On 30/11/12 18:49, Christoffer Dall wrote:
On Fri, Nov 30, 2012 at 12:14 PM, Will Deacon will.dea...@arm.com wrote:
On Fri, Nov 30, 2012 at 04:47:40PM +, Christoffer Dall wrote:
On Fri, Nov 30, 2012 at 10:15 AM, Will Deacon will.dea...@arm.com wrote:
At this point, VM1 is running and
On Mon, Dec 3, 2012 at 5:33 AM, Marc Zyngier marc.zyng...@arm.com wrote:
On 30/11/12 18:49, Christoffer Dall wrote:
On Fri, Nov 30, 2012 at 12:14 PM, Will Deacon will.dea...@arm.com wrote:
On Fri, Nov 30, 2012 at 04:47:40PM +, Christoffer Dall wrote:
On Fri, Nov 30, 2012 at 10:15 AM, Will
On Fri, Nov 30, 2012 at 06:37:04AM +, Christoffer Dall wrote:
On Mon, Nov 19, 2012 at 9:57 AM, Will Deacon will.dea...@arm.com wrote:
I must be missing something here: how do you ensure that a guest running
on multiple CPUs continues to have the same VMID across them after a
rollover?
On Fri, Nov 30, 2012 at 10:15 AM, Will Deacon will.dea...@arm.com wrote:
On Fri, Nov 30, 2012 at 06:37:04AM +, Christoffer Dall wrote:
On Mon, Nov 19, 2012 at 9:57 AM, Will Deacon will.dea...@arm.com wrote:
I must be missing something here: how do you ensure that a guest running
on
On Fri, Nov 30, 2012 at 04:47:40PM +, Christoffer Dall wrote:
On Fri, Nov 30, 2012 at 10:15 AM, Will Deacon will.dea...@arm.com wrote:
At this point, VM1 is running and VM0:VCPU1 is running. VM0:VCPU0 is not
running because physical CPU0 is handling an interrupt. The problem is that
On Fri, Nov 30, 2012 at 12:14 PM, Will Deacon will.dea...@arm.com wrote:
On Fri, Nov 30, 2012 at 04:47:40PM +, Christoffer Dall wrote:
On Fri, Nov 30, 2012 at 10:15 AM, Will Deacon will.dea...@arm.com wrote:
At this point, VM1 is running and VM0:VCPU1 is running. VM0:VCPU0 is not
running
On Mon, Nov 19, 2012 at 9:57 AM, Will Deacon will.dea...@arm.com wrote:
On Sat, Nov 10, 2012 at 03:43:06PM +, Christoffer Dall wrote:
Provides complete world-switch implementation to switch to other guests
running in non-secure modes. Includes Hyp exception handlers that
capture necessary
On Sat, Nov 10, 2012 at 03:43:06PM +, Christoffer Dall wrote:
Provides complete world-switch implementation to switch to other guests
running in non-secure modes. Includes Hyp exception handlers that
capture necessary exception information and stores the information on
the VCPU and KVM
Provides complete world-switch implementation to switch to other guests
running in non-secure modes. Includes Hyp exception handlers that
capture necessary exception information and stores the information on
the VCPU and KVM structures.
The following Hyp-ABI is also documented in the code: