KVM ARM Archive mirror
 help / color / mirror / Atom feed
 messages from 2021-05-10 07:51:19 to 2021-05-17 07:56:01 UTC [more...]

[GIT PULL] KVM/arm64 fixes for 5.13, take #1
 2021-05-17  7:55 UTC  (2+ messages)

[PATCH v3 0/5] KVM: selftests: arm64 exception handling and debug test
 2021-05-16  9:50 UTC  (11+ messages)
` [PATCH v3 1/5] KVM: selftests: Rename vm_handle_exception
` [PATCH v3 2/5] KVM: selftests: Introduce UCALL_UNHANDLED for unhandled vector reporting
` [PATCH v3 3/5] KVM: selftests: Move GUEST_ASSERT_EQ to utils header
` [PATCH v3 4/5] KVM: selftests: Add exception handling support for aarch64
` [PATCH v3 5/5] KVM: selftests: Add aarch64/debug-exceptions test

arm32: panic in move_freepages (Was [PATCH v2 0/4] arm64: drop pfn_valid_within() and simplify pfn_valid())
 2021-05-14  2:18 UTC  (18+ messages)

[PATCH] KVM: arm64: Add missing index for trapping debug registers
 2021-05-14 17:53 UTC  (3+ messages)

[PATCH v2 0/2] KVM: arm64: Fixup PC updates on exit to userspace
 2021-05-14 14:21 UTC  (7+ messages)
` [PATCH v2 1/2] KVM: arm64: Move __adjust_pc out of line
` [PATCH v2 2/2] KVM: arm64: Commit pending PC adjustemnts before returning to userspace

[PATCH v3 0/9] KVM: arm64: Initial host support for the Apple M1
 2021-05-14 12:46 UTC  (16+ messages)
` [PATCH v3 1/9] irqchip/gic: Split vGIC probing information from the GIC code
` [PATCH v3 2/9] KVM: arm64: Handle physical FIQ as an IRQ while running a guest
` [PATCH v3 3/9] KVM: arm64: vgic: Be tolerant to the lack of maintenance interrupt
` [PATCH v3 4/9] KVM: arm64: vgic: Let an interrupt controller advertise lack of HW deactivation
` [PATCH v3 5/9] KVM: arm64: vgic: move irq->get_input_level into an ops structure
` [PATCH v3 6/9] KVM: arm64: vgic: Implement SW-driven deactivation
` [PATCH v3 7/9] KVM: arm64: timer: Refactor IRQ configuration
` [PATCH v3 8/9] KVM: arm64: timer: Add support for SW-based deactivation
` [PATCH v3 9/9] irqchip/apple-aic: Advertise some level of vGICv3 compatibility

[PATCH 0/2] KVM: arm64: Mark a couple of variables static
 2021-05-14 10:12 UTC  (6+ messages)
` [PATCH 1/2] KVM: arm64: Mark pkvm_pgtable_mm_ops static
` [PATCH 2/2] KVM: arm64: Mark the host stage-2 memory pools static

[PATCH v15 00/12] SMMUv3 Nested Stage Setup (IOMMU part)
 2021-05-14  3:09 UTC  (3+ messages)
` [PATCH v15 07/12] iommu/smmuv3: Implement cache_invalidate

[PATCH v3 0/4] KVM statistics data fd-based binary interface
 2021-05-13 20:54 UTC  (3+ messages)
` [PATCH v3 3/4] KVM: stats: Add documentation for statistics data "

[PATCH v11 0/6] MTE support for KVM guest
 2021-05-13 15:21 UTC  (13+ messages)
` [PATCH v11 2/6] arm64: kvm: Introduce MTE VM feature

[PATCH 5.4 000/244] 5.4.119-rc1 review
 2021-05-13 12:23 UTC  (7+ messages)

[PATCH] KVM: arm64: selftests: Request PMU feature in get-reg-list
 2021-05-13 13:20 UTC  (3+ messages)

[PATCH v2 0/5] KVM: selftests: arm64 exception handling and debug test
 2021-05-12 21:39 UTC  (17+ messages)
` [PATCH v2 4/5] KVM: selftests: Add exception handling support for aarch64

[PATCH v5 0/6] KVM: arm64: Improve efficiency of stage2 page table
 2021-05-12 12:54 UTC  (2+ messages)

[PATCH v4 0/4] arm64: drop pfn_valid_within() and simplify pfn_valid()
 2021-05-12  8:32 UTC  (16+ messages)
` [PATCH v4 1/4] include/linux/mmzone.h: add documentation for pfn_valid()
` [PATCH v4 2/4] memblock: update initialization of reserved pages
` [PATCH v4 3/4] arm64: decouple check whether pfn is in linear map from pfn_valid()
` [PATCH v4 4/4] arm64: drop pfn_valid_within() and simplify pfn_valid()

[PATCH v2 0/4] arm64: drop pfn_valid_within() and simplify pfn_valid()
 2021-05-12  3:50 UTC  (8+ messages)
        ` arm32: panic in move_freepages (Was [PATCH v2 0/4] arm64: drop pfn_valid_within() and simplify pfn_valid())

[kvm-unit-tests BUG] lib/ldiv32.c breaks arm compilation
 2021-05-11 17:41 UTC  (5+ messages)

[PATCH] KVM: arm64: fix boolreturn.cocci warnings
 2021-05-11 17:07 UTC  (3+ messages)

[PATCH 0/2] KVM: arm64: Fixup PC updates on exit to userspace
 2021-05-11 16:50 UTC  (14+ messages)
` [PATCH 1/2] KVM: arm64: Move __adjust_pc out of line
` [PATCH 2/2] KVM: arm64: Commit pending PC adjustemnts before returning to userspace

[PATCH v19 0/7] KVM: arm64: Add host/guest KVM-PTP support
 2021-05-11  9:13 UTC  (4+ messages)
` [PATCH v19 7/7] ptp: arm/arm64: Enable ptp_kvm for arm/arm64

[PATCH] Revert "irqbypass: do not start cons/prod when failed connect"
 2021-05-11  8:48 UTC  (10+ messages)

[PATCH v4 0/4] KVM statistics data fd-based binary interface
 2021-05-11  8:38 UTC  (3+ messages)

[PATCH v4 00/66] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
 2021-05-10 16:59 UTC  (67+ messages)
` [PATCH v4 01/66] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
` [PATCH v4 02/66] KVM: arm64: nv: Introduce nested virtualization VCPU feature
` [PATCH v4 03/66] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
` [PATCH v4 04/66] KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x
` [PATCH v4 05/66] KVM: arm64: nv: Add EL2 system registers to vcpu context
` [PATCH v4 06/66] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
` [PATCH v4 07/66] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
` [PATCH v4 08/66] KVM: arm64: nv: Reset VMPIDR_EL2 and VPIDR_EL2 to sane values
` [PATCH v4 09/66] KVM: arm64: nv: Support virtual EL2 exceptions
` [PATCH v4 10/66] KVM: arm64: nv: Inject HVC exceptions to the virtual EL2
` [PATCH v4 11/66] KVM: arm64: nv: Handle trapped ERET from "
` [PATCH v4 12/66] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
` [PATCH v4 13/66] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
` [PATCH v4 14/66] KVM: arm64: nv: Handle SPSR_EL2 specially
` [PATCH v4 15/66] KVM: arm64: nv: Handle HCR_EL2.E2H specially
` [PATCH v4 16/66] KVM: arm64: nv: Save/Restore vEL2 sysregs
` [PATCH v4 17/66] KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor
` [PATCH v4 18/66] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
` [PATCH v4 19/66] KVM: arm64: nv: Trap SPSR_EL1, ELR_EL1 and VBAR_EL1 from "
` [PATCH v4 20/66] KVM: arm64: nv: Trap CPACR_EL1 access in "
` [PATCH v4 21/66] KVM: arm64: nv: Handle PSCI call via smc from the guest
` [PATCH v4 22/66] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
` [PATCH v4 23/66] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP, FPEN} settings
` [PATCH v4 24/66] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
` [PATCH v4 25/66] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
` [PATCH v4 26/66] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
` [PATCH v4 27/66] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
` [PATCH v4 28/66] KVM: arm64: nv: Forward debug traps to the nested guest
` [PATCH v4 29/66] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
` [PATCH v4 30/66] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
` [PATCH v4 31/66] KVM: arm64: nv: Filter out unsupported features from ID regs
` [PATCH v4 32/66] KVM: arm64: nv: Hide RAS from nested guests
` [PATCH v4 33/66] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
` [PATCH v4 34/66] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
` [PATCH v4 35/66] KVM: arm64: nv: Handle shadow stage 2 page faults
` [PATCH v4 36/66] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
` [PATCH v4 37/66] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
` [PATCH v4 38/66] KVM: arm64: nv: Introduce sys_reg_desc.forward_trap
` [PATCH v4 39/66] KVM: arm64: nv: Set a handler for the system instruction traps
` [PATCH v4 40/66] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
` [PATCH v4 41/66] KVM: arm64: nv: Trap and emulate TLBI "
` [PATCH v4 42/66] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
` [PATCH v4 43/66] KVM: arm64: nv: arch_timer: Support hyp timer emulation
` [PATCH v4 44/66] KVM: arm64: nv: Add handling of EL2-specific timer registers
` [PATCH v4 45/66] KVM: arm64: nv: Load timer before the GIC
` [PATCH v4 46/66] KVM: arm64: nv: Nested GICv3 Support
` [PATCH v4 47/66] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
` [PATCH v4 48/66] KVM: arm64: nv: vgic: Emulate the HW bit in software
` [PATCH v4 49/66] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
` [PATCH v4 50/66] KVM: arm64: nv: Implement maintenance interrupt forwarding
` [PATCH v4 51/66] KVM: arm64: nv: Add nested GICv3 tracepoints
` [PATCH v4 52/66] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
` [PATCH v4 53/66] KVM: arm64: nv: Add handling of ARMv8.4-TTL TLB invalidation
` [PATCH v4 54/66] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
` [PATCH v4 55/66] KVM: arm64: Allow populating S2 SW bits
` [PATCH v4 56/66] KVM: arm64: nv: Tag shadow S2 entries with nested level
` [PATCH v4 57/66] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
` [PATCH v4 58/66] KVM: arm64: Map VNCR-capable registers to a separate page
` [PATCH v4 59/66] KVM: arm64: nv: Move nested vgic state into the sysreg file
` [PATCH v4 60/66] KVM: arm64: Add ARMv8.4 Enhanced Nested Virt cpufeature
` [PATCH v4 61/66] KVM: arm64: nv: Synchronize PSTATE early on exit
` [PATCH v4 62/66] KVM: arm64: nv: Sync nested timer state with ARMv8.4
` [PATCH v4 63/66] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v4 64/66] KVM: arm64: nv: Enable ARMv8.4-NV support
` [PATCH v4 65/66] KVM: arm64: nv: Fast-track 'InHost' exception returns
` [PATCH v4 66/66] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests

Question on guest enable msi fail when using GICv4/4.1
 2021-05-10  9:59 UTC  (8+ messages)

[GIT PULL] KVM/arm64 updates for 5.9
 2021-05-10  8:43 UTC  (5+ messages)
` [PATCH 15/56] KVM: arm64: Add build rules for separate VHE/nVHE object files

[PATCH v2 00/11] KVM: arm64: Move PC/ELR/SPSR/PSTATE updatess to EL2
 2021-05-10  7:59 UTC  (9+ messages)
` [PATCH v2 03/11] KVM: arm64: Make kvm_skip_instr() and co private to HYP


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).