From: Paul Mackerras <paulus@samba.org> To: Alexander Graf <agraf@suse.de>, Benjamin Herrenschmidt <benh@kernel.crashing.org> Cc: kvm-ppc@vger.kernel.org, kvm@vger.kernel.org Subject: [PATCH 12/23] KVM: PPC: Book3S HV: Better handling of exceptions that happen in real mode Date: Tue, 6 Aug 2013 14:22:05 +1000 [thread overview] Message-ID: <20130806042205.GR19254@iris.ozlabs.ibm.com> (raw) In-Reply-To: <20130806041259.GF19254@iris.ozlabs.ibm.com> When an interrupt or exception happens in the guest that comes to the host, the CPU goes to hypervisor real mode (MMU off) to handle the exception but doesn't change the MMU context. After saving a few registers, we then clear the "in guest" flag. If, for any reason, we get an exception in the real-mode code, that then gets handled by the normal kernel exception handlers, which turn the MMU on. This is disasterous if the MMU is still set to the guest context, since we end up executing instructions from random places in the guest kernel with hypervisor privilege. In order to catch this situation, we define a new value for the "in guest" flag, KVM_GUEST_MODE_HOST_HV, to indicate that we are in hypervisor real mode with guest MMU context. If the "in guest" flag is set to this value, we branch off to an emergency handler. For the moment, this just does a branch to self to stop the CPU from doing anything further. While we're here, we define another new flag value to indicate that we are in a HV guest, as distinct from a PR guest. This will be useful when we have a kernel that can support both PR and HV guests concurrently. Signed-off-by: Paul Mackerras <paulus@samba.org> --- arch/powerpc/include/asm/kvm_asm.h | 2 ++ arch/powerpc/include/asm/kvm_book3s_asm.h | 1 + arch/powerpc/kernel/asm-offsets.c | 1 + arch/powerpc/kvm/book3s_hv_rmhandlers.S | 38 +++++++++++++++++++++++-------- 4 files changed, 33 insertions(+), 9 deletions(-) diff --git a/arch/powerpc/include/asm/kvm_asm.h b/arch/powerpc/include/asm/kvm_asm.h index 3d70b7e..9ca0228 100644 --- a/arch/powerpc/include/asm/kvm_asm.h +++ b/arch/powerpc/include/asm/kvm_asm.h @@ -137,6 +137,8 @@ #define KVM_GUEST_MODE_NONE 0 #define KVM_GUEST_MODE_GUEST 1 #define KVM_GUEST_MODE_SKIP 2 +#define KVM_GUEST_MODE_GUEST_HV 3 +#define KVM_GUEST_MODE_HOST_HV 4 #define KVM_INST_FETCH_FAILED -1 diff --git a/arch/powerpc/include/asm/kvm_book3s_asm.h b/arch/powerpc/include/asm/kvm_book3s_asm.h index 4141409..360742a 100644 --- a/arch/powerpc/include/asm/kvm_book3s_asm.h +++ b/arch/powerpc/include/asm/kvm_book3s_asm.h @@ -79,6 +79,7 @@ struct kvmppc_host_state { ulong vmhandler; ulong scratch0; ulong scratch1; + ulong scratch2; u8 in_guest; u8 restore_hid5; u8 napping; diff --git a/arch/powerpc/kernel/asm-offsets.c b/arch/powerpc/kernel/asm-offsets.c index 14a8004..cbd9366 100644 --- a/arch/powerpc/kernel/asm-offsets.c +++ b/arch/powerpc/kernel/asm-offsets.c @@ -574,6 +574,7 @@ int main(void) HSTATE_FIELD(HSTATE_VMHANDLER, vmhandler); HSTATE_FIELD(HSTATE_SCRATCH0, scratch0); HSTATE_FIELD(HSTATE_SCRATCH1, scratch1); + HSTATE_FIELD(HSTATE_SCRATCH2, scratch2); HSTATE_FIELD(HSTATE_IN_GUEST, in_guest); HSTATE_FIELD(HSTATE_RESTORE_HID5, restore_hid5); HSTATE_FIELD(HSTATE_NAPPING, napping); diff --git a/arch/powerpc/kvm/book3s_hv_rmhandlers.S b/arch/powerpc/kvm/book3s_hv_rmhandlers.S index 60dce5b..cf3d045 100644 --- a/arch/powerpc/kvm/book3s_hv_rmhandlers.S +++ b/arch/powerpc/kvm/book3s_hv_rmhandlers.S @@ -266,6 +266,9 @@ END_FTR_SECTION_IFSET(CPU_FTR_ARCH_206) mtspr SPRN_DAR, r5 mtspr SPRN_DSISR, r6 + li r6, KVM_GUEST_MODE_HOST_HV + stb r6, HSTATE_IN_GUEST(r13) + BEGIN_FTR_SECTION /* Restore AMR and UAMOR, set AMOR to all 1s */ ld r5,VCPU_AMR(r4) @@ -533,7 +536,7 @@ fast_guest_return: mtspr SPRN_HSRR1,r11 /* Activate guest mode, so faults get handled by KVM */ - li r9, KVM_GUEST_MODE_GUEST + li r9, KVM_GUEST_MODE_GUEST_HV stb r9, HSTATE_IN_GUEST(r13) /* Enter guest */ @@ -585,8 +588,15 @@ kvmppc_interrupt: * guest CR, R12 saved in shadow VCPU SCRATCH1/0 * guest R13 saved in SPRN_SCRATCH0 */ - /* abuse host_r2 as third scratch area; we get r2 from PACATOC(r13) */ - std r9, HSTATE_HOST_R2(r13) + std r9, HSTATE_SCRATCH2(r13) + + lbz r9, HSTATE_IN_GUEST(r13) + cmpwi r9, KVM_GUEST_MODE_HOST_HV + beq kvmppc_bad_host_intr + /* We're now back in the host but in guest MMU context */ + li r9, KVM_GUEST_MODE_HOST_HV + stb r9, HSTATE_IN_GUEST(r13) + ld r9, HSTATE_KVM_VCPU(r13) /* Save registers */ @@ -600,7 +610,7 @@ kvmppc_interrupt: std r6, VCPU_GPR(R6)(r9) std r7, VCPU_GPR(R7)(r9) std r8, VCPU_GPR(R8)(r9) - ld r0, HSTATE_HOST_R2(r13) + ld r0, HSTATE_SCRATCH2(r13) std r0, VCPU_GPR(R9)(r9) std r10, VCPU_GPR(R10)(r9) std r11, VCPU_GPR(R11)(r9) @@ -634,10 +644,6 @@ END_FTR_SECTION_IFSET(CPU_FTR_CFAR) std r3, VCPU_GPR(R13)(r9) std r4, VCPU_LR(r9) - /* Unset guest mode */ - li r0, KVM_GUEST_MODE_NONE - stb r0, HSTATE_IN_GUEST(r13) - stw r12,VCPU_TRAP(r9) /* Save HEIR (HV emulation assist reg) in last_inst @@ -1050,6 +1056,10 @@ BEGIN_FTR_SECTION mtspr SPRN_AMR,r6 END_FTR_SECTION_IFSET(CPU_FTR_ARCH_206) + /* Unset guest mode */ + li r0, KVM_GUEST_MODE_NONE + stb r0, HSTATE_IN_GUEST(r13) + /* Switch DSCR back to host value */ BEGIN_FTR_SECTION mfspr r8, SPRN_DSCR @@ -1321,7 +1331,7 @@ fast_interrupt_c_return: stw r8, VCPU_LAST_INST(r9) /* Unset guest mode. */ - li r0, KVM_GUEST_MODE_NONE + li r0, KVM_GUEST_MODE_HOST_HV stb r0, HSTATE_IN_GUEST(r13) b guest_exit_cont @@ -1696,6 +1706,8 @@ secondary_too_late: cmpwi r3,0 bne 13b HMT_MEDIUM + li r0, KVM_GUEST_MODE_NONE + stb r0, HSTATE_IN_GUEST(r13) ld r11,PACA_SLBSHADOWPTR(r13) .rept SLB_NUM_BOLTED @@ -1867,3 +1879,11 @@ END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC) lwz r7,VCPU_VRSAVE(r4) mtspr SPRN_VRSAVE,r7 blr + +/* + * We come here if we get any exception or interrupt while we are + * executing host real mode code while in guest MMU context. + * For now just spin, but we should do something better. + */ +kvmppc_bad_host_intr: + b . -- 1.8.3.1
WARNING: multiple messages have this Message-ID (diff)
From: Paul Mackerras <paulus@samba.org> To: Alexander Graf <agraf@suse.de>, Benjamin Herrenschmidt <benh@kernel.crashing.org> Cc: kvm-ppc@vger.kernel.org, kvm@vger.kernel.org Subject: [PATCH 12/23] KVM: PPC: Book3S HV: Better handling of exceptions that happen in real mode Date: Tue, 06 Aug 2013 04:22:05 +0000 [thread overview] Message-ID: <20130806042205.GR19254@iris.ozlabs.ibm.com> (raw) In-Reply-To: <20130806041259.GF19254@iris.ozlabs.ibm.com> When an interrupt or exception happens in the guest that comes to the host, the CPU goes to hypervisor real mode (MMU off) to handle the exception but doesn't change the MMU context. After saving a few registers, we then clear the "in guest" flag. If, for any reason, we get an exception in the real-mode code, that then gets handled by the normal kernel exception handlers, which turn the MMU on. This is disasterous if the MMU is still set to the guest context, since we end up executing instructions from random places in the guest kernel with hypervisor privilege. In order to catch this situation, we define a new value for the "in guest" flag, KVM_GUEST_MODE_HOST_HV, to indicate that we are in hypervisor real mode with guest MMU context. If the "in guest" flag is set to this value, we branch off to an emergency handler. For the moment, this just does a branch to self to stop the CPU from doing anything further. While we're here, we define another new flag value to indicate that we are in a HV guest, as distinct from a PR guest. This will be useful when we have a kernel that can support both PR and HV guests concurrently. Signed-off-by: Paul Mackerras <paulus@samba.org> --- arch/powerpc/include/asm/kvm_asm.h | 2 ++ arch/powerpc/include/asm/kvm_book3s_asm.h | 1 + arch/powerpc/kernel/asm-offsets.c | 1 + arch/powerpc/kvm/book3s_hv_rmhandlers.S | 38 +++++++++++++++++++++++-------- 4 files changed, 33 insertions(+), 9 deletions(-) diff --git a/arch/powerpc/include/asm/kvm_asm.h b/arch/powerpc/include/asm/kvm_asm.h index 3d70b7e..9ca0228 100644 --- a/arch/powerpc/include/asm/kvm_asm.h +++ b/arch/powerpc/include/asm/kvm_asm.h @@ -137,6 +137,8 @@ #define KVM_GUEST_MODE_NONE 0 #define KVM_GUEST_MODE_GUEST 1 #define KVM_GUEST_MODE_SKIP 2 +#define KVM_GUEST_MODE_GUEST_HV 3 +#define KVM_GUEST_MODE_HOST_HV 4 #define KVM_INST_FETCH_FAILED -1 diff --git a/arch/powerpc/include/asm/kvm_book3s_asm.h b/arch/powerpc/include/asm/kvm_book3s_asm.h index 4141409..360742a 100644 --- a/arch/powerpc/include/asm/kvm_book3s_asm.h +++ b/arch/powerpc/include/asm/kvm_book3s_asm.h @@ -79,6 +79,7 @@ struct kvmppc_host_state { ulong vmhandler; ulong scratch0; ulong scratch1; + ulong scratch2; u8 in_guest; u8 restore_hid5; u8 napping; diff --git a/arch/powerpc/kernel/asm-offsets.c b/arch/powerpc/kernel/asm-offsets.c index 14a8004..cbd9366 100644 --- a/arch/powerpc/kernel/asm-offsets.c +++ b/arch/powerpc/kernel/asm-offsets.c @@ -574,6 +574,7 @@ int main(void) HSTATE_FIELD(HSTATE_VMHANDLER, vmhandler); HSTATE_FIELD(HSTATE_SCRATCH0, scratch0); HSTATE_FIELD(HSTATE_SCRATCH1, scratch1); + HSTATE_FIELD(HSTATE_SCRATCH2, scratch2); HSTATE_FIELD(HSTATE_IN_GUEST, in_guest); HSTATE_FIELD(HSTATE_RESTORE_HID5, restore_hid5); HSTATE_FIELD(HSTATE_NAPPING, napping); diff --git a/arch/powerpc/kvm/book3s_hv_rmhandlers.S b/arch/powerpc/kvm/book3s_hv_rmhandlers.S index 60dce5b..cf3d045 100644 --- a/arch/powerpc/kvm/book3s_hv_rmhandlers.S +++ b/arch/powerpc/kvm/book3s_hv_rmhandlers.S @@ -266,6 +266,9 @@ END_FTR_SECTION_IFSET(CPU_FTR_ARCH_206) mtspr SPRN_DAR, r5 mtspr SPRN_DSISR, r6 + li r6, KVM_GUEST_MODE_HOST_HV + stb r6, HSTATE_IN_GUEST(r13) + BEGIN_FTR_SECTION /* Restore AMR and UAMOR, set AMOR to all 1s */ ld r5,VCPU_AMR(r4) @@ -533,7 +536,7 @@ fast_guest_return: mtspr SPRN_HSRR1,r11 /* Activate guest mode, so faults get handled by KVM */ - li r9, KVM_GUEST_MODE_GUEST + li r9, KVM_GUEST_MODE_GUEST_HV stb r9, HSTATE_IN_GUEST(r13) /* Enter guest */ @@ -585,8 +588,15 @@ kvmppc_interrupt: * guest CR, R12 saved in shadow VCPU SCRATCH1/0 * guest R13 saved in SPRN_SCRATCH0 */ - /* abuse host_r2 as third scratch area; we get r2 from PACATOC(r13) */ - std r9, HSTATE_HOST_R2(r13) + std r9, HSTATE_SCRATCH2(r13) + + lbz r9, HSTATE_IN_GUEST(r13) + cmpwi r9, KVM_GUEST_MODE_HOST_HV + beq kvmppc_bad_host_intr + /* We're now back in the host but in guest MMU context */ + li r9, KVM_GUEST_MODE_HOST_HV + stb r9, HSTATE_IN_GUEST(r13) + ld r9, HSTATE_KVM_VCPU(r13) /* Save registers */ @@ -600,7 +610,7 @@ kvmppc_interrupt: std r6, VCPU_GPR(R6)(r9) std r7, VCPU_GPR(R7)(r9) std r8, VCPU_GPR(R8)(r9) - ld r0, HSTATE_HOST_R2(r13) + ld r0, HSTATE_SCRATCH2(r13) std r0, VCPU_GPR(R9)(r9) std r10, VCPU_GPR(R10)(r9) std r11, VCPU_GPR(R11)(r9) @@ -634,10 +644,6 @@ END_FTR_SECTION_IFSET(CPU_FTR_CFAR) std r3, VCPU_GPR(R13)(r9) std r4, VCPU_LR(r9) - /* Unset guest mode */ - li r0, KVM_GUEST_MODE_NONE - stb r0, HSTATE_IN_GUEST(r13) - stw r12,VCPU_TRAP(r9) /* Save HEIR (HV emulation assist reg) in last_inst @@ -1050,6 +1056,10 @@ BEGIN_FTR_SECTION mtspr SPRN_AMR,r6 END_FTR_SECTION_IFSET(CPU_FTR_ARCH_206) + /* Unset guest mode */ + li r0, KVM_GUEST_MODE_NONE + stb r0, HSTATE_IN_GUEST(r13) + /* Switch DSCR back to host value */ BEGIN_FTR_SECTION mfspr r8, SPRN_DSCR @@ -1321,7 +1331,7 @@ fast_interrupt_c_return: stw r8, VCPU_LAST_INST(r9) /* Unset guest mode. */ - li r0, KVM_GUEST_MODE_NONE + li r0, KVM_GUEST_MODE_HOST_HV stb r0, HSTATE_IN_GUEST(r13) b guest_exit_cont @@ -1696,6 +1706,8 @@ secondary_too_late: cmpwi r3,0 bne 13b HMT_MEDIUM + li r0, KVM_GUEST_MODE_NONE + stb r0, HSTATE_IN_GUEST(r13) ld r11,PACA_SLBSHADOWPTR(r13) .rept SLB_NUM_BOLTED @@ -1867,3 +1879,11 @@ END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC) lwz r7,VCPU_VRSAVE(r4) mtspr SPRN_VRSAVE,r7 blr + +/* + * We come here if we get any exception or interrupt while we are + * executing host real mode code while in guest MMU context. + * For now just spin, but we should do something better. + */ +kvmppc_bad_host_intr: + b . -- 1.8.3.1
next prev parent reply other threads:[~2013-08-06 4:28 UTC|newest] Thread overview: 136+ messages / expand[flat|nested] mbox.gz Atom feed top 2013-08-06 4:12 [PATCH 00/23] Allow PR and HV KVM to coexist in one kernel Paul Mackerras 2013-08-06 4:12 ` Paul Mackerras 2013-08-06 4:13 ` [PATCH 01/23] KVM: PPC: Book3S: Fix compile error in XICS emulation Paul Mackerras 2013-08-06 4:13 ` Paul Mackerras 2013-08-28 22:51 ` Alexander Graf 2013-08-28 22:51 ` Alexander Graf 2013-08-06 4:14 ` [PATCH 02/23] KVM: PPC: Book3S PR: Don't corrupt guest state when kernel uses VMX Paul Mackerras 2013-08-06 4:14 ` Paul Mackerras 2013-08-08 15:49 ` Aneesh Kumar K.V 2013-08-08 15:49 ` Aneesh Kumar K.V 2013-08-28 22:51 ` Alexander Graf 2013-08-28 22:51 ` Alexander Graf 2013-08-06 4:15 ` [PATCH 03/23] KVM: PPC: Book3S PR: Make instruction fetch fallback work for system calls Paul Mackerras 2013-08-06 4:15 ` Paul Mackerras 2013-08-28 22:51 ` Alexander Graf 2013-08-28 22:51 ` Alexander Graf 2013-08-06 4:16 ` [PATCH 04/23] KVM: PPC: Book3S PR: Keep volatile reg values in vcpu rather than shadow_vcpu Paul Mackerras 2013-08-06 4:16 ` Paul Mackerras 2013-08-11 11:06 ` Aneesh Kumar K.V 2013-08-11 11:18 ` Aneesh Kumar K.V 2013-08-28 22:00 ` Alexander Graf 2013-08-28 22:00 ` Alexander Graf 2013-08-29 5:04 ` Paul Mackerras 2013-08-29 5:04 ` Paul Mackerras 2013-08-29 12:46 ` Alexander Graf 2013-08-29 12:46 ` Alexander Graf 2013-08-06 4:18 ` [PATCH 05/23] KVM: PPC: Book3S PR: Rework kvmppc_mmu_book3s_64_xlate() Paul Mackerras 2013-08-06 4:18 ` Paul Mackerras 2013-08-28 22:51 ` Alexander Graf 2013-08-28 22:51 ` Alexander Graf 2013-08-06 4:18 ` [PATCH 06/23] KVM: PPC: Book3S PR: Allow guest to use 64k pages Paul Mackerras 2013-08-06 4:18 ` Paul Mackerras 2013-08-28 22:56 ` Alexander Graf 2013-08-28 22:56 ` Alexander Graf 2013-08-29 5:17 ` Paul Mackerras 2013-08-29 5:17 ` Paul Mackerras 2013-08-29 12:48 ` Alexander Graf 2013-08-29 12:48 ` Alexander Graf 2013-08-06 4:19 ` [PATCH 07/23] KVM: PPC: Book3S PR: Use 64k host pages where possible Paul Mackerras 2013-08-06 4:19 ` Paul Mackerras 2013-08-28 23:24 ` Alexander Graf 2013-08-28 23:24 ` Alexander Graf 2013-08-29 5:23 ` Paul Mackerras 2013-08-29 5:23 ` Paul Mackerras 2013-08-29 12:43 ` Alexander Graf 2013-08-29 12:43 ` Alexander Graf 2013-08-06 4:20 ` [PATCH 08/23] KVM: PPC: Book3S PR: Handle PP0 page-protection bit in guest HPTEs Paul Mackerras 2013-08-06 4:20 ` Paul Mackerras 2013-08-06 4:20 ` [PATCH 09/23] KVM: PPC: Book3S PR: Correct errors in H_ENTER implementation Paul Mackerras 2013-08-06 4:20 ` Paul Mackerras 2013-08-06 4:21 ` [PATCH 10/23] KVM: PPC: Book3S PR: Make HPT accesses and updates SMP-safe Paul Mackerras 2013-08-06 4:21 ` Paul Mackerras 2013-08-06 4:21 ` [PATCH 11/23] KVM: PPC: Book3S PR: Allocate kvm_vcpu structs from kvm_vcpu_cache Paul Mackerras 2013-08-06 4:21 ` Paul Mackerras 2013-08-12 10:03 ` Aneesh Kumar K.V 2013-08-12 10:15 ` Aneesh Kumar K.V 2013-08-06 4:22 ` Paul Mackerras [this message] 2013-08-06 4:22 ` [PATCH 12/23] KVM: PPC: Book3S HV: Better handling of exceptions that happen in real mode Paul Mackerras 2013-08-06 4:22 ` [PATCH 13/23] KVM: PPC: Book3S: Move skip-interrupt handlers to common code Paul Mackerras 2013-08-06 4:22 ` Paul Mackerras 2013-08-06 4:23 ` [PATCH 14/23] KVM: PPC: Book3S PR: Delay disabling relocation-on interrupts Paul Mackerras 2013-08-06 4:23 ` Paul Mackerras 2013-08-30 16:30 ` Alexander Graf 2013-08-30 16:30 ` Alexander Graf 2013-08-30 22:55 ` Paul Mackerras 2013-08-30 22:55 ` Paul Mackerras 2013-08-30 23:13 ` Alexander Graf 2013-08-30 23:13 ` Alexander Graf 2013-08-31 5:42 ` Paul Mackerras 2013-08-31 5:42 ` Paul Mackerras 2013-08-06 4:24 ` [PATCH 15/23] KVM: PPC: Book3S: Rename symbols that exist in both PR and HV KVM Paul Mackerras 2013-08-06 4:24 ` Paul Mackerras 2013-08-06 4:24 ` [PATCH 16/23] KVM: PPC: Book3S: Merge implementations of KVM_PPC_GET_SMMU_INFO ioctl Paul Mackerras 2013-08-06 4:24 ` Paul Mackerras 2013-08-06 4:25 ` [PATCH 17/23] KVM: PPC: Book3S HV: Factorize kvmppc_core_vcpu_create_hv() Paul Mackerras 2013-08-06 4:25 ` Paul Mackerras 2013-08-06 4:25 ` [PATCH 18/23] KVM: PPC: Book3S: Allow both PR and HV KVM to be selected Paul Mackerras 2013-08-06 4:25 ` Paul Mackerras 2013-08-06 4:26 ` [PATCH 19/23] KVM: PPC: Book3S: Select PR vs HV separately for each guest Paul Mackerras 2013-08-06 4:26 ` Paul Mackerras 2013-09-12 22:56 ` Alexander Graf 2013-09-12 22:56 ` Alexander Graf 2013-09-13 0:17 ` Paul Mackerras 2013-09-13 0:17 ` Paul Mackerras 2013-09-13 1:31 ` Benjamin Herrenschmidt 2013-09-13 1:31 ` Benjamin Herrenschmidt 2013-09-13 4:18 ` Alexander Graf 2013-09-13 4:18 ` Alexander Graf 2013-09-14 18:33 ` Aneesh Kumar K.V 2013-09-14 18:45 ` Aneesh Kumar K.V 2013-09-14 20:22 ` Alexander Graf 2013-09-14 20:22 ` Alexander Graf 2013-09-15 9:16 ` Aneesh Kumar K.V 2013-09-15 9:28 ` Aneesh Kumar K.V 2013-09-15 11:55 ` Alexander Graf 2013-09-15 11:55 ` Alexander Graf 2013-09-13 4:17 ` Alexander Graf 2013-09-13 4:17 ` Alexander Graf 2013-09-18 12:05 ` Paul Mackerras 2013-09-18 12:05 ` Paul Mackerras 2013-09-19 7:31 ` Alexander Graf 2013-09-19 7:31 ` Alexander Graf 2013-08-06 4:27 ` [PATCH 20/23] KVM: PPC: Book3S PR: Better handling of host-side read-only pages Paul Mackerras 2013-08-06 4:27 ` Paul Mackerras 2013-09-12 23:01 ` Alexander Graf 2013-09-12 23:01 ` Alexander Graf 2013-09-13 0:23 ` Paul Mackerras 2013-09-13 0:23 ` Paul Mackerras 2013-09-14 5:24 ` Paul Mackerras 2013-09-14 5:24 ` Paul Mackerras 2013-09-14 20:23 ` Alexander Graf 2013-09-14 20:23 ` Alexander Graf 2013-09-16 4:12 ` Paul Mackerras 2013-09-16 4:12 ` Paul Mackerras 2013-09-16 12:47 ` Alexander Graf 2013-09-16 12:47 ` Alexander Graf 2013-08-06 4:27 ` [PATCH 21/23] KVM: PPC: Book3S PR: Use mmu_notifier_retry() in kvmppc_mmu_map_page() Paul Mackerras 2013-08-06 4:27 ` Paul Mackerras 2013-08-07 4:13 ` Bhushan Bharat-R65777 2013-08-07 4:13 ` Bhushan Bharat-R65777 2013-08-07 4:28 ` Paul Mackerras 2013-08-07 4:28 ` Paul Mackerras 2013-08-07 5:18 ` Bhushan Bharat-R65777 2013-08-07 5:18 ` Bhushan Bharat-R65777 2013-08-07 5:17 ` Bhushan Bharat-R65777 2013-08-07 5:17 ` Bhushan Bharat-R65777 2013-08-07 8:27 ` Paul Mackerras 2013-08-07 8:27 ` Paul Mackerras 2013-08-07 8:31 ` Bhushan Bharat-R65777 2013-08-07 8:31 ` Bhushan Bharat-R65777 2013-08-08 12:06 ` Paul Mackerras 2013-08-08 12:06 ` Paul Mackerras 2013-08-06 4:27 ` [PATCH 22/23] KVM: PPC: Book3S PR: Mark pages accessed, and dirty if being written Paul Mackerras 2013-08-06 4:27 ` Paul Mackerras 2013-08-06 4:28 ` [PATCH 23/23] KVM: PPC: Book3S PR: Reduce number of shadow PTEs invalidated by MMU notifiers Paul Mackerras 2013-08-06 4:28 ` Paul Mackerras
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20130806042205.GR19254@iris.ozlabs.ibm.com \ --to=paulus@samba.org \ --cc=agraf@suse.de \ --cc=benh@kernel.crashing.org \ --cc=kvm-ppc@vger.kernel.org \ --cc=kvm@vger.kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.