Linux KVM for ARM Processors
[Prev Page][Next Page]
- [PATCH v2 2/4] KVM: arm64: Don't mask softirq with IRQs disabled in vcpu_put()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v2 3/4] KVM: arm64/sve: Fix SVE trap restoration for non-current tasks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v2 1/4] arm64: introduce sysreg_clear_set()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v2 4/4] KVM: arm64: Avoid mistaken attempts to save SVE state for vcpus
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v2 0/4] KVM: arm64: FPSIMD/SVE fixes for 4.17
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 4/4] KVM: arm64: Avoid mistaken attempts to save SVE state for vcpus
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 4/4] KVM: arm64: Avoid mistaken attempts to save SVE state for vcpus
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't mask softirq with IRQs disabled in vcpu_put()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: Don't mask softirq with IRQs disabled in vcpu_put()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: FPSIMD/SVE fixes for 4.17
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 4/4] KVM: arm64: Avoid mistaken attempts to save SVE state for vcpus
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 3/4] KVM: arm64/sve: Fix SVE trap restoration for non-current tasks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 2/4] KVM: arm64: Don't mask softirq with IRQs disabled in vcpu_put()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 1/4] arm64: introduce sysreg_clear_set()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 0/4] KVM: arm64: FPSIMD/SVE fixes for 4.17
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] kvm: Delete the slot only when KVM_MEM_READONLY flag is changed
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm: Delete the slot only when KVM_MEM_READONLY flag is changed
- From: Shannon Zhao <zhaoshenglong@xxxxxxxxxx>
- Re: [PATCH v2 1/6] arm64: KVM: Add support for Stage-2 control of memory types and cacheability
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] kvm: Delete the slot only when KVM_MEM_READONLY flag is changed
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm: Delete the slot only when KVM_MEM_READONLY flag is changed
- From: Shannon Zhao <zhaoshenglong@xxxxxxxxxx>
- Re: [PATCH] KVM: arm/arm64: drop resource size check for GICV window
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v2 00/16] arm64: Add SMCCC v1.1 support and CVE-2017-5715 (Spectre variant 2) mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 00/16] arm64: Add SMCCC v1.1 support and CVE-2017-5715 (Spectre variant 2) mitigation
- From: Jon Masters <jcm@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/17] arm64: KVM: Add ARCH_WORKAROUND_2 support for guests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 07/17] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 05/17] arm64: Add 'ssbd' command-line option
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 00/17] arm64 SSBD (aka Spectre-v4) mitigation
- From: Jon Masters <jcm@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/17] arm64: KVM: Add ARCH_WORKAROUND_2 support for guests
- From: Jon Masters <jcm@xxxxxxxxxxxxxx>
- Re: [PATCH v2 07/17] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
- From: Jon Masters <jcm@xxxxxxxxxxxxxx>
- Re: [PATCH v2 05/17] arm64: Add 'ssbd' command-line option
- From: Jon Masters <jcm@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm/arm64: Consolidate page-table accessors
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 2/6] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: drop resource size check for GICV window
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: drop resource size check for GICV window
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: drop resource size check for GICV window
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] KVM: arm/arm64: drop resource size check for GICV window
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v2 6/6] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v2 5/6] KVM: arm/arm64: Stop using {pmd,pud,pgd}_populate
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm/arm64: Consolidate page-table accessors
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v2 3/6] arm64: KVM: Avoid marking pages as XN in Stage-2 if CTR_EL0.DIC is set
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v2 2/6] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: A KVM kernel for FVP for ARM7
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCHv4 06/10] arm64: add basic pointer authentication support
- From: Kristina Martsenko <kristina.martsenko@xxxxxxx>
- Re: [PATCH v3] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm/arm64: harden unmap_stage2_ptes in case end is not PAGE_SIZE aligned
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm/arm64: harden unmap_stage2_ptes in case end is not PAGE_SIZE aligned
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Jia He <hejianet@xxxxxxxxx>
- Re: A KVM kernel for FVP for ARM7
- From: Raz <raziebe@xxxxxxxxx>
- Re: A KVM kernel for FVP for ARM7
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- A KVM kernel for FVP for ARM7
- From: Raz <raziebe@xxxxxxxxx>
- [PATCH v5 5/6] Initialize the mapping of KASan shadow memory
- From: Abbott Liu <liuwenliang@xxxxxxxxxx>
- [PATCH v5 1/6] Add TTBR operator for kasan_init
- From: Abbott Liu <liuwenliang@xxxxxxxxxx>
- [PATCH v5 2/6] Disable instrumentation for some code
- From: Abbott Liu <liuwenliang@xxxxxxxxxx>
- [PATCH v5 4/6] Define the virtual space of KASan's shadow region
- From: Abbott Liu <liuwenliang@xxxxxxxxxx>
- [PATCH v5 3/6] Replace memory function for kasan
- From: Abbott Liu <liuwenliang@xxxxxxxxxx>
- [PATCH v5 0/6] KASan for arm
- From: Abbott Liu <liuwenliang@xxxxxxxxxx>
- [PATCH v5 6/6] Enable KASan for arm
- From: Abbott Liu <liuwenliang@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: VHE: Migrate _elx sysreg accessors to msr_s/mrs_s
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] KVM: arm64: VHE: Migrate _elx sysreg accessors to msr_s/mrs_s
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: linux-next-20180601: build error in arch/arm64/kvm/hyp/hyp-entry.S
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- linux-next-20180601: build error in arch/arm64/kvm/hyp/hyp-entry.S
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: linux-next-20180601: build error in arch/arm64/kvm/hyp/hyp-entry.S
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: linux-next-20180601: build error in arch/arm64/kvm/hyp/hyp-entry.S
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [GIT PULL] KVM/ARM updates for 4.18
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 33/33] KVM: arm/arm64: Bump VGIC_V3_MAX_CPUS to 512
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 32/33] KVM: arm/arm64: Implement KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 31/33] KVM: arm/arm64: Add KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 30/33] KVM: arm/arm64: Check all vcpu redistributors are set on map_resources
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 29/33] KVM: arm/arm64: Check vcpu redist base before registering an iodev
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 28/33] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 27/33] KVM: arm/arm64: Helper to register a new redistributor region
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 26/33] KVM: arm/arm64: Adapt vgic_v3_check_base to multiple rdist regions
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 25/33] KVM: arm/arm64: Revisit Redistributor TYPER last bit computation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 23/33] KVM: arm/arm64: Replace the single rdist region by a list
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 24/33] KVM: arm/arm64: Helper to locate free rdist index
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 22/33] KVM: arm/arm64: Document KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 21/33] KVM: arm/arm64: Set dist->spis to NULL after kfree
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 20/33] KVM: arm64: Invoke FPSIMD context switch trap from C
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 18/33] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 16/33] KVM: arm64: Save host SVE context as appropriate
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 19/33] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 15/33] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 17/33] KVM: arm64: Remove eager host SVE state saving
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 14/33] arm64/sve: Switch sve_pffr() argument from task to thread
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 13/33] arm64/sve: Move read_zcr_features() out of cpufeature.h
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 12/33] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 11/33] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 09/33] arm64: fpsimd: Eliminate task->mm checks
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 10/33] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 08/33] arm64: fpsimd: Avoid FPSIMD context leakage for the init task
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 07/33] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 06/33] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 05/33] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 04/33] arm64: Use update{,_tsk}_thread_flag()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 03/33] thread_info: Add update_thread_flag() helpers
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 02/33] arm64: fpsimd: Fix TIF_FOREIGN_FPSTATE after invalidating cpu regs
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 01/33] arm64: KVM: Use lm_alias() for kvm_ksym_ref()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [GIT PULL] KVM/ARM updates for 4.18
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH] KVM: arm/arm64: drop resource size check for GICV window
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 00/17] arm64 SSBD (aka Spectre-v4) mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 00/17] arm64 SSBD (aka Spectre-v4) mitigation
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 2/6] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 2/6] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 1/6] arm64: KVM: Add support for Stage-2 control of memory types and cacheability
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 6/6] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 5/6] KVM: arm/arm64: Stop using {pmd,pud,pgd}_populate
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm/arm64: Consolidate page-table accessors
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 3/6] arm64: KVM: Avoid marking pages as XN in Stage-2 if CTR_EL0.DIC is set
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 2/6] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 1/6] arm64: KVM: Add support for Stage-2 control of memory types and cacheability
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 10/15] ARM: spectre-v2: warn about incorrect context switching functions
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/15] ARM: spectre-v2: warn about incorrect context switching functions
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 10/15] ARM: spectre-v2: warn about incorrect context switching functions
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/17] arm64 SSBD (aka Spectre-v4) mitigation
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v2 5/6] KVM: arm/arm64: Stop using {pmd,pud,pgd}_populate
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 6/6] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 4/6] KVM: arm/arm64: Consolidate page-table accessors
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 3/6] arm64: KVM: Avoid marking pages as XN in Stage-2 if CTR_EL0.DIC is set
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 2/6] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 1/6] arm64: KVM: Add support for Stage-2 control of memory types and cacheability
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 0/6] KVM/arm64: Cache maintenance relaxations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] kvm: no need to check return value of debugfs_create functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 15/15] ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 14/15] ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 13/15] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 10/15] ARM: spectre-v2: warn about incorrect context switching functions
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 09/15] ARM: spectre-v2: add firmware based hardening
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 06/15] ARM: spectre-v2: harden branch predictor on context switches
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 05/15] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 04/15] ARM: bugs: add support for per-processor bug checking
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 03/15] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 02/15] ARM: bugs: prepare processor bug infrastructure
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v5 01/15] ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH] kvm: no need to check return value of debugfs_create functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/15] ARM Spectre variant 2 fixes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PATCH v5 15/15] ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 14/15] ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 13/15] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 12/15] ARM: KVM: invalidate icache on guest exit for Cortex-A15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 11/15] ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 10/15] ARM: spectre-v2: warn about incorrect context switching functions
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 09/15] ARM: spectre-v2: add firmware based hardening
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 08/15] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 07/15] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 06/15] ARM: spectre-v2: harden branch predictor on context switches
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 05/15] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 04/15] ARM: bugs: add support for per-processor bug checking
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 03/15] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 02/15] ARM: bugs: prepare processor bug infrastructure
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 01/15] ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v5 00/15] ARM Spectre variant 2 fixes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PATCH] KVM: arm64: VHE: Migrate _elx sysreg accessors to msr_s/mrs_s
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2 04/17] arm64: Add ARCH_WORKAROUND_2 probing
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH v2 08/17] arm64: ssbd: Restore mitigation status on CPU resume
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v2 16/17] arm64: ssbd: Enable delayed setting of TIF_SSBD
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 17/17] arm64: ssbd: Implement arch_seccomp_spec_mitigate
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 15/17] arm64: Add test_and_clear_flag and set_flag atomic assembler primitives
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 14/17] arm64: KVM: Add ARCH_WORKAROUND_2 discovery through ARCH_FEATURES_FUNC_ID
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 12/17] arm64: KVM: Add ARCH_WORKAROUND_2 support for guests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 13/17] arm64: KVM: Handle guest's ARCH_WORKAROUND_2 requests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 11/17] arm64: KVM: Add HYP per-cpu accessors
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 10/17] arm64: ssbd: Add prctl interface for per-thread mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 06/17] arm64: ssbd: Add global mitigation state accessor
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 08/17] arm64: ssbd: Restore mitigation status on CPU resume
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 09/17] arm64: ssbd: Introduce thread flag to control userspace mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 07/17] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 05/17] arm64: Add 'ssbd' command-line option
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 04/17] arm64: Add ARCH_WORKAROUND_2 probing
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 03/17] arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 02/17] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 01/17] arm/arm64: smccc: Add SMCCC-specific return codes
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 00/17] arm64 SSBD (aka Spectre-v4) mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v4 14/15] ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 15/15] ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 13/15] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 12/15] ARM: KVM: invalidate icache on guest exit for Cortex-A15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 11/15] ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 10/15] ARM: spectre-v2: warn about incorrect context switching functions
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 09/15] ARM: spectre-v2: add firmware based hardening
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 08/15] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 07/15] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 06/15] ARM: spectre-v2: harden branch predictor on context switches
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 05/15] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 04/15] ARM: bugs: add support for per-processor bug checking
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 03/15] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 02/15] ARM: bugs: prepare processor bug infrastructure
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 01/15] ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v4 00/15] ARM Spectre variant 2 fixes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 15/15] khwasan: update kasan documentation
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [RFC PATCH v3 15/15] khwasan: update kasan documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/15] ARM Spectre variant 2 fixes
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH v3 08/15] ARM: spectre-v2: harden user aborts in kernel space
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH] arm64: vgic-v2: Fix proxying of cpuif access
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v3 08/15] ARM: spectre-v2: harden user aborts in kernel space
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH v3 08/15] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/15] ARM: spectre-v2: harden user aborts in kernel space
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH v3 15/15] ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 14/15] ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 13/15] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 11/15] ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 10/15] ARM: spectre-v2: warn about incorrect context switching functions
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 08/15] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 12/15] ARM: KVM: invalidate icache on guest exit for Cortex-A15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 09/15] ARM: spectre-v2: add firmware based hardening
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 07/15] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 06/15] ARM: spectre-v2: harden branch predictor on context switches
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 05/15] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 04/15] ARM: bugs: add support for per-processor bug checking
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 03/15] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 02/15] ARM: bugs: prepare processor bug infrastructure
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 01/15] ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v3 00/15] ARM Spectre variant 2 fixes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/14] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCHv2] ARM64: KVM: use lm_alias() for kvm_ksym_ref()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv2] ARM64: KVM: use lm_alias() for kvm_ksym_ref()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v11 08/19] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCHv2] ARM64: KVM: use lm_alias() for kvm_ksym_ref()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv4 06/10] arm64: add basic pointer authentication support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 03/14] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 08/19] arm64: fpsimd: Eliminate task->mm checks
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCHv4 05/10] arm64/cpufeature: detect pointer authentication
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v11 07/19] arm64: fpsimd: Avoid FPSIMD context leakage for the init task
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v2 00/14] ARM Spectre variant 2 fixes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 08/19] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v4 14/26] arm64: kvm: Unmask PMR before entering guest
- From: Julien Thierry <julien.thierry@xxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v11 08/19] arm64: fpsimd: Eliminate task->mm checks
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH 3/4] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 03/14] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v2 00/14] ARM Spectre variant 2 fixes
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v11 02/19] thread_info: Add update_thread_flag() helpers
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v11 19/19] KVM: arm64: Invoke FPSIMD context switch trap from C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 18/19] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 14/19] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 17/19] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 16/19] KVM: arm64: Remove eager host SVE state saving
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 15/19] KVM: arm64: Save host SVE context as appropriate
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 10/19] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 11/19] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 13/19] arm64/sve: Switch sve_pffr() argument from task to thread
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 12/19] arm64/sve: Move read_zcr_features() out of cpufeature.h
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 09/19] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 08/19] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 07/19] arm64: fpsimd: Avoid FPSIMD context leakage for the init task
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 06/19] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 05/19] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 04/19] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 01/19] arm64: fpsimd: Fix TIF_FOREIGN_FPSTATE after invalidating cpu regs
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 02/19] thread_info: Add update_thread_flag() helpers
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 03/19] arm64: Use update{,_tsk}_thread_flag()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v11 00/19] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 3/4] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 2/4] arm64: KVM: Avoid marking pages as XN in Stage-2 if CTR_EL0.DIC is set
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/4] arm64: KVM: Add support for Stage-2 control of memory types and cacheability
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 3/4] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 18/18] KVM: arm64: Invoke FPSIMD context switch trap from C
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 17/18] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 16/18] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 15/18] KVM: arm64: Remove eager host SVE state saving
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 14/18] KVM: arm64: Save host SVE context as appropriate
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 04/14] arm64: Add ARCH_WORKAROUND_2 probing
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 09/14] arm64: ssbd: Introduce thread flag to control userspace mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 14/14] arm64: KVM: Add ARCH_WORKAROUND_2 discovery through ARCH_FEATURES_FUNC_ID
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 10/14] arm64: ssbd: Add prctl interface for per-thread mitigation
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 13/14] arm64: KVM: Handle guest's ARCH_WORKAROUND_2 requests
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 09/14] arm64: ssbd: Introduce thread flag to control userspace mitigation
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 09/14] arm64: ssbd: Introduce thread flag to control userspace mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 12/14] arm64: KVM: Add ARCH_WORKAROUND_2 support for guests
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 11/14] arm64: KVM: Add HYP per-cpu accessors
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 02/14] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 10/14] arm64: ssbd: Add prctl interface for per-thread mitigation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 09/14] arm64: ssbd: Introduce thread flag to control userspace mitigation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 08/14] arm64: ssbd: Disable mitigation on CPU resume if required by user
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 05/14] arm64: Add 'ssbd' command-line option
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 07/14] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 06/14] arm64: ssbd: Add global mitigation state accessor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 05/14] arm64: Add 'ssbd' command-line option
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 04/14] arm64: Add ARCH_WORKAROUND_2 probing
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 02/14] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 04/14] arm64: Add ARCH_WORKAROUND_2 probing
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 02/14] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v10 13/18] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 03/14] arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 02/14] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 01/14] arm/arm64: smccc: Add SMCCC-specific return codes
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 02/14] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v10 13/18] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 10/18] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v10 12/18] arm64/sve: Switch sve_pffr() argument from task to thread
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 11/18] arm64/sve: Move read_zcr_features() out of cpufeature.h
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 10/18] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 04/18] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 04/14] arm64: Add ARCH_WORKAROUND_2 probing
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v10 06/18] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 09/18] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 04/18] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 05/18] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 17/18] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 16/18] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 14/18] KVM: arm64: Save host SVE context as appropriate
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 06/18] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v10 05/18] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 05/18] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 04/18] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 08/18] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 06/18] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 05/18] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v10 14/18] KVM: arm64: Save host SVE context as appropriate
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 04/18] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v10 02/18] thread_info: Add update_thread_flag() helpers
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 04/18] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 02/18] thread_info: Add update_thread_flag() helpers
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v10 03/18] arm64: Use update{,_tsk}_thread_flag()
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 02/18] thread_info: Add update_thread_flag() helpers
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 01/18] arm64: fpsimd: Fix TIF_FOREIGN_FPSTATE after invalidating cpu regs
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 01/18] arm64: fpsimd: Fix TIF_FOREIGN_FPSTATE after invalidating cpu regs
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v10 01/18] arm64: fpsimd: Fix TIF_FOREIGN_FPSTATE after invalidating cpu regs
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH 08/14] arm64: ssbd: Disable mitigation on CPU resume if required by user
- From: Julien Grall <julien.grall@xxxxxxx>
- Re: [PATCH 13/14] ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 07/14] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
- From: Julien Grall <julien.grall@xxxxxxx>
- Re: [PATCH 06/14] arm64: ssbd: Add global mitigation state accessor
- From: Julien Grall <julien.grall@xxxxxxx>
- Re: [PATCH 05/14] arm64: Add 'ssbd' command-line option
- From: Julien Grall <julien.grall@xxxxxxx>
- Re: [PATCH 04/14] arm64: Add ARCH_WORKAROUND_2 probing
- From: Julien Grall <julien.grall@xxxxxxx>
- Re: [PATCH 03/14] arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2
- From: Julien Grall <julien.grall@xxxxxxx>
- Re: [PATCH 02/14] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Julien Grall <julien.grall@xxxxxxx>
- Re: [PATCHv4 05/10] arm64/cpufeature: detect pointer authentication
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCHv4 06/10] arm64: add basic pointer authentication support
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCHv4 06/10] arm64: add basic pointer authentication support
- From: Adam Wallis <awallis@xxxxxxxxxxxxxx>
- Re: [PATCHv2 06/12] arm64: add basic pointer authentication support
- From: Adam Wallis <awallis@xxxxxxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 07/14] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 06/14] ARM: spectre-v2: harden branch predictor on context switches
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 10/14] arm64: ssbd: Add prctl interface for per-thread mitigation
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: Clang arm64 build is broken
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH 10/14] arm64: ssbd: Add prctl interface for per-thread mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v10 18/18] KVM: arm64: Invoke FPSIMD context switch trap from C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 17/18] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 16/18] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 06/18] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 15/18] KVM: arm64: Remove eager host SVE state saving
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 07/18] arm64: fpsimd: Eliminate task->mm checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 14/18] KVM: arm64: Save host SVE context as appropriate
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 10/18] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 13/18] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 11/18] arm64/sve: Move read_zcr_features() out of cpufeature.h
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 12/18] arm64/sve: Switch sve_pffr() argument from task to thread
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 09/18] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 08/18] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 05/18] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 03/18] arm64: Use update{,_tsk}_thread_flag()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 02/18] thread_info: Add update_thread_flag() helpers
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 01/18] arm64: fpsimd: Fix TIF_FOREIGN_FPSTATE after invalidating cpu regs
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 04/18] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v10 00/18] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 05/14] arm64: Add 'ssbd' command-line option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 14/14] arm64: KVM: Add ARCH_WORKAROUND_2 discovery through ARCH_FEATURES_FUNC_ID
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 13/14] arm64: KVM: Handle guest's ARCH_WORKAROUND_2 requests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 12/14] arm64: KVM: Add ARCH_WORKAROUND_2 support for guests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 11/14] arm64: KVM: Add HYP per-cpu accessors
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 10/14] arm64: ssbd: Add prctl interface for per-thread mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 09/14] arm64: ssbd: Introduce thread flag to control userspace mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 08/14] arm64: ssbd: Disable mitigation on CPU resume if required by user
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 07/14] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 06/14] arm64: ssbd: Add global mitigation state accessor
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 05/14] arm64: Add 'ssbd' command-line option
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 04/14] arm64: Add ARCH_WORKAROUND_2 probing
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 02/14] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 03/14] arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 01/14] arm/arm64: smccc: Add SMCCC-specific return codes
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 00/14] arm64 SSBD (aka Spectre-v4) mitigation
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v7 08/13] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
- From: Auger Eric <eric.auger@xxxxxxxxxx>
- Re: [PATCH v7 08/13] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PULL v8] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 07/14] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/14] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 06/14] ARM: spectre-v2: harden branch predictor on context switches
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PATCH v8 13/13] KVM: arm/arm64: Bump VGIC_V3_MAX_CPUS to 512
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 12/13] KVM: arm/arm64: Implement KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 10/13] KVM: arm/arm64: Check all vcpu redistributors are set on map_resources
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 11/13] KVM: arm/arm64: Add KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 09/13] KVM: arm/arm64: Check vcpu redist base before registering an iodev
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 07/13] KVM: arm/arm64: Helper to register a new redistributor region
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 08/13] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 06/13] KVM: arm/arm64: Adapt vgic_v3_check_base to multiple rdist regions
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 05/13] KVM: arm/arm64: Revisit Redistributor TYPER last bit computation
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 04/13] KVM: arm/arm64: Helper to locate free rdist index
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 03/13] KVM: arm/arm64: Replace the single rdist region by a list
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 02/13] KVM: arm/arm64: Document KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 01/13] KVM: arm/arm64: Set dist->spis to NULL after kfree
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v8 00/13] KVM: arm/arm64: Allow multiple GICv3 redistributor regions
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH 12/14] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 06/14] ARM: spectre-v2: harden branch predictor on context switches
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v7 08/13] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 12/16] KVM: arm64: Save host SVE context as appropriate
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v9 12/16] KVM: arm64: Save host SVE context as appropriate
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v9 16/16] KVM: arm64: Invoke FPSIMD context switch trap from C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 15/16] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 14/16] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 13/16] KVM: arm64: Remove eager host SVE state saving
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 12/16] KVM: arm64: Save host SVE context as appropriate
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 11/16] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 10/16] arm64/sve: Switch sve_pffr() argument from task to thread
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 09/16] arm64/sve: Move read_zcr_features() out of cpufeature.h
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 08/16] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 05/16] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 07/16] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 06/16] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 03/16] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 02/16] arm64: Use update{,_tsk}_thread_flag()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 04/16] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 01/16] thread_info: Add update_thread_flag() helpers
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 00/16] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 13/14] ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 14/14] ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 12/14] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 11/14] ARM: KVM: invalidate icache on guest exit for Cortex-A15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 10/14] ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 07/14] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 06/14] ARM: spectre-v2: harden branch predictor on context switches
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 05/14] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 04/14] ARM: bugs: add support for per-processor bug checking
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 03/14] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 02/14] ARM: bugs: prepare processor bug infrastructure
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 01/14] ARM: add CPU part numbers for Cortex A73, A75 and Brahma B15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH v2 00/14] ARM Spectre variant 2 fixes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [kvmarm:queue 13/29] arch/arm/kvm/../../../virt/kvm/arm/arm.c:1598:6: error: implicit declaration of function 'system_supports_sve'
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PULL v8] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v3] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Jia He <hejianet@xxxxxxxxx>
- RE: [PATCH] arm64: KVM: reduce guest fpsimd trap
- From: "Tangnianyao (ICT)" <tangnianyao@xxxxxxxxxx>
- [kvmarm:queue 9/29] arch/arm/kvm/../../../virt/kvm/arm/arm.c:783:3: error: implicit declaration of function 'kvm_arch_vcpu_ctxsync_fp'; did you mean 'kvm_arch_vcpu_put_fp'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- [kvmarm:queue 13/29] arch/arm/kvm/../../../virt/kvm/arm/arm.c:1598:6: error: implicit declaration of function 'system_supports_sve'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 00/12] KVM: arm/arm64: Allow multiple GICv3 redistributor regions
- From: Auger Eric <eric.auger@xxxxxxxxxx>
- [PATCH v7 13/13] KVM: arm/arm64: Bump VGIC_V3_MAX_CPUS to 512
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 12/13] KVM: arm/arm64: Implement KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 11/13] KVM: arm/arm64: Add KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 10/13] KVM: arm/arm64: Check all vcpu redistributors are set on map_resources
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 09/13] KVM: arm/arm64: Check vcpu redist base before registering an iodev
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 08/13] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 07/13] KVM: arm/arm64: Helper to register a new redistributor region
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 05/13] KVM: arm/arm64: Revisit Redistributor TYPER last bit computation
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 06/13] KVM: arm/arm64: Adapt vgic_v3_check_base to multiple rdist regions
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 04/13] KVM: arm/arm64: Helper to locate free rdist index
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 03/13] KVM: arm/arm64: Replace the single rdist region by a list
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 02/13] KVM: arm/arm64: Document KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 01/13] KVM: arm/arm64: Set dist->spis to NULL after kfree
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v7 00/13] KVM: arm/arm64: Allow multiple GICv3 redistributor regions
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v6 00/12] KVM: arm/arm64: Allow multiple GICv3 redistributor regions
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PULL v8] KVM: arm64: Optimise FPSIMD context switching
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] arm64: KVM: reduce guest fpsimd trap
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- 答复: [PATCH v4 11/12] mm/memory-failure: increase queued recovery work's priority
- From: gengdongjiu <gengdongjiu@xxxxxxxxxx>
- 答复: [PATCH v4 11/12] mm/memory-failure: increase queued recovery work's priority
- From: gengdongjiu <gengdongjiu@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 03/14] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: KVM: reduce guest fpsimd trap
- From: "Tangnianyao (ICT)" <tangnianyao@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] arm64: kvm: use -fno-jump-tables with clang
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm/arm64: harden unmap_stage2_ptes in case end is not PAGE_SIZE aligned
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm/arm64: harden unmap_stage2_ptes in case end is not PAGE_SIZE aligned
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 2/2] KVM: arm/arm64: harden unmap_stage2_ptes in case end is not PAGE_SIZE aligned
- From: Jia He <hejianet@xxxxxxxxx>
- [PATCH v2 1/2] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH v3 07/12] ACPI / APEI: Make the nmi_fixmap_idx per-ghes to allow multiple in_nmi() users
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH v3 07/12] ACPI / APEI: Make the nmi_fixmap_idx per-ghes to allow multiple in_nmi() users
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 07/12] ACPI / APEI: Make the nmi_fixmap_idx per-ghes to allow multiple in_nmi() users
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Jia He <hejianet@xxxxxxxxx>
- [PATCH 4/4] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 1/4] arm64: KVM: Add support for Stage-2 control of memory types and cacheability
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 0/4] KVM/arm64: Cache maintenance relaxations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 3/4] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 2/4] arm64: KVM: Avoid marking pages as XN in Stage-2 if CTR_EL0.DIC is set
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: use vnc in arm-kvm
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re:Re: use vnc in arm-kvm
- From: lizhuoyao <lizhuoyao@xxxxxxxxxxx>
- Re:Re: use vnc in arm-kvm
- From: lizhuoyao <lizhuoyao@xxxxxxxxxxx>
- Re: [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 07/14] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 07/14] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 12/14] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 05/14] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 04/14] ARM: bugs: add support for per-processor bug checking
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 03/14] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 02/14] ARM: bugs: prepare processor bug infrastructure
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 01/14] ARM: add CPU part numbers for Cortex A73, A75 and Brahma B15
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH] KVM: arm/arm64: add WARN_ON if size is not PAGE_SIZE aligned in unmap_stage2_range
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v4 00/12] APEI in_nmi() rework and arm64 SDEI wire-up
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 12/12] arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 11/12] mm/memory-failure: increase queued recovery work's priority
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 10/12] ACPI / APEI: Add support for the SDEI GHES Notification type
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 09/12] firmware: arm_sdei: Add ACPI GHES registration helper
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 08/12] ACPI / APEI: Split fixmap pages for arm64 NMI-like notifications
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 07/12] ACPI / APEI: Make the nmi_fixmap_idx per-ghes to allow multiple in_nmi() users
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 06/12] arm64: KVM/mm: Move SEA handling behind a single 'claim' interface
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 05/12] KVM: arm/arm64: Add kvm_ras.h to collect kvm specific RAS plumbing
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 04/12] ACPI / APEI: Switch NOTIFY_SEA to use the estatus queue
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 03/12] ACPI / APEI: don't wait to serialise with oops messages when panic()ing
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 02/12] ACPI / APEI: Generalise the estatus queue's add/remove and notify code
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 01/12] ACPI / APEI: Move the estatus queue code up, and under its own ifdef
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v4 00/12] APEI in_nmi() rework and arm64 SDEI wire-up
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v3 07/12] ACPI / APEI: Make the nmi_fixmap_idx per-ghes to allow multiple in_nmi() users
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH v3 07/12] ACPI / APEI: Make the nmi_fixmap_idx per-ghes to allow multiple in_nmi() users
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH] arm64: KVM: reduce guest fpsimd trap
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH 06/14] ARM: spectre-v2: harden branch predictor on context switches
- From: Vladimir Murzin <vladimir.murzin@xxxxxxx>
- Re: [PATCH v3 4/4] KVM: arm64: Add support for PUD hugepages at stage 2
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH v3 07/12] ACPI / APEI: Make the nmi_fixmap_idx per-ghes to allow multiple in_nmi() users
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 10/14] ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 14/14] ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 12/14] ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 11/14] ARM: KVM: invalidate icache on guest exit for Cortex-A15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 13/14] ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 09/14] ARM: spectre-v2: add PSCI based hardening
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 08/14] ARM: spectre-v2: harden user aborts in kernel space
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 07/14] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 06/14] ARM: spectre-v2: harden branch predictor on context switches
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 05/14] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 04/14] ARM: bugs: add support for per-processor bug checking
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 03/14] ARM: bugs: hook processor bug checking into SMP and suspend paths
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 02/14] ARM: bugs: prepare processor bug infrastructure
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 01/14] ARM: add CPU part numbers for Cortex A73, A75 and Brahma B15
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 0/14] ARM Spectre variant 2 fixes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PULL v8] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] arm64: KVM: reduce guest fpsimd trap
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] arm64: KVM: reduce guest fpsimd trap
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH] kvm: Delete the slot only when KVM_MEM_READONLY flag is changed
- From: Shannon Zhao <zhaoshenglong@xxxxxxxxxx>
- Re: use vnc in arm-kvm
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: use vnc in arm-kvm
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH] arm64: KVM: reduce guest fpsimd trap
- From: "Tangnianyao (ICT)" <tangnianyao@xxxxxxxxxx>
- use vnc in arm-kvm
- From: lizhuoyao <lizhuoyao@xxxxxxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH v3 4/4] KVM: arm64: Add support for PUD hugepages at stage 2
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v3 4/4] KVM: arm64: Add support for PUD hugepages at stage 2
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 4/4] KVM: arm64: Add support for PUD hugepages at stage 2
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH v2 4/4] KVM: arm64: Add support for PUD hugepages at stage 2
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Jia He <hejianet@xxxxxxxxx>
- [PATCH v12 3/4] ACPI / APEI: Add SEI notification type support for ARMv8
- From: Dongjiu Geng <gengdongjiu@xxxxxxxxxx>
- [PATCH v12 4/4] arm64: handle NOTIFY_SEI notification by the APEI driver
- From: Dongjiu Geng <gengdongjiu@xxxxxxxxxx>
- [PATCH v12 2/4] arm/arm64: KVM: Add KVM_GET/SET_VCPU_EVENTS
- From: Dongjiu Geng <gengdongjiu@xxxxxxxxxx>
- [PATCH v12 0/4] set VSESR_EL2 by user space and support NOTIFY_SEI notification
- From: Dongjiu Geng <gengdongjiu@xxxxxxxxxx>
- [PATCH v12 1/4] arm64: KVM: export the capability to set guest SError syndrome
- From: Dongjiu Geng <gengdongjiu@xxxxxxxxxx>
- Re: [PATCH v7 08/16] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm/arm64: Fix locking issues
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm/arm64: Fix locking issues
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: Potential deadlock in vgic
- From: Jan Glauber <jan.glauber@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm/arm64: Fix locking issues
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 16/16] KVM: arm64: Invoke FPSIMD context switch trap from C
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v7 07/16] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v7 08/16] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH v7 14/16] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH 0/4] KVM: arm/arm64: Fix locking issues
- From: Christoffer Dall <christoffer.dall@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Jia He <hejianet@xxxxxxxxx>
- Re: Clang arm64 build is broken
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v3 3/4] KVM: arm64: Support dirty page tracking for PUD hugepages
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- [PATCH v3 4/4] KVM: arm64: Add support for PUD hugepages at stage 2
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- [PATCH v3 2/4] KVM: arm/arm64: Introduce helpers to manupulate page table entries
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- [PATCH v3 1/4] KVM: arm/arm64: Share common code in user_mem_abort()
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- [PATCH v3 0/4] KVM: Support PUD hugepages at stage 2
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Jia He <hejianet@xxxxxxxxx>
- Re: kvm_read_guest_page() missing kvm->srcu read lock?
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: kvm_read_guest_page() missing kvm->srcu read lock?
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Potential deadlock in vgic
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH 4/4] KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH 3/4] KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH 2/4] KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH 1/4] KVM: arm/arm64: Properly protect VGIC locks from IRQs
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH 0/4] KVM: arm/arm64: Fix locking issues
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: kvm_read_guest_page() missing kvm->srcu read lock?
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: kvm_read_guest_page() missing kvm->srcu read lock?
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: kvm_read_guest_page() missing kvm->srcu read lock?
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: kvm_read_guest_page() missing kvm->srcu read lock?
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- kvm_read_guest_page() missing kvm->srcu read lock?
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v7 13/16] KVM: arm64: Remove eager host SVE state saving
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v7 12/16] KVM: arm64: Save host SVE context as appropriate
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v7 08/16] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] kvm: Change return type to vm_fault_t
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 06/16] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v7 05/16] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v7 02/16] arm64: Use update{,_tsk}_thread_flag()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v7 01/16] thread_info: Add update_thread_flag() helpers
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] kvm: Change return type to vm_fault_t
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- [PATCHv2] ARM64: KVM: use lm_alias() for kvm_ksym_ref()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v7 02/16] arm64: Use update{,_tsk}_thread_flag()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 08/16] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 02/16] arm64: Use update{,_tsk}_thread_flag()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v7 08/16] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v7 06/16] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v7 06/16] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 06/16] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v7 02/16] arm64: Use update{,_tsk}_thread_flag()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 02/16] arm64: Use update{,_tsk}_thread_flag()
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v7 16/16] KVM: arm64: Invoke FPSIMD context switch trap from C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 13/16] KVM: arm64: Remove eager host SVE state saving
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 14/16] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 15/16] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 12/16] KVM: arm64: Save host SVE context as appropriate
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 11/16] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 10/16] arm64/sve: Switch sve_pffr() argument from task to thread
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 09/16] arm64/sve: Move read_zcr_features() out of cpufeature.h
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 08/16] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 07/16] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 06/16] arm64/sve: Refactor user SVE trap maintenance for external use
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 02/16] arm64: Use update{,_tsk}_thread_flag()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 05/16] arm64: fpsimd: Generalise context saving for non-task contexts
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 03/16] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 04/16] KVM: arm64: Convert lazy FPSIMD context switch trap to C
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 01/16] thread_info: Add update_thread_flag() helpers
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v7 00/16] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 07/15] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 07/15] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 11/15] KVM: arm64: Save host SVE context as appropriate
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 07/15] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 02/15] arm64: Use update{,_tsk}_thread_flag()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 01/15] thread_info: Add update_thread_flag() helpers
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 14/15] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 12/15] KVM: arm64: Remove eager host SVE state saving
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 11/15] KVM: arm64: Save host SVE context as appropriate
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 10/15] arm64/sve: Move sve_pffr() to fpsimd.h and make inline
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 09/15] arm64/sve: Switch sve_pffr() argument from task to thread
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 08/15] arm64/sve: Move read_zcr_features() out of cpufeature.h
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 06/15] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 07/15] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v6 01/15] thread_info: Add update_thread_flag() helpers
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
[Index of Archives]
[Linux KVM]
[Spice Development]
[Libvirt]
[Libvirt Users]
[Linux USB Devel]
[Linux SCSI]
[Samba]
[Yosemite News]