All of lore.kernel.org
 help / color / mirror / Atom feed
From: David Hildenbrand <dahi@linux.vnet.ibm.com>
To: "Alex Bennée" <alex.bennee@linaro.org>
Cc: kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org,
	kvmarm@lists.cs.columbia.edu, christoffer.dall@linaro.org,
	marc.zyngier@arm.com, peter.maydell@linaro.org, agraf@suse.de,
	drjones@redhat.com, pbonzini@redhat.com,
	zhichao.huang@linaro.org, jan.kiszka@siemens.com,
	r65777@freescale.com, bp@suse.de, Gleb Natapov <gleb@kernel.org>,
	Russell King <linux@arm.linux.org.uk>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	Andre Przywara <andre.przywara@arm.com>,
	Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>,
	linux-kernel@vger.kernel.org (open list)
Subject: Re: [PATCH v2 05/10] KVM: arm: introduce kvm_arch_setup/clear_debug()
Date: Wed, 1 Apr 2015 18:28:55 +0200	[thread overview]
Message-ID: <20150401182855.4650b14a@thinkpad-w530> (raw)
In-Reply-To: <1427814488-28467-6-git-send-email-alex.bennee@linaro.org>

> This is a precursor for later patches which will need to do more to
> setup debug state before entering the hyp.S switch code. The existing
> functionality for setting mdcr_el2 has been moved out of hyp.S and now
> uses the value kept in vcpu->arch.mdcr_el2.
> 
> This also moves the conditional setting of the TDA bit from the hyp code
> into the C code.
> 
> Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
> 
>  create mode 100644 arch/arm64/kvm/debug.c
> 
> diff --git a/arch/arm/include/asm/kvm_host.h b/arch/arm/include/asm/kvm_host.h
> index 41008cd..8c01c97 100644
> --- a/arch/arm/include/asm/kvm_host.h
> +++ b/arch/arm/include/asm/kvm_host.h
> @@ -242,5 +242,7 @@ static inline void kvm_arch_hardware_unsetup(void) {}
>  static inline void kvm_arch_sync_events(struct kvm *kvm) {}
>  static inline void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu) {}
>  static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {}
> +static inline void kvm_arch_setup_debug(struct kvm_vcpu *vcpu) {}
> +static inline void kvm_arch_clear_debug(struct kvm_vcpu *vcpu) {}

Do you really want to call these functions "kvm_arch.." although they are not
defined for other arch and not triggered by common code?

kvm_setup ... or kvm_arm_setup...

> 
>  #endif /* __ARM_KVM_HOST_H__ */
> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
> index 445933d..7ea8b0e 100644
> --- a/arch/arm/kvm/arm.c
[...]
> +#include <linux/kvm_host.h>
> +
> +#include <asm/kvm_arm.h>
> +#include <asm/kvm_host.h>
> +
> +/**
> + * kvm_arch_setup_debug - set-up debug related stuff
> + *
> + * @vcpu:	the vcpu pointer
> + *
> + * This is called before each entry in to the hypervisor to setup any
> + * debug related registers. Currently this just ensures we will trap
> + * access to:
> + *  - Performance monitors (MDCR_EL2_TPM/MDCR_EL2_TPMCR)
> + *  - Debug ROM Address (MDCR_EL2_TDRA)
> + *  - Power down debug registers (MDCR_EL2_TDOSA)
> + *
> + * Additionally the hypervisor lazily saves/restores the debug
> + * register state. If it is not currently doing so (arch.debug_flags)
> + * then we also need to ensure we trap if the guest messes with them
> + * so we know we need to save them.
> + */
> +
> +void kvm_arch_setup_debug(struct kvm_vcpu *vcpu)
> +{
> +	vcpu->arch.mdcr_el2 |= (MDCR_EL2_TPM | MDCR_EL2_TPMCR);
> +	vcpu->arch.mdcr_el2 |= (MDCR_EL2_TDRA | MDCR_EL2_TDOSA);

I'd put that into a single assignment.

> +
> +	if (!vcpu->arch.debug_flags & KVM_ARM64_DEBUG_DIRTY)
> +		vcpu->arch.mdcr_el2 |= MDCR_EL2_TDA;
> +	else
> +		vcpu->arch.mdcr_el2 &= ~MDCR_EL2_TDA;
> +
> +}
> +
> +void kvm_arch_clear_debug(struct kvm_vcpu *vcpu)
> +{
> +	/* Nothing to do yet */

Wonder if that would be the right place to clear MDCR_EL2_TDA unconditionally?
But see my comment below.

> +}
> diff --git a/arch/arm64/kvm/hyp.S b/arch/arm64/kvm/hyp.S
> index 5befd01..be92bfe1 100644
> --- a/arch/arm64/kvm/hyp.S
> +++ b/arch/arm64/kvm/hyp.S
> @@ -768,17 +768,8 @@
>  	mov	x2, #(1 << 15)	// Trap CP15 Cr=15
>  	msr	hstr_el2, x2
> 
> -	mrs	x2, mdcr_el2
> -	and	x2, x2, #MDCR_EL2_HPMN_MASK
> -	orr	x2, x2, #(MDCR_EL2_TPM | MDCR_EL2_TPMCR)
> -	orr	x2, x2, #(MDCR_EL2_TDRA | MDCR_EL2_TDOSA)
> -
> -	// Check for KVM_ARM64_DEBUG_DIRTY, and set debug to trap
> -	// if not dirty.
> -	ldr	x3, [x0, #VCPU_DEBUG_FLAGS]
> -	tbnz	x3, #KVM_ARM64_DEBUG_DIRTY_SHIFT, 1f
> -	orr	x2, x2,  #MDCR_EL2_TDA
> -1:

*neither an assembler nor arm expert*
The existing code always cleared all bits except MDCR_EL2_HPMN_MASK. So they
remained set.

We would now always overwrite these bits with the values from 
vcpu->arch.mdcr_el2, is that okay?

> +	// Monitor Debug Config - see kvm_arch_setup_debug()
> +	ldr	x2, [x0, #VCPU_MDCR_EL2]
>  	msr	mdcr_el2, x2
>  .endm
> 



David


WARNING: multiple messages have this Message-ID (diff)
From: David Hildenbrand <dahi@linux.vnet.ibm.com>
To: "Alex Bennée" <alex.bennee@linaro.org>
Cc: kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org,
	kvmarm@lists.cs.columbia.edu, christoffer.dall@linaro.org,
	marc.zyngier@arm.com, peter.maydell@linaro.org, agraf@suse.de,
	drjones@redhat.com, pbonzini@redhat.com,
	zhichao.huang@linaro.org, jan.kiszka@siemens.com,
	r65777@freescale.com, bp@suse.de, Gleb Natapov <gleb@kernel.org>,
	Russell King <linux@arm.linux.org.uk>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	Andre Przywara <andre.przywara@arm.com>,
	Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>,
	open list <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH v2 05/10] KVM: arm: introduce kvm_arch_setup/clear_debug()
Date: Wed, 1 Apr 2015 18:28:55 +0200	[thread overview]
Message-ID: <20150401182855.4650b14a@thinkpad-w530> (raw)
In-Reply-To: <1427814488-28467-6-git-send-email-alex.bennee@linaro.org>

> This is a precursor for later patches which will need to do more to
> setup debug state before entering the hyp.S switch code. The existing
> functionality for setting mdcr_el2 has been moved out of hyp.S and now
> uses the value kept in vcpu->arch.mdcr_el2.
> 
> This also moves the conditional setting of the TDA bit from the hyp code
> into the C code.
> 
> Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
> 
>  create mode 100644 arch/arm64/kvm/debug.c
> 
> diff --git a/arch/arm/include/asm/kvm_host.h b/arch/arm/include/asm/kvm_host.h
> index 41008cd..8c01c97 100644
> --- a/arch/arm/include/asm/kvm_host.h
> +++ b/arch/arm/include/asm/kvm_host.h
> @@ -242,5 +242,7 @@ static inline void kvm_arch_hardware_unsetup(void) {}
>  static inline void kvm_arch_sync_events(struct kvm *kvm) {}
>  static inline void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu) {}
>  static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {}
> +static inline void kvm_arch_setup_debug(struct kvm_vcpu *vcpu) {}
> +static inline void kvm_arch_clear_debug(struct kvm_vcpu *vcpu) {}

Do you really want to call these functions "kvm_arch.." although they are not
defined for other arch and not triggered by common code?

kvm_setup ... or kvm_arm_setup...

> 
>  #endif /* __ARM_KVM_HOST_H__ */
> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
> index 445933d..7ea8b0e 100644
> --- a/arch/arm/kvm/arm.c
[...]
> +#include <linux/kvm_host.h>
> +
> +#include <asm/kvm_arm.h>
> +#include <asm/kvm_host.h>
> +
> +/**
> + * kvm_arch_setup_debug - set-up debug related stuff
> + *
> + * @vcpu:	the vcpu pointer
> + *
> + * This is called before each entry in to the hypervisor to setup any
> + * debug related registers. Currently this just ensures we will trap
> + * access to:
> + *  - Performance monitors (MDCR_EL2_TPM/MDCR_EL2_TPMCR)
> + *  - Debug ROM Address (MDCR_EL2_TDRA)
> + *  - Power down debug registers (MDCR_EL2_TDOSA)
> + *
> + * Additionally the hypervisor lazily saves/restores the debug
> + * register state. If it is not currently doing so (arch.debug_flags)
> + * then we also need to ensure we trap if the guest messes with them
> + * so we know we need to save them.
> + */
> +
> +void kvm_arch_setup_debug(struct kvm_vcpu *vcpu)
> +{
> +	vcpu->arch.mdcr_el2 |= (MDCR_EL2_TPM | MDCR_EL2_TPMCR);
> +	vcpu->arch.mdcr_el2 |= (MDCR_EL2_TDRA | MDCR_EL2_TDOSA);

I'd put that into a single assignment.

> +
> +	if (!vcpu->arch.debug_flags & KVM_ARM64_DEBUG_DIRTY)
> +		vcpu->arch.mdcr_el2 |= MDCR_EL2_TDA;
> +	else
> +		vcpu->arch.mdcr_el2 &= ~MDCR_EL2_TDA;
> +
> +}
> +
> +void kvm_arch_clear_debug(struct kvm_vcpu *vcpu)
> +{
> +	/* Nothing to do yet */

Wonder if that would be the right place to clear MDCR_EL2_TDA unconditionally?
But see my comment below.

> +}
> diff --git a/arch/arm64/kvm/hyp.S b/arch/arm64/kvm/hyp.S
> index 5befd01..be92bfe1 100644
> --- a/arch/arm64/kvm/hyp.S
> +++ b/arch/arm64/kvm/hyp.S
> @@ -768,17 +768,8 @@
>  	mov	x2, #(1 << 15)	// Trap CP15 Cr=15
>  	msr	hstr_el2, x2
> 
> -	mrs	x2, mdcr_el2
> -	and	x2, x2, #MDCR_EL2_HPMN_MASK
> -	orr	x2, x2, #(MDCR_EL2_TPM | MDCR_EL2_TPMCR)
> -	orr	x2, x2, #(MDCR_EL2_TDRA | MDCR_EL2_TDOSA)
> -
> -	// Check for KVM_ARM64_DEBUG_DIRTY, and set debug to trap
> -	// if not dirty.
> -	ldr	x3, [x0, #VCPU_DEBUG_FLAGS]
> -	tbnz	x3, #KVM_ARM64_DEBUG_DIRTY_SHIFT, 1f
> -	orr	x2, x2,  #MDCR_EL2_TDA
> -1:

*neither an assembler nor arm expert*
The existing code always cleared all bits except MDCR_EL2_HPMN_MASK. So they
remained set.

We would now always overwrite these bits with the values from 
vcpu->arch.mdcr_el2, is that okay?

> +	// Monitor Debug Config - see kvm_arch_setup_debug()
> +	ldr	x2, [x0, #VCPU_MDCR_EL2]
>  	msr	mdcr_el2, x2
>  .endm
> 



David


WARNING: multiple messages have this Message-ID (diff)
From: dahi@linux.vnet.ibm.com (David Hildenbrand)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v2 05/10] KVM: arm: introduce kvm_arch_setup/clear_debug()
Date: Wed, 1 Apr 2015 18:28:55 +0200	[thread overview]
Message-ID: <20150401182855.4650b14a@thinkpad-w530> (raw)
In-Reply-To: <1427814488-28467-6-git-send-email-alex.bennee@linaro.org>

> This is a precursor for later patches which will need to do more to
> setup debug state before entering the hyp.S switch code. The existing
> functionality for setting mdcr_el2 has been moved out of hyp.S and now
> uses the value kept in vcpu->arch.mdcr_el2.
> 
> This also moves the conditional setting of the TDA bit from the hyp code
> into the C code.
> 
> Signed-off-by: Alex Benn?e <alex.bennee@linaro.org>
> 
>  create mode 100644 arch/arm64/kvm/debug.c
> 
> diff --git a/arch/arm/include/asm/kvm_host.h b/arch/arm/include/asm/kvm_host.h
> index 41008cd..8c01c97 100644
> --- a/arch/arm/include/asm/kvm_host.h
> +++ b/arch/arm/include/asm/kvm_host.h
> @@ -242,5 +242,7 @@ static inline void kvm_arch_hardware_unsetup(void) {}
>  static inline void kvm_arch_sync_events(struct kvm *kvm) {}
>  static inline void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu) {}
>  static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {}
> +static inline void kvm_arch_setup_debug(struct kvm_vcpu *vcpu) {}
> +static inline void kvm_arch_clear_debug(struct kvm_vcpu *vcpu) {}

Do you really want to call these functions "kvm_arch.." although they are not
defined for other arch and not triggered by common code?

kvm_setup ... or kvm_arm_setup...

> 
>  #endif /* __ARM_KVM_HOST_H__ */
> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
> index 445933d..7ea8b0e 100644
> --- a/arch/arm/kvm/arm.c
[...]
> +#include <linux/kvm_host.h>
> +
> +#include <asm/kvm_arm.h>
> +#include <asm/kvm_host.h>
> +
> +/**
> + * kvm_arch_setup_debug - set-up debug related stuff
> + *
> + * @vcpu:	the vcpu pointer
> + *
> + * This is called before each entry in to the hypervisor to setup any
> + * debug related registers. Currently this just ensures we will trap
> + * access to:
> + *  - Performance monitors (MDCR_EL2_TPM/MDCR_EL2_TPMCR)
> + *  - Debug ROM Address (MDCR_EL2_TDRA)
> + *  - Power down debug registers (MDCR_EL2_TDOSA)
> + *
> + * Additionally the hypervisor lazily saves/restores the debug
> + * register state. If it is not currently doing so (arch.debug_flags)
> + * then we also need to ensure we trap if the guest messes with them
> + * so we know we need to save them.
> + */
> +
> +void kvm_arch_setup_debug(struct kvm_vcpu *vcpu)
> +{
> +	vcpu->arch.mdcr_el2 |= (MDCR_EL2_TPM | MDCR_EL2_TPMCR);
> +	vcpu->arch.mdcr_el2 |= (MDCR_EL2_TDRA | MDCR_EL2_TDOSA);

I'd put that into a single assignment.

> +
> +	if (!vcpu->arch.debug_flags & KVM_ARM64_DEBUG_DIRTY)
> +		vcpu->arch.mdcr_el2 |= MDCR_EL2_TDA;
> +	else
> +		vcpu->arch.mdcr_el2 &= ~MDCR_EL2_TDA;
> +
> +}
> +
> +void kvm_arch_clear_debug(struct kvm_vcpu *vcpu)
> +{
> +	/* Nothing to do yet */

Wonder if that would be the right place to clear MDCR_EL2_TDA unconditionally?
But see my comment below.

> +}
> diff --git a/arch/arm64/kvm/hyp.S b/arch/arm64/kvm/hyp.S
> index 5befd01..be92bfe1 100644
> --- a/arch/arm64/kvm/hyp.S
> +++ b/arch/arm64/kvm/hyp.S
> @@ -768,17 +768,8 @@
>  	mov	x2, #(1 << 15)	// Trap CP15 Cr=15
>  	msr	hstr_el2, x2
> 
> -	mrs	x2, mdcr_el2
> -	and	x2, x2, #MDCR_EL2_HPMN_MASK
> -	orr	x2, x2, #(MDCR_EL2_TPM | MDCR_EL2_TPMCR)
> -	orr	x2, x2, #(MDCR_EL2_TDRA | MDCR_EL2_TDOSA)
> -
> -	// Check for KVM_ARM64_DEBUG_DIRTY, and set debug to trap
> -	// if not dirty.
> -	ldr	x3, [x0, #VCPU_DEBUG_FLAGS]
> -	tbnz	x3, #KVM_ARM64_DEBUG_DIRTY_SHIFT, 1f
> -	orr	x2, x2,  #MDCR_EL2_TDA
> -1:

*neither an assembler nor arm expert*
The existing code always cleared all bits except MDCR_EL2_HPMN_MASK. So they
remained set.

We would now always overwrite these bits with the values from 
vcpu->arch.mdcr_el2, is that okay?

> +	// Monitor Debug Config - see kvm_arch_setup_debug()
> +	ldr	x2, [x0, #VCPU_MDCR_EL2]
>  	msr	mdcr_el2, x2
>  .endm
> 



David

  reply	other threads:[~2015-04-01 16:29 UTC|newest]

Thread overview: 199+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-03-31 15:07 [PATCH v2 00/10] KVM Guest Debug support for arm64 Alex Bennée
2015-03-31 15:07 ` Alex Bennée
2015-03-31 15:07 ` [PATCH v2 01/10] KVM: add commentary for kvm_debug_exit_arch struct Alex Bennée
2015-03-31 15:07   ` Alex Bennée
2015-03-31 15:07   ` Alex Bennée
2015-04-01 15:38   ` David Hildenbrand
2015-04-01 15:38     ` David Hildenbrand
2015-04-01 15:38     ` David Hildenbrand
2015-04-01 15:38     ` David Hildenbrand
2015-04-10 12:58   ` Andrew Jones
2015-04-10 12:58     ` Andrew Jones
2015-04-13 10:57   ` Christoffer Dall
2015-04-13 10:57     ` Christoffer Dall
2015-04-13 10:57     ` Christoffer Dall
2015-03-31 15:08 ` [PATCH v2 02/10] KVM: define common __KVM_GUESTDBG_USE_SW/HW_BP values Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-10 12:59   ` Andrew Jones
2015-04-10 12:59     ` Andrew Jones
2015-04-10 12:59     ` Andrew Jones
2015-04-10 12:59     ` Andrew Jones
2015-04-13 11:55   ` Christoffer Dall
2015-04-13 11:55     ` Christoffer Dall
2015-04-13 11:55     ` Christoffer Dall
2015-04-13 11:55     ` Christoffer Dall
2015-04-13 14:51     ` Alex Bennée
2015-04-13 14:51       ` Alex Bennée
2015-04-13 14:51       ` Alex Bennée
2015-04-13 14:51       ` Alex Bennée
2015-04-13 15:07       ` Andrew Jones
2015-04-13 15:07         ` Andrew Jones
2015-04-13 15:07         ` Andrew Jones
2015-04-13 15:07         ` Andrew Jones
2015-04-14  8:24       ` Christoffer Dall
2015-04-14  8:24         ` Christoffer Dall
2015-04-14  8:24         ` Christoffer Dall
2015-04-14  8:24         ` Christoffer Dall
2015-04-14  8:24         ` Christoffer Dall
2015-03-31 15:08 ` [PATCH v2 03/10] KVM: arm: guest debug, define API headers Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-01 15:46   ` David Hildenbrand
2015-04-01 15:46     ` David Hildenbrand
2015-04-01 15:46     ` David Hildenbrand
2015-04-01 16:01     ` Alex Bennée
2015-04-01 16:01       ` Alex Bennée
2015-04-01 16:05       ` David Hildenbrand
2015-04-01 16:05         ` David Hildenbrand
2015-04-01 16:09       ` Peter Maydell
2015-04-01 16:09         ` Peter Maydell
2015-04-10 13:05   ` Andrew Jones
2015-04-10 13:05     ` Andrew Jones
2015-04-10 13:05     ` Andrew Jones
2015-04-13 12:08   ` Christoffer Dall
2015-04-13 12:08     ` Christoffer Dall
2015-04-23  9:54     ` Alex Bennée
2015-04-23  9:54       ` Alex Bennée
2015-04-23  9:54       ` Alex Bennée
2015-03-31 15:08 ` [PATCH v2 04/10] KVM: arm: guest debug, add stub KVM_SET_GUEST_DEBUG ioctl Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-01 15:55   ` David Hildenbrand
2015-04-01 15:55     ` David Hildenbrand
2015-04-01 15:55     ` David Hildenbrand
2015-04-09 12:28     ` Andrew Jones
2015-04-09 12:28       ` Andrew Jones
2015-04-09 12:28       ` Andrew Jones
2015-04-09 14:19       ` Alex Bennée
2015-04-09 14:19         ` Alex Bennée
2015-04-09 14:19         ` Alex Bennée
2015-04-13 12:12   ` Christoffer Dall
2015-04-13 12:12     ` Christoffer Dall
2015-04-13 12:12     ` Christoffer Dall
2015-04-14  6:31     ` David Hildenbrand
2015-04-14  6:31       ` David Hildenbrand
2015-04-14  6:31       ` David Hildenbrand
2015-04-14  8:03       ` Alex Bennée
2015-04-14  8:03         ` Alex Bennée
2015-04-14  8:03         ` Alex Bennée
2015-03-31 15:08 ` [PATCH v2 05/10] KVM: arm: introduce kvm_arch_setup/clear_debug() Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-01 16:28   ` David Hildenbrand [this message]
2015-04-01 16:28     ` David Hildenbrand
2015-04-01 16:28     ` David Hildenbrand
2015-04-09 12:56     ` Andrew Jones
2015-04-09 12:56       ` Andrew Jones
2015-04-09 12:56       ` Andrew Jones
2015-04-09 14:18       ` Alex Bennée
2015-04-09 14:18         ` Alex Bennée
2015-04-09 12:55   ` Andrew Jones
2015-04-09 12:55     ` Andrew Jones
2015-04-09 12:55     ` Andrew Jones
2015-04-13 14:36   ` Christoffer Dall
2015-04-13 14:36     ` Christoffer Dall
2015-04-13 14:48     ` Christoffer Dall
2015-04-13 14:48       ` Christoffer Dall
2015-04-13 14:48       ` Christoffer Dall
2015-04-13 15:29     ` Alex Bennée
2015-04-13 15:29       ` Alex Bennée
2015-04-13 15:29       ` Alex Bennée
2015-03-31 15:08 ` [PATCH v2 06/10] KVM: arm64: guest debug, add SW break point support Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-02 12:52   ` David Hildenbrand
2015-04-02 12:52     ` David Hildenbrand
2015-04-02 12:52     ` David Hildenbrand
2015-04-02 14:06     ` Alex Bennée
2015-04-02 14:06       ` Alex Bennée
2015-04-02 14:06       ` Alex Bennée
2015-04-10 13:09   ` Andrew Jones
2015-04-10 13:09     ` Andrew Jones
2015-04-10 13:09     ` Andrew Jones
2015-04-14  8:25   ` Christoffer Dall
2015-04-14  8:25     ` Christoffer Dall
2015-04-23 14:26     ` Alex Bennée
2015-04-23 14:26       ` Alex Bennée
2015-04-23 14:26       ` Alex Bennée
2015-04-27 20:04       ` Christoffer Dall
2015-04-27 20:04         ` Christoffer Dall
2015-04-27 21:57         ` Peter Maydell
2015-04-27 21:57           ` Peter Maydell
2015-04-28  8:42           ` Alex Bennée
2015-04-28  8:42             ` Alex Bennée
2015-04-28  8:42             ` Alex Bennée
2015-04-28  9:34             ` Peter Maydell
2015-04-28  9:34               ` Peter Maydell
2015-04-28 12:56               ` Christoffer Dall
2015-04-28 12:56                 ` Christoffer Dall
2015-04-28 14:37                 ` Alex Bennée
2015-04-28 14:37                   ` Alex Bennée
2015-04-28 14:37                   ` Alex Bennée
2015-04-29  8:10                   ` Christoffer Dall
2015-04-29  8:10                     ` Christoffer Dall
2015-04-29  9:18                     ` Alex Bennée
2015-04-29  9:18                       ` Alex Bennée
2015-04-29  9:18                       ` Alex Bennée
2015-04-29 10:38                       ` Christoffer Dall
2015-04-29 10:38                         ` Christoffer Dall
2015-04-29 15:08                         ` Alex Bennée
2015-04-29 15:08                           ` Alex Bennée
2015-04-29 15:08                           ` Alex Bennée
2015-04-29 19:20                           ` Christoffer Dall
2015-04-29 19:20                             ` Christoffer Dall
2015-04-21 14:42   ` Zhichao Huang
2015-04-22  9:46     ` Alex Bennée
2015-04-22  9:46       ` Alex Bennée
2015-04-22  9:46       ` Alex Bennée
2015-03-31 15:08 ` [PATCH v2 07/10] KVM: arm64: guest debug, add support for single-step Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-09 13:24   ` Andrew Jones
2015-04-09 13:24     ` Andrew Jones
2015-04-09 14:16     ` Alex Bennée
2015-04-09 14:16       ` Alex Bennée
2015-04-09 14:16       ` Alex Bennée
2015-04-14  8:27   ` Christoffer Dall
2015-04-14  8:27     ` Christoffer Dall
2015-04-14  8:27     ` Christoffer Dall
2015-03-31 15:08 ` [PATCH v2 08/10] KVM: arm64: guest debug, HW assisted debug support Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-10 12:25   ` Andrew Jones
2015-04-10 12:25     ` Andrew Jones
2015-04-10 12:25     ` Andrew Jones
2015-04-13  8:00     ` Alex Bennée
2015-04-13  8:00       ` Alex Bennée
2015-04-13  8:00       ` Alex Bennée
2015-04-14 10:23     ` Christoffer Dall
2015-04-14 10:23       ` Christoffer Dall
2015-04-14 10:17   ` Christoffer Dall
2015-04-14 10:17     ` Christoffer Dall
2015-04-14 10:17     ` Christoffer Dall
2015-03-31 15:08 ` [PATCH v2 09/10] KVM: arm64: trap nested debug register access Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-10 12:38   ` Andrew Jones
2015-04-10 12:38     ` Andrew Jones
2015-04-10 12:38     ` Andrew Jones
2015-04-13  7:59     ` Alex Bennée
2015-04-13  7:59       ` Alex Bennée
2015-04-13  7:59       ` Alex Bennée
2015-04-14 10:27       ` Christoffer Dall
2015-04-14 10:27         ` Christoffer Dall
2015-04-14 10:27         ` Christoffer Dall
2015-04-14 10:30   ` Christoffer Dall
2015-04-14 10:30     ` Christoffer Dall
2015-04-14 10:30     ` Christoffer Dall
2015-03-31 15:08 ` [PATCH v2 10/10] KVM: arm64: add trace points for guest_debug debug Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-03-31 15:08   ` Alex Bennée
2015-04-10 12:54   ` Andrew Jones
2015-04-10 12:54     ` Andrew Jones
2015-04-13  7:57     ` Alex Bennée
2015-04-13  7:57       ` Alex Bennée
2015-04-14 10:32   ` Christoffer Dall
2015-04-14 10:32     ` Christoffer Dall
2015-04-14 10:32     ` Christoffer Dall

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20150401182855.4650b14a@thinkpad-w530 \
    --to=dahi@linux.vnet.ibm.com \
    --cc=agraf@suse.de \
    --cc=alex.bennee@linaro.org \
    --cc=andre.przywara@arm.com \
    --cc=bp@suse.de \
    --cc=catalin.marinas@arm.com \
    --cc=christoffer.dall@linaro.org \
    --cc=drjones@redhat.com \
    --cc=gleb@kernel.org \
    --cc=jan.kiszka@siemens.com \
    --cc=kvm@vger.kernel.org \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux@arm.linux.org.uk \
    --cc=lorenzo.pieralisi@arm.com \
    --cc=marc.zyngier@arm.com \
    --cc=pbonzini@redhat.com \
    --cc=peter.maydell@linaro.org \
    --cc=r65777@freescale.com \
    --cc=will.deacon@arm.com \
    --cc=zhichao.huang@linaro.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.