summaryrefslogtreecommitdiffstats
path: root/arch (follow)
Commit message (Expand)AuthorAgeFilesLines
...
| | | * | | | KVM: arm64: GICv4.1: Add function to get VLPI stateShenming Lu2021-03-242-0/+20
| | | | |_|/ | | | |/| |
| | * | | | Merge branch 'kvm-arm64/vgic-5.13' into kvmarm-master/nextMarc Zyngier2021-04-135-44/+67
| | |\ \ \ \
| | | * | | | KVM: arm/arm64: Fix KVM_VGIC_V3_ADDR_TYPE_REDIST readEric Auger2021-04-131-2/+2
| | | * | | | KVM: arm64: vgic-v3: Expose GICR_TYPER.Last for userspaceEric Auger2021-04-061-19/+27
| | | * | | | kvm: arm64: vgic-v3: Introduce vgic_v3_free_redist_region()Eric Auger2021-04-063-10/+14
| | | * | | | KVM: arm64: Simplify argument passing to vgic_uaccess_[read|write]Eric Auger2021-04-061-6/+4
| | | * | | | KVM: arm/arm64: vgic: Reset base address on kvm_vgic_dist_destroy()Eric Auger2021-04-061-1/+5
| | | * | | | KVM: arm64: vgic-v3: Fix error handling in vgic_v3_set_redist_base()Eric Auger2021-04-061-1/+7
| | | * | | | KVM: arm64: Fix KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION readEric Auger2021-04-061-0/+3
| | | * | | | KVM: arm64: vgic-v3: Fix some error codes when setting RDIST baseEric Auger2021-04-061-7/+7
| | | |/ / /
| | * | | | Merge branch 'kvm-arm64/ptp' into kvmarm-master/nextMarc Zyngier2021-04-134-9/+78
| | |\ \ \ \
| | | * | | | KVM: arm64: Add support for the KVM PTP serviceJianyong Wu2021-04-072-0/+54
| | | * | | | KVM: arm64: Advertise KVM UID to guests via SMCCCWill Deacon2021-03-311-9/+18
| | | * | | | arm/arm64: Probe for the presence of KVM hypervisorWill Deacon2021-03-312-0/+6
| | | |/ / /
| | * | | | Merge branch 'kvm-arm64/nvhe-wxn' into kvmarm-master/nextMarc Zyngier2021-04-133-17/+7
| | |\ \ \ \
| | | * | | | KVM: arm64: Force SCTLR_EL2.WXN when running nVHEMarc Zyngier2021-03-181-1/+1
| | | * | | | KVM: arm64: Turn SCTLR_ELx_FLAGS into INIT_SCTLR_EL2_MMU_ONMarc Zyngier2021-03-182-10/+5
| | | * | | | KVM: arm64: Use INIT_SCTLR_EL2_MMU_OFF to disable the MMU on KVM teardownMarc Zyngier2021-03-181-3/+1
| | | * | | | arm64: Use INIT_SCTLR_EL1_MMU_OFF to disable the MMU on CPU restartMarc Zyngier2021-03-181-4/+1
| | | |/ / /
| | * | | | Merge branch 'kvm-arm64/nvhe-sve' into kvmarm-master/nextMarc Zyngier2021-04-131-0/+2
| | |\ \ \ \
| | | * | | | arm64: sve: Provide sve_cond_update_zcr_vq fallback when !ARM64_SVEXiaofei Tan2021-03-311-0/+2
| | * | | | | Merge branch 'kvm-arm64/nvhe-panic-info' into kvmarm-master/nextMarc Zyngier2021-04-1312-31/+63
| | |\ \ \ \ \
| | | * | | | | KVM: arm64: Log source when panicking from nVHE hypAndrew Scull2021-04-017-20/+56
| | | * | | | | KVM: arm64: Use BUG and BUG_ON in nVHE hypAndrew Scull2021-04-013-6/+3
| | | | |/ / / | | | |/| | |
| | * | | | | Merge branch 'kvm-arm64/misc-5.13' into kvmarm-master/nextMarc Zyngier2021-04-133-1/+26
| | |\ \ \ \ \
| | | * | | | | KVM: arm64: Fully zero the vcpu state on resetMarc Zyngier2021-04-091-0/+5
| | | * | | | | KVM: arm64: Fix error return code in init_hyp_mode()Wang Wensheng2021-04-061-1/+3
| | | * | | | | KVM: arm64: Support PREL/PLT relocs in EL2 codeDavid Brazdil2021-03-311-0/+18
| | | |/ / / /
| | * | | | | Merge branch 'kvm-arm64/memslot-fixes' into kvmarm-master/nextMarc Zyngier2021-04-132-8/+14
| | |\ \ \ \ \
| | | * | | | | KVM: arm64: Don't retrieve memory slot again in page fault handlerGavin Shan2021-04-071-2/+7
| | | * | | | | KVM: arm64: Use find_vma_intersection()Gavin Shan2021-04-071-4/+6
| | | * | | | | KVM: arm64: Hide kvm_mmu_wp_memory_region()Gavin Shan2021-04-072-2/+1
| | | |/ / / /
| | * | | | | Merge branch 'kvm-arm64/host-stage2' into kvmarm-master/nextMarc Zyngier2021-04-1351-348/+2607
| | |\ \ \ \ \
| | | * | | | | KVM: arm64: Make symbol '_kvm_host_prot_finalize' staticXu Jia2021-03-311-1/+1
| | | * | | | | KVM: arm64: Drop the CPU_FTR_REG_HYP_COPY infrastructureMarc Zyngier2021-03-259-81/+15
| | | * | | | | KVM: arm64: Generate final CTR_EL0 value when running in Protected modeMarc Zyngier2021-03-253-0/+21
| | | * | | | | KVM: arm64: Protect the .hyp sections from the hostQuentin Perret2021-03-195-0/+91
| | | * | | | | KVM: arm64: Disable PMU support in protected modeQuentin Perret2021-03-192-5/+6
| | | * | | | | KVM: arm64: Page-align the .hyp sectionsQuentin Perret2021-03-191-13/+9
| | | * | | | | KVM: arm64: Wrap the host with a stage 2Quentin Perret2021-03-1911-7/+316
| | | * | | | | KVM: arm64: Provide sanitized mmfr* registers at EL2Quentin Perret2021-03-193-0/+6
| | | * | | | | KVM: arm64: Introduce KVM_PGTABLE_S2_IDMAP stage 2 flagQuentin Perret2021-03-192-0/+5
| | | * | | | | KVM: arm64: Introduce KVM_PGTABLE_S2_NOFWB stage 2 flagQuentin Perret2021-03-193-41/+62
| | | * | | | | KVM: arm64: Add kvm_pgtable_stage2_find_range()Quentin Perret2021-03-192-4/+114
| | | * | | | | KVM: arm64: Refactor the *_map_set_prot_attr() helpersQuentin Perret2021-03-191-8/+8
| | | * | | | | KVM: arm64: Use page-table to track page ownershipQuentin Perret2021-03-192-24/+122
| | | * | | | | KVM: arm64: Always zero invalid PTEsQuentin Perret2021-03-191-10/+16
| | | * | | | | KVM: arm64: Sort the hypervisor memblocksQuentin Perret2021-03-191-0/+19
| | | * | | | | KVM: arm64: Reserve memory for host stage 2Quentin Perret2021-03-193-1/+40
| | | * | | | | KVM: arm64: Make memcache anonymous in pgtable allocatorQuentin Perret2021-03-192-5/+5