Linux KVM/arm64 development list
 help / color / mirror / Atom feed
 messages from 2018-02-27 11:28:32 to 2018-03-13 00:44:09 UTC [more...]

[PATCH v2 0/2] KVM: arm/arm64: GICv2-on-v3 fixes
 2018-03-13  0:44 UTC  (4+ messages)
` [PATCH v2 1/2] KVM: arm/arm64: vgic: Don't populate multiple LRs with the same vintid
` [PATCH v2 2/2] kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3

[PATCH v5 00/23] KVM/arm64: Randomise EL2 mappings (variant 3a mitigation)
 2018-03-12 19:43 UTC  (41+ messages)
` [PATCH v5 01/23] arm64: alternatives: Add dynamic patching feature
` [PATCH v5 02/23] arm64: insn: Add N immediate encoding
` [PATCH v5 03/23] arm64: insn: Add encoder for bitwise operations using literals
` [PATCH v5 04/23] arm64: KVM: Dynamically patch the kernel/hyp VA mask
` [PATCH v5 05/23] arm64: cpufeatures: Drop the ARM64_HYP_OFFSET_LOW feature flag
` [PATCH v5 06/23] KVM: arm/arm64: Do not use kern_hyp_va() with kvm_vgic_global_state
` [PATCH v5 07/23] KVM: arm/arm64: Demote HYP VA range display to being a debug feature
` [PATCH v5 08/23] KVM: arm/arm64: Move ioremap calls to create_hyp_io_mappings
` [PATCH v5 09/23] KVM: arm/arm64: Keep GICv2 HYP VAs in kvm_vgic_global_state
` [PATCH v5 10/23] KVM: arm/arm64: Move HYP IO VAs to the "idmap" range
` [PATCH v5 11/23] arm64; insn: Add encoder for the EXTR instruction
` [PATCH v5 12/23] arm64: insn: Allow ADD/SUB (immediate) with LSL #12
` [PATCH v5 13/23] arm64: KVM: Dynamically compute the HYP VA mask
` [PATCH v5 14/23] arm64: KVM: Introduce EL2 VA randomisation
` [PATCH v5 15/23] arm64: Update the KVM memory map documentation
` [PATCH v5 16/23] arm64: KVM: Move vector offsetting from hyp-init.S to kvm_get_hyp_vector
` [PATCH v5 17/23] arm64: KVM: Move stashing of x0/x1 into the vector code itself
` [PATCH v5 18/23] arm64: KVM: Add epilogue branching to the vector code
` [PATCH v5 19/23] arm64: KVM: Allow far branches from vector slots to the main vectors
` [PATCH v5 20/23] arm/arm64: KVM: Introduce EL2-specific executable mappings
` [PATCH v5 21/23] arm64: Make BP hardening slot counter available
` [PATCH v5 22/23] arm64: KVM: Allow mapping of vectors outside of the RAM region
` [PATCH v5 23/23] arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72

[RFC PATCH] KVM: arm/arm64: vgic: change condition for level interrupt resampling
 2018-03-12 10:09 UTC  (24+ messages)
  ` [此邮件可能存在风险] "
          `  "

[PATCH 0/2] KVM: arm/arm64: GICv2-on-v3 fixes
 2018-03-11  1:51 UTC  (14+ messages)
` [PATCH 1/2] KVM: arm/arm64: vgic: Don't populate multiple LRs with the same vintid
` [PATCH 2/2] kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3

[PATCH v2] arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening
 2018-03-10 18:40 UTC  (4+ messages)

[PATCH] arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening
 2018-03-10 18:25 UTC  (9+ messages)

Re:Re: [PATCH] KVM:arm/arm64: dcache need be coherent unconditionally
 2018-03-10 14:34 UTC 

[PATCH] KVM:arm/arm64: dcache need be coherent unconditionally
 2018-03-10 11:48 UTC  (4+ messages)
  `  "

Re: [PATCH] KVM:arm/arm64: dcache need be coherent unconditionally
 2018-03-10  3:48 UTC 

[PATCHv2 00/12] ARMv8.3 pointer authentication userspace support
 2018-03-09 14:28 UTC  (4+ messages)
` [PATCHv2 10/12] arm64/kvm: context-switch ptrauth registers

[PATCH v7] arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC
 2018-03-09 13:48 UTC  (4+ messages)

[PATCH 00/11] APEI in_nmi() rework and arm64 SDEI wire-up
 2018-03-08 10:44 UTC  (7+ messages)
` [PATCH 02/11] ACPI / APEI: Generalise the estatus queue's add/remove and notify code

[PATCH v9 5/7] arm64: kvm: Introduce KVM_ARM_SET_SERROR_ESR ioctl
 2018-03-08  6:18 UTC  (7+ messages)

[PATCH] KVM: arm/arm64: VGIC MMIO: add missing irq_lock
 2018-03-07 13:09 UTC  (3+ messages)

[PATCH] KVM: arm/arm64: Reset mapped IRQs on VM reset
 2018-03-07 13:02 UTC  (2+ messages)

[PATCH v5 00/40] Optimize KVM/ARM for VHE systems
 2018-03-07 13:01 UTC  (35+ messages)
` [PATCH v5 01/40] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN
` [PATCH v5 03/40] KVM: arm64: Avoid storing the vcpu pointer on the stack
` [PATCH v5 07/40] KVM: arm/arm64: Add kvm_vcpu_load_sysregs and kvm_vcpu_put_sysregs
` [PATCH v5 13/40] KVM: arm64: Introduce VHE-specific kvm_vcpu_run
` [PATCH v5 15/40] KVM: arm64: Don't deactivate VM on VHE systems
` [PATCH v5 16/40] KVM: arm64: Remove noop calls to timer save/restore from VHE switch
` [PATCH v5 17/40] KVM: arm64: Move userspace system registers into separate function
` [PATCH v5 18/40] KVM: arm64: Rewrite sysreg alternatives to static keys
` [PATCH v5 19/40] KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions
` [PATCH v5 20/40] KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe
` [PATCH v5 21/40] KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions
` [PATCH v5 22/40] KVM: arm64: Don't save the host ELR_EL2 and SPSR_EL2 on VHE systems
` [PATCH v5 23/40] KVM: arm64: Change 32-bit handling of VM system registers
` [PATCH v5 24/40] KVM: arm64: Rewrite system register accessors to read/write functions
` [PATCH v5 25/40] KVM: arm64: Introduce framework for accessing deferred sysregs
` [PATCH v5 26/40] KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1
` [PATCH v5 27/40] KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1
` [PATCH v5 28/40] KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE
` [PATCH v5 29/40] KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers
` [PATCH v5 30/40] KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put
` [PATCH v5 31/40] KVM: arm64: Move common VHE/non-VHE trap config in separate functions
` [PATCH v5 32/40] KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions
` [PATCH v5 33/40] KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE
` [PATCH v5 34/40] KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE
` [PATCH v5 35/40] KVM: arm/arm64: Get rid of vgic_elrsr
` [PATCH v5 36/40] KVM: arm/arm64: Handle VGICv2 save/restore from the main VGIC code
` [PATCH v5 37/40] KVM: arm/arm64: Move arm64-only vgic-v2-sr.c file to arm64
` [PATCH v5 38/40] KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE
` [PATCH v5 39/40] KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load
` [PATCH v5 40/40] KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs

VCPU hotplug on KVM/ARM
 2018-03-07 12:47 UTC  (9+ messages)
        ` [Qemu-devel] "
          ` [Qemu-arm] "
            ` [Qemu-devel] [Qemu-arm] "

[PATCH v6] arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC
 2018-03-07 10:04 UTC  (8+ messages)

[PATCH v2] KVM: arm: reserve bit in KVM_REG_ARM encoding for secure/nonsecure
 2018-03-06 19:47 UTC 

[PATCH] KVM: arm: reserve bit in KVM_REG_ARM encoding for secure/nonsecure
 2018-03-06 19:14 UTC  (6+ messages)

can we define a KVM_REG_ARM encoding bit for NonSecure/Secure ?
 2018-03-06 14:28 UTC  (4+ messages)

[REPOST PATCH] arm/arm64: KVM: Add PSCI version selection API
 2018-03-06 10:52 UTC  (11+ messages)

[RFC PATCH 0/2] KVM: arm64: Optime FPSIMD context handling
 2018-03-05 11:54 UTC  (9+ messages)
` [RFC PATCH 2/2] KVM: arm64: Eliminate most redundant FPSIMD saves and restores
` [RFC PATCH 0.9/2] arm64: fpsimd: Expose CPU / FPSIMD state association helpers

[PATCH v10 0/5] set VSESR_EL2 by user space and support NOTIFY_SEI notification
 2018-03-03 16:09 UTC  (6+ messages)
` [PATCH v10 1/5] arm64: KVM: Prepare set virtual SEI syndrome value
` [PATCH v10 2/5] arm64: KVM: export the capability to set guest SError syndrome
` [PATCH v10 3/5] arm/arm64: KVM: Introduce set and get per-vcpu event
` [PATCH v10 4/5] ACPI / APEI: Add SEI notification type support for ARMv8
` [PATCH v10 5/5] arm64: handle NOTIFY_SEI notification by the APEI driver

[PATCH v5] arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC
 2018-02-28 17:48 UTC  (2+ messages)

[PATCH 1/4] iommu: Add virtio-iommu driver
 2018-02-27 14:47 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox