All of lore.kernel.org
 help / color / mirror / Atom feed
From: Zenghui Yu <yuzenghui@huawei.com>
To: Marc Zyngier <maz@kernel.org>
Cc: <linux-arm-kernel@lists.infradead.org>,
	<kvmarm@lists.cs.columbia.edu>, <kvm@vger.kernel.org>,
	<linux-kernel@vger.kernel.org>,
	Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>,
	Jason Cooper <jason@lakedaemon.net>,
	"Robert Richter" <rrichter@marvell.com>,
	Thomas Gleixner <tglx@linutronix.de>,
	"Eric Auger" <eric.auger@redhat.com>,
	James Morse <james.morse@arm.com>,
	"Julien Thierry" <julien.thierry.kdev@gmail.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>
Subject: Re: [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
Date: Mon, 23 Mar 2020 16:11:00 +0800	[thread overview]
Message-ID: <cf5d7cf3-076f-47a7-83cf-717a619dc13e@huawei.com> (raw)
In-Reply-To: <256b58a9679412c96600217f316f424f@kernel.org>

Hi Marc,

On 2020/3/20 17:01, Marc Zyngier wrote:
> Hi Zenghui,
> 
> On 2020-03-20 03:53, Zenghui Yu wrote:
>> Hi Marc,
>>
>> On 2020/3/19 20:10, Marc Zyngier wrote:
>>>> But I wonder that should we use nassgireq to *only* keep track what
>>>> the guest had written into the GICD_CTLR.nASSGIreq.  If not, we may
>>>> lose the guest-request bit after migration among hosts with different
>>>> has_gicv4_1 settings.
>>>
>>> I'm unsure of what you're suggesting here. If userspace tries to set
>>> GICD_CTLR.nASSGIreq on a non-4.1 host, this bit will not latch.
>>
>> This is exactly what I *was* concerning about.
>>
>>> Userspace can check that at restore time. Or we could fail the
>>> userspace write, which is a bit odd (the bit is otherwise RES0).
>>>
>>> Could you clarify your proposal?
>>
>> Let's assume two hosts below. 'has_gicv4_1' is true on host-A while
>> it is false on host-B because of lack of HW support or the kernel
>> parameter "kvm-arm.vgic_v4_enable=0".
>>
>> If we migrate guest through A->B->A, we may end-up lose the initial
>> guest-request "nASSGIreq=1" and don't use direct vSGI delivery for
>> this guest when it's migrated back to host-A.
> 
> My point above is that we shouldn't allow the A->B migration the first
> place, and fail it as quickly as possible. We don't know what the guest
> has observed in terms of GIC capability, and it may not have enabled the
> new flavour of SGIs just yet.

Indeed. I didn't realize it.

> 
>> This can be "fixed" by keep track of what guest had written into
>> nASSGIreq. And we need to evaluate the need for using direct vSGI
>> for a specified guest by 'has_gicv4_1 && nassgireq'.
> 
> It feels odd. It means we have more state than the HW normally has.
> I have an alternative proposal, see below.
> 
>> But if it's expected that "if userspace tries to set nASSGIreq on
>> a non-4.1 host, this bit will not latch", then this shouldn't be
>> a problem at all.
> 
> Well, that is the semantics of the RES0 bit. It applies from both
> guest and userspace.
> 
> And actually, maybe we can handle that pretty cheaply. If userspace
> tries to restore GICD_TYPER2 to a value that isn't what KVM can
> offer, we just return an error. Exactly like we do for GICD_IIDR.
> Hence the following patch:
> 
> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c 
> b/virt/kvm/arm/vgic/vgic-mmio-v3.c
> index 28b639fd1abc..e72dcc454247 100644
> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c
> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c
> @@ -156,6 +156,7 @@ static int vgic_mmio_uaccess_write_v3_misc(struct 
> kvm_vcpu *vcpu,
>       struct vgic_dist *dist = &vcpu->kvm->arch.vgic;
> 
>       switch (addr & 0x0c) {
> +    case GICD_TYPER2:
>       case GICD_IIDR:
>           if (val != vgic_mmio_read_v3_misc(vcpu, addr, len))
>               return -EINVAL;
> 
> Being a RO register, writing something that isn't compatible with the
> possible behaviour of the hypervisor will just return an error.

This is really a nice point to address my concern! I'm happy to see
this in v6 now.

> 
> What do you think?

I agreed with you, with a bit nervous though. Some old guests (which
have no knowledge about GICv4.1 vSGIs and don't care about nASSGIcap
at all) will also fail to migrate from A to B, just because now we
present two different (unused) GICD_TYPER2 registers to them.

Is it a little unfair to them :-) ?


Thanks,
Zenghui


WARNING: multiple messages have this Message-ID (diff)
From: Zenghui Yu <yuzenghui@huawei.com>
To: Marc Zyngier <maz@kernel.org>
Cc: Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>,
	Jason Cooper <jason@lakedaemon.net>,
	kvm@vger.kernel.org, linux-kernel@vger.kernel.org,
	Robert Richter <rrichter@marvell.com>,
	Thomas Gleixner <tglx@linutronix.de>,
	kvmarm@lists.cs.columbia.edu,
	linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
Date: Mon, 23 Mar 2020 16:11:00 +0800	[thread overview]
Message-ID: <cf5d7cf3-076f-47a7-83cf-717a619dc13e@huawei.com> (raw)
In-Reply-To: <256b58a9679412c96600217f316f424f@kernel.org>

Hi Marc,

On 2020/3/20 17:01, Marc Zyngier wrote:
> Hi Zenghui,
> 
> On 2020-03-20 03:53, Zenghui Yu wrote:
>> Hi Marc,
>>
>> On 2020/3/19 20:10, Marc Zyngier wrote:
>>>> But I wonder that should we use nassgireq to *only* keep track what
>>>> the guest had written into the GICD_CTLR.nASSGIreq.  If not, we may
>>>> lose the guest-request bit after migration among hosts with different
>>>> has_gicv4_1 settings.
>>>
>>> I'm unsure of what you're suggesting here. If userspace tries to set
>>> GICD_CTLR.nASSGIreq on a non-4.1 host, this bit will not latch.
>>
>> This is exactly what I *was* concerning about.
>>
>>> Userspace can check that at restore time. Or we could fail the
>>> userspace write, which is a bit odd (the bit is otherwise RES0).
>>>
>>> Could you clarify your proposal?
>>
>> Let's assume two hosts below. 'has_gicv4_1' is true on host-A while
>> it is false on host-B because of lack of HW support or the kernel
>> parameter "kvm-arm.vgic_v4_enable=0".
>>
>> If we migrate guest through A->B->A, we may end-up lose the initial
>> guest-request "nASSGIreq=1" and don't use direct vSGI delivery for
>> this guest when it's migrated back to host-A.
> 
> My point above is that we shouldn't allow the A->B migration the first
> place, and fail it as quickly as possible. We don't know what the guest
> has observed in terms of GIC capability, and it may not have enabled the
> new flavour of SGIs just yet.

Indeed. I didn't realize it.

> 
>> This can be "fixed" by keep track of what guest had written into
>> nASSGIreq. And we need to evaluate the need for using direct vSGI
>> for a specified guest by 'has_gicv4_1 && nassgireq'.
> 
> It feels odd. It means we have more state than the HW normally has.
> I have an alternative proposal, see below.
> 
>> But if it's expected that "if userspace tries to set nASSGIreq on
>> a non-4.1 host, this bit will not latch", then this shouldn't be
>> a problem at all.
> 
> Well, that is the semantics of the RES0 bit. It applies from both
> guest and userspace.
> 
> And actually, maybe we can handle that pretty cheaply. If userspace
> tries to restore GICD_TYPER2 to a value that isn't what KVM can
> offer, we just return an error. Exactly like we do for GICD_IIDR.
> Hence the following patch:
> 
> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c 
> b/virt/kvm/arm/vgic/vgic-mmio-v3.c
> index 28b639fd1abc..e72dcc454247 100644
> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c
> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c
> @@ -156,6 +156,7 @@ static int vgic_mmio_uaccess_write_v3_misc(struct 
> kvm_vcpu *vcpu,
>       struct vgic_dist *dist = &vcpu->kvm->arch.vgic;
> 
>       switch (addr & 0x0c) {
> +    case GICD_TYPER2:
>       case GICD_IIDR:
>           if (val != vgic_mmio_read_v3_misc(vcpu, addr, len))
>               return -EINVAL;
> 
> Being a RO register, writing something that isn't compatible with the
> possible behaviour of the hypervisor will just return an error.

This is really a nice point to address my concern! I'm happy to see
this in v6 now.

> 
> What do you think?

I agreed with you, with a bit nervous though. Some old guests (which
have no knowledge about GICv4.1 vSGIs and don't care about nASSGIcap
at all) will also fail to migrate from A to B, just because now we
present two different (unused) GICD_TYPER2 registers to them.

Is it a little unfair to them :-) ?


Thanks,
Zenghui

_______________________________________________
kvmarm mailing list
kvmarm@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

WARNING: multiple messages have this Message-ID (diff)
From: Zenghui Yu <yuzenghui@huawei.com>
To: Marc Zyngier <maz@kernel.org>
Cc: Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>,
	Jason Cooper <jason@lakedaemon.net>,
	kvm@vger.kernel.org, Suzuki K Poulose <suzuki.poulose@arm.com>,
	linux-kernel@vger.kernel.org, Eric Auger <eric.auger@redhat.com>,
	Robert Richter <rrichter@marvell.com>,
	James Morse <james.morse@arm.com>,
	Julien Thierry <julien.thierry.kdev@gmail.com>,
	Thomas Gleixner <tglx@linutronix.de>,
	kvmarm@lists.cs.columbia.edu,
	linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
Date: Mon, 23 Mar 2020 16:11:00 +0800	[thread overview]
Message-ID: <cf5d7cf3-076f-47a7-83cf-717a619dc13e@huawei.com> (raw)
In-Reply-To: <256b58a9679412c96600217f316f424f@kernel.org>

Hi Marc,

On 2020/3/20 17:01, Marc Zyngier wrote:
> Hi Zenghui,
> 
> On 2020-03-20 03:53, Zenghui Yu wrote:
>> Hi Marc,
>>
>> On 2020/3/19 20:10, Marc Zyngier wrote:
>>>> But I wonder that should we use nassgireq to *only* keep track what
>>>> the guest had written into the GICD_CTLR.nASSGIreq.  If not, we may
>>>> lose the guest-request bit after migration among hosts with different
>>>> has_gicv4_1 settings.
>>>
>>> I'm unsure of what you're suggesting here. If userspace tries to set
>>> GICD_CTLR.nASSGIreq on a non-4.1 host, this bit will not latch.
>>
>> This is exactly what I *was* concerning about.
>>
>>> Userspace can check that at restore time. Or we could fail the
>>> userspace write, which is a bit odd (the bit is otherwise RES0).
>>>
>>> Could you clarify your proposal?
>>
>> Let's assume two hosts below. 'has_gicv4_1' is true on host-A while
>> it is false on host-B because of lack of HW support or the kernel
>> parameter "kvm-arm.vgic_v4_enable=0".
>>
>> If we migrate guest through A->B->A, we may end-up lose the initial
>> guest-request "nASSGIreq=1" and don't use direct vSGI delivery for
>> this guest when it's migrated back to host-A.
> 
> My point above is that we shouldn't allow the A->B migration the first
> place, and fail it as quickly as possible. We don't know what the guest
> has observed in terms of GIC capability, and it may not have enabled the
> new flavour of SGIs just yet.

Indeed. I didn't realize it.

> 
>> This can be "fixed" by keep track of what guest had written into
>> nASSGIreq. And we need to evaluate the need for using direct vSGI
>> for a specified guest by 'has_gicv4_1 && nassgireq'.
> 
> It feels odd. It means we have more state than the HW normally has.
> I have an alternative proposal, see below.
> 
>> But if it's expected that "if userspace tries to set nASSGIreq on
>> a non-4.1 host, this bit will not latch", then this shouldn't be
>> a problem at all.
> 
> Well, that is the semantics of the RES0 bit. It applies from both
> guest and userspace.
> 
> And actually, maybe we can handle that pretty cheaply. If userspace
> tries to restore GICD_TYPER2 to a value that isn't what KVM can
> offer, we just return an error. Exactly like we do for GICD_IIDR.
> Hence the following patch:
> 
> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c 
> b/virt/kvm/arm/vgic/vgic-mmio-v3.c
> index 28b639fd1abc..e72dcc454247 100644
> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c
> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c
> @@ -156,6 +156,7 @@ static int vgic_mmio_uaccess_write_v3_misc(struct 
> kvm_vcpu *vcpu,
>       struct vgic_dist *dist = &vcpu->kvm->arch.vgic;
> 
>       switch (addr & 0x0c) {
> +    case GICD_TYPER2:
>       case GICD_IIDR:
>           if (val != vgic_mmio_read_v3_misc(vcpu, addr, len))
>               return -EINVAL;
> 
> Being a RO register, writing something that isn't compatible with the
> possible behaviour of the hypervisor will just return an error.

This is really a nice point to address my concern! I'm happy to see
this in v6 now.

> 
> What do you think?

I agreed with you, with a bit nervous though. Some old guests (which
have no knowledge about GICv4.1 vSGIs and don't care about nASSGIcap
at all) will also fail to migrate from A to B, just because now we
present two different (unused) GICD_TYPER2 registers to them.

Is it a little unfair to them :-) ?


Thanks,
Zenghui


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2020-03-23  8:11 UTC|newest]

Thread overview: 312+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-03-04 20:33 [PATCH v5 00/23] irqchip/gic-v4: GICv4.1 architecture support Marc Zyngier
2020-03-04 20:33 ` Marc Zyngier
2020-03-04 20:33 ` Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 01/23] irqchip/gic-v3: Use SGIs without active state if offered Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  6:30   ` Zenghui Yu
2020-03-12  6:30     ` Zenghui Yu
2020-03-12  6:30     ` Zenghui Yu
2020-03-12  9:28     ` Marc Zyngier
2020-03-12  9:28       ` Marc Zyngier
2020-03-12  9:28       ` Marc Zyngier
2020-03-12 12:05       ` Marc Zyngier
2020-03-12 12:05         ` Marc Zyngier
2020-03-12 12:05         ` Marc Zyngier
2020-03-13  1:39         ` Zenghui Yu
2020-03-13  1:39           ` Zenghui Yu
2020-03-13  1:39           ` Zenghui Yu
2020-03-12 17:16   ` Auger Eric
2020-03-12 17:16     ` Auger Eric
2020-03-12 17:16     ` Auger Eric
2020-03-12 17:23     ` Marc Zyngier
2020-03-12 17:23       ` Marc Zyngier
2020-03-12 17:23       ` Marc Zyngier
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 02/23] irqchip/gic-v4.1: Skip absent CPUs while iterating over redistributors Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-16 17:10   ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 03/23] irqchip/gic-v4.1: Ensure mutual exclusion between vPE affinity change and RD access Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  6:56   ` Zenghui Yu
2020-03-12  6:56     ` Zenghui Yu
2020-03-12  6:56     ` Zenghui Yu
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-20 14:23   ` Auger Eric
2020-03-20 14:23     ` Auger Eric
2020-03-20 14:23     ` Auger Eric
2020-03-04 20:33 ` [PATCH v5 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  7:11   ` Zenghui Yu
2020-03-12  7:11     ` Zenghui Yu
2020-03-12  7:11     ` Zenghui Yu
2020-03-20 14:23   ` Auger Eric
2020-03-20 14:23     ` Auger Eric
2020-03-20 14:23     ` Auger Eric
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 06/23] irqchip/gic-v4.1: Advertise support v4.1 to KVM Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-16 17:10   ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 07/23] irqchip/gic-v4.1: Map the ITS SGIR register page Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-16 17:10   ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 08/23] irqchip/gic-v4.1: Plumb skeletal VSGI irqchip Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-16 17:10   ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-16 17:10     ` Auger Eric
2020-03-19 10:03     ` Marc Zyngier
2020-03-19 10:03       ` Marc Zyngier
2020-03-19 10:03       ` Marc Zyngier
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 09/23] irqchip/gic-v4.1: Add initial SGI configuration Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-16 17:53   ` Auger Eric
2020-03-16 17:53     ` Auger Eric
2020-03-16 17:53     ` Auger Eric
2020-03-17  2:02     ` Zenghui Yu
2020-03-17  2:02       ` Zenghui Yu
2020-03-17  2:02       ` Zenghui Yu
2020-03-17  8:36       ` Auger Eric
2020-03-17  8:36         ` Auger Eric
2020-03-17  8:36         ` Auger Eric
2020-03-19 10:20     ` Marc Zyngier
2020-03-19 10:20       ` Marc Zyngier
2020-03-19 10:20       ` Marc Zyngier
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 10/23] irqchip/gic-v4.1: Plumb mask/unmask SGI callbacks Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-16 18:15   ` Auger Eric
2020-03-16 18:15     ` Auger Eric
2020-03-16 18:15     ` Auger Eric
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 11/23] irqchip/gic-v4.1: Plumb get/set_irqchip_state " Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  7:41   ` Zenghui Yu
2020-03-12  7:41     ` Zenghui Yu
2020-03-12  7:41     ` Zenghui Yu
2020-03-16 21:43   ` Auger Eric
2020-03-16 21:43     ` Auger Eric
2020-03-16 21:43     ` Auger Eric
2020-03-19 10:27     ` Marc Zyngier
2020-03-19 10:27       ` Marc Zyngier
2020-03-19 10:27       ` Marc Zyngier
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 12/23] irqchip/gic-v4.1: Plumb set_vcpu_affinity " Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-17 10:35   ` Auger Eric
2020-03-17 10:35     ` Auger Eric
2020-03-17 10:35     ` Auger Eric
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 13/23] irqchip/gic-v4.1: Move doorbell management to the GICv4 abstraction layer Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  8:20   ` Zenghui Yu
2020-03-12  8:20     ` Zenghui Yu
2020-03-12  8:20     ` Zenghui Yu
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 14/23] irqchip/gic-v4.1: Add VSGI allocation/teardown Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  8:06   ` Zenghui Yu
2020-03-12  8:06     ` Zenghui Yu
2020-03-12  8:06     ` Zenghui Yu
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 15/23] irqchip/gic-v4.1: Add VSGI property setup Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  8:09   ` Zenghui Yu
2020-03-12  8:09     ` Zenghui Yu
2020-03-12  8:09     ` Zenghui Yu
2020-03-17 10:30   ` Auger Eric
2020-03-17 10:30     ` Auger Eric
2020-03-17 10:30     ` Auger Eric
2020-03-19 10:57     ` Marc Zyngier
2020-03-19 10:57       ` Marc Zyngier
2020-03-19 10:57       ` Marc Zyngier
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 16/23] irqchip/gic-v4.1: Eagerly vmap vPEs Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  8:12   ` Zenghui Yu
2020-03-12  8:12     ` Zenghui Yu
2020-03-12  8:12     ` Zenghui Yu
2020-03-17  2:49   ` Zenghui Yu
2020-03-17  2:49     ` Zenghui Yu
2020-03-17  2:49     ` Zenghui Yu
2020-03-19 10:55     ` Marc Zyngier
2020-03-19 10:55       ` Marc Zyngier
2020-03-19 10:55       ` Marc Zyngier
2020-03-20  2:31       ` Zenghui Yu
2020-03-20  2:31         ` Zenghui Yu
2020-03-20  2:31         ` Zenghui Yu
2020-03-29 20:26   ` [tip: irq/core] " tip-bot2 for Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 17/23] KVM: arm64: GICv4.1: Let doorbells be auto-enabled Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-12  8:15   ` Zenghui Yu
2020-03-12  8:15     ` Zenghui Yu
2020-03-12  8:15     ` Zenghui Yu
2020-03-17 11:04   ` Auger Eric
2020-03-17 11:04     ` Auger Eric
2020-03-17 11:04     ` Auger Eric
2020-03-04 20:33 ` [PATCH v5 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-18  3:28   ` Zenghui Yu
2020-03-18  3:28     ` Zenghui Yu
2020-03-18  3:28     ` Zenghui Yu
2020-03-20  8:11   ` Auger Eric
2020-03-20  8:11     ` Auger Eric
2020-03-20  8:11     ` Auger Eric
2020-03-20 10:05     ` Marc Zyngier
2020-03-20 10:05       ` Marc Zyngier
2020-03-20 10:05       ` Marc Zyngier
2020-03-20 10:56       ` Auger Eric
2020-03-20 10:56         ` Auger Eric
2020-03-20 10:56         ` Auger Eric
2020-03-04 20:33 ` [PATCH v5 19/23] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-19 16:16   ` Auger Eric
2020-03-19 16:16     ` Auger Eric
2020-03-19 16:16     ` Auger Eric
2020-03-19 19:52     ` Marc Zyngier
2020-03-19 19:52       ` Marc Zyngier
2020-03-19 19:52       ` Marc Zyngier
2020-03-19 20:13       ` Auger Eric
2020-03-19 20:13         ` Auger Eric
2020-03-19 20:13         ` Auger Eric
2020-03-20  9:17         ` Marc Zyngier
2020-03-20  9:17           ` Marc Zyngier
2020-03-20  9:17           ` Marc Zyngier
2020-03-20  4:22   ` Zenghui Yu
2020-03-20  4:22     ` Zenghui Yu
2020-03-20  4:22     ` Zenghui Yu
2020-03-04 20:33 ` [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-18  6:34   ` Zenghui Yu
2020-03-18  6:34     ` Zenghui Yu
2020-03-18  6:34     ` Zenghui Yu
2020-03-19 12:10     ` Marc Zyngier
2020-03-19 12:10       ` Marc Zyngier
2020-03-19 12:10       ` Marc Zyngier
2020-03-19 20:38       ` Auger Eric
2020-03-19 20:38         ` Auger Eric
2020-03-19 20:38         ` Auger Eric
2020-03-20  3:08         ` Zenghui Yu
2020-03-20  3:08           ` Zenghui Yu
2020-03-20  3:08           ` Zenghui Yu
2020-03-20  7:59           ` Auger Eric
2020-03-20  7:59             ` Auger Eric
2020-03-20  7:59             ` Auger Eric
2020-03-20  9:46             ` Marc Zyngier
2020-03-20  9:46               ` Marc Zyngier
2020-03-20  9:46               ` Marc Zyngier
2020-03-20 11:09               ` Auger Eric
2020-03-20 11:09                 ` Auger Eric
2020-03-20 11:09                 ` Auger Eric
2020-03-20 11:20                 ` Marc Zyngier
2020-03-20 11:20                   ` Marc Zyngier
2020-03-20 11:20                   ` Marc Zyngier
2020-03-20  3:53       ` Zenghui Yu
2020-03-20  3:53         ` Zenghui Yu
2020-03-20  3:53         ` Zenghui Yu
2020-03-20  9:01         ` Marc Zyngier
2020-03-20  9:01           ` Marc Zyngier
2020-03-20  9:01           ` Marc Zyngier
2020-03-23  8:11           ` Zenghui Yu [this message]
2020-03-23  8:11             ` Zenghui Yu
2020-03-23  8:11             ` Zenghui Yu
2020-03-23  8:25             ` Marc Zyngier
2020-03-23  8:25               ` Marc Zyngier
2020-03-23  8:25               ` Marc Zyngier
2020-03-23 12:40               ` Zenghui Yu
2020-03-23 12:40                 ` Zenghui Yu
2020-03-23 12:40                 ` Zenghui Yu
2020-03-04 20:33 ` [PATCH v5 21/23] KVM: arm64: GICv4.1: Reload VLPI configuration on distributor enable/disable Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-18  3:17   ` Zenghui Yu
2020-03-18  3:17     ` Zenghui Yu
2020-03-18  3:17     ` Zenghui Yu
2020-03-19 12:18     ` Marc Zyngier
2020-03-19 12:18       ` Marc Zyngier
2020-03-19 12:18       ` Marc Zyngier
2020-03-04 20:33 ` [PATCH v5 22/23] KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-20  4:23   ` Zenghui Yu
2020-03-20  4:23     ` Zenghui Yu
2020-03-20  4:23     ` Zenghui Yu
2020-03-20  8:12   ` Auger Eric
2020-03-20  8:12     ` Auger Eric
2020-03-20  8:12     ` Auger Eric
2020-03-04 20:33 ` [PATCH v5 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-04 20:33   ` Marc Zyngier
2020-03-18  3:19   ` Zenghui Yu
2020-03-18  3:19     ` Zenghui Yu
2020-03-18  3:19     ` Zenghui Yu
2020-03-19 15:05   ` Auger Eric
2020-03-19 15:05     ` Auger Eric
2020-03-19 15:05     ` Auger Eric
2020-03-19 15:21     ` Marc Zyngier
2020-03-19 15:21       ` Marc Zyngier
2020-03-19 15:21       ` Marc Zyngier
2020-03-19 15:43       ` Auger Eric
2020-03-19 15:43         ` Auger Eric
2020-03-19 15:43         ` Auger Eric
2020-03-19 16:16         ` Marc Zyngier
2020-03-19 16:16           ` Marc Zyngier
2020-03-19 16:16           ` Marc Zyngier
2020-03-19 16:17           ` Auger Eric
2020-03-19 16:17             ` Auger Eric
2020-03-19 16:17             ` Auger Eric
2020-03-20  4:38       ` Zenghui Yu
2020-03-20  4:38         ` Zenghui Yu
2020-03-20  4:38         ` Zenghui Yu
2020-03-20  9:09         ` Marc Zyngier
2020-03-20  9:09           ` Marc Zyngier
2020-03-20  9:09           ` Marc Zyngier
2020-03-20 11:35           ` Zenghui Yu
2020-03-20 11:35             ` Zenghui Yu
2020-03-20 11:35             ` Zenghui Yu
2020-03-20 11:46             ` Marc Zyngier
2020-03-20 11:46               ` Marc Zyngier
2020-03-20 11:46               ` Marc Zyngier
2020-03-20 12:09               ` Zenghui Yu
2020-03-20 12:09                 ` Zenghui Yu
2020-03-20 12:09                 ` Zenghui Yu
2020-03-05  3:39 ` [PATCH v5 00/23] irqchip/gic-v4: GICv4.1 architecture support Zenghui Yu
2020-03-05  3:39   ` Zenghui Yu
2020-03-05  3:39   ` Zenghui Yu
2020-03-09  8:17 ` Zenghui Yu
2020-03-09  8:17   ` Zenghui Yu
2020-03-09  8:17   ` Zenghui Yu
2020-03-09  8:46   ` Marc Zyngier
2020-03-09  8:46     ` Marc Zyngier
2020-03-09  8:46     ` Marc Zyngier

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cf5d7cf3-076f-47a7-83cf-717a619dc13e@huawei.com \
    --to=yuzenghui@huawei.com \
    --cc=eric.auger@redhat.com \
    --cc=james.morse@arm.com \
    --cc=jason@lakedaemon.net \
    --cc=julien.thierry.kdev@gmail.com \
    --cc=kvm@vger.kernel.org \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lorenzo.pieralisi@arm.com \
    --cc=maz@kernel.org \
    --cc=rrichter@marvell.com \
    --cc=suzuki.poulose@arm.com \
    --cc=tglx@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.