|
BUG: unable to handle kernel paging request in kvm_vgic_destroy
kvmarm
|
8 |
C |
|
|
7 |
51d |
63d
|
28/29 |
never |
ac6769c8f948
KVM: arm64: Eagerly init vgic dist/redist on vgic creation
|
|
WARNING in kvm_set_vm_id_reg
kvmarm
|
-1 |
C |
|
|
23 |
165d |
168d
|
29/29 |
101d |
0f559cd91e37
KVM: arm64: Finalize ID registers only once per VM
|
|
kernel BUG in kvm_s2_put_page
kvmarm
|
-1 |
C |
|
|
88 |
185d |
225d
|
29/29 |
162d |
fc670ad5966f
Revert "KVM: arm64: Reschedule as needed when destroying the stage-2 page-tables"
|
|
WARNING: locking bug in vgic_put_irq
kvmarm
|
4 |
C |
|
|
7 |
243d |
250d
|
29/29 |
185d |
d54594accf73
KVM: arm64: vgic-v3: Erase LPIs from xarray outside of raw spinlocks
|
|
WARNING in pend_sync_exception
kvmarm
|
-1 |
C |
|
|
100 |
291d |
294d
|
29/29 |
252d |
efa1368ba9f4
KVM: arm64: Commit exceptions from KVM_SET_VCPU_EVENTS immediately
|
|
WARNING in pend_serror_exception
kvmarm
|
-1 |
C |
|
|
49 |
291d |
294d
|
29/29 |
252d |
efa1368ba9f4
KVM: arm64: Commit exceptions from KVM_SET_VCPU_EVENTS immediately
|
|
WARNING in kvm_timer_update_irq
kvmarm
|
-1 |
C |
|
|
15 |
526d |
558d
|
28/29 |
359d |
38d7aacca092
KVM: arm64: Get rid of userspace_irqchip_in_use
|
|
WARNING in kvm_handle_mmio_return
kvmarm
|
-1 |
C |
|
|
5 |
527d |
534d
|
28/29 |
359d |
e735a5da6442
KVM: arm64: Don't retire aborted MMIO instruction
|
|
BUG: unable to handle kernel paging request in __hwasan_check_x0_ADDR
kvmarm
|
8 |
|
|
|
3 |
507d |
507d
|
28/29 |
361d |
d561491ba927
KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR
|