kvmarm.lists.cs.columbia.edu archive mirror
 help / color / mirror / Atom feed
 messages from 2017-03-27 14:02:53 to 2017-04-04 07:36:54 UTC [more...]

[PATCH v4 00/28] arm/arm64: KVM: Rework the hyp-stub API
 2017-04-04  7:36 UTC  (11+ messages)
` [PATCH v4 07/28] arm64: KVM: Allow the main HYP code to use the init hyp stub implementation
` [PATCH v4 19/28] ARM: "

[PATCH v2 0/9] KVM: arm/arm64: race fixes and vcpu requests
 2017-04-04  7:27 UTC  (13+ messages)
` [PATCH v2 1/9] KVM: add kvm_request_pending
` [PATCH v2 2/9] KVM: Add documentation for VCPU requests
` [PATCH v2 3/9] KVM: arm/arm64: prepare to use vcpu requests
` [PATCH v2 4/9] KVM: arm/arm64: replace vcpu->arch.pause with a vcpu request
` [PATCH v2 5/9] KVM: arm/arm64: replace vcpu->arch.power_off "
` [PATCH v2 6/9] KVM: arm/arm64: use a vcpu request on irq injection
` [PATCH v2 7/9] KVM: arm/arm64: PMU: remove request-less vcpu kick
` [PATCH v2 8/9] KVM: arm/arm64: fix race in kvm_psci_vcpu_on
` [PATCH v2 9/9] KVM: arm/arm64: avoid race by caching MPIDR

[kvmarm:master 1/3] arch/arm/kvm/mmu.c:302:14: error: 'S2_PUD_SIZE' undeclared
 2017-04-03 21:15 UTC 

[PATCH v5 00/34] arm/arm64: KVM: Rework the hyp-stub API
 2017-04-03 18:38 UTC  (35+ messages)
` [PATCH v5 01/34] arm64: hyp-stub: Stop pointlessly clobbering lr
` [PATCH v5 02/34] arm64: KVM: Move lr save/restore to do_el2_call
` [PATCH v5 03/34] arm64: hyp-stub: Don't save lr in the EL1 code
` [PATCH v5 04/34] arm64: hyp-stub: Define a return value for failed stub calls
` [PATCH v5 05/34] arm64: hyp-stub: Update documentation in asm/virt.h
` [PATCH v5 06/34] arm64: hyp-stub: Implement HVC_RESET_VECTORS stub hypercall
` [PATCH v5 07/34] arm64: KVM: Implement HVC_RESET_VECTORS stub hypercall in the init code
` [PATCH v5 08/34] arm64: KVM: Implement HVC_GET_VECTORS "
` [PATCH v5 09/34] arm64: KVM: Allow the main HYP code to use the init hyp stub implementation
` [PATCH v5 10/34] arm64: KVM: Convert __cpu_reset_hyp_mode to using __hyp_reset_vectors
` [PATCH v5 11/34] arm64: KVM: Implement HVC_SOFT_RESTART in the init code
` [PATCH v5 12/34] ARM: hyp-stub: improve ABI
` [PATCH v5 13/34] ARM: soft-reboot into same mode that we entered the kernel
` [PATCH v5 14/34] ARM: KVM: Convert KVM to use HVC_GET_VECTORS
` [PATCH v5 15/34] ARM: Update cpu_v7_reset documentation
` [PATCH v5 16/34] ARM: hyp-stub: Use r1 for the soft-restart address
` [PATCH v5 17/34] ARM: Expose the VA/IDMAP offset
` [PATCH v5 18/34] ARM: hyp-stub: Define a return value for failed stub calls
` [PATCH v5 19/34] ARM: hyp-stub: Implement HVC_RESET_VECTORS stub hypercall
` [PATCH v5 20/34] ARM: KVM: Implement HVC_RESET_VECTORS stub hypercall in the init code
` [PATCH v5 21/34] ARM: KVM: Implement HVC_GET_VECTORS "
` [PATCH v5 22/34] ARM: KVM: Allow the main HYP code to use the init hyp stub implementation
` [PATCH v5 23/34] ARM: KVM: Convert __cpu_reset_hyp_mode to using __hyp_reset_vectors
` [PATCH v5 24/34] ARM: KVM: Implement HVC_SOFT_RESTART in the init code
` [PATCH v5 25/34] ARM: KVM: Gracefully handle hyp-stubs being restored from under our feet
` [PATCH v5 26/34] arm/arm64: KVM: Use __hyp_reset_vectors() directly
` [PATCH v5 27/34] arm/arm64: KVM: Remove kvm_get_idmap_start
` [PATCH v5 28/34] arm/arm64: KVM: Use HVC_RESET_VECTORS to reinit HYP mode
` [PATCH v5 29/34] ARM: decompressor: Remove __hyp_get_vectors usage
` [PATCH v5 30/34] ARM: hyp-stub/KVM: Kill __hyp_get_vectors
` [PATCH v5 31/34] arm64: "
` [PATCH v5 32/34] arm64: hyp-stub: Zero x0 on successful stub handling
` [PATCH v5 33/34] ARM: hyp-stub: Zero r0 "
` [PATCH v5 34/34] arm/arm64: Add hyp-stub API documentation

[RFC 0/9] ARMv8.3 pointer authentication userspace support
 2017-04-03 15:19 UTC  (10+ messages)
` [RFC 1/9] asm-generic: mm_hooks: allow hooks to be overridden individually
` [RFC 2/9] arm64: add pointer authentication register bits
` [RFC 3/9] arm64/cpufeature: add ARMv8.3 id_aa64isar1 bits
` [RFC 4/9] arm64/cpufeature: detect pointer authentication
` [RFC 5/9] arm64: Don't trap host pointer auth use to EL2
` [RFC 6/9] arm64: add basic pointer authentication support
` [RFC 7/9] arm64: expose PAC bit positions via ptrace
` [RFC 8/9] arm64/kvm: context-switch PAC registers
` [RFC 9/9] arm64: docs: document pointer authentication

[PATCH v3] kvm: arm/arm64: Fix locking for kvm_free_stage2_pgd
 2017-04-03 14:31 UTC  (4+ messages)

host stalls when qemu-system-aarch64 with kvm and pflash
 2017-03-31 23:16 UTC  (12+ messages)

[PATCH v3 0/8] arm64: acpi: apei: handle SEI notification type for ARMv8
 2017-03-31 16:22 UTC  (21+ messages)
` [PATCH v3 1/8] trace: ras: add ARM processor error information trace event
` [PATCH v3 2/8] acpi: apei: handle SEI notification type for ARMv8
` [PATCH v3 3/8] arm64: apei: add a per-cpu variable to indecate sei is processing
` [PATCH v3 4/8] APEI: GHES: reserve a virtual page for SEI context
` [PATCH v3 5/8] arm64: KVM: add guest SEI support
` [PATCH v3 6/8] arm64: RAS: add ras extension runtime detection
` [PATCH v3 7/8] arm64: exception: handle asynchronous SError interrupt
` [PATCH v3 8/8] arm64: exception: check shared writable page in SEI handler

KVM/ARM: sleeping function called from invalid context
 2017-03-30 17:36 UTC  (6+ messages)

(unknown),
 2017-03-30 10:55 UTC 

[PATCH v4 13/22] KVM: arm64: ITS: KVM_DEV_ARM_VGIC_GRP_ITS_TABLES group
 2017-03-30  8:29 UTC  (7+ messages)
    ` [kbuild-all] "

[kvmtool PATCH v9 00/15] kvmtool: arm: ITS emulation and GSI routing support
 2017-03-30  7:29 UTC  (14+ messages)
` [kvmtool PATCH v9 04/15] MSI-X: update GSI routing after changed MSI-X configuration
` [kvmtool PATCH v9 06/15] PCI: Only allocate IRQ routing entry when available
` [kvmtool PATCH v9 09/15] arm: allow creation of an MSI register frame region
` [kvmtool PATCH v9 12/15] PCI: inject PCI device ID on MSI injection
` [kvmtool PATCH v9 14/15] extend GSI IRQ routing to take a device ID

[PATCH] kvm: pass the virtual SEI syndrome to guest OS
 2017-03-30  1:22 UTC  (31+ messages)
                              ` [edk2] "

[PATCH 00/15] arm64/kvm: use common sysreg definitions
 2017-03-29  9:55 UTC  (8+ messages)

[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-03-28 22:18 UTC  (14+ messages)
` [PATCH V14 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V14 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V14 03/10] efi: parse ARM processor error
` [PATCH V14 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V14 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V14 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V14 07/10] efi: print unrecognized CPER section
` [PATCH V14 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V14 09/10] trace, ras: add ARM processor error trace event
` [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support

[PATCH V13 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-03-28 16:44 UTC  (11+ messages)
` [PATCH V13 10/10] arm/arm64: KVM: add guest SEA support

[PATCH] KVM: arm/arm64: Signal SIGBUS when stage2 discovers hwpoison memory
 2017-03-28 15:12 UTC  (11+ messages)

[PATCH v2 0/9] arm64: KVM: Fix PMU exception generation
 2017-03-28 13:37 UTC  (24+ messages)
` [PATCH v2 1/9] arm64: KVM: PMU: Refactor pmu_*_el0_disabled
` [PATCH v2 2/9] arm64: KVM: PMU: Inject UNDEF exception on illegal register access
` [PATCH v2 3/9] arm64: KVM: PMU: Inject UNDEF on non-privileged accesses
` [PATCH v2 4/9] arm64: KVM: Make unexpected reads from WO registers inject an undef
` [PATCH v2 5/9] arm64: KVM: PMU: Inject UNDEF on read access to PMSWINC_EL0
` [PATCH v2 6/9] arm64: KVM: Treat sysreg accessors returning false as successful
` [PATCH v2 7/9] arm64: KVM: Do not corrupt registers on failed 64bit CP read
` [PATCH v2 8/9] arm: KVM: Make unexpected register accesses inject an undef
` [PATCH v2 9/9] arm: KVM: Treat CP15 accessors returning false as successful

Aarch64: Qemu master or 2.9.0-rc1 breaks compatibility with 4.10 kernel
 2017-03-28 11:59 UTC  (3+ messages)
  ` [Qemu-devel] "

[PATCH] kvm: arm/arm64: Rework gpa callback handlers
 2017-03-27 15:18 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).