw/isa/i82378: Propagate error if PC_SPEAKER device creation failed
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 41/60] hw/loader: Clean up global variable shadowing in rom_add_file()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 40/60] hw/cpu: Clean up global variable shadowing
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 39/60] exec/cpu: Have cpu_exec_realize() return a boolean
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 38/60] hw/cpu: Call object_class_is_abstract() once in cpu_class_by_name()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 37/60] target/alpha: Tidy up alpha_cpu_class_by_name()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 36/60] target/nios2: Create IRQs *after* accelerator vCPU is realized
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 35/60] target/ppc: Prohibit target specific KVM prototypes on user emulation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 34/60] target/ppc: Restrict KVM objects to system emulation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 33/60] hw/ppc/e500: Restrict ppce500_init_mpic_kvm() to KVM
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 32/60] sysemu/kvm: Restrict kvmppc_get_radix_page_info() to ppc targets
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 31/60] target/mips: Fix TX79 LQ/SQ opcodes
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 30/60] target/mips: Fix MSA BZ/BNZ opcodes displacement
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 29/60] target/i386/monitor: synchronize cpu state for lapic info
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 28/60] target/i386/kvm: Correct comment in kvm_cpu_realize()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 27/60] target/i386/hvf: Rename 'X86CPU *x86_cpu' variable as 'cpu'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 26/60] target/i386/hvf: Rename 'CPUState *cpu' variable as 'cs'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 25/60] target/i386/hvf: Use CPUState typedef
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 24/60] target/i386/hvf: Use env_archcpu() in simulate_[rdmsr/wrmsr]()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 23/60] target/i386/hvf: Use x86_cpu in simulate_[rdmsr|wrmsr]()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 22/60] target/xtensa: Use env_archcpu() in update_c[compare|count]()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 21/60] target/s390x: Use env_archcpu() in handle_diag_308()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 20/60] target/riscv: Use env_archcpu() in [check_]nanbox()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 19/60] target/ppc: Use env_archcpu() in helper_book3s_msgsndp()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 18/60] target/riscv: Move TYPE_RISCV_CPU_BASE definition to 'cpu.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 17/60] target/openrisc: Declare QOM definitions in 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 16/60] target/nios2: Declare QOM definitions in 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 15/60] target/loongarch: Declare QOM definitions in 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 14/60] target/hexagon: Declare QOM definitions in 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 13/60] target: Declare FOO_CPU_TYPE_NAME/SUFFIX in 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 12/60] target/riscv: Remove CPU_RESOLVING_TYPE from 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 11/60] target/ppc: Remove CPU_RESOLVING_TYPE from 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 10/60] target/arm: Move internal declarations from 'cpu-qom.h' to 'cpu.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 09/60] target: Mention 'cpu-qom.h' is target agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 08/60] target: Unify QOM style
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 07/60] accel/tcg: Factor tcg_cpu_reset_hold() out
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 06/60] accel: Introduce cpu_exec_reset_hold()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 05/60] accel/tcg: Declare tcg_flush_jmp_cache() in 'exec/tb-flush.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 04/60] tests/unit/test-seccomp: Remove mentions of softmmu in test names
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 03/60] tests/vm/ubuntu.aarch64: Correct comment about TCG specific delay
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 02/60] vl: constify default_list
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 23/34] KVM: selftests: Convert lib's mem regions to KVM_SET_USER_MEMORY_REGION2
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PULL 01/60] vl: Free machine list
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PULL 00/60] Misc HW/UI patches for 2023-11-06
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 22/34] KVM: selftests: Drop unused kvm_userspace_memory_region_find() helper
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 23/35] KVM: x86: Add support for "protected VMs" that can utilize private memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 21/34] KVM: x86: Add support for "protected VMs" that can utilize private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 23/35] KVM: x86: Add support for "protected VMs" that can utilize private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: s390: cpu model: Use previously unused constant
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 18/34] KVM: x86/mmu: Handle page fault for private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 15/34] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH net 0/4] vsock: fix server prevents clients from reconnecting
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net 4/4] test/vsock: add dobule bind connect test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net 3/4] test/vsock: refactor vsock_accept
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net 2/4] test/vsock fix: add missing check on socket creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH net 1/4] vsock/virtio: remove socket from connected/bound list on shutdown
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PULL 3/7] hw/xen: select kernel mode for per-vCPU event channel upcall vector
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 0/7] xenfv-stable queue
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 5/7] hw/xen: fix XenStore watch delivery to guest
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 2/7] i386/xen: fix per-vCPU upcall vector for Xen emulation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 4/7] hw/xen: don't clear map_track[] in xen_gnttab_reset()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 6/7] hw/xen: take iothread mutex in xen_evtchn_reset_op()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 7/7] hw/xen: use correct default protocol for xen-block on x86
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PULL 1/7] i386/xen: Don't advertise XENFEAT_supervisor_mode_kernel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 12/34] KVM: Introduce per-page memory attributes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 7/8] s390x: add a test for SIE without MSO/MSL
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 09/34] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests RFC PATCH 00/19] arm/arm64: Rework cache maintenance at boot
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH 03/34] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 02/34] KVM: Assert that mmu_invalidate_in_progress *never* goes negative
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 01/34] KVM: Tweak kvm_hva_range and hva_handler_t to allow reusing for gfn ranges
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 08/34] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH net v2] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v19 2/3] Documentation: add debugfs description for vfio
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v19 3/3] MAINTAINERS: Update the maintenance directory of vfio driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v19 1/3] vfio/migration: Add debugfs to live migration driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v19 0/3] add debugfs to migration driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH v6 09/20] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
- From: JinrongLiang <ljr.kernel@xxxxxxxxx>
- Re: [PATCH v18 2/2] Documentation: add debugfs description for vfio
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: linux-next: manual merge of the kvm-riscv tree with the risc-v tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] vhost,virtio,vdpa: features, fixes, cleanups
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH 32/34] KVM: selftests: Add basic selftest for guest_memfd()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 35/34] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 34/34] KVM: selftests: Add a memory region subtest to validate invalid flags
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 36/34] KVM: Add transparent hugepage support for dedicated guest memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 33/34] KVM: selftests: Test KVM exit behavior for private memory/access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 31/34] KVM: selftests: Expand set_memory_region_test to validate guest_memfd()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 30/34] KVM: selftests: Add KVM_SET_USER_MEMORY_REGION2 helper
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 29/34] KVM: selftests: Add x86-only selftest for private memory conversions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 28/34] KVM: selftests: Add GUEST_SYNC[1-6] macros for synchronizing more data
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 26/34] KVM: selftests: Add helpers to do KVM_HC_MAP_GPA_RANGE hypercalls (x86)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 25/34] KVM: selftests: Add helpers to convert guest memory b/w private and shared
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 24/34] KVM: selftests: Add support for creating private memslots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 23/34] KVM: selftests: Convert lib's mem regions to KVM_SET_USER_MEMORY_REGION2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 22/34] KVM: selftests: Drop unused kvm_userspace_memory_region_find() helper
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 21/34] KVM: x86: Add support for "protected VMs" that can utilize private memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 20/34] KVM: Allow arch code to track number of memslot address spaces per VM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 19/34] KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/34] KVM: x86/mmu: Handle page fault for private memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 17/34] KVM: x86: Disallow hugepages when memory attributes are mixed
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]