messages from 2018-02-27 11:28:32 to 2018-03-13 00:44:09 UTC [more...]
[PATCH v2 0/2] KVM: arm/arm64: GICv2-on-v3 fixes
2018-03-13 0:44 UTC (4+ messages)
` [PATCH v2 1/2] KVM: arm/arm64: vgic: Don't populate multiple LRs with the same vintid
` [PATCH v2 2/2] kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3
[PATCH v5 00/23] KVM/arm64: Randomise EL2 mappings (variant 3a mitigation)
2018-03-12 19:43 UTC (41+ messages)
` [PATCH v5 01/23] arm64: alternatives: Add dynamic patching feature
` [PATCH v5 02/23] arm64: insn: Add N immediate encoding
` [PATCH v5 03/23] arm64: insn: Add encoder for bitwise operations using literals
` [PATCH v5 04/23] arm64: KVM: Dynamically patch the kernel/hyp VA mask
` [PATCH v5 05/23] arm64: cpufeatures: Drop the ARM64_HYP_OFFSET_LOW feature flag
` [PATCH v5 06/23] KVM: arm/arm64: Do not use kern_hyp_va() with kvm_vgic_global_state
` [PATCH v5 07/23] KVM: arm/arm64: Demote HYP VA range display to being a debug feature
` [PATCH v5 08/23] KVM: arm/arm64: Move ioremap calls to create_hyp_io_mappings
` [PATCH v5 09/23] KVM: arm/arm64: Keep GICv2 HYP VAs in kvm_vgic_global_state
` [PATCH v5 10/23] KVM: arm/arm64: Move HYP IO VAs to the "idmap" range
` [PATCH v5 11/23] arm64; insn: Add encoder for the EXTR instruction
` [PATCH v5 12/23] arm64: insn: Allow ADD/SUB (immediate) with LSL #12
` [PATCH v5 13/23] arm64: KVM: Dynamically compute the HYP VA mask
` [PATCH v5 14/23] arm64: KVM: Introduce EL2 VA randomisation
` [PATCH v5 15/23] arm64: Update the KVM memory map documentation
` [PATCH v5 16/23] arm64: KVM: Move vector offsetting from hyp-init.S to kvm_get_hyp_vector
` [PATCH v5 17/23] arm64: KVM: Move stashing of x0/x1 into the vector code itself
` [PATCH v5 18/23] arm64: KVM: Add epilogue branching to the vector code
` [PATCH v5 19/23] arm64: KVM: Allow far branches from vector slots to the main vectors
` [PATCH v5 20/23] arm/arm64: KVM: Introduce EL2-specific executable mappings
` [PATCH v5 21/23] arm64: Make BP hardening slot counter available
` [PATCH v5 22/23] arm64: KVM: Allow mapping of vectors outside of the RAM region
` [PATCH v5 23/23] arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72
[RFC PATCH] KVM: arm/arm64: vgic: change condition for level interrupt resampling
2018-03-12 10:09 UTC (24+ messages)
` [此邮件可能存在风险] "
` "
[PATCH 0/2] KVM: arm/arm64: GICv2-on-v3 fixes
2018-03-11 1:51 UTC (14+ messages)
` [PATCH 1/2] KVM: arm/arm64: vgic: Don't populate multiple LRs with the same vintid
` [PATCH 2/2] kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3
[PATCH v2] arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening
2018-03-10 18:40 UTC (4+ messages)
[PATCH] arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening
2018-03-10 18:25 UTC (9+ messages)
Re:Re: [PATCH] KVM:arm/arm64: dcache need be coherent unconditionally
2018-03-10 14:34 UTC
[PATCH] KVM:arm/arm64: dcache need be coherent unconditionally
2018-03-10 11:48 UTC (4+ messages)
` "
Re: [PATCH] KVM:arm/arm64: dcache need be coherent unconditionally
2018-03-10 3:48 UTC
[PATCHv2 00/12] ARMv8.3 pointer authentication userspace support
2018-03-09 14:28 UTC (4+ messages)
` [PATCHv2 10/12] arm64/kvm: context-switch ptrauth registers
[PATCH v7] arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC
2018-03-09 13:48 UTC (4+ messages)
[PATCH 00/11] APEI in_nmi() rework and arm64 SDEI wire-up
2018-03-08 10:44 UTC (7+ messages)
` [PATCH 02/11] ACPI / APEI: Generalise the estatus queue's add/remove and notify code
[PATCH v9 5/7] arm64: kvm: Introduce KVM_ARM_SET_SERROR_ESR ioctl
2018-03-08 6:18 UTC (7+ messages)
[PATCH] KVM: arm/arm64: VGIC MMIO: add missing irq_lock
2018-03-07 13:09 UTC (3+ messages)
[PATCH] KVM: arm/arm64: Reset mapped IRQs on VM reset
2018-03-07 13:02 UTC (2+ messages)
[PATCH v5 00/40] Optimize KVM/ARM for VHE systems
2018-03-07 13:01 UTC (35+ messages)
` [PATCH v5 01/40] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN
` [PATCH v5 03/40] KVM: arm64: Avoid storing the vcpu pointer on the stack
` [PATCH v5 07/40] KVM: arm/arm64: Add kvm_vcpu_load_sysregs and kvm_vcpu_put_sysregs
` [PATCH v5 13/40] KVM: arm64: Introduce VHE-specific kvm_vcpu_run
` [PATCH v5 15/40] KVM: arm64: Don't deactivate VM on VHE systems
` [PATCH v5 16/40] KVM: arm64: Remove noop calls to timer save/restore from VHE switch
` [PATCH v5 17/40] KVM: arm64: Move userspace system registers into separate function
` [PATCH v5 18/40] KVM: arm64: Rewrite sysreg alternatives to static keys
` [PATCH v5 19/40] KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions
` [PATCH v5 20/40] KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe
` [PATCH v5 21/40] KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions
` [PATCH v5 22/40] KVM: arm64: Don't save the host ELR_EL2 and SPSR_EL2 on VHE systems
` [PATCH v5 23/40] KVM: arm64: Change 32-bit handling of VM system registers
` [PATCH v5 24/40] KVM: arm64: Rewrite system register accessors to read/write functions
` [PATCH v5 25/40] KVM: arm64: Introduce framework for accessing deferred sysregs
` [PATCH v5 26/40] KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1
` [PATCH v5 27/40] KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1
` [PATCH v5 28/40] KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE
` [PATCH v5 29/40] KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers
` [PATCH v5 30/40] KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put
` [PATCH v5 31/40] KVM: arm64: Move common VHE/non-VHE trap config in separate functions
` [PATCH v5 32/40] KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions
` [PATCH v5 33/40] KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE
` [PATCH v5 34/40] KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE
` [PATCH v5 35/40] KVM: arm/arm64: Get rid of vgic_elrsr
` [PATCH v5 36/40] KVM: arm/arm64: Handle VGICv2 save/restore from the main VGIC code
` [PATCH v5 37/40] KVM: arm/arm64: Move arm64-only vgic-v2-sr.c file to arm64
` [PATCH v5 38/40] KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE
` [PATCH v5 39/40] KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load
` [PATCH v5 40/40] KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs
VCPU hotplug on KVM/ARM
2018-03-07 12:47 UTC (9+ messages)
` [Qemu-devel] "
` [Qemu-arm] "
` [Qemu-devel] [Qemu-arm] "
[PATCH v6] arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC
2018-03-07 10:04 UTC (8+ messages)
[PATCH v2] KVM: arm: reserve bit in KVM_REG_ARM encoding for secure/nonsecure
2018-03-06 19:47 UTC
[PATCH] KVM: arm: reserve bit in KVM_REG_ARM encoding for secure/nonsecure
2018-03-06 19:14 UTC (6+ messages)
can we define a KVM_REG_ARM encoding bit for NonSecure/Secure ?
2018-03-06 14:28 UTC (4+ messages)
[REPOST PATCH] arm/arm64: KVM: Add PSCI version selection API
2018-03-06 10:52 UTC (11+ messages)
[RFC PATCH 0/2] KVM: arm64: Optime FPSIMD context handling
2018-03-05 11:54 UTC (9+ messages)
` [RFC PATCH 2/2] KVM: arm64: Eliminate most redundant FPSIMD saves and restores
` [RFC PATCH 0.9/2] arm64: fpsimd: Expose CPU / FPSIMD state association helpers
[PATCH v10 0/5] set VSESR_EL2 by user space and support NOTIFY_SEI notification
2018-03-03 16:09 UTC (6+ messages)
` [PATCH v10 1/5] arm64: KVM: Prepare set virtual SEI syndrome value
` [PATCH v10 2/5] arm64: KVM: export the capability to set guest SError syndrome
` [PATCH v10 3/5] arm/arm64: KVM: Introduce set and get per-vcpu event
` [PATCH v10 4/5] ACPI / APEI: Add SEI notification type support for ARMv8
` [PATCH v10 5/5] arm64: handle NOTIFY_SEI notification by the APEI driver
[PATCH v5] arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC
2018-02-28 17:48 UTC (2+ messages)
[PATCH 1/4] iommu: Add virtio-iommu driver
2018-02-27 14:47 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox