All of lore.kernel.org
 help / color / mirror / Atom feed
From: David Gibson <david@gibson.dropbear.id.au>
To: "Cédric Le Goater" <clg@kaod.org>
Cc: kvm@vger.kernel.org, kvm-ppc@vger.kernel.org,
	Paul Mackerras <paulus@samba.org>,
	linuxppc-dev@lists.ozlabs.org
Subject: Re: [PATCH 06/19] KVM: PPC: Book3S HV: add a GET_ESB_FD control to the XIVE native device
Date: Tue, 5 Feb 2019 16:28:22 +1100	[thread overview]
Message-ID: <20190205052822.GE22661@umbus.fritz.box> (raw)
In-Reply-To: <69791b73-f93e-6957-92e8-5b8620b87731@kaod.org>

[-- Attachment #1: Type: text/plain, Size: 6190 bytes --]

On Mon, Feb 04, 2019 at 12:30:39PM +0100, Cédric Le Goater wrote:
> On 2/4/19 5:45 AM, David Gibson wrote:
> > On Mon, Jan 07, 2019 at 07:43:18PM +0100, Cédric Le Goater wrote:
> >> This will let the guest create a memory mapping to expose the ESB MMIO
> >> regions used to control the interrupt sources, to trigger events, to
> >> EOI or to turn off the sources.
> >>
> >> Signed-off-by: Cédric Le Goater <clg@kaod.org>
> >> ---
> >>  arch/powerpc/include/uapi/asm/kvm.h   |  4 ++
> >>  arch/powerpc/kvm/book3s_xive_native.c | 97 +++++++++++++++++++++++++++
> >>  2 files changed, 101 insertions(+)
> >>
> >> diff --git a/arch/powerpc/include/uapi/asm/kvm.h b/arch/powerpc/include/uapi/asm/kvm.h
> >> index 8c876c166ef2..6bb61ba141c2 100644
> >> --- a/arch/powerpc/include/uapi/asm/kvm.h
> >> +++ b/arch/powerpc/include/uapi/asm/kvm.h
> >> @@ -675,4 +675,8 @@ struct kvm_ppc_cpu_char {
> >>  #define  KVM_XICS_PRESENTED		(1ULL << 43)
> >>  #define  KVM_XICS_QUEUED		(1ULL << 44)
> >>  
> >> +/* POWER9 XIVE Native Interrupt Controller */
> >> +#define KVM_DEV_XIVE_GRP_CTRL		1
> >> +#define   KVM_DEV_XIVE_GET_ESB_FD	1
> > 
> > Introducing a new FD for ESB and TIMA seems overkill.  Can't you get
> > to both with an mmap() directly on the xive device fd?  Using the
> > offset to distinguish which one to map, obviously.
> 
> The page offset would define some sort of user API. It seems feasible.
> But I am not sure this would be practical in the future if we need to 
> tune the length.

Um.. why not?  I mean, yes the XIVE supports rather a lot of
interrupts, but we have 64-bits of offset we can play with - we can
leave room for billions of ESB slots and still have room for billions
of VPs.

> The TIMA has two pages that can be exposed at guest level for interrupt 
> management : the OS and the USER page. That should be OK.
> 
> But we might want to map only portions of the interrupt ESB space, for 
> PCI passthrough for instance as Paul proposed. I am still looking at that.
> 
> Thanks,
> 
> C.
> 
> >>  #endif /* __LINUX_KVM_POWERPC_H */
> >> diff --git a/arch/powerpc/kvm/book3s_xive_native.c b/arch/powerpc/kvm/book3s_xive_native.c
> >> index 115143e76c45..e20081f0c8d4 100644
> >> --- a/arch/powerpc/kvm/book3s_xive_native.c
> >> +++ b/arch/powerpc/kvm/book3s_xive_native.c
> >> @@ -153,6 +153,85 @@ int kvmppc_xive_native_connect_vcpu(struct kvm_device *dev,
> >>  	return rc;
> >>  }
> >>  
> >> +static int xive_native_esb_fault(struct vm_fault *vmf)
> >> +{
> >> +	struct vm_area_struct *vma = vmf->vma;
> >> +	struct kvmppc_xive *xive = vma->vm_file->private_data;
> >> +	struct kvmppc_xive_src_block *sb;
> >> +	struct kvmppc_xive_irq_state *state;
> >> +	struct xive_irq_data *xd;
> >> +	u32 hw_num;
> >> +	u16 src;
> >> +	u64 page;
> >> +	unsigned long irq;
> >> +
> >> +	/*
> >> +	 * Linux/KVM uses a two pages ESB setting, one for trigger and
> >> +	 * one for EOI
> >> +	 */
> >> +	irq = vmf->pgoff / 2;
> >> +
> >> +	sb = kvmppc_xive_find_source(xive, irq, &src);
> >> +	if (!sb) {
> >> +		pr_err("%s: source %lx not found !\n", __func__, irq);
> >> +		return VM_FAULT_SIGBUS;
> >> +	}
> >> +
> >> +	state = &sb->irq_state[src];
> >> +	kvmppc_xive_select_irq(state, &hw_num, &xd);
> >> +
> >> +	arch_spin_lock(&sb->lock);
> >> +
> >> +	/*
> >> +	 * first/even page is for trigger
> >> +	 * second/odd page is for EOI and management.
> >> +	 */
> >> +	page = vmf->pgoff % 2 ? xd->eoi_page : xd->trig_page;
> >> +	arch_spin_unlock(&sb->lock);
> >> +
> >> +	if (!page) {
> >> +		pr_err("%s: acessing invalid ESB page for source %lx !\n",
> >> +		       __func__, irq);
> >> +		return VM_FAULT_SIGBUS;
> >> +	}
> >> +
> >> +	vmf_insert_pfn(vma, vmf->address, page >> PAGE_SHIFT);
> >> +	return VM_FAULT_NOPAGE;
> >> +}
> >> +
> >> +static const struct vm_operations_struct xive_native_esb_vmops = {
> >> +	.fault = xive_native_esb_fault,
> >> +};
> >> +
> >> +static int xive_native_esb_mmap(struct file *file, struct vm_area_struct *vma)
> >> +{
> >> +	/* There are two ESB pages (trigger and EOI) per IRQ */
> >> +	if (vma_pages(vma) + vma->vm_pgoff > KVMPPC_XIVE_NR_IRQS * 2)
> >> +		return -EINVAL;
> >> +
> >> +	vma->vm_flags |= VM_IO | VM_PFNMAP;
> >> +	vma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);
> >> +	vma->vm_ops = &xive_native_esb_vmops;
> >> +	return 0;
> >> +}
> >> +
> >> +static const struct file_operations xive_native_esb_fops = {
> >> +	.mmap = xive_native_esb_mmap,
> >> +};
> >> +
> >> +static int kvmppc_xive_native_get_esb_fd(struct kvmppc_xive *xive, u64 addr)
> >> +{
> >> +	u64 __user *ubufp = (u64 __user *) addr;
> >> +	int ret;
> >> +
> >> +	ret = anon_inode_getfd("[xive-esb]", &xive_native_esb_fops, xive,
> >> +				O_RDWR | O_CLOEXEC);
> >> +	if (ret < 0)
> >> +		return ret;
> >> +
> >> +	return put_user(ret, ubufp);
> >> +}
> >> +
> >>  static int kvmppc_xive_native_set_attr(struct kvm_device *dev,
> >>  				       struct kvm_device_attr *attr)
> >>  {
> >> @@ -162,12 +241,30 @@ static int kvmppc_xive_native_set_attr(struct kvm_device *dev,
> >>  static int kvmppc_xive_native_get_attr(struct kvm_device *dev,
> >>  				       struct kvm_device_attr *attr)
> >>  {
> >> +	struct kvmppc_xive *xive = dev->private;
> >> +
> >> +	switch (attr->group) {
> >> +	case KVM_DEV_XIVE_GRP_CTRL:
> >> +		switch (attr->attr) {
> >> +		case KVM_DEV_XIVE_GET_ESB_FD:
> >> +			return kvmppc_xive_native_get_esb_fd(xive, attr->addr);
> >> +		}
> >> +		break;
> >> +	}
> >>  	return -ENXIO;
> >>  }
> >>  
> >>  static int kvmppc_xive_native_has_attr(struct kvm_device *dev,
> >>  				       struct kvm_device_attr *attr)
> >>  {
> >> +	switch (attr->group) {
> >> +	case KVM_DEV_XIVE_GRP_CTRL:
> >> +		switch (attr->attr) {
> >> +		case KVM_DEV_XIVE_GET_ESB_FD:
> >> +			return 0;
> >> +		}
> >> +		break;
> >> +	}
> >>  	return -ENXIO;
> >>  }
> >>  
> > 
> 

-- 
David Gibson			| I'll have my music baroque, and my code
david AT gibson.dropbear.id.au	| minimalist, thank you.  NOT _the_ _other_
				| _way_ _around_!
http://www.ozlabs.org/~dgibson

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

WARNING: multiple messages have this Message-ID (diff)
From: David Gibson <david@gibson.dropbear.id.au>
To: "Cédric Le Goater" <clg@kaod.org>
Cc: kvm@vger.kernel.org, kvm-ppc@vger.kernel.org,
	Paul Mackerras <paulus@samba.org>,
	linuxppc-dev@lists.ozlabs.org
Subject: Re: [PATCH 06/19] KVM: PPC: Book3S HV: add a GET_ESB_FD control to the XIVE native device
Date: Tue, 05 Feb 2019 05:28:22 +0000	[thread overview]
Message-ID: <20190205052822.GE22661@umbus.fritz.box> (raw)
In-Reply-To: <69791b73-f93e-6957-92e8-5b8620b87731@kaod.org>

[-- Attachment #1: Type: text/plain, Size: 6190 bytes --]

On Mon, Feb 04, 2019 at 12:30:39PM +0100, Cédric Le Goater wrote:
> On 2/4/19 5:45 AM, David Gibson wrote:
> > On Mon, Jan 07, 2019 at 07:43:18PM +0100, Cédric Le Goater wrote:
> >> This will let the guest create a memory mapping to expose the ESB MMIO
> >> regions used to control the interrupt sources, to trigger events, to
> >> EOI or to turn off the sources.
> >>
> >> Signed-off-by: Cédric Le Goater <clg@kaod.org>
> >> ---
> >>  arch/powerpc/include/uapi/asm/kvm.h   |  4 ++
> >>  arch/powerpc/kvm/book3s_xive_native.c | 97 +++++++++++++++++++++++++++
> >>  2 files changed, 101 insertions(+)
> >>
> >> diff --git a/arch/powerpc/include/uapi/asm/kvm.h b/arch/powerpc/include/uapi/asm/kvm.h
> >> index 8c876c166ef2..6bb61ba141c2 100644
> >> --- a/arch/powerpc/include/uapi/asm/kvm.h
> >> +++ b/arch/powerpc/include/uapi/asm/kvm.h
> >> @@ -675,4 +675,8 @@ struct kvm_ppc_cpu_char {
> >>  #define  KVM_XICS_PRESENTED		(1ULL << 43)
> >>  #define  KVM_XICS_QUEUED		(1ULL << 44)
> >>  
> >> +/* POWER9 XIVE Native Interrupt Controller */
> >> +#define KVM_DEV_XIVE_GRP_CTRL		1
> >> +#define   KVM_DEV_XIVE_GET_ESB_FD	1
> > 
> > Introducing a new FD for ESB and TIMA seems overkill.  Can't you get
> > to both with an mmap() directly on the xive device fd?  Using the
> > offset to distinguish which one to map, obviously.
> 
> The page offset would define some sort of user API. It seems feasible.
> But I am not sure this would be practical in the future if we need to 
> tune the length.

Um.. why not?  I mean, yes the XIVE supports rather a lot of
interrupts, but we have 64-bits of offset we can play with - we can
leave room for billions of ESB slots and still have room for billions
of VPs.

> The TIMA has two pages that can be exposed at guest level for interrupt 
> management : the OS and the USER page. That should be OK.
> 
> But we might want to map only portions of the interrupt ESB space, for 
> PCI passthrough for instance as Paul proposed. I am still looking at that.
> 
> Thanks,
> 
> C.
> 
> >>  #endif /* __LINUX_KVM_POWERPC_H */
> >> diff --git a/arch/powerpc/kvm/book3s_xive_native.c b/arch/powerpc/kvm/book3s_xive_native.c
> >> index 115143e76c45..e20081f0c8d4 100644
> >> --- a/arch/powerpc/kvm/book3s_xive_native.c
> >> +++ b/arch/powerpc/kvm/book3s_xive_native.c
> >> @@ -153,6 +153,85 @@ int kvmppc_xive_native_connect_vcpu(struct kvm_device *dev,
> >>  	return rc;
> >>  }
> >>  
> >> +static int xive_native_esb_fault(struct vm_fault *vmf)
> >> +{
> >> +	struct vm_area_struct *vma = vmf->vma;
> >> +	struct kvmppc_xive *xive = vma->vm_file->private_data;
> >> +	struct kvmppc_xive_src_block *sb;
> >> +	struct kvmppc_xive_irq_state *state;
> >> +	struct xive_irq_data *xd;
> >> +	u32 hw_num;
> >> +	u16 src;
> >> +	u64 page;
> >> +	unsigned long irq;
> >> +
> >> +	/*
> >> +	 * Linux/KVM uses a two pages ESB setting, one for trigger and
> >> +	 * one for EOI
> >> +	 */
> >> +	irq = vmf->pgoff / 2;
> >> +
> >> +	sb = kvmppc_xive_find_source(xive, irq, &src);
> >> +	if (!sb) {
> >> +		pr_err("%s: source %lx not found !\n", __func__, irq);
> >> +		return VM_FAULT_SIGBUS;
> >> +	}
> >> +
> >> +	state = &sb->irq_state[src];
> >> +	kvmppc_xive_select_irq(state, &hw_num, &xd);
> >> +
> >> +	arch_spin_lock(&sb->lock);
> >> +
> >> +	/*
> >> +	 * first/even page is for trigger
> >> +	 * second/odd page is for EOI and management.
> >> +	 */
> >> +	page = vmf->pgoff % 2 ? xd->eoi_page : xd->trig_page;
> >> +	arch_spin_unlock(&sb->lock);
> >> +
> >> +	if (!page) {
> >> +		pr_err("%s: acessing invalid ESB page for source %lx !\n",
> >> +		       __func__, irq);
> >> +		return VM_FAULT_SIGBUS;
> >> +	}
> >> +
> >> +	vmf_insert_pfn(vma, vmf->address, page >> PAGE_SHIFT);
> >> +	return VM_FAULT_NOPAGE;
> >> +}
> >> +
> >> +static const struct vm_operations_struct xive_native_esb_vmops = {
> >> +	.fault = xive_native_esb_fault,
> >> +};
> >> +
> >> +static int xive_native_esb_mmap(struct file *file, struct vm_area_struct *vma)
> >> +{
> >> +	/* There are two ESB pages (trigger and EOI) per IRQ */
> >> +	if (vma_pages(vma) + vma->vm_pgoff > KVMPPC_XIVE_NR_IRQS * 2)
> >> +		return -EINVAL;
> >> +
> >> +	vma->vm_flags |= VM_IO | VM_PFNMAP;
> >> +	vma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);
> >> +	vma->vm_ops = &xive_native_esb_vmops;
> >> +	return 0;
> >> +}
> >> +
> >> +static const struct file_operations xive_native_esb_fops = {
> >> +	.mmap = xive_native_esb_mmap,
> >> +};
> >> +
> >> +static int kvmppc_xive_native_get_esb_fd(struct kvmppc_xive *xive, u64 addr)
> >> +{
> >> +	u64 __user *ubufp = (u64 __user *) addr;
> >> +	int ret;
> >> +
> >> +	ret = anon_inode_getfd("[xive-esb]", &xive_native_esb_fops, xive,
> >> +				O_RDWR | O_CLOEXEC);
> >> +	if (ret < 0)
> >> +		return ret;
> >> +
> >> +	return put_user(ret, ubufp);
> >> +}
> >> +
> >>  static int kvmppc_xive_native_set_attr(struct kvm_device *dev,
> >>  				       struct kvm_device_attr *attr)
> >>  {
> >> @@ -162,12 +241,30 @@ static int kvmppc_xive_native_set_attr(struct kvm_device *dev,
> >>  static int kvmppc_xive_native_get_attr(struct kvm_device *dev,
> >>  				       struct kvm_device_attr *attr)
> >>  {
> >> +	struct kvmppc_xive *xive = dev->private;
> >> +
> >> +	switch (attr->group) {
> >> +	case KVM_DEV_XIVE_GRP_CTRL:
> >> +		switch (attr->attr) {
> >> +		case KVM_DEV_XIVE_GET_ESB_FD:
> >> +			return kvmppc_xive_native_get_esb_fd(xive, attr->addr);
> >> +		}
> >> +		break;
> >> +	}
> >>  	return -ENXIO;
> >>  }
> >>  
> >>  static int kvmppc_xive_native_has_attr(struct kvm_device *dev,
> >>  				       struct kvm_device_attr *attr)
> >>  {
> >> +	switch (attr->group) {
> >> +	case KVM_DEV_XIVE_GRP_CTRL:
> >> +		switch (attr->attr) {
> >> +		case KVM_DEV_XIVE_GET_ESB_FD:
> >> +			return 0;
> >> +		}
> >> +		break;
> >> +	}
> >>  	return -ENXIO;
> >>  }
> >>  
> > 
> 

-- 
David Gibson			| I'll have my music baroque, and my code
david AT gibson.dropbear.id.au	| minimalist, thank you.  NOT _the_ _other_
				| _way_ _around_!
http://www.ozlabs.org/~dgibson

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

  reply	other threads:[~2019-02-05  5:28 UTC|newest]

Thread overview: 271+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-01-07 18:43 [PATCH 00/19] KVM: PPC: Book3S HV: add XIVE native exploitation mode Cédric Le Goater
2019-01-07 18:43 ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 01/19] powerpc/xive: export flags for the XIVE native exploitation mode hcalls Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-09  3:33   ` David Gibson
2019-01-09  3:33     ` David Gibson
2019-01-09 13:08   ` Michael Ellerman
2019-01-09 13:08     ` Michael Ellerman
2019-01-09 13:38     ` Cédric Le Goater
2019-01-09 13:38       ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 02/19] powerpc/xive: add OPAL extensions for the XIVE native exploitation support Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-09  4:26   ` David Gibson
2019-01-09  4:26     ` David Gibson
2019-01-07 18:43 ` [PATCH 03/19] KVM: PPC: Book3S HV: check the IRQ controller type Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-09  4:27   ` David Gibson
2019-01-09  4:27     ` David Gibson
2019-01-22  4:56   ` Paul Mackerras
2019-01-22  4:56     ` Paul Mackerras
2019-01-23 16:24     ` Cédric Le Goater
2019-01-23 16:24       ` Cédric Le Goater
2019-02-04  0:50       ` David Gibson
2019-02-04  0:50         ` David Gibson
2019-02-04 10:16         ` Cédric Le Goater
2019-02-04 10:16           ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 04/19] KVM: PPC: Book3S HV: export services for the XIVE native exploitation device Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-11  4:09   ` David Gibson
2019-01-11  4:09     ` David Gibson
2019-01-07 18:43 ` [PATCH 05/19] KVM: PPC: Book3S HV: add a new KVM device for the XIVE native exploitation mode Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-22  5:05   ` Paul Mackerras
2019-01-22  5:05     ` Paul Mackerras
2019-01-23 16:28     ` Cédric Le Goater
2019-01-23 16:28       ` Cédric Le Goater
2019-01-28 17:35     ` Cédric Le Goater
2019-01-28 17:35       ` Cédric Le Goater
2019-01-30  4:29       ` Paul Mackerras
2019-01-30  4:29         ` Paul Mackerras
2019-01-30  7:01         ` Cédric Le Goater
2019-01-30  7:01           ` Cédric Le Goater
2019-01-31  3:01           ` Paul Mackerras
2019-01-31  3:01             ` Paul Mackerras
2019-02-01 17:03             ` Cédric Le Goater
2019-02-01 17:03               ` Cédric Le Goater
2019-02-04  4:25   ` David Gibson
2019-02-04  4:25     ` David Gibson
2019-02-04 11:19     ` Cédric Le Goater
2019-02-04 11:19       ` Cédric Le Goater
2019-02-05  5:26       ` David Gibson
2019-02-05  5:26         ` David Gibson
2019-01-07 18:43 ` [PATCH 06/19] KVM: PPC: Book3S HV: add a GET_ESB_FD control to the XIVE native device Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-22  5:09   ` Paul Mackerras
2019-01-22  5:09     ` Paul Mackerras
2019-01-23 16:48     ` Cédric Le Goater
2019-01-23 16:48       ` Cédric Le Goater
2019-02-04  4:45   ` David Gibson
2019-02-04  4:45     ` David Gibson
2019-02-04 11:30     ` Cédric Le Goater
2019-02-04 11:30       ` Cédric Le Goater
2019-02-05  5:28       ` David Gibson [this message]
2019-02-05  5:28         ` David Gibson
2019-02-05 12:55         ` Cédric Le Goater
2019-02-05 12:55           ` Cédric Le Goater
2019-02-06  1:23           ` David Gibson
2019-02-06  1:23             ` David Gibson
2019-02-06  7:21             ` Cédric Le Goater
2019-02-06  7:21               ` Cédric Le Goater
2019-02-07  2:49               ` David Gibson
2019-02-07  2:49                 ` David Gibson
2019-02-07  9:03                 ` Cédric Le Goater
2019-02-07  9:03                   ` Cédric Le Goater
2019-02-07  9:03                   ` Cédric Le Goater
2019-02-08  5:15                   ` David Gibson
2019-02-08  5:15                     ` David Gibson
2019-02-08  7:58                     ` Cédric Le Goater
2019-02-08  7:58                       ` Cédric Le Goater
2019-02-08 21:53                       ` Paul Mackerras
2019-02-08 21:53                         ` Paul Mackerras
2019-02-09  9:41                         ` Cédric Le Goater
2019-02-09  9:41                           ` Cédric Le Goater
2019-02-11  2:38                           ` David Gibson
2019-02-11  2:38                             ` David Gibson
2019-02-11  6:42                             ` Benjamin Herrenschmidt
2019-02-11  6:42                               ` Benjamin Herrenschmidt
2019-02-12 22:07                               ` Cédric Le Goater
2019-02-12 22:07                                 ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 07/19] KVM: PPC: Book3S HV: add a GET_TIMA_FD control to " Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 08/19] KVM: PPC: Book3S HV: add a VC_BASE control to the " Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-22  5:14   ` Paul Mackerras
2019-01-22  5:14     ` Paul Mackerras
2019-01-23 16:56     ` Cédric Le Goater
2019-01-23 16:56       ` Cédric Le Goater
2019-02-04  4:49       ` David Gibson
2019-02-04  4:49         ` David Gibson
2019-02-04 15:36         ` Cédric Le Goater
2019-02-04 15:36           ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 09/19] KVM: PPC: Book3S HV: add a SET_SOURCE " Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-02-04  4:57   ` David Gibson
2019-02-04  4:57     ` David Gibson
2019-02-04 19:07     ` Cédric Le Goater
2019-02-04 19:07       ` Cédric Le Goater
2019-02-05  5:35       ` David Gibson
2019-02-05  5:35         ` David Gibson
2019-02-05 13:39         ` Cédric Le Goater
2019-02-05 13:39           ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 10/19] KVM: PPC: Book3S HV: add a EISN attribute to kvmppc_xive_irq_state Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 11/19] KVM: PPC: Book3S HV: add support for the XIVE native exploitation mode hcalls Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-01-22  5:23   ` Paul Mackerras
2019-01-22  5:23     ` Paul Mackerras
2019-01-23  6:44     ` Benjamin Herrenschmidt
2019-01-23  6:44       ` Benjamin Herrenschmidt
2019-01-23  8:48       ` Cédric Le Goater
2019-01-23  8:48         ` Cédric Le Goater
2019-01-23 10:26         ` Paul Mackerras
2019-01-23 10:26           ` Paul Mackerras
2019-01-23 10:48           ` Cédric Le Goater
2019-01-23 10:48             ` Cédric Le Goater
2019-01-23 21:23           ` Benjamin Herrenschmidt
2019-01-23 21:23             ` Benjamin Herrenschmidt
2019-01-07 18:43 ` [PATCH 12/19] KVM: PPC: Book3S HV: record guest queue page address Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-02-04  5:15   ` David Gibson
2019-02-04  5:15     ` David Gibson
2019-02-04 15:37     ` Cédric Le Goater
2019-02-04 15:37       ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 13/19] KVM: PPC: Book3S HV: add a SYNC control for the XIVE native migration Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-02-04  5:17   ` David Gibson
2019-02-04  5:17     ` David Gibson
2019-02-04 15:39     ` Cédric Le Goater
2019-02-04 15:39       ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 14/19] KVM: PPC: Book3S HV: add a control to make the XIVE EQ pages dirty Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-02-04  5:18   ` David Gibson
2019-02-04  5:18     ` David Gibson
2019-02-04 15:46     ` Cédric Le Goater
2019-02-04 15:46       ` Cédric Le Goater
2019-02-05  5:30       ` David Gibson
2019-02-05  5:30         ` David Gibson
2019-01-07 18:43 ` [PATCH 15/19] KVM: PPC: Book3S HV: add get/set accessors for the source configuration Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-02-04  5:21   ` David Gibson
2019-02-04  5:21     ` David Gibson
2019-02-04 16:07     ` Cédric Le Goater
2019-02-04 16:07       ` Cédric Le Goater
2019-02-05  5:32       ` David Gibson
2019-02-05  5:32         ` David Gibson
2019-02-05 13:03         ` Cédric Le Goater
2019-02-05 13:03           ` Cédric Le Goater
2019-02-06  1:23           ` David Gibson
2019-02-06  1:23             ` David Gibson
2019-02-06  1:24             ` David Gibson
2019-02-06  1:24               ` David Gibson
2019-02-06  7:07               ` Cédric Le Goater
2019-02-06  7:07                 ` Cédric Le Goater
2019-02-07  2:48                 ` David Gibson
2019-02-07  2:48                   ` David Gibson
2019-02-07  9:13                   ` Cédric Le Goater
2019-02-07  9:13                     ` Cédric Le Goater
2019-02-08  5:15                     ` David Gibson
2019-02-08  5:15                       ` David Gibson
2019-02-14 16:50                       ` Cédric Le Goater
2019-02-14 16:50                         ` Cédric Le Goater
2019-01-07 18:43 ` [PATCH 16/19] KVM: PPC: Book3S HV: add get/set accessors for the EQ configuration Cédric Le Goater
2019-01-07 18:43   ` Cédric Le Goater
2019-02-04  5:24   ` David Gibson
2019-02-04  5:24     ` David Gibson
2019-02-05 17:45     ` Cédric Le Goater
2019-02-05 17:45       ` Cédric Le Goater
2019-01-07 19:10 ` [PATCH 17/19] KVM: PPC: Book3S HV: add get/set accessors for the VP XIVE state Cédric Le Goater
2019-01-07 19:10   ` Cédric Le Goater
2019-01-07 19:10   ` [PATCH 18/19] KVM: PPC: Book3S HV: add passthrough support Cédric Le Goater
2019-01-07 19:10     ` Cédric Le Goater
2019-01-22  5:26     ` Paul Mackerras
2019-01-22  5:26       ` Paul Mackerras
2019-01-23  6:45       ` Benjamin Herrenschmidt
2019-01-23  6:45         ` Benjamin Herrenschmidt
2019-01-23 10:30         ` Paul Mackerras
2019-01-23 10:30           ` Paul Mackerras
2019-01-23 11:07           ` Cédric Le Goater
2019-01-23 11:07             ` Cédric Le Goater
2019-01-28  6:13             ` Paul Mackerras
2019-01-28  6:13               ` Paul Mackerras
2019-01-28 18:26               ` Cédric Le Goater
2019-01-28 18:26                 ` Cédric Le Goater
2019-01-29  2:45                 ` Paul Mackerras
2019-01-29  2:45                   ` Paul Mackerras
2019-01-29 13:47                   ` Cédric Le Goater
2019-01-29 13:47                     ` Cédric Le Goater
2019-01-30  6:20                     ` Paul Mackerras
2019-01-30  6:20                       ` Paul Mackerras
2019-01-30 15:54                       ` Cédric Le Goater
2019-01-30 15:54                         ` Cédric Le Goater
2019-01-31  2:48                         ` Paul Mackerras
2019-01-31  2:48                           ` Paul Mackerras
2019-01-29  4:12                 ` Paul Mackerras
2019-01-29  4:12                   ` Paul Mackerras
2019-01-29 17:44                   ` Cédric Le Goater
2019-01-29 17:44                     ` Cédric Le Goater
2019-01-30  5:55                     ` Paul Mackerras
2019-01-30  5:55                       ` Paul Mackerras
2019-01-30  7:06                       ` Cédric Le Goater
2019-01-30  7:06                         ` Cédric Le Goater
2019-01-23 21:25           ` Benjamin Herrenschmidt
2019-01-23 21:25             ` Benjamin Herrenschmidt
2019-01-24  8:41             ` Cédric Le Goater
2019-01-24  8:41               ` Cédric Le Goater
2019-01-28  4:43             ` Paul Mackerras
2019-01-28  4:43               ` Paul Mackerras
2019-01-29 13:46               ` Cédric Le Goater
2019-01-29 13:46                 ` Cédric Le Goater
2019-01-07 19:10   ` [PATCH 19/19] KVM: introduce a KVM_DELETE_DEVICE ioctl Cédric Le Goater
2019-01-07 19:10     ` Cédric Le Goater
2019-01-22  5:42     ` Paul Mackerras
2019-01-22  5:42       ` Paul Mackerras
2019-01-23 18:39       ` Cédric Le Goater
2019-01-23 18:39         ` Cédric Le Goater
2019-01-23 21:32         ` Benjamin Herrenschmidt
2019-01-23 21:32           ` Benjamin Herrenschmidt
2019-02-04  5:26   ` [PATCH 17/19] KVM: PPC: Book3S HV: add get/set accessors for the VP XIVE state David Gibson
2019-02-04  5:26     ` David Gibson
2019-02-04 18:57     ` Cédric Le Goater
2019-02-04 18:57       ` Cédric Le Goater
2019-02-05  5:33       ` David Gibson
2019-02-05  5:33         ` David Gibson
2019-02-05 11:58         ` Cédric Le Goater
2019-02-05 11:58           ` Cédric Le Goater
2019-02-06  1:19           ` David Gibson
2019-02-06  1:19             ` David Gibson
2019-01-22  4:46 ` [PATCH 00/19] KVM: PPC: Book3S HV: add XIVE native exploitation mode Paul Mackerras
2019-01-22  4:46   ` Paul Mackerras
2019-01-23 19:07   ` Cédric Le Goater
2019-01-23 19:07     ` Cédric Le Goater
2019-01-23 21:35     ` Benjamin Herrenschmidt
2019-01-23 21:35       ` Benjamin Herrenschmidt
2019-01-26  8:25       ` Cédric Le Goater
2019-01-26  8:25         ` Cédric Le Goater
2019-02-04  5:36         ` David Gibson
2019-02-04  5:36           ` David Gibson
2019-02-05 11:31           ` Cédric Le Goater
2019-02-05 11:31             ` Cédric Le Goater
2019-02-05 22:13             ` Paul Mackerras
2019-02-05 22:13               ` Paul Mackerras
2019-02-06  1:18               ` David Gibson
2019-02-06  1:18                 ` David Gibson
2019-02-06  7:35                 ` Cédric Le Goater
2019-02-06  7:35                   ` Cédric Le Goater
2019-02-07  2:51                   ` David Gibson
2019-02-07  2:51                     ` David Gibson
2019-02-07  8:31                     ` Cédric Le Goater
2019-02-07  8:31                       ` Cédric Le Goater
2019-02-08  5:07                       ` David Gibson
2019-02-08  5:07                         ` David Gibson
2019-02-08  7:38                         ` Cédric Le Goater
2019-02-08  7:38                           ` Cédric Le Goater
2019-01-28  5:51     ` Paul Mackerras
2019-01-28  5:51       ` Paul Mackerras
2019-01-29 13:51       ` Cédric Le Goater
2019-01-29 13:51         ` Cédric Le Goater
2019-01-30  5:40         ` Paul Mackerras
2019-01-30  5:40           ` Paul Mackerras
2019-01-30 15:36           ` Cédric Le Goater
2019-01-30 15:36             ` Cédric Le Goater

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190205052822.GE22661@umbus.fritz.box \
    --to=david@gibson.dropbear.id.au \
    --cc=clg@kaod.org \
    --cc=kvm-ppc@vger.kernel.org \
    --cc=kvm@vger.kernel.org \
    --cc=linuxppc-dev@lists.ozlabs.org \
    --cc=paulus@samba.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.