All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dave Martin <Dave.Martin@arm.com>
To: Andrew Jones <drjones@redhat.com>
Cc: Okamoto Takayuki <tokamoto@jp.fujitsu.com>,
	Christoffer Dall <cdall@kernel.org>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	Marc Zyngier <marc.zyngier@arm.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	Zhang Lei <zhang.lei@jp.fujitsu.com>,
	Julien Grall <julien.grall@arm.com>,
	kvmarm@lists.cs.columbia.edu,
	linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH v7 23/27] KVM: arm64/sve: Add pseudo-register for the guest's vector lengths
Date: Fri, 5 Apr 2019 15:06:40 +0100	[thread overview]
Message-ID: <20190405140640.GC3567@e103592.cambridge.arm.com> (raw)
In-Reply-To: <20190405102204.m4depbrkn5f3btnz@kamzik.brq.redhat.com>

On Fri, Apr 05, 2019 at 12:22:04PM +0200, Andrew Jones wrote:
> On Fri, Apr 05, 2019 at 10:36:10AM +0100, Dave Martin wrote:
> > On Thu, Apr 04, 2019 at 10:31:09PM +0200, Andrew Jones wrote:
> > > On Fri, Mar 29, 2019 at 01:00:48PM +0000, Dave Martin wrote:
> > > > This patch adds a new pseudo-register KVM_REG_ARM64_SVE_VLS to
> > > > allow userspace to set and query the set of vector lengths visible
> > > > to the guest.
> > > > 
> > > > In the future, multiple register slices per SVE register may be
> > > > visible through the ioctl interface.  Once the set of slices has
> > > > been determined we would not be able to allow the vector length set
> > > > to be changed any more, in order to avoid userspace seeing
> > > > inconsistent sets of registers.  For this reason, this patch adds
> > > > support for explicit finalization of the SVE configuration via the
> > > > KVM_ARM_VCPU_FINALIZE ioctl.
> > > > 
> > > > Finalization is the proper place to allocate the SVE register state
> > > > storage in vcpu->arch.sve_state, so this patch adds that as
> > > > appropriate.  The data is freed via kvm_arch_vcpu_uninit(), which
> > > > was previously a no-op on arm64.
> > > > 
> > > > To simplify the logic for determining what vector lengths can be
> > > > supported, some code is added to KVM init to work this out, in the
> > > > kvm_arm_init_arch_resources() hook.
> > > > 
> > > > The KVM_REG_ARM64_SVE_VLS pseudo-register is not exposed yet.
> > > > Subsequent patches will allow SVE to be turned on for guest vcpus,
> > > > making it visible.
> > > > 
> > > > Signed-off-by: Dave Martin <Dave.Martin@arm.com>
> > > > Reviewed-by: Julien Thierry <julien.thierry@arm.com>
> > > > Tested-by: zhang.lei <zhang.lei@jp.fujitsu.com>
> > 
> > [...]
> > 
> > > > diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c
> > 
> > [...]
> > 
> > > > +/*
> > > > + * Finalize vcpu's maximum SVE vector length, allocating
> > > > + * vcpu->arch.sve_state as necessary.
> > > > + */
> > > > +static int kvm_vcpu_finalize_sve(struct kvm_vcpu *vcpu)
> > > > +{
> > > > +	void *buf;
> > > > +	unsigned int vl;
> > > > +
> > > > +	vl = vcpu->arch.sve_max_vl;
> > > > +
> > > > +	/*
> > > > +	 * Resposibility for these properties is shared between
> > > > +	 * kvm_arm_init_arch_resources(), kvm_vcpu_enable_sve() and
> > > > +	 * set_sve_vls().  Double-check here just to be sure:
> > > > +	 */
> > > > +	if (WARN_ON(!sve_vl_valid(vl) || vl > sve_max_virtualisable_vl ||
> > > > +		    vl > SVE_VL_ARCH_MAX))
> > > > +		return -EIO;
> > > > +
> > > > +	buf = kzalloc(SVE_SIG_REGS_SIZE(sve_vq_from_vl(vl)), GFP_KERNEL);
> > > > +	if (!buf)
> > > > +		return -ENOMEM;
> > > > +
> > > > +	vcpu->arch.sve_state = buf;
> > > > +	vcpu->arch.flags |= KVM_ARM64_VCPU_SVE_FINALIZED;
> > > > +	return 0;
> > > > +}
> > > > +
> > > > +int kvm_arm_vcpu_finalize(struct kvm_vcpu *vcpu, int what)
> > > > +{
> > > > +	switch (what) {
> > > > +	case KVM_ARM_VCPU_SVE:
> > > > +		if (!vcpu_has_sve(vcpu))
> > > > +			return -EINVAL;
> > > > +
> > > > +		if (kvm_arm_vcpu_sve_finalized(vcpu))
> > > > +			return -EPERM;
> > > > +
> > > > +		return kvm_vcpu_finalize_sve(vcpu);
> > > 
> > > In the next patch I see that we already have KVM_ARM64_GUEST_HAS_SVE
> > > set in vcpu->arch.flags at this point. So if this kvm_vcpu_finalize_sve()
> > > call fails, shouldn't we unset KVM_ARM64_GUEST_HAS_SVE and anything
> > > else used to indicate the vcpu has sve?
> > 
> > If this fails, either userspace did the wrong thing, or there was some
> > fatal error (like the ENOMEM case).  Either way, the vcpu is not runnable
> > and userspace is expected to bail out.
> > 
> > Further, KVM_ARM_VCPU_INIT fixes the set of features requested by
> > userspace: we shouldn't change the set of features under userspace's
> > feet and try to limp on somehow.  We have no means for userspace to find
> > out that some features went away in the meantime...
> > 
> > So, what would you be trying to achieve with this change?
> 
> Being able to do additional vcpu ioctls with only partially initialized
> sve (sve_state is still null, but we otherwise believe the vcpu has sve).
> That sounds risky. Although I see we only set KVM_ARM64_VCPU_SVE_FINALIZED
> when everything, like the memory allocation, succeeds, so we're probably
> fine. Indeed having KVM_ARM64_GUEST_HAS_SVE and not KVM_ARM64_VCPU_SVE_FINALIZED
> is likely the safest vcpu state for a vcpu that failed to finalize sve.

This was my rationale: every non-trivial operation that is affected by
SVE operation checks for kvm_arm_vcpu_sve_finalized(): accessing
KVM_REG_ARM64_SVE_VLS should be the only exception.

Of course, people might forget that in new code, but I think all the
major ABI code paths that are likely to exist for SVE are already there
now.

Does this sound OK, or do you still have concerns?

Clearing KVM_ARM64_GUEST_HAS_SVE could be done on finalization failure;
it just feels a bit weird.

Cheers
---Dave

WARNING: multiple messages have this Message-ID (diff)
From: Dave Martin <Dave.Martin@arm.com>
To: Andrew Jones <drjones@redhat.com>
Cc: Okamoto Takayuki <tokamoto@jp.fujitsu.com>,
	Christoffer Dall <cdall@kernel.org>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	Marc Zyngier <marc.zyngier@arm.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	Zhang Lei <zhang.lei@jp.fujitsu.com>,
	Julien Grall <julien.grall@arm.com>,
	kvmarm@lists.cs.columbia.edu,
	linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH v7 23/27] KVM: arm64/sve: Add pseudo-register for the guest's vector lengths
Date: Fri, 5 Apr 2019 15:06:40 +0100	[thread overview]
Message-ID: <20190405140640.GC3567@e103592.cambridge.arm.com> (raw)
In-Reply-To: <20190405102204.m4depbrkn5f3btnz@kamzik.brq.redhat.com>

On Fri, Apr 05, 2019 at 12:22:04PM +0200, Andrew Jones wrote:
> On Fri, Apr 05, 2019 at 10:36:10AM +0100, Dave Martin wrote:
> > On Thu, Apr 04, 2019 at 10:31:09PM +0200, Andrew Jones wrote:
> > > On Fri, Mar 29, 2019 at 01:00:48PM +0000, Dave Martin wrote:
> > > > This patch adds a new pseudo-register KVM_REG_ARM64_SVE_VLS to
> > > > allow userspace to set and query the set of vector lengths visible
> > > > to the guest.
> > > > 
> > > > In the future, multiple register slices per SVE register may be
> > > > visible through the ioctl interface.  Once the set of slices has
> > > > been determined we would not be able to allow the vector length set
> > > > to be changed any more, in order to avoid userspace seeing
> > > > inconsistent sets of registers.  For this reason, this patch adds
> > > > support for explicit finalization of the SVE configuration via the
> > > > KVM_ARM_VCPU_FINALIZE ioctl.
> > > > 
> > > > Finalization is the proper place to allocate the SVE register state
> > > > storage in vcpu->arch.sve_state, so this patch adds that as
> > > > appropriate.  The data is freed via kvm_arch_vcpu_uninit(), which
> > > > was previously a no-op on arm64.
> > > > 
> > > > To simplify the logic for determining what vector lengths can be
> > > > supported, some code is added to KVM init to work this out, in the
> > > > kvm_arm_init_arch_resources() hook.
> > > > 
> > > > The KVM_REG_ARM64_SVE_VLS pseudo-register is not exposed yet.
> > > > Subsequent patches will allow SVE to be turned on for guest vcpus,
> > > > making it visible.
> > > > 
> > > > Signed-off-by: Dave Martin <Dave.Martin@arm.com>
> > > > Reviewed-by: Julien Thierry <julien.thierry@arm.com>
> > > > Tested-by: zhang.lei <zhang.lei@jp.fujitsu.com>
> > 
> > [...]
> > 
> > > > diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c
> > 
> > [...]
> > 
> > > > +/*
> > > > + * Finalize vcpu's maximum SVE vector length, allocating
> > > > + * vcpu->arch.sve_state as necessary.
> > > > + */
> > > > +static int kvm_vcpu_finalize_sve(struct kvm_vcpu *vcpu)
> > > > +{
> > > > +	void *buf;
> > > > +	unsigned int vl;
> > > > +
> > > > +	vl = vcpu->arch.sve_max_vl;
> > > > +
> > > > +	/*
> > > > +	 * Resposibility for these properties is shared between
> > > > +	 * kvm_arm_init_arch_resources(), kvm_vcpu_enable_sve() and
> > > > +	 * set_sve_vls().  Double-check here just to be sure:
> > > > +	 */
> > > > +	if (WARN_ON(!sve_vl_valid(vl) || vl > sve_max_virtualisable_vl ||
> > > > +		    vl > SVE_VL_ARCH_MAX))
> > > > +		return -EIO;
> > > > +
> > > > +	buf = kzalloc(SVE_SIG_REGS_SIZE(sve_vq_from_vl(vl)), GFP_KERNEL);
> > > > +	if (!buf)
> > > > +		return -ENOMEM;
> > > > +
> > > > +	vcpu->arch.sve_state = buf;
> > > > +	vcpu->arch.flags |= KVM_ARM64_VCPU_SVE_FINALIZED;
> > > > +	return 0;
> > > > +}
> > > > +
> > > > +int kvm_arm_vcpu_finalize(struct kvm_vcpu *vcpu, int what)
> > > > +{
> > > > +	switch (what) {
> > > > +	case KVM_ARM_VCPU_SVE:
> > > > +		if (!vcpu_has_sve(vcpu))
> > > > +			return -EINVAL;
> > > > +
> > > > +		if (kvm_arm_vcpu_sve_finalized(vcpu))
> > > > +			return -EPERM;
> > > > +
> > > > +		return kvm_vcpu_finalize_sve(vcpu);
> > > 
> > > In the next patch I see that we already have KVM_ARM64_GUEST_HAS_SVE
> > > set in vcpu->arch.flags at this point. So if this kvm_vcpu_finalize_sve()
> > > call fails, shouldn't we unset KVM_ARM64_GUEST_HAS_SVE and anything
> > > else used to indicate the vcpu has sve?
> > 
> > If this fails, either userspace did the wrong thing, or there was some
> > fatal error (like the ENOMEM case).  Either way, the vcpu is not runnable
> > and userspace is expected to bail out.
> > 
> > Further, KVM_ARM_VCPU_INIT fixes the set of features requested by
> > userspace: we shouldn't change the set of features under userspace's
> > feet and try to limp on somehow.  We have no means for userspace to find
> > out that some features went away in the meantime...
> > 
> > So, what would you be trying to achieve with this change?
> 
> Being able to do additional vcpu ioctls with only partially initialized
> sve (sve_state is still null, but we otherwise believe the vcpu has sve).
> That sounds risky. Although I see we only set KVM_ARM64_VCPU_SVE_FINALIZED
> when everything, like the memory allocation, succeeds, so we're probably
> fine. Indeed having KVM_ARM64_GUEST_HAS_SVE and not KVM_ARM64_VCPU_SVE_FINALIZED
> is likely the safest vcpu state for a vcpu that failed to finalize sve.

This was my rationale: every non-trivial operation that is affected by
SVE operation checks for kvm_arm_vcpu_sve_finalized(): accessing
KVM_REG_ARM64_SVE_VLS should be the only exception.

Of course, people might forget that in new code, but I think all the
major ABI code paths that are likely to exist for SVE are already there
now.

Does this sound OK, or do you still have concerns?

Clearing KVM_ARM64_GUEST_HAS_SVE could be done on finalization failure;
it just feels a bit weird.

Cheers
---Dave

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2019-04-05 14:06 UTC|newest]

Thread overview: 224+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-03-29 13:00 [PATCH v7 00/27] KVM: arm64: SVE guest support Dave Martin
2019-03-29 13:00 ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 01/27] KVM: Documentation: Document arm64 core registers in detail Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-24  9:25   ` Alex Bennée
2019-04-24  9:25     ` Alex Bennée
2019-03-29 13:00 ` [PATCH v7 02/27] arm64: fpsimd: Always set TIF_FOREIGN_FPSTATE on task state flush Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 03/27] KVM: arm64: Delete orphaned declaration for __fpsimd_enabled() Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 04/27] KVM: arm64: Refactor kvm_arm_num_regs() for easier maintenance Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 05/27] KVM: arm64: Add missing #includes to kvm_host.h Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 06/27] arm64/sve: Clarify role of the VQ map maintenance functions Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 21:21   ` Andrew Jones
2019-04-04 21:21     ` Andrew Jones
2019-03-29 13:00 ` [PATCH v7 07/27] arm64/sve: Check SVE virtualisability Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 21:21   ` Andrew Jones
2019-04-04 21:21     ` Andrew Jones
2019-04-05  9:35     ` Dave Martin
2019-04-05  9:35       ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 08/27] arm64/sve: Enable SVE state tracking for non-task contexts Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 09/27] KVM: arm64: Add a vcpu flag to control SVE visibility for the guest Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-03 19:14   ` Andrew Jones
2019-04-03 19:14     ` Andrew Jones
2019-04-04  3:17     ` Marc Zyngier
2019-04-04  3:17       ` Marc Zyngier
2019-04-04  7:53       ` Dave Martin
2019-04-04  7:53         ` Dave Martin
2019-04-04 21:15   ` Andrew Jones
2019-04-04 21:15     ` Andrew Jones
2019-03-29 13:00 ` [PATCH v7 10/27] KVM: arm64: Propagate vcpu into read_id_reg() Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 21:15   ` Andrew Jones
2019-04-04 21:15     ` Andrew Jones
2019-03-29 13:00 ` [PATCH v7 11/27] KVM: arm64: Support runtime sysreg visibility filtering Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-03 19:17   ` Andrew Jones
2019-04-03 19:17     ` Andrew Jones
2019-04-24  9:39   ` Alex Bennée
2019-04-24  9:39     ` Alex Bennée
2019-04-24 13:47     ` Dave Martin
2019-04-24 13:47       ` Dave Martin
2019-04-24 13:47       ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 12/27] KVM: arm64/sve: System register context switch and access support Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-03 19:39   ` Andrew Jones
2019-04-03 19:39     ` Andrew Jones
2019-04-04  8:06     ` Dave Martin
2019-04-04  8:06       ` Dave Martin
2019-04-04  8:32       ` Andrew Jones
2019-04-04  8:32         ` Andrew Jones
2019-04-04  8:47         ` Dave Martin
2019-04-04  8:47           ` Dave Martin
2019-04-04  8:59   ` Andrew Jones
2019-04-04  8:59     ` Andrew Jones
2019-04-24 15:21   ` Alex Bennée
2019-04-24 15:21     ` Alex Bennée
2019-04-25 13:28     ` Dave Martin
2019-04-25 13:28       ` Dave Martin
2019-04-25 13:28       ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 13/27] KVM: arm64/sve: Context switch the SVE registers Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-03 20:01   ` Andrew Jones
2019-04-03 20:01     ` Andrew Jones
2019-04-04  8:10     ` Dave Martin
2019-04-04  8:10       ` Dave Martin
2019-04-04  8:35       ` Andrew Jones
2019-04-04  8:35         ` Andrew Jones
2019-04-04  8:36         ` Dave Martin
2019-04-04  8:36           ` Dave Martin
2019-04-24 14:51           ` Alex Bennée
2019-04-24 14:51             ` Alex Bennée
2019-04-25 13:35             ` Dave Martin
2019-04-25 13:35               ` Dave Martin
2019-04-25 13:35               ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 14/27] KVM: Allow 2048-bit register access via ioctl interface Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 21:11   ` Andrew Jones
2019-04-04 21:11     ` Andrew Jones
2019-03-29 13:00 ` [PATCH v7 15/27] KVM: arm64: Add missing #include of <linux/string.h> in guest.c Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 16/27] KVM: arm64: Factor out core register ID enumeration Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-02  2:41   ` Marc Zyngier
2019-04-02  2:41     ` Marc Zyngier
2019-04-02  8:59     ` Dave Martin
2019-04-02  8:59       ` Dave Martin
2019-04-02  9:32       ` Marc Zyngier
2019-04-02  9:32         ` Marc Zyngier
2019-04-02  9:54         ` Dave P Martin
2019-04-02  9:54           ` Dave P Martin
2019-03-29 13:00 ` [PATCH v7 17/27] KVM: arm64: Reject ioctl access to FPSIMD V-regs on SVE vcpus Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-03 20:15   ` Andrew Jones
2019-04-03 20:15     ` Andrew Jones
2019-04-24 13:45   ` Alex Bennée
2019-04-24 13:45     ` Alex Bennée
2019-03-29 13:00 ` [PATCH v7 18/27] KVM: arm64/sve: Add SVE support to register access ioctl interface Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 13:57   ` Andrew Jones
2019-04-04 13:57     ` Andrew Jones
2019-04-04 14:50     ` Dave Martin
2019-04-04 14:50       ` Dave Martin
2019-04-04 16:25       ` Andrew Jones
2019-04-04 16:25         ` Andrew Jones
2019-04-04 16:56         ` Dave Martin
2019-04-04 16:56           ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 19/27] KVM: arm64: Enumerate SVE register indices for KVM_GET_REG_LIST Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 14:08   ` Andrew Jones
2019-04-04 14:08     ` Andrew Jones
2019-04-05  9:35     ` Dave Martin
2019-04-05  9:35       ` Dave Martin
2019-04-05  9:45       ` Andrew Jones
2019-04-05  9:45         ` Andrew Jones
2019-04-05 11:11         ` Dave Martin
2019-04-05 11:11           ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 20/27] arm64/sve: In-kernel vector length availability query interface Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 14:20   ` Andrew Jones
2019-04-04 14:20     ` Andrew Jones
2019-04-05  9:35     ` Dave Martin
2019-04-05  9:35       ` Dave Martin
2019-04-05  9:54       ` Andrew Jones
2019-04-05  9:54         ` Andrew Jones
2019-04-05 11:13         ` Dave Martin
2019-04-05 11:13           ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 21/27] KVM: arm/arm64: Add hook for arch-specific KVM initialisation Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 14:25   ` Andrew Jones
2019-04-04 14:25     ` Andrew Jones
2019-04-04 14:53     ` Dave Martin
2019-04-04 14:53       ` Dave Martin
2019-04-04 16:33       ` Andrew Jones
2019-04-04 16:33         ` Andrew Jones
2019-04-05  9:36         ` Dave Martin
2019-04-05  9:36           ` Dave Martin
2019-04-05 10:40           ` Andrew Jones
2019-04-05 10:40             ` Andrew Jones
2019-04-05 11:14             ` Dave Martin
2019-04-05 11:14               ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 22/27] KVM: arm/arm64: Add KVM_ARM_VCPU_FINALIZE ioctl Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 15:07   ` Andrew Jones
2019-04-04 15:07     ` Andrew Jones
2019-04-04 16:47     ` Dave Martin
2019-04-04 16:47       ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 23/27] KVM: arm64/sve: Add pseudo-register for the guest's vector lengths Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 20:18   ` Andrew Jones
2019-04-04 20:18     ` Andrew Jones
2019-04-05  9:36     ` Dave Martin
2019-04-05  9:36       ` Dave Martin
2019-04-05 10:14       ` Andrew Jones
2019-04-05 10:14         ` Andrew Jones
2019-04-05 12:54         ` Dave Martin
2019-04-05 12:54           ` Dave Martin
2019-04-05 15:33           ` Andrew Jones
2019-04-05 15:33             ` Andrew Jones
2019-04-10 12:42             ` Dave Martin
2019-04-10 12:42               ` Dave Martin
2019-04-10 12:42               ` Dave Martin
2019-04-04 20:31   ` Andrew Jones
2019-04-04 20:31     ` Andrew Jones
2019-04-05  9:36     ` Dave Martin
2019-04-05  9:36       ` Dave Martin
2019-04-05 10:22       ` Andrew Jones
2019-04-05 10:22         ` Andrew Jones
2019-04-05 14:06         ` Dave Martin [this message]
2019-04-05 14:06           ` Dave Martin
2019-04-05 15:41           ` Andrew Jones
2019-04-05 15:41             ` Andrew Jones
2019-04-10 12:35             ` Dave Martin
2019-04-10 12:35               ` Dave Martin
2019-04-10 12:35               ` Dave Martin
2019-03-29 13:00 ` [PATCH v7 24/27] KVM: arm64/sve: Allow userspace to enable SVE for vcpus Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 20:36   ` Andrew Jones
2019-04-04 20:36     ` Andrew Jones
2019-03-29 13:00 ` [PATCH v7 25/27] KVM: arm64: Add a capability to advertise SVE support Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 20:39   ` Andrew Jones
2019-04-04 20:39     ` Andrew Jones
2019-03-29 13:00 ` [PATCH v7 26/27] KVM: Document errors for KVM_GET_ONE_REG and KVM_SET_ONE_REG Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-03 20:27   ` Andrew Jones
2019-04-03 20:27     ` Andrew Jones
2019-04-04  8:35     ` Dave Martin
2019-04-04  8:35       ` Dave Martin
2019-04-04  9:34       ` Andrew Jones
2019-04-04  9:34         ` Andrew Jones
2019-04-04  9:38         ` Dave P Martin
2019-04-04  9:38           ` Dave P Martin
2019-04-04  9:45           ` Andrew Jones
2019-04-04  9:45             ` Andrew Jones
2019-03-29 13:00 ` [PATCH v7 27/27] KVM: arm64/sve: Document KVM API extensions for SVE Dave Martin
2019-03-29 13:00   ` Dave Martin
2019-04-04 21:09   ` Andrew Jones
2019-04-04 21:09     ` Andrew Jones
2019-04-05  9:36     ` Dave Martin
2019-04-05  9:36       ` Dave Martin
2019-04-05 10:39       ` Andrew Jones
2019-04-05 10:39         ` Andrew Jones
2019-04-05 13:00         ` Dave Martin
2019-04-05 13:00           ` Dave Martin
2019-04-05 15:38           ` Andrew Jones
2019-04-05 15:38             ` Andrew Jones
2019-04-10 12:34             ` Dave Martin
2019-04-10 12:34               ` Dave Martin
2019-04-10 12:34               ` Dave Martin
2019-03-29 14:56 ` [PATCH v7 00/27] KVM: arm64: SVE guest support Marc Zyngier
2019-03-29 14:56   ` Marc Zyngier
2019-03-29 15:06   ` Dave Martin
2019-03-29 15:06     ` Dave Martin
2019-04-05 16:41 ` Dave Martin
2019-04-05 16:41   ` Dave Martin
2019-04-25 10:33 ` Alex Bennée
2019-04-25 10:33   ` Alex Bennée

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190405140640.GC3567@e103592.cambridge.arm.com \
    --to=dave.martin@arm.com \
    --cc=ard.biesheuvel@linaro.org \
    --cc=catalin.marinas@arm.com \
    --cc=cdall@kernel.org \
    --cc=drjones@redhat.com \
    --cc=julien.grall@arm.com \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=marc.zyngier@arm.com \
    --cc=tokamoto@jp.fujitsu.com \
    --cc=will.deacon@arm.com \
    --cc=zhang.lei@jp.fujitsu.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.