All of lore.kernel.org
 help / color / mirror / Atom feed
From: Sean Christopherson <seanjc@google.com>
To: Marc Zyngier <maz@kernel.org>,
	Huacai Chen <chenhuacai@kernel.org>,
	 Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Paul Mackerras <paulus@ozlabs.org>,
	 Anup Patel <anup.patel@wdc.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	 Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	 Christian Borntraeger <borntraeger@de.ibm.com>,
	Janosch Frank <frankja@linux.ibm.com>,
	Paolo Bonzini <pbonzini@redhat.com>
Cc: Wanpeng Li <wanpengli@tencent.com>,
	kvm@vger.kernel.org, David Hildenbrand <david@redhat.com>,
	linux-kernel@vger.kernel.org, Atish Patra <atish.patra@wdc.com>,
	linux-riscv@lists.infradead.org,
	Claudio Imbrenda <imbrenda@linux.ibm.com>,
	kvmarm@lists.cs.columbia.edu, Joerg Roedel <joro@8bytes.org>,
	kvm-ppc@vger.kernel.org, David Matlack <dmatlack@google.com>,
	linux-arm-kernel@lists.infradead.org,
	Jim Mattson <jmattson@google.com>,
	Cornelia Huck <cohuck@redhat.com>,
	linux-mips@vger.kernel.org, kvm-riscv@lists.infradead.org,
	Vitaly Kuznetsov <vkuznets@redhat.com>
Subject: [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
Date: Fri,  8 Oct 2021 19:12:24 -0700	[thread overview]
Message-ID: <20211009021236.4122790-32-seanjc@google.com> (raw)
In-Reply-To: <20211009021236.4122790-1-seanjc@google.com>

Move the seemingly generic block_vcpu_list from kvm_vcpu to vcpu_vmx, and
rename the list and all associated variables to clarify that it tracks
the set of vCPU that need to be poked on a posted interrupt to the wakeup
vector.  The list is not used to track _all_ vCPUs that are blocking, and
the term "blocked" can be misleading as it may refer to a blocking
condition in the host or the guest, where as the PI wakeup case is
specifically for the vCPUs that are actively blocking from within the
guest.

No functional change intended.

Signed-off-by: Sean Christopherson <seanjc@google.com>
---
 arch/x86/kvm/vmx/posted_intr.c | 39 +++++++++++++++++-----------------
 arch/x86/kvm/vmx/vmx.c         |  2 ++
 arch/x86/kvm/vmx/vmx.h         |  3 +++
 include/linux/kvm_host.h       |  2 --
 virt/kvm/kvm_main.c            |  2 --
 5 files changed, 25 insertions(+), 23 deletions(-)

diff --git a/arch/x86/kvm/vmx/posted_intr.c b/arch/x86/kvm/vmx/posted_intr.c
index d2b3d75c57d1..f1bcf8c32b6d 100644
--- a/arch/x86/kvm/vmx/posted_intr.c
+++ b/arch/x86/kvm/vmx/posted_intr.c
@@ -18,7 +18,7 @@
  * wake the target vCPUs.  vCPUs are removed from the list and the notification
  * vector is reset when the vCPU is scheduled in.
  */
-static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
+static DEFINE_PER_CPU(struct list_head, wakeup_vcpus_on_cpu);
 /*
  * Protect the per-CPU list with a per-CPU spinlock to handle task migration.
  * When a blocking vCPU is awakened _and_ migrated to a different pCPU, the
@@ -26,7 +26,7 @@ static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
  * CPU.  IRQs must be disabled when taking this lock, otherwise deadlock will
  * occur if a wakeup IRQ arrives and attempts to acquire the lock.
  */
-static DEFINE_PER_CPU(spinlock_t, blocked_vcpu_on_cpu_lock);
+static DEFINE_PER_CPU(spinlock_t, wakeup_vcpus_on_cpu_lock);
 
 static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 {
@@ -36,6 +36,7 @@ static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 	unsigned int dest;
@@ -71,9 +72,9 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 	 * current pCPU if the task was migrated.
 	 */
 	if (pi_desc->nv == POSTED_INTR_WAKEUP_VECTOR) {
-		spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-		list_del(&vcpu->blocked_vcpu_list);
-		spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+		spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+		list_del(&vmx->pi_wakeup_list);
+		spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 	}
 
 	dest = cpu_physical_id(cpu);
@@ -121,15 +122,16 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 static void pi_enable_wakeup_handler(struct kvm_vcpu *vcpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 
 	local_irq_save(flags);
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-	list_add_tail(&vcpu->blocked_vcpu_list,
-		      &per_cpu(blocked_vcpu_on_cpu, vcpu->cpu));
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+	list_add_tail(&vmx->pi_wakeup_list,
+		      &per_cpu(wakeup_vcpus_on_cpu, vcpu->cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 
 	WARN(pi_desc->sn, "PI descriptor SN field set before blocking");
 
@@ -182,24 +184,23 @@ void vmx_vcpu_pi_put(struct kvm_vcpu *vcpu)
  */
 void pi_wakeup_handler(void)
 {
-	struct kvm_vcpu *vcpu;
 	int cpu = smp_processor_id();
+	struct vcpu_vmx *vmx;
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
-	list_for_each_entry(vcpu, &per_cpu(blocked_vcpu_on_cpu, cpu),
-			blocked_vcpu_list) {
-		struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
+	list_for_each_entry(vmx, &per_cpu(wakeup_vcpus_on_cpu, cpu),
+			    pi_wakeup_list) {
 
-		if (pi_test_on(pi_desc))
-			kvm_vcpu_kick(vcpu);
+		if (pi_test_on(&vmx->pi_desc))
+			kvm_vcpu_kick(&vmx->vcpu);
 	}
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 void __init pi_init_cpu(int cpu)
 {
-	INIT_LIST_HEAD(&per_cpu(blocked_vcpu_on_cpu, cpu));
-	spin_lock_init(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	INIT_LIST_HEAD(&per_cpu(wakeup_vcpus_on_cpu, cpu));
+	spin_lock_init(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 bool pi_has_pending_interrupt(struct kvm_vcpu *vcpu)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 26ed8cd1a1f2..b3bb2031a7ac 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -6848,6 +6848,8 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu)
 	BUILD_BUG_ON(offsetof(struct vcpu_vmx, vcpu) != 0);
 	vmx = to_vmx(vcpu);
 
+	INIT_LIST_HEAD(&vmx->pi_wakeup_list);
+
 	err = -ENOMEM;
 
 	vmx->vpid = allocate_vpid();
diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h
index 592217fd7d92..d1a720be9a64 100644
--- a/arch/x86/kvm/vmx/vmx.h
+++ b/arch/x86/kvm/vmx/vmx.h
@@ -298,6 +298,9 @@ struct vcpu_vmx {
 	/* Posted interrupt descriptor */
 	struct pi_desc pi_desc;
 
+	/* Used if this vCPU is waiting for PI notification wakeup. */
+	struct list_head pi_wakeup_list;
+
 	/* Support for a guest hypervisor (nested VMX) */
 	struct nested_vmx nested;
 
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 87996b22e681..c5961a361c73 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -304,8 +304,6 @@ struct kvm_vcpu {
 	u64 requests;
 	unsigned long guest_debug;
 
-	struct list_head blocked_vcpu_list;
-
 	struct mutex mutex;
 	struct kvm_run *run;
 
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 2bbf5c9d410f..c1850b60f38b 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -426,8 +426,6 @@ static void kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
 #endif
 	kvm_async_pf_vcpu_init(vcpu);
 
-	INIT_LIST_HEAD(&vcpu->blocked_vcpu_list);
-
 	kvm_vcpu_set_in_spin_loop(vcpu, false);
 	kvm_vcpu_set_dy_eligible(vcpu, false);
 	vcpu->preempted = false;
-- 
2.33.0.882.g93a45727a2-goog

_______________________________________________
kvmarm mailing list
kvmarm@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

WARNING: multiple messages have this Message-ID (diff)
From: Sean Christopherson <seanjc@google.com>
To: Marc Zyngier <maz@kernel.org>,
	Huacai Chen <chenhuacai@kernel.org>,
	Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Paul Mackerras <paulus@ozlabs.org>,
	Anup Patel <anup.patel@wdc.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	Christian Borntraeger <borntraeger@de.ibm.com>,
	Janosch Frank <frankja@linux.ibm.com>,
	Paolo Bonzini <pbonzini@redhat.com>
Cc: James Morse <james.morse@arm.com>,
	Alexandru Elisei <alexandru.elisei@arm.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>,
	Atish Patra <atish.patra@wdc.com>,
	David Hildenbrand <david@redhat.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Claudio Imbrenda <imbrenda@linux.ibm.com>,
	Sean Christopherson <seanjc@google.com>,
	Vitaly Kuznetsov <vkuznets@redhat.com>,
	Wanpeng Li <wanpengli@tencent.com>,
	Jim Mattson <jmattson@google.com>, Joerg Roedel <joro@8bytes.org>,
	linux-arm-kernel@lists.infradead.org,
	kvmarm@lists.cs.columbia.edu, linux-mips@vger.kernel.org,
	kvm@vger.kernel.org, kvm-ppc@vger.kernel.org,
	kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org,
	linux-kernel@vger.kernel.org, David Matlack <dmatlack@google.com>,
	Oliver Upton <oupton@google.com>,
	Jing Zhang <jingzhangos@google.com>
Subject: [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
Date: Fri,  8 Oct 2021 19:12:24 -0700	[thread overview]
Message-ID: <20211009021236.4122790-32-seanjc@google.com> (raw)
In-Reply-To: <20211009021236.4122790-1-seanjc@google.com>

Move the seemingly generic block_vcpu_list from kvm_vcpu to vcpu_vmx, and
rename the list and all associated variables to clarify that it tracks
the set of vCPU that need to be poked on a posted interrupt to the wakeup
vector.  The list is not used to track _all_ vCPUs that are blocking, and
the term "blocked" can be misleading as it may refer to a blocking
condition in the host or the guest, where as the PI wakeup case is
specifically for the vCPUs that are actively blocking from within the
guest.

No functional change intended.

Signed-off-by: Sean Christopherson <seanjc@google.com>
---
 arch/x86/kvm/vmx/posted_intr.c | 39 +++++++++++++++++-----------------
 arch/x86/kvm/vmx/vmx.c         |  2 ++
 arch/x86/kvm/vmx/vmx.h         |  3 +++
 include/linux/kvm_host.h       |  2 --
 virt/kvm/kvm_main.c            |  2 --
 5 files changed, 25 insertions(+), 23 deletions(-)

diff --git a/arch/x86/kvm/vmx/posted_intr.c b/arch/x86/kvm/vmx/posted_intr.c
index d2b3d75c57d1..f1bcf8c32b6d 100644
--- a/arch/x86/kvm/vmx/posted_intr.c
+++ b/arch/x86/kvm/vmx/posted_intr.c
@@ -18,7 +18,7 @@
  * wake the target vCPUs.  vCPUs are removed from the list and the notification
  * vector is reset when the vCPU is scheduled in.
  */
-static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
+static DEFINE_PER_CPU(struct list_head, wakeup_vcpus_on_cpu);
 /*
  * Protect the per-CPU list with a per-CPU spinlock to handle task migration.
  * When a blocking vCPU is awakened _and_ migrated to a different pCPU, the
@@ -26,7 +26,7 @@ static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
  * CPU.  IRQs must be disabled when taking this lock, otherwise deadlock will
  * occur if a wakeup IRQ arrives and attempts to acquire the lock.
  */
-static DEFINE_PER_CPU(spinlock_t, blocked_vcpu_on_cpu_lock);
+static DEFINE_PER_CPU(spinlock_t, wakeup_vcpus_on_cpu_lock);
 
 static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 {
@@ -36,6 +36,7 @@ static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 	unsigned int dest;
@@ -71,9 +72,9 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 	 * current pCPU if the task was migrated.
 	 */
 	if (pi_desc->nv == POSTED_INTR_WAKEUP_VECTOR) {
-		spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-		list_del(&vcpu->blocked_vcpu_list);
-		spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+		spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+		list_del(&vmx->pi_wakeup_list);
+		spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 	}
 
 	dest = cpu_physical_id(cpu);
@@ -121,15 +122,16 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 static void pi_enable_wakeup_handler(struct kvm_vcpu *vcpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 
 	local_irq_save(flags);
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-	list_add_tail(&vcpu->blocked_vcpu_list,
-		      &per_cpu(blocked_vcpu_on_cpu, vcpu->cpu));
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+	list_add_tail(&vmx->pi_wakeup_list,
+		      &per_cpu(wakeup_vcpus_on_cpu, vcpu->cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 
 	WARN(pi_desc->sn, "PI descriptor SN field set before blocking");
 
@@ -182,24 +184,23 @@ void vmx_vcpu_pi_put(struct kvm_vcpu *vcpu)
  */
 void pi_wakeup_handler(void)
 {
-	struct kvm_vcpu *vcpu;
 	int cpu = smp_processor_id();
+	struct vcpu_vmx *vmx;
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
-	list_for_each_entry(vcpu, &per_cpu(blocked_vcpu_on_cpu, cpu),
-			blocked_vcpu_list) {
-		struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
+	list_for_each_entry(vmx, &per_cpu(wakeup_vcpus_on_cpu, cpu),
+			    pi_wakeup_list) {
 
-		if (pi_test_on(pi_desc))
-			kvm_vcpu_kick(vcpu);
+		if (pi_test_on(&vmx->pi_desc))
+			kvm_vcpu_kick(&vmx->vcpu);
 	}
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 void __init pi_init_cpu(int cpu)
 {
-	INIT_LIST_HEAD(&per_cpu(blocked_vcpu_on_cpu, cpu));
-	spin_lock_init(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	INIT_LIST_HEAD(&per_cpu(wakeup_vcpus_on_cpu, cpu));
+	spin_lock_init(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 bool pi_has_pending_interrupt(struct kvm_vcpu *vcpu)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 26ed8cd1a1f2..b3bb2031a7ac 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -6848,6 +6848,8 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu)
 	BUILD_BUG_ON(offsetof(struct vcpu_vmx, vcpu) != 0);
 	vmx = to_vmx(vcpu);
 
+	INIT_LIST_HEAD(&vmx->pi_wakeup_list);
+
 	err = -ENOMEM;
 
 	vmx->vpid = allocate_vpid();
diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h
index 592217fd7d92..d1a720be9a64 100644
--- a/arch/x86/kvm/vmx/vmx.h
+++ b/arch/x86/kvm/vmx/vmx.h
@@ -298,6 +298,9 @@ struct vcpu_vmx {
 	/* Posted interrupt descriptor */
 	struct pi_desc pi_desc;
 
+	/* Used if this vCPU is waiting for PI notification wakeup. */
+	struct list_head pi_wakeup_list;
+
 	/* Support for a guest hypervisor (nested VMX) */
 	struct nested_vmx nested;
 
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 87996b22e681..c5961a361c73 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -304,8 +304,6 @@ struct kvm_vcpu {
 	u64 requests;
 	unsigned long guest_debug;
 
-	struct list_head blocked_vcpu_list;
-
 	struct mutex mutex;
 	struct kvm_run *run;
 
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 2bbf5c9d410f..c1850b60f38b 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -426,8 +426,6 @@ static void kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
 #endif
 	kvm_async_pf_vcpu_init(vcpu);
 
-	INIT_LIST_HEAD(&vcpu->blocked_vcpu_list);
-
 	kvm_vcpu_set_in_spin_loop(vcpu, false);
 	kvm_vcpu_set_dy_eligible(vcpu, false);
 	vcpu->preempted = false;
-- 
2.33.0.882.g93a45727a2-goog


WARNING: multiple messages have this Message-ID (diff)
From: Sean Christopherson <seanjc@google.com>
To: Marc Zyngier <maz@kernel.org>,
	Huacai Chen <chenhuacai@kernel.org>,
	 Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Paul Mackerras <paulus@ozlabs.org>,
	 Anup Patel <anup.patel@wdc.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	 Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	 Christian Borntraeger <borntraeger@de.ibm.com>,
	Janosch Frank <frankja@linux.ibm.com>,
	Paolo Bonzini <pbonzini@redhat.com>
Cc: James Morse <james.morse@arm.com>,
	Alexandru Elisei <alexandru.elisei@arm.com>,
	 Suzuki K Poulose <suzuki.poulose@arm.com>,
	Atish Patra <atish.patra@wdc.com>,
	 David Hildenbrand <david@redhat.com>,
	Cornelia Huck <cohuck@redhat.com>,
	 Claudio Imbrenda <imbrenda@linux.ibm.com>,
	Sean Christopherson <seanjc@google.com>,
	 Vitaly Kuznetsov <vkuznets@redhat.com>,
	Wanpeng Li <wanpengli@tencent.com>,
	 Jim Mattson <jmattson@google.com>,
	Joerg Roedel <joro@8bytes.org>,
	 linux-arm-kernel@lists.infradead.org,
	kvmarm@lists.cs.columbia.edu,  linux-mips@vger.kernel.org,
	kvm@vger.kernel.org, kvm-ppc@vger.kernel.org,
	 kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org,
	 linux-kernel@vger.kernel.org,
	David Matlack <dmatlack@google.com>,
	 Oliver Upton <oupton@google.com>,
	Jing Zhang <jingzhangos@google.com>
Subject: [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
Date: Fri,  8 Oct 2021 19:12:24 -0700	[thread overview]
Message-ID: <20211009021236.4122790-32-seanjc@google.com> (raw)
In-Reply-To: <20211009021236.4122790-1-seanjc@google.com>

Move the seemingly generic block_vcpu_list from kvm_vcpu to vcpu_vmx, and
rename the list and all associated variables to clarify that it tracks
the set of vCPU that need to be poked on a posted interrupt to the wakeup
vector.  The list is not used to track _all_ vCPUs that are blocking, and
the term "blocked" can be misleading as it may refer to a blocking
condition in the host or the guest, where as the PI wakeup case is
specifically for the vCPUs that are actively blocking from within the
guest.

No functional change intended.

Signed-off-by: Sean Christopherson <seanjc@google.com>
---
 arch/x86/kvm/vmx/posted_intr.c | 39 +++++++++++++++++-----------------
 arch/x86/kvm/vmx/vmx.c         |  2 ++
 arch/x86/kvm/vmx/vmx.h         |  3 +++
 include/linux/kvm_host.h       |  2 --
 virt/kvm/kvm_main.c            |  2 --
 5 files changed, 25 insertions(+), 23 deletions(-)

diff --git a/arch/x86/kvm/vmx/posted_intr.c b/arch/x86/kvm/vmx/posted_intr.c
index d2b3d75c57d1..f1bcf8c32b6d 100644
--- a/arch/x86/kvm/vmx/posted_intr.c
+++ b/arch/x86/kvm/vmx/posted_intr.c
@@ -18,7 +18,7 @@
  * wake the target vCPUs.  vCPUs are removed from the list and the notification
  * vector is reset when the vCPU is scheduled in.
  */
-static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
+static DEFINE_PER_CPU(struct list_head, wakeup_vcpus_on_cpu);
 /*
  * Protect the per-CPU list with a per-CPU spinlock to handle task migration.
  * When a blocking vCPU is awakened _and_ migrated to a different pCPU, the
@@ -26,7 +26,7 @@ static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
  * CPU.  IRQs must be disabled when taking this lock, otherwise deadlock will
  * occur if a wakeup IRQ arrives and attempts to acquire the lock.
  */
-static DEFINE_PER_CPU(spinlock_t, blocked_vcpu_on_cpu_lock);
+static DEFINE_PER_CPU(spinlock_t, wakeup_vcpus_on_cpu_lock);
 
 static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 {
@@ -36,6 +36,7 @@ static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 	unsigned int dest;
@@ -71,9 +72,9 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 	 * current pCPU if the task was migrated.
 	 */
 	if (pi_desc->nv == POSTED_INTR_WAKEUP_VECTOR) {
-		spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-		list_del(&vcpu->blocked_vcpu_list);
-		spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+		spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+		list_del(&vmx->pi_wakeup_list);
+		spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 	}
 
 	dest = cpu_physical_id(cpu);
@@ -121,15 +122,16 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 static void pi_enable_wakeup_handler(struct kvm_vcpu *vcpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 
 	local_irq_save(flags);
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-	list_add_tail(&vcpu->blocked_vcpu_list,
-		      &per_cpu(blocked_vcpu_on_cpu, vcpu->cpu));
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+	list_add_tail(&vmx->pi_wakeup_list,
+		      &per_cpu(wakeup_vcpus_on_cpu, vcpu->cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 
 	WARN(pi_desc->sn, "PI descriptor SN field set before blocking");
 
@@ -182,24 +184,23 @@ void vmx_vcpu_pi_put(struct kvm_vcpu *vcpu)
  */
 void pi_wakeup_handler(void)
 {
-	struct kvm_vcpu *vcpu;
 	int cpu = smp_processor_id();
+	struct vcpu_vmx *vmx;
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
-	list_for_each_entry(vcpu, &per_cpu(blocked_vcpu_on_cpu, cpu),
-			blocked_vcpu_list) {
-		struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
+	list_for_each_entry(vmx, &per_cpu(wakeup_vcpus_on_cpu, cpu),
+			    pi_wakeup_list) {
 
-		if (pi_test_on(pi_desc))
-			kvm_vcpu_kick(vcpu);
+		if (pi_test_on(&vmx->pi_desc))
+			kvm_vcpu_kick(&vmx->vcpu);
 	}
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 void __init pi_init_cpu(int cpu)
 {
-	INIT_LIST_HEAD(&per_cpu(blocked_vcpu_on_cpu, cpu));
-	spin_lock_init(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	INIT_LIST_HEAD(&per_cpu(wakeup_vcpus_on_cpu, cpu));
+	spin_lock_init(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 bool pi_has_pending_interrupt(struct kvm_vcpu *vcpu)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 26ed8cd1a1f2..b3bb2031a7ac 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -6848,6 +6848,8 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu)
 	BUILD_BUG_ON(offsetof(struct vcpu_vmx, vcpu) != 0);
 	vmx = to_vmx(vcpu);
 
+	INIT_LIST_HEAD(&vmx->pi_wakeup_list);
+
 	err = -ENOMEM;
 
 	vmx->vpid = allocate_vpid();
diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h
index 592217fd7d92..d1a720be9a64 100644
--- a/arch/x86/kvm/vmx/vmx.h
+++ b/arch/x86/kvm/vmx/vmx.h
@@ -298,6 +298,9 @@ struct vcpu_vmx {
 	/* Posted interrupt descriptor */
 	struct pi_desc pi_desc;
 
+	/* Used if this vCPU is waiting for PI notification wakeup. */
+	struct list_head pi_wakeup_list;
+
 	/* Support for a guest hypervisor (nested VMX) */
 	struct nested_vmx nested;
 
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 87996b22e681..c5961a361c73 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -304,8 +304,6 @@ struct kvm_vcpu {
 	u64 requests;
 	unsigned long guest_debug;
 
-	struct list_head blocked_vcpu_list;
-
 	struct mutex mutex;
 	struct kvm_run *run;
 
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 2bbf5c9d410f..c1850b60f38b 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -426,8 +426,6 @@ static void kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
 #endif
 	kvm_async_pf_vcpu_init(vcpu);
 
-	INIT_LIST_HEAD(&vcpu->blocked_vcpu_list);
-
 	kvm_vcpu_set_in_spin_loop(vcpu, false);
 	kvm_vcpu_set_dy_eligible(vcpu, false);
 	vcpu->preempted = false;
-- 
2.33.0.882.g93a45727a2-goog


_______________________________________________
linux-riscv mailing list
linux-riscv@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-riscv

WARNING: multiple messages have this Message-ID (diff)
From: Sean Christopherson <seanjc@google.com>
To: Marc Zyngier <maz@kernel.org>,
	Huacai Chen <chenhuacai@kernel.org>,
	 Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Paul Mackerras <paulus@ozlabs.org>,
	 Anup Patel <anup.patel@wdc.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	 Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	 Christian Borntraeger <borntraeger@de.ibm.com>,
	Janosch Frank <frankja@linux.ibm.com>,
	Paolo Bonzini <pbonzini@redhat.com>
Cc: James Morse <james.morse@arm.com>,
	Alexandru Elisei <alexandru.elisei@arm.com>,
	 Suzuki K Poulose <suzuki.poulose@arm.com>,
	Atish Patra <atish.patra@wdc.com>,
	 David Hildenbrand <david@redhat.com>,
	Cornelia Huck <cohuck@redhat.com>,
	 Claudio Imbrenda <imbrenda@linux.ibm.com>,
	Sean Christopherson <seanjc@google.com>,
	 Vitaly Kuznetsov <vkuznets@redhat.com>,
	Wanpeng Li <wanpengli@tencent.com>,
	 Jim Mattson <jmattson@google.com>,
	Joerg Roedel <joro@8bytes.org>,
	 linux-arm-kernel@lists.infradead.org,
	kvmarm@lists.cs.columbia.edu,  linux-mips@vger.kernel.org,
	kvm@vger.kernel.org, kvm-ppc@vger.kernel.org,
	 kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org,
	 linux-kernel@vger.kernel.org,
	David Matlack <dmatlack@google.com>,
	 Oliver Upton <oupton@google.com>,
	Jing Zhang <jingzhangos@google.com>
Subject: [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
Date: Fri,  8 Oct 2021 19:12:24 -0700	[thread overview]
Message-ID: <20211009021236.4122790-32-seanjc@google.com> (raw)
In-Reply-To: <20211009021236.4122790-1-seanjc@google.com>

Move the seemingly generic block_vcpu_list from kvm_vcpu to vcpu_vmx, and
rename the list and all associated variables to clarify that it tracks
the set of vCPU that need to be poked on a posted interrupt to the wakeup
vector.  The list is not used to track _all_ vCPUs that are blocking, and
the term "blocked" can be misleading as it may refer to a blocking
condition in the host or the guest, where as the PI wakeup case is
specifically for the vCPUs that are actively blocking from within the
guest.

No functional change intended.

Signed-off-by: Sean Christopherson <seanjc@google.com>
---
 arch/x86/kvm/vmx/posted_intr.c | 39 +++++++++++++++++-----------------
 arch/x86/kvm/vmx/vmx.c         |  2 ++
 arch/x86/kvm/vmx/vmx.h         |  3 +++
 include/linux/kvm_host.h       |  2 --
 virt/kvm/kvm_main.c            |  2 --
 5 files changed, 25 insertions(+), 23 deletions(-)

diff --git a/arch/x86/kvm/vmx/posted_intr.c b/arch/x86/kvm/vmx/posted_intr.c
index d2b3d75c57d1..f1bcf8c32b6d 100644
--- a/arch/x86/kvm/vmx/posted_intr.c
+++ b/arch/x86/kvm/vmx/posted_intr.c
@@ -18,7 +18,7 @@
  * wake the target vCPUs.  vCPUs are removed from the list and the notification
  * vector is reset when the vCPU is scheduled in.
  */
-static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
+static DEFINE_PER_CPU(struct list_head, wakeup_vcpus_on_cpu);
 /*
  * Protect the per-CPU list with a per-CPU spinlock to handle task migration.
  * When a blocking vCPU is awakened _and_ migrated to a different pCPU, the
@@ -26,7 +26,7 @@ static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
  * CPU.  IRQs must be disabled when taking this lock, otherwise deadlock will
  * occur if a wakeup IRQ arrives and attempts to acquire the lock.
  */
-static DEFINE_PER_CPU(spinlock_t, blocked_vcpu_on_cpu_lock);
+static DEFINE_PER_CPU(spinlock_t, wakeup_vcpus_on_cpu_lock);
 
 static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 {
@@ -36,6 +36,7 @@ static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 	unsigned int dest;
@@ -71,9 +72,9 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 	 * current pCPU if the task was migrated.
 	 */
 	if (pi_desc->nv == POSTED_INTR_WAKEUP_VECTOR) {
-		spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-		list_del(&vcpu->blocked_vcpu_list);
-		spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+		spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+		list_del(&vmx->pi_wakeup_list);
+		spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 	}
 
 	dest = cpu_physical_id(cpu);
@@ -121,15 +122,16 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 static void pi_enable_wakeup_handler(struct kvm_vcpu *vcpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 
 	local_irq_save(flags);
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-	list_add_tail(&vcpu->blocked_vcpu_list,
-		      &per_cpu(blocked_vcpu_on_cpu, vcpu->cpu));
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+	list_add_tail(&vmx->pi_wakeup_list,
+		      &per_cpu(wakeup_vcpus_on_cpu, vcpu->cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 
 	WARN(pi_desc->sn, "PI descriptor SN field set before blocking");
 
@@ -182,24 +184,23 @@ void vmx_vcpu_pi_put(struct kvm_vcpu *vcpu)
  */
 void pi_wakeup_handler(void)
 {
-	struct kvm_vcpu *vcpu;
 	int cpu = smp_processor_id();
+	struct vcpu_vmx *vmx;
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
-	list_for_each_entry(vcpu, &per_cpu(blocked_vcpu_on_cpu, cpu),
-			blocked_vcpu_list) {
-		struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
+	list_for_each_entry(vmx, &per_cpu(wakeup_vcpus_on_cpu, cpu),
+			    pi_wakeup_list) {
 
-		if (pi_test_on(pi_desc))
-			kvm_vcpu_kick(vcpu);
+		if (pi_test_on(&vmx->pi_desc))
+			kvm_vcpu_kick(&vmx->vcpu);
 	}
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 void __init pi_init_cpu(int cpu)
 {
-	INIT_LIST_HEAD(&per_cpu(blocked_vcpu_on_cpu, cpu));
-	spin_lock_init(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	INIT_LIST_HEAD(&per_cpu(wakeup_vcpus_on_cpu, cpu));
+	spin_lock_init(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 bool pi_has_pending_interrupt(struct kvm_vcpu *vcpu)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 26ed8cd1a1f2..b3bb2031a7ac 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -6848,6 +6848,8 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu)
 	BUILD_BUG_ON(offsetof(struct vcpu_vmx, vcpu) != 0);
 	vmx = to_vmx(vcpu);
 
+	INIT_LIST_HEAD(&vmx->pi_wakeup_list);
+
 	err = -ENOMEM;
 
 	vmx->vpid = allocate_vpid();
diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h
index 592217fd7d92..d1a720be9a64 100644
--- a/arch/x86/kvm/vmx/vmx.h
+++ b/arch/x86/kvm/vmx/vmx.h
@@ -298,6 +298,9 @@ struct vcpu_vmx {
 	/* Posted interrupt descriptor */
 	struct pi_desc pi_desc;
 
+	/* Used if this vCPU is waiting for PI notification wakeup. */
+	struct list_head pi_wakeup_list;
+
 	/* Support for a guest hypervisor (nested VMX) */
 	struct nested_vmx nested;
 
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 87996b22e681..c5961a361c73 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -304,8 +304,6 @@ struct kvm_vcpu {
 	u64 requests;
 	unsigned long guest_debug;
 
-	struct list_head blocked_vcpu_list;
-
 	struct mutex mutex;
 	struct kvm_run *run;
 
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 2bbf5c9d410f..c1850b60f38b 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -426,8 +426,6 @@ static void kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
 #endif
 	kvm_async_pf_vcpu_init(vcpu);
 
-	INIT_LIST_HEAD(&vcpu->blocked_vcpu_list);
-
 	kvm_vcpu_set_in_spin_loop(vcpu, false);
 	kvm_vcpu_set_dy_eligible(vcpu, false);
 	vcpu->preempted = false;
-- 
2.33.0.882.g93a45727a2-goog


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

WARNING: multiple messages have this Message-ID (diff)
From: Sean Christopherson <seanjc@google.com>
To: Marc Zyngier <maz@kernel.org>,
	Huacai Chen <chenhuacai@kernel.org>,
	Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Paul Mackerras <paulus@ozlabs.org>,
	Anup Patel <anup.patel@wdc.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	Christian Borntraeger <borntraeger@de.ibm.com>,
	Janosch Frank <frankja@linux.ibm.com>,
	Paolo Bonzini <pbonzini@redhat.com>
Cc: Wanpeng Li <wanpengli@tencent.com>,
	kvm@vger.kernel.org, David Hildenbrand <david@redhat.com>,
	linux-kernel@vger.kernel.org, Atish Patra <atish.patra@wdc.com>,
	linux-riscv@lists.infradead.org,
	Claudio Imbrenda <imbrenda@linux.ibm.com>,
	kvmarm@lists.cs.columbia.edu, Joerg Roedel <joro@8bytes.org>,
	kvm-ppc@vger.kernel.org, David Matlack <dmatlack@google.com>,
	linux-arm-kernel@lists.infradead.org,
	Jim Mattson <jmattson@google.com>,
	Cornelia Huck <cohuck@redhat.com>,
	linux-mips@vger.kernel.org, kvm-riscv@lists.infradead.org,
	Vitaly Kuznetsov <vkuznets@redhat.com>
Subject: [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
Date: Sat, 09 Oct 2021 02:12:24 +0000	[thread overview]
Message-ID: <20211009021236.4122790-32-seanjc@google.com> (raw)
In-Reply-To: <20211009021236.4122790-1-seanjc@google.com>

Move the seemingly generic block_vcpu_list from kvm_vcpu to vcpu_vmx, and
rename the list and all associated variables to clarify that it tracks
the set of vCPU that need to be poked on a posted interrupt to the wakeup
vector.  The list is not used to track _all_ vCPUs that are blocking, and
the term "blocked" can be misleading as it may refer to a blocking
condition in the host or the guest, where as the PI wakeup case is
specifically for the vCPUs that are actively blocking from within the
guest.

No functional change intended.

Signed-off-by: Sean Christopherson <seanjc@google.com>
---
 arch/x86/kvm/vmx/posted_intr.c | 39 +++++++++++++++++-----------------
 arch/x86/kvm/vmx/vmx.c         |  2 ++
 arch/x86/kvm/vmx/vmx.h         |  3 +++
 include/linux/kvm_host.h       |  2 --
 virt/kvm/kvm_main.c            |  2 --
 5 files changed, 25 insertions(+), 23 deletions(-)

diff --git a/arch/x86/kvm/vmx/posted_intr.c b/arch/x86/kvm/vmx/posted_intr.c
index d2b3d75c57d1..f1bcf8c32b6d 100644
--- a/arch/x86/kvm/vmx/posted_intr.c
+++ b/arch/x86/kvm/vmx/posted_intr.c
@@ -18,7 +18,7 @@
  * wake the target vCPUs.  vCPUs are removed from the list and the notification
  * vector is reset when the vCPU is scheduled in.
  */
-static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
+static DEFINE_PER_CPU(struct list_head, wakeup_vcpus_on_cpu);
 /*
  * Protect the per-CPU list with a per-CPU spinlock to handle task migration.
  * When a blocking vCPU is awakened _and_ migrated to a different pCPU, the
@@ -26,7 +26,7 @@ static DEFINE_PER_CPU(struct list_head, blocked_vcpu_on_cpu);
  * CPU.  IRQs must be disabled when taking this lock, otherwise deadlock will
  * occur if a wakeup IRQ arrives and attempts to acquire the lock.
  */
-static DEFINE_PER_CPU(spinlock_t, blocked_vcpu_on_cpu_lock);
+static DEFINE_PER_CPU(spinlock_t, wakeup_vcpus_on_cpu_lock);
 
 static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 {
@@ -36,6 +36,7 @@ static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu)
 void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 	unsigned int dest;
@@ -71,9 +72,9 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 	 * current pCPU if the task was migrated.
 	 */
 	if (pi_desc->nv = POSTED_INTR_WAKEUP_VECTOR) {
-		spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-		list_del(&vcpu->blocked_vcpu_list);
-		spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+		spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+		list_del(&vmx->pi_wakeup_list);
+		spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 	}
 
 	dest = cpu_physical_id(cpu);
@@ -121,15 +122,16 @@ void vmx_vcpu_pi_load(struct kvm_vcpu *vcpu, int cpu)
 static void pi_enable_wakeup_handler(struct kvm_vcpu *vcpu)
 {
 	struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	struct vcpu_vmx *vmx = to_vmx(vcpu);
 	struct pi_desc old, new;
 	unsigned long flags;
 
 	local_irq_save(flags);
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
-	list_add_tail(&vcpu->blocked_vcpu_list,
-		      &per_cpu(blocked_vcpu_on_cpu, vcpu->cpu));
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->cpu));
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
+	list_add_tail(&vmx->pi_wakeup_list,
+		      &per_cpu(wakeup_vcpus_on_cpu, vcpu->cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, vcpu->cpu));
 
 	WARN(pi_desc->sn, "PI descriptor SN field set before blocking");
 
@@ -182,24 +184,23 @@ void vmx_vcpu_pi_put(struct kvm_vcpu *vcpu)
  */
 void pi_wakeup_handler(void)
 {
-	struct kvm_vcpu *vcpu;
 	int cpu = smp_processor_id();
+	struct vcpu_vmx *vmx;
 
-	spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
-	list_for_each_entry(vcpu, &per_cpu(blocked_vcpu_on_cpu, cpu),
-			blocked_vcpu_list) {
-		struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
+	spin_lock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
+	list_for_each_entry(vmx, &per_cpu(wakeup_vcpus_on_cpu, cpu),
+			    pi_wakeup_list) {
 
-		if (pi_test_on(pi_desc))
-			kvm_vcpu_kick(vcpu);
+		if (pi_test_on(&vmx->pi_desc))
+			kvm_vcpu_kick(&vmx->vcpu);
 	}
-	spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	spin_unlock(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 void __init pi_init_cpu(int cpu)
 {
-	INIT_LIST_HEAD(&per_cpu(blocked_vcpu_on_cpu, cpu));
-	spin_lock_init(&per_cpu(blocked_vcpu_on_cpu_lock, cpu));
+	INIT_LIST_HEAD(&per_cpu(wakeup_vcpus_on_cpu, cpu));
+	spin_lock_init(&per_cpu(wakeup_vcpus_on_cpu_lock, cpu));
 }
 
 bool pi_has_pending_interrupt(struct kvm_vcpu *vcpu)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 26ed8cd1a1f2..b3bb2031a7ac 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -6848,6 +6848,8 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu)
 	BUILD_BUG_ON(offsetof(struct vcpu_vmx, vcpu) != 0);
 	vmx = to_vmx(vcpu);
 
+	INIT_LIST_HEAD(&vmx->pi_wakeup_list);
+
 	err = -ENOMEM;
 
 	vmx->vpid = allocate_vpid();
diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h
index 592217fd7d92..d1a720be9a64 100644
--- a/arch/x86/kvm/vmx/vmx.h
+++ b/arch/x86/kvm/vmx/vmx.h
@@ -298,6 +298,9 @@ struct vcpu_vmx {
 	/* Posted interrupt descriptor */
 	struct pi_desc pi_desc;
 
+	/* Used if this vCPU is waiting for PI notification wakeup. */
+	struct list_head pi_wakeup_list;
+
 	/* Support for a guest hypervisor (nested VMX) */
 	struct nested_vmx nested;
 
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 87996b22e681..c5961a361c73 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -304,8 +304,6 @@ struct kvm_vcpu {
 	u64 requests;
 	unsigned long guest_debug;
 
-	struct list_head blocked_vcpu_list;
-
 	struct mutex mutex;
 	struct kvm_run *run;
 
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 2bbf5c9d410f..c1850b60f38b 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -426,8 +426,6 @@ static void kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
 #endif
 	kvm_async_pf_vcpu_init(vcpu);
 
-	INIT_LIST_HEAD(&vcpu->blocked_vcpu_list);
-
 	kvm_vcpu_set_in_spin_loop(vcpu, false);
 	kvm_vcpu_set_dy_eligible(vcpu, false);
 	vcpu->preempted = false;
-- 
2.33.0.882.g93a45727a2-goog

  parent reply	other threads:[~2021-10-09  2:14 UTC|newest]

Thread overview: 693+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-10-09  2:11 [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul Sean Christopherson
2021-10-09  2:11 ` Sean Christopherson
2021-10-09  2:11 ` Sean Christopherson
2021-10-09  2:11 ` Sean Christopherson
2021-10-09  2:11 ` Sean Christopherson
2021-10-09  2:11 ` [PATCH v2 01/43] KVM: VMX: Don't unblock vCPU w/ Posted IRQ if IRQs are disabled in guest Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11 ` [PATCH v2 02/43] KVM: SVM: Ensure target pCPU is read once when signalling AVIC doorbell Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-25 13:21   ` Paolo Bonzini
2021-10-25 13:21     ` Paolo Bonzini
2021-10-25 13:21     ` Paolo Bonzini
2021-10-25 13:21     ` Paolo Bonzini
2021-10-25 13:21     ` Paolo Bonzini
2021-10-27  9:50   ` Maxim Levitsky
2021-10-27  9:50     ` Maxim Levitsky
2021-10-27  9:50     ` Maxim Levitsky
2021-10-27  9:50     ` Maxim Levitsky
2021-10-27  9:50     ` Maxim Levitsky
2021-10-09  2:11 ` [PATCH v2 03/43] KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11 ` [PATCH v2 04/43] KVM: Force PPC to define its own rcuwait object Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11 ` [PATCH v2 05/43] KVM: Update halt-polling stats if and only if halt-polling was attempted Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-27 10:18   ` Maxim Levitsky
2021-10-27 10:18     ` Maxim Levitsky
2021-10-27 10:18     ` Maxim Levitsky
2021-10-27 10:18     ` Maxim Levitsky
2021-10-27 10:18     ` Maxim Levitsky
2021-10-09  2:11 ` [PATCH v2 06/43] KVM: Refactor and document halt-polling stats update helper Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-09  2:11   ` Sean Christopherson
2021-10-27 10:56   ` Maxim Levitsky
2021-10-27 10:56     ` Maxim Levitsky
2021-10-27 10:56     ` Maxim Levitsky
2021-10-27 10:56     ` Maxim Levitsky
2021-10-27 10:56     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 07/43] KVM: Reconcile discrepancies in halt-polling stats Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-27 11:29   ` Maxim Levitsky
2021-10-27 11:29     ` Maxim Levitsky
2021-10-27 11:29     ` Maxim Levitsky
2021-10-27 11:29     ` Maxim Levitsky
2021-10-27 11:29     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 08/43] KVM: s390: Clear valid_wakeup in kvm_s390_handle_wait(), not in arch hook Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12 ` [PATCH v2 09/43] KVM: Drop obsolete kvm_arch_vcpu_block_finish() Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-22 15:02   ` Anup Patel
2021-10-22 15:14     ` Anup Patel
2021-10-22 15:02     ` Anup Patel
2021-10-22 15:02     ` Anup Patel
2021-10-22 15:02     ` Anup Patel
2021-10-09  2:12 ` [PATCH v2 10/43] KVM: arm64: Move vGIC v4 handling for WFI out arch callback hook Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 13:31   ` Paolo Bonzini
2021-10-25 13:31     ` Paolo Bonzini
2021-10-25 13:31     ` Paolo Bonzini
2021-10-25 13:31     ` Paolo Bonzini
2021-10-25 13:31     ` Paolo Bonzini
2021-10-26 15:41     ` Marc Zyngier
2021-10-26 15:41       ` Marc Zyngier
2021-10-26 15:41       ` Marc Zyngier
2021-10-26 15:41       ` Marc Zyngier
2021-10-26 15:41       ` Marc Zyngier
2021-10-26 16:12       ` Paolo Bonzini
2021-10-26 16:12         ` Paolo Bonzini
2021-10-26 16:12         ` Paolo Bonzini
2021-10-26 16:12         ` Paolo Bonzini
2021-10-26 16:12         ` Paolo Bonzini
2021-11-30 11:39         ` Paolo Bonzini
2021-11-30 11:39           ` Paolo Bonzini
2021-11-30 11:39           ` Paolo Bonzini
2021-11-30 11:39           ` Paolo Bonzini
2021-11-30 11:39           ` Paolo Bonzini
2021-11-30 12:04           ` Marc Zyngier
2021-11-30 12:04             ` Marc Zyngier
2021-11-30 12:04             ` Marc Zyngier
2021-11-30 12:04             ` Marc Zyngier
2021-11-30 16:07             ` Paolo Bonzini
2021-11-30 16:07               ` Paolo Bonzini
2021-11-30 16:07               ` Paolo Bonzini
2021-11-30 16:07               ` Paolo Bonzini
2021-11-30 16:07               ` Paolo Bonzini
2021-10-09  2:12 ` [PATCH v2 11/43] KVM: Don't block+unblock when halt-polling is successful Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-27 13:40   ` Maxim Levitsky
2021-10-27 13:40     ` Maxim Levitsky
2021-10-27 13:40     ` Maxim Levitsky
2021-10-27 13:40     ` Maxim Levitsky
2021-10-27 13:40     ` Maxim Levitsky
2021-11-28 22:16     ` Maxim Levitsky
2021-11-28 22:16       ` Maxim Levitsky
2021-11-28 22:16       ` Maxim Levitsky
2021-11-28 22:16       ` Maxim Levitsky
2021-11-28 22:16       ` Maxim Levitsky
2021-11-29 17:25       ` Sean Christopherson
2021-11-29 17:25         ` Sean Christopherson
2021-11-29 17:25         ` Sean Christopherson
2021-11-29 17:25         ` Sean Christopherson
2021-11-29 17:25         ` Sean Christopherson
2021-11-29 17:53         ` Paolo Bonzini
2021-11-29 17:53           ` Paolo Bonzini
2021-11-29 17:53           ` Paolo Bonzini
2021-11-29 17:53           ` Paolo Bonzini
2021-11-29 17:53           ` Paolo Bonzini
2021-11-29 18:55           ` Sean Christopherson
2021-11-29 18:55             ` Sean Christopherson
2021-11-29 18:55             ` Sean Christopherson
2021-11-29 18:55             ` Sean Christopherson
2021-11-29 18:55             ` Sean Christopherson
2021-11-29 19:18             ` Paolo Bonzini
2021-11-29 19:18               ` Paolo Bonzini
2021-11-29 19:18               ` Paolo Bonzini
2021-11-29 19:18               ` Paolo Bonzini
2021-11-29 19:18               ` Paolo Bonzini
2021-11-29 22:53               ` Maxim Levitsky
2021-11-29 22:53                 ` Maxim Levitsky
2021-11-29 22:53                 ` Maxim Levitsky
2021-11-29 22:53                 ` Maxim Levitsky
2021-11-29 22:53                 ` Maxim Levitsky
2021-12-02  0:20                 ` Maxim Levitsky
2021-12-02  0:20                   ` Maxim Levitsky
2021-12-02  0:20                   ` Maxim Levitsky
2021-12-02  0:20                   ` Maxim Levitsky
2021-12-02  0:20                   ` Maxim Levitsky
2021-12-02  1:59                   ` Sean Christopherson
2021-12-02  2:00                     ` Sean Christopherson
2021-12-02  2:00                     ` Sean Christopherson
2021-12-02  2:00                     ` Sean Christopherson
2021-12-02  2:00                     ` Sean Christopherson
2021-12-02 10:31                     ` Paolo Bonzini
2021-12-02 10:31                       ` Paolo Bonzini
2021-12-02 10:31                       ` Paolo Bonzini
2021-12-02 10:31                       ` Paolo Bonzini
2021-12-02 10:31                       ` Paolo Bonzini
2021-11-29 17:55         ` Paolo Bonzini
2021-11-29 17:55           ` Paolo Bonzini
2021-11-29 17:55           ` Paolo Bonzini
2021-11-29 17:55           ` Paolo Bonzini
2021-11-29 17:55           ` Paolo Bonzini
2021-11-29 22:55           ` Maxim Levitsky
2021-11-29 22:55             ` Maxim Levitsky
2021-11-29 22:55             ` Maxim Levitsky
2021-11-29 22:55             ` Maxim Levitsky
2021-11-29 22:55             ` Maxim Levitsky
2021-12-02 10:20         ` Maxim Levitsky
2021-12-02 10:20           ` Maxim Levitsky
2021-12-02 10:20           ` Maxim Levitsky
2021-12-02 10:20           ` Maxim Levitsky
2021-12-02 10:20           ` Maxim Levitsky
2021-12-02 10:47           ` Maxim Levitsky
2021-12-02 10:47             ` Maxim Levitsky
2021-12-02 10:47             ` Maxim Levitsky
2021-12-02 10:47             ` Maxim Levitsky
2021-12-02 10:47             ` Maxim Levitsky
2021-12-02 12:02         ` Maxim Levitsky
2021-12-02 12:02           ` Maxim Levitsky
2021-12-02 12:02           ` Maxim Levitsky
2021-12-02 12:02           ` Maxim Levitsky
2021-12-02 12:02           ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 12/43] KVM: x86: Tweak halt emulation helper names to free up kvm_vcpu_halt() Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-27 14:10   ` Maxim Levitsky
2021-10-27 14:10     ` Maxim Levitsky
2021-10-27 14:10     ` Maxim Levitsky
2021-10-27 14:10     ` Maxim Levitsky
2021-10-27 14:10     ` Maxim Levitsky
2021-10-27 14:18     ` Maxim Levitsky
2021-10-27 14:18       ` Maxim Levitsky
2021-10-27 14:18       ` Maxim Levitsky
2021-10-27 14:18       ` Maxim Levitsky
2021-10-27 14:18       ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 13/43] KVM: Rename kvm_vcpu_block() => kvm_vcpu_halt() Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-22 15:04   ` Anup Patel
2021-10-22 15:16     ` Anup Patel
2021-10-22 15:04     ` Anup Patel
2021-10-22 15:04     ` Anup Patel
2021-10-22 15:04     ` Anup Patel
2021-10-09  2:12 ` [PATCH v2 14/43] KVM: Split out a kvm_vcpu_block() helper from kvm_vcpu_halt() Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12 ` [PATCH v2 15/43] KVM: stats: Add stat to detect if vcpu is currently blocking Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12 ` [PATCH v2 16/43] KVM: Don't redo ktime_get() when calculating halt-polling stop/deadline Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 14:26   ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-27 14:35     ` Maxim Levitsky
2021-10-27 14:35       ` Maxim Levitsky
2021-10-27 14:35       ` Maxim Levitsky
2021-10-27 14:35       ` Maxim Levitsky
2021-10-27 14:35       ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 17/43] KVM: x86: Directly block (instead of "halting") UNINITIALIZED vCPUs Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-27 14:46   ` Maxim Levitsky
2021-10-27 14:46     ` Maxim Levitsky
2021-10-27 14:46     ` Maxim Levitsky
2021-10-27 14:46     ` Maxim Levitsky
2021-10-27 14:46     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 18/43] KVM: x86: Invoke kvm_vcpu_block() directly for non-HALTED wait states Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-27 15:18   ` Maxim Levitsky
2021-10-27 15:18     ` Maxim Levitsky
2021-10-27 15:18     ` Maxim Levitsky
2021-10-27 15:18     ` Maxim Levitsky
2021-10-27 15:18     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 19/43] KVM: Add helpers to wake/query blocking vCPU Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 14:06   ` Paolo Bonzini
2021-10-25 14:06     ` Paolo Bonzini
2021-10-25 14:06     ` Paolo Bonzini
2021-10-25 14:06     ` Paolo Bonzini
2021-10-25 14:06     ` Paolo Bonzini
2021-10-27 19:27   ` Maxim Levitsky
2021-10-27 19:27     ` Maxim Levitsky
2021-10-27 19:27     ` Maxim Levitsky
2021-10-27 19:27     ` Maxim Levitsky
2021-10-27 19:27     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 20/43] KVM: VMX: Skip Posted Interrupt updates if APICv is hard disabled Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 13:48   ` Paolo Bonzini
2021-10-25 13:48     ` Paolo Bonzini
2021-10-25 13:48     ` Paolo Bonzini
2021-10-25 13:48     ` Paolo Bonzini
2021-10-25 13:48     ` Paolo Bonzini
2021-10-28  9:12   ` Maxim Levitsky
2021-10-28  9:12     ` Maxim Levitsky
2021-10-28  9:12     ` Maxim Levitsky
2021-10-28  9:12     ` Maxim Levitsky
2021-10-28  9:12     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 21/43] KVM: VMX: Clean up PI pre/post-block WARNs Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 10:20   ` Maxim Levitsky
2021-10-28 10:20     ` Maxim Levitsky
2021-10-28 10:20     ` Maxim Levitsky
2021-10-28 10:20     ` Maxim Levitsky
2021-10-28 10:20     ` Maxim Levitsky
2021-10-28 15:34     ` Sean Christopherson
2021-10-28 15:34       ` Sean Christopherson
2021-10-28 15:34       ` Sean Christopherson
2021-10-28 15:34       ` Sean Christopherson
2021-10-09  2:12 ` [PATCH v2 22/43] KVM: VMX: Drop unnecessary PI logic to handle impossible conditions Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 13:53   ` Paolo Bonzini
2021-10-25 13:53     ` Paolo Bonzini
2021-10-25 13:53     ` Paolo Bonzini
2021-10-25 13:53     ` Paolo Bonzini
2021-10-25 13:53     ` Paolo Bonzini
2021-10-28 14:36   ` Maxim Levitsky
2021-10-28 14:36     ` Maxim Levitsky
2021-10-28 14:36     ` Maxim Levitsky
2021-10-28 14:36     ` Maxim Levitsky
2021-10-28 14:36     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 23/43] KVM: VMX: Use boolean returns for Posted Interrupt "test" helpers Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28  6:05   ` Maxim Levitsky
2021-10-28  6:05     ` Maxim Levitsky
2021-10-28  6:05     ` Maxim Levitsky
2021-10-28  6:05     ` Maxim Levitsky
2021-10-28  6:05     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 24/43] KVM: VMX: Drop pointless PI.NDST update when blocking Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 14:01   ` Paolo Bonzini
2021-10-25 14:01     ` Paolo Bonzini
2021-10-25 14:01     ` Paolo Bonzini
2021-10-25 14:01     ` Paolo Bonzini
2021-10-25 14:01     ` Paolo Bonzini
2021-10-27 14:26     ` Sean Christopherson
2021-10-27 14:26       ` Sean Christopherson
2021-10-27 14:26       ` Sean Christopherson
2021-10-27 14:26       ` Sean Christopherson
2021-10-28 10:53   ` Maxim Levitsky
2021-10-28 10:53     ` Maxim Levitsky
2021-10-28 10:53     ` Maxim Levitsky
2021-10-28 10:53     ` Maxim Levitsky
2021-10-28 10:53     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 25/43] KVM: VMX: Save/restore IRQs (instead of CLI/STI) during PI pre/post block Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 10:54   ` Maxim Levitsky
2021-10-28 10:54     ` Maxim Levitsky
2021-10-28 10:54     ` Maxim Levitsky
2021-10-28 10:54     ` Maxim Levitsky
2021-10-28 10:54     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 10:58   ` Maxim Levitsky
2021-10-28 10:58     ` Maxim Levitsky
2021-10-28 10:58     ` Maxim Levitsky
2021-10-28 10:58     ` Maxim Levitsky
2021-10-28 10:58     ` Maxim Levitsky
2021-10-28 15:55     ` Sean Christopherson
2021-10-28 15:55       ` Sean Christopherson
2021-10-28 15:55       ` Sean Christopherson
2021-10-28 15:55       ` Sean Christopherson
2021-10-31 22:48       ` Maxim Levitsky
2021-10-31 22:48         ` Maxim Levitsky
2021-10-31 22:48         ` Maxim Levitsky
2021-10-31 22:48         ` Maxim Levitsky
2021-10-31 22:48         ` Maxim Levitsky
2021-11-01 17:41         ` Sean Christopherson
2021-11-01 17:41           ` Sean Christopherson
2021-11-01 17:41           ` Sean Christopherson
2021-11-01 17:41           ` Sean Christopherson
2021-11-01 17:41           ` Sean Christopherson
2021-10-09  2:12 ` [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 11:28   ` Maxim Levitsky
2021-10-28 11:28     ` Maxim Levitsky
2021-10-28 11:28     ` Maxim Levitsky
2021-10-28 11:28     ` Maxim Levitsky
2021-10-28 11:28     ` Maxim Levitsky
2021-10-28 16:09     ` Maxim Levitsky
2021-10-28 16:09       ` Maxim Levitsky
2021-10-28 16:09       ` Maxim Levitsky
2021-10-28 16:09       ` Maxim Levitsky
2021-10-28 16:09       ` Maxim Levitsky
2021-10-28 16:12     ` Sean Christopherson
2021-10-28 16:12       ` Sean Christopherson
2021-10-28 16:12       ` Sean Christopherson
2021-10-28 16:12       ` Sean Christopherson
2021-10-31 22:51       ` Maxim Levitsky
2021-10-31 22:51         ` Maxim Levitsky
2021-10-31 22:51         ` Maxim Levitsky
2021-10-31 22:51         ` Maxim Levitsky
2021-10-31 22:51         ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 12:53   ` Maxim Levitsky
2021-10-28 12:53     ` Maxim Levitsky
2021-10-28 12:53     ` Maxim Levitsky
2021-10-28 12:53     ` Maxim Levitsky
2021-10-28 12:53     ` Maxim Levitsky
2021-10-28 17:19     ` Sean Christopherson
2021-10-28 17:19       ` Sean Christopherson
2021-10-28 17:19       ` Sean Christopherson
2021-10-28 17:19       ` Sean Christopherson
2021-10-31 22:52       ` Maxim Levitsky
2021-10-31 22:52         ` Maxim Levitsky
2021-10-31 22:52         ` Maxim Levitsky
2021-10-31 22:52         ` Maxim Levitsky
2021-10-31 22:52         ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 29/43] KVM: VMX: Handle PI wakeup shenanigans during vcpu_put/load Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 15:14   ` Maxim Levitsky
2021-10-28 15:14     ` Maxim Levitsky
2021-10-28 15:14     ` Maxim Levitsky
2021-10-28 15:14     ` Maxim Levitsky
2021-10-28 15:14     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 30/43] KVM: Drop unused kvm_vcpu.pre_pcpu field Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 15:16   ` Maxim Levitsky
2021-10-28 15:16     ` Maxim Levitsky
2021-10-28 15:16     ` Maxim Levitsky
2021-10-28 15:16     ` Maxim Levitsky
2021-10-28 15:16     ` Maxim Levitsky
2021-10-09  2:12 ` Sean Christopherson [this message]
2021-10-09  2:12   ` [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 15:33   ` Maxim Levitsky
2021-10-28 15:33     ` Maxim Levitsky
2021-10-28 15:33     ` Maxim Levitsky
2021-10-28 15:33     ` Maxim Levitsky
2021-10-28 15:33     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 32/43] KVM: VMX: Move preemption timer <=> hrtimer dance to common x86 Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 15:45   ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv, sw}_timer() helpers Sean Christopherson
2021-10-09  2:12   ` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv,sw}_timer() helpers Sean Christopherson
2021-10-09  2:12   ` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv, sw}_timer() helpers Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv,sw}_timer() helpers Sean Christopherson
2021-10-28 15:45   ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-28 15:45     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 34/43] KVM: x86: Remove defunct pre_block/post_block kvm_x86_ops hooks Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-28 15:46   ` Maxim Levitsky
2021-10-28 15:46     ` Maxim Levitsky
2021-10-28 15:46     ` Maxim Levitsky
2021-10-28 15:46     ` Maxim Levitsky
2021-10-28 15:46     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 14:26   ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-25 14:26     ` Paolo Bonzini
2021-10-27 15:06     ` Sean Christopherson
2021-10-27 15:06       ` Sean Christopherson
2021-10-27 15:06       ` Sean Christopherson
2021-10-27 15:06       ` Sean Christopherson
2021-10-27 15:06       ` Sean Christopherson
2021-10-27 15:36       ` Paolo Bonzini
2021-10-27 15:36         ` Paolo Bonzini
2021-10-27 15:36         ` Paolo Bonzini
2021-10-27 15:36         ` Paolo Bonzini
2021-10-27 15:36         ` Paolo Bonzini
2021-10-27 16:08         ` Sean Christopherson
2021-10-27 16:08           ` Sean Christopherson
2021-10-27 16:08           ` Sean Christopherson
2021-10-27 16:08           ` Sean Christopherson
2021-10-27 16:08           ` Sean Christopherson
2021-10-27 16:14           ` Paolo Bonzini
2021-10-27 16:14             ` Paolo Bonzini
2021-10-27 16:14             ` Paolo Bonzini
2021-10-27 16:14             ` Paolo Bonzini
2021-10-27 16:14             ` Paolo Bonzini
2021-10-28 16:12   ` Maxim Levitsky
2021-10-28 16:12     ` Maxim Levitsky
2021-10-28 16:12     ` Maxim Levitsky
2021-10-28 16:12     ` Maxim Levitsky
2021-10-28 16:12     ` Maxim Levitsky
2021-10-28 17:06     ` Sean Christopherson
2021-10-28 17:06       ` Sean Christopherson
2021-10-28 17:06       ` Sean Christopherson
2021-10-28 17:06       ` Sean Christopherson
2021-10-28 17:06       ` Sean Christopherson
2021-10-09  2:12 ` [PATCH v2 36/43] KVM: SVM: Don't bother checking for "running" AVIC when kicking for IPIs Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-31 14:50   ` Maxim Levitsky
2021-10-31 14:50     ` Maxim Levitsky
2021-10-31 14:50     ` Maxim Levitsky
2021-10-31 14:50     ` Maxim Levitsky
2021-10-31 14:50     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv) Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 14:22   ` Paolo Bonzini
2021-10-25 14:22     ` Paolo Bonzini
2021-10-25 14:22     ` Paolo Bonzini
2021-10-25 14:22     ` Paolo Bonzini
2021-10-25 14:22     ` Paolo Bonzini
2021-10-25 15:48     ` Sean Christopherson
2021-10-25 15:48       ` Sean Christopherson
2021-10-25 15:48       ` Sean Christopherson
2021-10-25 15:48       ` Sean Christopherson
2021-10-25 15:57       ` Paolo Bonzini
2021-10-25 15:57         ` Paolo Bonzini
2021-10-25 15:57         ` Paolo Bonzini
2021-10-25 15:57         ` Paolo Bonzini
2021-10-25 15:57         ` Paolo Bonzini
2021-10-25 16:00         ` Sean Christopherson
2021-10-25 16:00           ` Sean Christopherson
2021-10-25 16:00           ` Sean Christopherson
2021-10-25 16:00           ` Sean Christopherson
2021-10-31 16:34   ` Maxim Levitsky
2021-10-31 16:34     ` Maxim Levitsky
2021-10-31 16:34     ` Maxim Levitsky
2021-10-31 16:34     ` Maxim Levitsky
2021-10-31 16:34     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 38/43] KVM: Drop defunct kvm_arch_vcpu_(un)blocking() hooks Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-10 15:20   ` kernel test robot
2021-10-31 16:35   ` Maxim Levitsky
2021-10-31 16:35     ` Maxim Levitsky
2021-10-31 16:35     ` Maxim Levitsky
2021-10-31 16:35     ` Maxim Levitsky
2021-10-31 16:35     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails" Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 14:34   ` Paolo Bonzini
2021-10-25 14:34     ` Paolo Bonzini
2021-10-25 14:34     ` Paolo Bonzini
2021-10-25 14:34     ` Paolo Bonzini
2021-10-25 14:34     ` Paolo Bonzini
2021-10-27 16:04     ` Sean Christopherson
2021-10-27 16:04       ` Sean Christopherson
2021-10-27 16:04       ` Sean Christopherson
2021-10-27 16:04       ` Sean Christopherson
2021-10-27 22:09       ` Paolo Bonzini
2021-10-27 22:09         ` Paolo Bonzini
2021-10-27 22:09         ` Paolo Bonzini
2021-10-27 22:09         ` Paolo Bonzini
2021-10-27 22:09         ` Paolo Bonzini
2021-10-31 22:15         ` Maxim Levitsky
2021-10-31 22:15           ` Maxim Levitsky
2021-10-31 22:15           ` Maxim Levitsky
2021-10-31 22:15           ` Maxim Levitsky
2021-10-31 22:15           ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 40/43] KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 15:05   ` Paolo Bonzini
2021-10-25 15:05     ` Paolo Bonzini
2021-10-25 15:05     ` Paolo Bonzini
2021-10-25 15:05     ` Paolo Bonzini
2021-10-25 15:05     ` Paolo Bonzini
2021-10-27 15:30     ` Sean Christopherson
2021-10-27 15:30       ` Sean Christopherson
2021-10-27 15:30       ` Sean Christopherson
2021-10-27 15:30       ` Sean Christopherson
2021-10-31 22:19       ` Maxim Levitsky
2021-10-31 22:19         ` Maxim Levitsky
2021-10-31 22:19         ` Maxim Levitsky
2021-10-31 22:19         ` Maxim Levitsky
2021-10-31 22:19         ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 41/43] KVM: VMX: Pass desired vector instead of bool for triggering posted IRQ Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-31 22:25   ` Maxim Levitsky
2021-10-31 22:25     ` Maxim Levitsky
2021-10-31 22:25     ` Maxim Levitsky
2021-10-31 22:25     ` Maxim Levitsky
2021-10-31 22:25     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 42/43] KVM: VMX: Fold fallback path into triggering posted IRQ helper Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-31 22:30   ` Maxim Levitsky
2021-10-31 22:30     ` Maxim Levitsky
2021-10-31 22:30     ` Maxim Levitsky
2021-10-31 22:30     ` Maxim Levitsky
2021-10-31 22:30     ` Maxim Levitsky
2021-10-09  2:12 ` [PATCH v2 43/43] KVM: VMX: Don't do full kick when handling posted interrupt wakeup Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-09  2:12   ` Sean Christopherson
2021-10-25 14:16   ` Paolo Bonzini
2021-10-25 14:16     ` Paolo Bonzini
2021-10-25 14:16     ` Paolo Bonzini
2021-10-25 14:16     ` Paolo Bonzini
2021-10-25 14:16     ` Paolo Bonzini
2021-10-31 22:33     ` Maxim Levitsky
2021-10-31 22:33       ` Maxim Levitsky
2021-10-31 22:33       ` Maxim Levitsky
2021-10-31 22:33       ` Maxim Levitsky
2021-10-31 22:33       ` Maxim Levitsky
2021-10-25 14:13 ` [PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul Paolo Bonzini
2021-10-25 14:13   ` Paolo Bonzini
2021-10-25 14:13   ` Paolo Bonzini
2021-10-25 14:13   ` Paolo Bonzini
2021-10-25 14:13   ` Paolo Bonzini
2021-10-27 14:41   ` Sean Christopherson
2021-10-27 14:41     ` Sean Christopherson
2021-10-27 14:41     ` Sean Christopherson
2021-10-27 14:41     ` Sean Christopherson
2021-10-27 14:57     ` Paolo Bonzini
2021-10-27 14:57       ` Paolo Bonzini
2021-10-27 14:57       ` Paolo Bonzini
2021-10-27 14:57       ` Paolo Bonzini
2021-10-27 14:57       ` Paolo Bonzini
2021-10-27 15:28       ` Sean Christopherson
2021-10-27 15:28         ` Sean Christopherson
2021-10-27 15:28         ` Sean Christopherson
2021-10-27 15:28         ` Sean Christopherson
2021-10-27 15:37         ` Paolo Bonzini
2021-10-27 15:37           ` Paolo Bonzini
2021-10-27 15:37           ` Paolo Bonzini
2021-10-27 15:37           ` Paolo Bonzini
2021-10-27 15:37           ` Paolo Bonzini
2021-10-26  7:20 ` Christian Borntraeger
2021-10-26  7:20   ` Christian Borntraeger
2021-10-26  7:20   ` Christian Borntraeger
2021-10-26  7:20   ` Christian Borntraeger
2021-10-26  7:20   ` Christian Borntraeger
2021-10-26 14:48   ` Sean Christopherson
2021-10-26 14:48     ` Sean Christopherson
2021-10-26 14:48     ` Sean Christopherson
2021-10-26 14:48     ` Sean Christopherson
2021-10-26 18:29     ` Christian Borntraeger
2021-10-26 18:29       ` Christian Borntraeger
2021-10-26 18:29       ` Christian Borntraeger
2021-10-26 18:29       ` Christian Borntraeger
2021-10-26 18:29       ` Christian Borntraeger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20211009021236.4122790-32-seanjc@google.com \
    --to=seanjc@google.com \
    --cc=aleksandar.qemu.devel@gmail.com \
    --cc=anup.patel@wdc.com \
    --cc=aou@eecs.berkeley.edu \
    --cc=atish.patra@wdc.com \
    --cc=borntraeger@de.ibm.com \
    --cc=chenhuacai@kernel.org \
    --cc=cohuck@redhat.com \
    --cc=david@redhat.com \
    --cc=dmatlack@google.com \
    --cc=frankja@linux.ibm.com \
    --cc=imbrenda@linux.ibm.com \
    --cc=jmattson@google.com \
    --cc=joro@8bytes.org \
    --cc=kvm-ppc@vger.kernel.org \
    --cc=kvm-riscv@lists.infradead.org \
    --cc=kvm@vger.kernel.org \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mips@vger.kernel.org \
    --cc=linux-riscv@lists.infradead.org \
    --cc=maz@kernel.org \
    --cc=palmer@dabbelt.com \
    --cc=paul.walmsley@sifive.com \
    --cc=paulus@ozlabs.org \
    --cc=pbonzini@redhat.com \
    --cc=vkuznets@redhat.com \
    --cc=wanpengli@tencent.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.