tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 7fb8b7d728a8ffae11f4c1e263a021de7eb1662b [73/75] arm64: KVM: nv:
Restrict S2 RD/WR permissions to match the guest's
config: arm-axm55xx_defc
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: d9adf257e12e66ab30056a8804b70a24ce0dded3 [68/75] fixup! KVM: arm/arm64:
nv: Support multiple nested stage 2 mmu structures
config: arm-axm55
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: ef4e8878a94ec44d0f883dfab21ecfb45fe33309 [67/75] fixup! KVM: arm/arm64:
nv: Support multiple nested stage 2 mmu structures
config: arm-axm55
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: bd3721cc25cec20d64c5c073fbc0879067cf86e7 [65/75] arm64: KVM: nv: Add
handling of EL2-specific timer registers
config: arm-axm55xx_defconfig
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 43c8e3e9d31cc009b7d37241859505293e494f4d [59/75] KVM: arm64: nv: vgic:
Allow userland to set VGIC maintenance IRQ
config: arm-axm55xx_defcon
On Wed, Jan 09, 2019 at 04:01:56PM +, Marc Zyngier wrote:
> On 09/01/2019 14:51, Julien Thierry wrote:
> >
> >
> > On 09/01/2019 14:45, Marc Zyngier wrote:
> >> Hi Andrew,
> >>
> >> On 09/01/2019 14:24, Andrew Murray wrote:
> >>> On Wed, Jan 09, 2019 at 01:54:34PM +, Marc Zyngier wrote:
>
On 09/01/2019 14:51, Julien Thierry wrote:
>
>
> On 09/01/2019 14:45, Marc Zyngier wrote:
>> Hi Andrew,
>>
>> On 09/01/2019 14:24, Andrew Murray wrote:
>>> On Wed, Jan 09, 2019 at 01:54:34PM +, Marc Zyngier wrote:
When running VHE, there is no need to jump via some stub to perform
a
On 09/01/2019 14:51, Julien Thierry wrote:
>
>
> On 09/01/2019 14:45, Marc Zyngier wrote:
>> Hi Andrew,
>>
>> On 09/01/2019 14:24, Andrew Murray wrote:
>>> On Wed, Jan 09, 2019 at 01:54:34PM +, Marc Zyngier wrote:
When running VHE, there is no need to jump via some stub to perform
>>>
On 09/01/2019 14:45, Marc Zyngier wrote:
> Hi Andrew,
>
> On 09/01/2019 14:24, Andrew Murray wrote:
>> On Wed, Jan 09, 2019 at 01:54:34PM +, Marc Zyngier wrote:
>>> When running VHE, there is no need to jump via some stub to perform
>>> a "HYP" function call, as there is a single address sp
Hi Andrew,
On 09/01/2019 14:24, Andrew Murray wrote:
> On Wed, Jan 09, 2019 at 01:54:34PM +, Marc Zyngier wrote:
>> When running VHE, there is no need to jump via some stub to perform
>> a "HYP" function call, as there is a single address space.
>>
>> Let's thus change kvm_call_hyp() and co to
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 78eb72890679e738e27f7ca4d06924c283492d70 [57/75] KVM: arm64: nv: Nested
GICv3 Support
config: arm-axm55xx_defconfig (attached as .config)
co
On Wed, Jan 09, 2019 at 01:54:34PM +, Marc Zyngier wrote:
> When running VHE, there is no need to jump via some stub to perform
> a "HYP" function call, as there is a single address space.
>
> Let's thus change kvm_call_hyp() and co to perform a direct call
> in this case. Although this result
On Wed, Jan 09, 2019 at 01:54:32PM +, Marc Zyngier wrote:
> It recently appeared that the nasty hack we use to call a HYP function
> on a non-VHE system has an interesting side effect on VHE: We wrap any
> such call into a hypercall, losing any form of type checking between
> the caller and the
It recently appeared that the nasty hack we use to call a HYP function
on a non-VHE system has an interesting side effect on VHE: We wrap any
such call into a hypercall, losing any form of type checking between
the caller and the callee.
This isn't a big deal if you can guarantee to write code tha
Until now, we haven't differentiated between HYP calls that
have a return value and those who don't. As we're about to
change this, introduce kvm_call_hyp_ret(), and change all
call sites that actually make use of a return value.
Signed-off-by: Marc Zyngier
---
arch/arm/include/asm/kvm_host.h
We now call VHE code directly, without going through any central
dispatching function. Let's drop that code.
Signed-off-by: Marc Zyngier
---
arch/arm64/kvm/hyp.S | 3 ---
arch/arm64/kvm/hyp/hyp-entry.S | 12
2 files changed, 15 deletions(-)
diff --git a/arch/arm64/kvm/hy
When running VHE, there is no need to jump via some stub to perform
a "HYP" function call, as there is a single address space.
Let's thus change kvm_call_hyp() and co to perform a direct call
in this case. Although this results in a bit of code expansion,
it allows the compiler to check for type c
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 2f0dfa723fec5361c9784fa63b6af3e83d2486d1 [56/75] KVM: arm64: nv:
vgic-v3: Take cpu_if pointer directly instead of vcpu
config: arm-axm55xx_d
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 66df9dda77fe8a8876039d6b07f842989126a584 [54/75] KVM: arm64: nv:
Propagate CNTVOFF_EL2 to the virtual EL1 timer
config: arm-axm55xx_defconfi
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 4fb08a5a9975b41829daec65774877666461e75f [53/75] KVM: arm64: nv:
arch_timer: Support hyp timer emulation
config: arm-axm55xx_defconfig (atta
On Wed, Jan 09, 2019 at 10:09:51AM +, Marc Zyngier wrote:
> On 09/01/2019 09:13, André Przywara wrote:
> > On 09/01/2019 04:40, kbuild test robot wrote:
> >
> > Marc, Christoffer,
> >
> >> tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
> >> kvm-arm64/nv-wip-v5.0-rc
On Wed, 9 Jan 2019 10:09:51 +
Marc Zyngier wrote:
> On 09/01/2019 09:13, André Przywara wrote:
> > On 09/01/2019 04:40, kbuild test robot wrote:
> >
> > Marc, Christoffer,
> >
> >> tree:
> >> https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
> >> kvm-arm64/nv-wip-v5.0-rc1
Hi,
On Fri, Jan 4, 2019 at 11:32 PM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > According to userspace settings, pointer authentication cpufeature
> > is enabled/disabled from guests.
>
> This reads like the guest is changing something in the host. Isn'
Hi,
On Sat, Jan 5, 2019 at 12:05 AM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > This feature will allow the KVM guest to allow the handling of
> > pointer authentication instructions or to treat them as undefined
> > if not set. It uses the existing vcp
On 09/01/2019 09:13, André Przywara wrote:
> On 09/01/2019 04:40, kbuild test robot wrote:
>
> Marc, Christoffer,
>
>> tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
>> kvm-arm64/nv-wip-v5.0-rc1
>> head: 688c386ca096f2c1f2eee386697586c88df5d5bc
>> commit: 2b1265c58a8
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 4d8a6cc25603cc92352d861970f1a678411af963 [46/75] KVM: arm64: nv: Move
last_vcpu_ran to be per s2 mmu
config: arm-axm55xx_defconfig (attached
Hi,
On Sat, Jan 5, 2019 at 12:05 AM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > When pointer authentication is supported, a guest may wish to use it.
> > This patch adds the necessary KVM infrastructure for this to work, with
> > a semi-lazy context swi
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: 3da39279c7b03e5f797de7c283a0de99f69e6a17 [45/75] KVM: arm64: nv:
Unmap/flush shadow stage 2 page tables
config: arm-axm55xx_defconfig (attac
On 09/01/2019 04:40, kbuild test robot wrote:
Marc, Christoffer,
> tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
> kvm-arm64/nv-wip-v5.0-rc1
> head: 688c386ca096f2c1f2eee386697586c88df5d5bc
> commit: 2b1265c58a873d917e99ac762e243c1274481dbf [4/75] KVM: arm/arm64:
>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git
kvm-arm64/nv-wip-v5.0-rc1
head: 688c386ca096f2c1f2eee386697586c88df5d5bc
commit: fbdecc14dd15c696fd86d28247a9b95b4635b8b1 [44/75] KVM: arm64: nv:
Forward the guest hypervisor's stage 2 permission faults
config: arm-axm55x
30 matches
Mail list logo