From: Benjamin Herrenschmidt <benh@kernel.crashing.org> To: Alexander Graf <agraf@suse.de> Cc: kvm-ppc@vger.kernel.org, KVM list <kvm@vger.kernel.org> Subject: Re: [PATCH 29/38] KVM: PPC: Book3S: PR: Rework irq disabling Date: Sat, 18 Aug 2012 07:47:36 +1000 [thread overview] Message-ID: <1345240056.11781.8.camel@pasglop> (raw) In-Reply-To: <1344985483-7440-30-git-send-email-agraf@suse.de> > > +/* Please call after prepare_to_enter. This function puts the lazy ee state > + back to normal mode, without actually enabling interrupts. */ > +static inline void kvmppc_lazy_ee_enable(void) > +{ > +#ifdef CONFIG_PPC64 > + /* Only need to enable IRQs by hard enabling them after this */ > + local_paca->irq_happened = 0; > + local_paca->soft_enabled = 1; > +#endif > +} Smells like the above is the right spot for trace_hardirqs_on() an: > - __hard_irq_disable(); > + local_irq_disable(); > if (kvmppc_prepare_to_enter(vcpu)) { > - /* local_irq_enable(); */ > + local_irq_enable(); > run->exit_reason = KVM_EXIT_INTR; > r = -EINTR; > } else { > /* Going back to guest */ > kvm_guest_enter(); > + kvmppc_lazy_ee_enable(); > } > } You should probably do kvmppc_lazy_ee_enable() before guest enter so the CPU doesn't appear to the rest of the world that it has interrupt disabled while it's in the guest. > @@ -1066,8 +1062,6 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > #endif > ulong ext_msr; > > - preempt_disable(); > - > /* Check if we can run the vcpu at all */ > if (!vcpu->arch.sane) { > kvm_run->exit_reason = KVM_EXIT_INTERNAL_ERROR; > @@ -1081,9 +1075,9 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > * really did time things so badly, then we just exit again due to > * a host external interrupt. > */ > - __hard_irq_disable(); > + local_irq_disable(); > if (kvmppc_prepare_to_enter(vcpu)) { > - __hard_irq_enable(); > + local_irq_enable(); > kvm_run->exit_reason = KVM_EXIT_INTR; > ret = -EINTR; > goto out; > @@ -1122,7 +1116,7 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > if (vcpu->arch.shared->msr & MSR_FP) > kvmppc_handle_ext(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, MSR_FP); > > - kvm_guest_enter(); > + kvmppc_lazy_ee_enable(); Same. BTW, why do you have two enter path ? Smells like a recipe for disaster :-) ret = __kvmppc_vcpu_run(kvm_run, vcpu); > > @@ -1157,7 +1151,6 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > > out: > vcpu->mode = OUTSIDE_GUEST_MODE; > - preempt_enable(); > return ret; > } > > diff --git a/arch/powerpc/kvm/book3s_rmhandlers.S b/arch/powerpc/kvm/book3s_rmhandlers.S > index 9ecf6e3..b2f8258 100644 > --- a/arch/powerpc/kvm/book3s_rmhandlers.S > +++ b/arch/powerpc/kvm/book3s_rmhandlers.S > @@ -170,20 +170,21 @@ kvmppc_handler_skip_ins: > * Call kvmppc_handler_trampoline_enter in real mode > * > * On entry, r4 contains the guest shadow MSR > + * MSR.EE has to be 0 when calling this function > */ > _GLOBAL(kvmppc_entry_trampoline) > mfmsr r5 > LOAD_REG_ADDR(r7, kvmppc_handler_trampoline_enter) > toreal(r7) > > - li r9, MSR_RI > - ori r9, r9, MSR_EE > - andc r9, r5, r9 /* Clear EE and RI in MSR value */ > li r6, MSR_IR | MSR_DR > - ori r6, r6, MSR_EE > - andc r6, r5, r6 /* Clear EE, DR and IR in MSR value */ > - MTMSR_EERI(r9) /* Clear EE and RI in MSR */ > - mtsrr0 r7 /* before we set srr0/1 */ > + andc r6, r5, r6 /* Clear DR and IR in MSR value */ > + /* > + * Set EE in HOST_MSR so that it's enabled when we get into our > + * C exit handler function > + */ > + ori r5, r5, MSR_EE > + mtsrr0 r7 > mtsrr1 r6 > RFI > > diff --git a/arch/powerpc/kvm/booke.c b/arch/powerpc/kvm/booke.c > index aae535f..2bd190c 100644 > --- a/arch/powerpc/kvm/booke.c > +++ b/arch/powerpc/kvm/booke.c > @@ -486,6 +486,7 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > ret = -EINTR; > goto out; > } > + kvmppc_lazy_ee_enable(); > > kvm_guest_enter(); Same. > @@ -955,6 +956,7 @@ int kvmppc_handle_exit(struct kvm_run *run, struct kvm_vcpu *vcpu, > } else { > /* Going back to guest */ > kvm_guest_enter(); > + kvmppc_lazy_ee_enable(); > } > } Same. > > diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c > index 053bfef..545c183 100644 > --- a/arch/powerpc/kvm/powerpc.c > +++ b/arch/powerpc/kvm/powerpc.c > @@ -30,6 +30,7 @@ > #include <asm/kvm_ppc.h> > #include <asm/tlbflush.h> > #include <asm/cputhreads.h> > +#include <asm/irqflags.h> > #include "timing.h" > #include "../mm/mmu_decl.h" > > @@ -93,6 +94,19 @@ int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu) > break; > } > > +#ifdef CONFIG_PPC64 > + /* lazy EE magic */ > + hard_irq_disable(); > + if (lazy_irq_pending()) { > + /* Got an interrupt in between, try again */ > + local_irq_enable(); > + local_irq_disable(); > + continue; > + } > + > + trace_hardirqs_on(); > +#endif And move the trace out as I mentioned. Cheers, Ben. > /* Going into guest context! Yay! */ > vcpu->mode = IN_GUEST_MODE; > smp_wmb();
WARNING: multiple messages have this Message-ID (diff)
From: Benjamin Herrenschmidt <benh@kernel.crashing.org> To: Alexander Graf <agraf@suse.de> Cc: kvm-ppc@vger.kernel.org, KVM list <kvm@vger.kernel.org> Subject: Re: [PATCH 29/38] KVM: PPC: Book3S: PR: Rework irq disabling Date: Fri, 17 Aug 2012 21:47:36 +0000 [thread overview] Message-ID: <1345240056.11781.8.camel@pasglop> (raw) In-Reply-To: <1344985483-7440-30-git-send-email-agraf@suse.de> > > +/* Please call after prepare_to_enter. This function puts the lazy ee state > + back to normal mode, without actually enabling interrupts. */ > +static inline void kvmppc_lazy_ee_enable(void) > +{ > +#ifdef CONFIG_PPC64 > + /* Only need to enable IRQs by hard enabling them after this */ > + local_paca->irq_happened = 0; > + local_paca->soft_enabled = 1; > +#endif > +} Smells like the above is the right spot for trace_hardirqs_on() an: > - __hard_irq_disable(); > + local_irq_disable(); > if (kvmppc_prepare_to_enter(vcpu)) { > - /* local_irq_enable(); */ > + local_irq_enable(); > run->exit_reason = KVM_EXIT_INTR; > r = -EINTR; > } else { > /* Going back to guest */ > kvm_guest_enter(); > + kvmppc_lazy_ee_enable(); > } > } You should probably do kvmppc_lazy_ee_enable() before guest enter so the CPU doesn't appear to the rest of the world that it has interrupt disabled while it's in the guest. > @@ -1066,8 +1062,6 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > #endif > ulong ext_msr; > > - preempt_disable(); > - > /* Check if we can run the vcpu at all */ > if (!vcpu->arch.sane) { > kvm_run->exit_reason = KVM_EXIT_INTERNAL_ERROR; > @@ -1081,9 +1075,9 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > * really did time things so badly, then we just exit again due to > * a host external interrupt. > */ > - __hard_irq_disable(); > + local_irq_disable(); > if (kvmppc_prepare_to_enter(vcpu)) { > - __hard_irq_enable(); > + local_irq_enable(); > kvm_run->exit_reason = KVM_EXIT_INTR; > ret = -EINTR; > goto out; > @@ -1122,7 +1116,7 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > if (vcpu->arch.shared->msr & MSR_FP) > kvmppc_handle_ext(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, MSR_FP); > > - kvm_guest_enter(); > + kvmppc_lazy_ee_enable(); Same. BTW, why do you have two enter path ? Smells like a recipe for disaster :-) ret = __kvmppc_vcpu_run(kvm_run, vcpu); > > @@ -1157,7 +1151,6 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > > out: > vcpu->mode = OUTSIDE_GUEST_MODE; > - preempt_enable(); > return ret; > } > > diff --git a/arch/powerpc/kvm/book3s_rmhandlers.S b/arch/powerpc/kvm/book3s_rmhandlers.S > index 9ecf6e3..b2f8258 100644 > --- a/arch/powerpc/kvm/book3s_rmhandlers.S > +++ b/arch/powerpc/kvm/book3s_rmhandlers.S > @@ -170,20 +170,21 @@ kvmppc_handler_skip_ins: > * Call kvmppc_handler_trampoline_enter in real mode > * > * On entry, r4 contains the guest shadow MSR > + * MSR.EE has to be 0 when calling this function > */ > _GLOBAL(kvmppc_entry_trampoline) > mfmsr r5 > LOAD_REG_ADDR(r7, kvmppc_handler_trampoline_enter) > toreal(r7) > > - li r9, MSR_RI > - ori r9, r9, MSR_EE > - andc r9, r5, r9 /* Clear EE and RI in MSR value */ > li r6, MSR_IR | MSR_DR > - ori r6, r6, MSR_EE > - andc r6, r5, r6 /* Clear EE, DR and IR in MSR value */ > - MTMSR_EERI(r9) /* Clear EE and RI in MSR */ > - mtsrr0 r7 /* before we set srr0/1 */ > + andc r6, r5, r6 /* Clear DR and IR in MSR value */ > + /* > + * Set EE in HOST_MSR so that it's enabled when we get into our > + * C exit handler function > + */ > + ori r5, r5, MSR_EE > + mtsrr0 r7 > mtsrr1 r6 > RFI > > diff --git a/arch/powerpc/kvm/booke.c b/arch/powerpc/kvm/booke.c > index aae535f..2bd190c 100644 > --- a/arch/powerpc/kvm/booke.c > +++ b/arch/powerpc/kvm/booke.c > @@ -486,6 +486,7 @@ int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) > ret = -EINTR; > goto out; > } > + kvmppc_lazy_ee_enable(); > > kvm_guest_enter(); Same. > @@ -955,6 +956,7 @@ int kvmppc_handle_exit(struct kvm_run *run, struct kvm_vcpu *vcpu, > } else { > /* Going back to guest */ > kvm_guest_enter(); > + kvmppc_lazy_ee_enable(); > } > } Same. > > diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c > index 053bfef..545c183 100644 > --- a/arch/powerpc/kvm/powerpc.c > +++ b/arch/powerpc/kvm/powerpc.c > @@ -30,6 +30,7 @@ > #include <asm/kvm_ppc.h> > #include <asm/tlbflush.h> > #include <asm/cputhreads.h> > +#include <asm/irqflags.h> > #include "timing.h" > #include "../mm/mmu_decl.h" > > @@ -93,6 +94,19 @@ int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu) > break; > } > > +#ifdef CONFIG_PPC64 > + /* lazy EE magic */ > + hard_irq_disable(); > + if (lazy_irq_pending()) { > + /* Got an interrupt in between, try again */ > + local_irq_enable(); > + local_irq_disable(); > + continue; > + } > + > + trace_hardirqs_on(); > +#endif And move the trace out as I mentioned. Cheers, Ben. > /* Going into guest context! Yay! */ > vcpu->mode = IN_GUEST_MODE; > smp_wmb();
next prev parent reply other threads:[~2012-08-17 21:47 UTC|newest] Thread overview: 150+ messages / expand[flat|nested] mbox.gz Atom feed top 2012-08-14 23:04 [PULL 00/38] ppc patch queue 2012-08-15 Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 01/38] PPC: epapr: create define for return code value of success Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 02/38] KVM: PPC: use definitions in epapr header for hcalls Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 03/38] KVM: PPC: add pvinfo for hcall opcodes on e500mc/e5500 Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 04/38] KVM: PPC: Add support for ePAPR idle hcall in host kernel Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 05/38] KVM: PPC: ev_idle hcall support for e500 guests Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 06/38] PPC: select EPAPR_PARAVIRT for all users of epapr hcalls Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 07/38] powerpc/fsl-soc: use CONFIG_EPAPR_PARAVIRT for hcalls Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 08/38] PPC: Don't use hardcoded opcode for ePAPR hcall invocation Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 09/38] KVM: PPC: PR: Use generic tracepoint for guest exit Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 10/38] KVM: PPC: Expose SYNC cap based on mmu notifiers Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 11/38] KVM: PPC: BookE: Expose remote TLB flushes in debugfs Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 12/38] KVM: PPC: E500: Fix clear_tlb_refs Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 13/38] KVM: PPC: Book3S HV: Fix incorrect branch in H_CEDE code Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 14/38] KVM: PPC: Quieten message about allocating linear regions Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 15/38] powerpc/epapr: export epapr_hypercall_start Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 16/38] KVM: PPC: BookE: Add check_requests helper function Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-15 0:10 ` Scott Wood 2012-08-15 0:10 ` Scott Wood 2012-08-15 0:13 ` Alexander Graf 2012-08-15 0:13 ` Alexander Graf 2012-08-15 0:20 ` Scott Wood 2012-08-15 0:20 ` Scott Wood 2012-08-15 18:28 ` Marcelo Tosatti 2012-08-15 18:28 ` Marcelo Tosatti 2012-08-14 23:04 ` [PATCH 17/38] KVM: PPC: BookE: Add support for vcpu->mode Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-15 0:17 ` Scott Wood 2012-08-15 0:17 ` Scott Wood 2012-08-15 0:26 ` Alexander Graf 2012-08-15 0:26 ` Alexander Graf 2012-08-15 1:17 ` Scott Wood 2012-08-15 1:17 ` Scott Wood 2012-08-15 9:29 ` Alexander Graf 2012-08-15 9:29 ` Alexander Graf 2012-08-21 1:41 ` Scott Wood 2012-08-21 1:41 ` Scott Wood 2012-08-15 1:25 ` Scott Wood 2012-08-15 1:25 ` Scott Wood 2012-08-14 23:04 ` [PATCH 18/38] KVM: PPC: E500: Implement MMU notifiers Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-15 1:20 ` Scott Wood 2012-08-15 1:20 ` Scott Wood 2012-08-15 9:38 ` Alexander Graf 2012-08-15 9:38 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 19/38] KVM: PPC: Add cache flush on page map Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-15 1:23 ` Scott Wood 2012-08-15 1:23 ` Scott Wood 2012-08-15 9:52 ` Alexander Graf 2012-08-15 9:52 ` Alexander Graf 2012-08-15 17:26 ` Scott Wood 2012-08-15 17:26 ` Scott Wood 2012-08-15 17:27 ` Alexander Graf 2012-08-15 17:27 ` Alexander Graf 2012-08-15 17:47 ` Scott Wood 2012-08-15 17:47 ` Scott Wood 2012-08-15 18:01 ` Alexander Graf 2012-08-15 18:01 ` Alexander Graf 2012-08-15 18:16 ` Scott Wood 2012-08-15 18:16 ` Scott Wood 2012-08-15 18:27 ` Alexander Graf 2012-08-15 18:27 ` Alexander Graf 2012-08-15 18:29 ` Alexander Graf 2012-08-15 18:29 ` Alexander Graf 2012-08-15 18:33 ` Scott Wood 2012-08-15 18:33 ` Scott Wood 2012-08-15 18:51 ` Alexander Graf 2012-08-15 18:51 ` Alexander Graf 2012-08-15 18:56 ` Scott Wood 2012-08-15 18:56 ` Scott Wood 2012-08-15 18:58 ` Alexander Graf 2012-08-15 18:58 ` Alexander Graf 2012-08-15 19:05 ` Scott Wood 2012-08-15 19:05 ` Scott Wood 2012-08-15 19:29 ` Alexander Graf 2012-08-15 19:29 ` Alexander Graf 2012-08-15 19:53 ` Scott Wood 2012-08-15 19:53 ` Scott Wood 2012-08-14 23:04 ` [PATCH 20/38] KVM: PPC: BookE: Add some more trace points Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 21/38] KVM: PPC: BookE: No duplicate request != 0 check Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 22/38] KVM: PPC: Use same kvmppc_prepare_to_enter code for booke and book3s_pr Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 23/38] KVM: PPC: Book3s: PR: Add (dumb) MMU Notifier support Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 24/38] KVM: PPC: BookE: Drop redundant vcpu->mode set Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 25/38] KVM: PPC: Book3S: PR: Only do resched check once per exit Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 26/38] KVM: PPC: Exit guest context while handling exit Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 27/38] KVM: PPC: Book3S: PR: Indicate we're out of guest mode Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 28/38] KVM: PPC: Consistentify vcpu exit path Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 29/38] KVM: PPC: Book3S: PR: Rework irq disabling Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-17 21:47 ` Benjamin Herrenschmidt [this message] 2012-08-17 21:47 ` Benjamin Herrenschmidt 2012-09-28 0:52 ` Alexander Graf 2012-09-28 0:52 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 30/38] KVM: PPC: Move kvm_guest_enter call into generic code Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 31/38] KVM: PPC: Ignore EXITING_GUEST_MODE mode Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 32/38] KVM: PPC: Add return value in prepare_to_enter Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 33/38] KVM: PPC: Add return value to core_check_requests Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 34/38] KVM: PPC: booke: Add watchdog emulation Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 35/38] booke: Added ONE_REG interface for IAC/DAC debug registers Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:44 ` Scott Wood 2012-08-14 23:44 ` Scott Wood 2012-08-14 23:47 ` Alexander Graf 2012-08-14 23:47 ` Alexander Graf 2012-08-15 0:06 ` Scott Wood 2012-08-15 0:06 ` Scott Wood 2012-08-14 23:04 ` [PATCH 36/38] KVM: PPC: 44x: Initialize PVR Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 37/38] KVM: PPC: BookE: Add MCSR SPR support Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-14 23:04 ` [PATCH 38/38] ppc: e500_tlb memset clears nothing Alexander Graf 2012-08-14 23:04 ` Alexander Graf 2012-08-15 10:07 ` Avi Kivity 2012-08-15 10:07 ` Avi Kivity 2012-08-15 10:09 ` Alexander Graf 2012-08-15 10:09 ` Alexander Graf 2012-08-15 10:10 ` Avi Kivity 2012-08-15 10:10 ` Avi Kivity
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=1345240056.11781.8.camel@pasglop \ --to=benh@kernel.crashing.org \ --cc=agraf@suse.de \ --cc=kvm-ppc@vger.kernel.org \ --cc=kvm@vger.kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.