From: christoffer.dall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v4 39/40] KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load
Date: Thu, 22 Feb 2018 15:44:43 +0100 [thread overview]
Message-ID: <20180222144443.GP29376@cbox> (raw)
In-Reply-To: <3f2f60ba-2269-7ebd-872c-b50dc2ca3e3b@arm.com>
On Thu, Feb 22, 2018 at 01:11:55PM +0000, Marc Zyngier wrote:
> On 15/02/18 21:03, Christoffer Dall wrote:
> > The APRs can only have bits set when the guest acknowledges an interrupt
> > in the LR and can only have a bit cleared when the guest EOIs an
> > interrupt in the LR. Therefore, if we have no LRs with any
> > pending/active interrupts, the APR cannot change value and there is no
> > need to clear it on every exit from the VM (hint: it will have already
> > been cleared when we exited the guest the last time with the LRs all
> > EOIed).
> >
> > The only case we need to take care of is when we migrate the VCPU away
> > from a CPU or migrate a new VCPU onto a CPU, or when we return to
> > userspace to capture the state of the VCPU for migration. To make sure
> > this works, factor out the APR save/restore functionality into separate
> > functions called from the VCPU (and by extension VGIC) put/load hooks.
> >
> > Signed-off-by: Christoffer Dall <christoffer.dall@linaro.org>
> > ---
> > arch/arm/include/asm/kvm_hyp.h | 2 +
> > arch/arm64/include/asm/kvm_hyp.h | 2 +
> > virt/kvm/arm/hyp/vgic-v3-sr.c | 124 +++++++++++++++++++++------------------
> > virt/kvm/arm/vgic/vgic-v2.c | 7 +--
> > virt/kvm/arm/vgic/vgic-v3.c | 5 ++
> > 5 files changed, 78 insertions(+), 62 deletions(-)
> >
> > diff --git a/arch/arm/include/asm/kvm_hyp.h b/arch/arm/include/asm/kvm_hyp.h
> > index 1ab8329e9ff7..530a3c1cfe6f 100644
> > --- a/arch/arm/include/asm/kvm_hyp.h
> > +++ b/arch/arm/include/asm/kvm_hyp.h
> > @@ -110,6 +110,8 @@ void __sysreg_restore_state(struct kvm_cpu_context *ctxt);
> >
> > void __vgic_v3_save_state(struct kvm_vcpu *vcpu);
> > void __vgic_v3_restore_state(struct kvm_vcpu *vcpu);
> > +void __vgic_v3_save_aprs(struct kvm_vcpu *vcpu);
> > +void __vgic_v3_restore_aprs(struct kvm_vcpu *vcpu);
> >
> > asmlinkage void __vfp_save_state(struct vfp_hard_struct *vfp);
> > asmlinkage void __vfp_restore_state(struct vfp_hard_struct *vfp);
> > diff --git a/arch/arm64/include/asm/kvm_hyp.h b/arch/arm64/include/asm/kvm_hyp.h
> > index febe417b8b4e..6f3929b2fcf7 100644
> > --- a/arch/arm64/include/asm/kvm_hyp.h
> > +++ b/arch/arm64/include/asm/kvm_hyp.h
> > @@ -124,6 +124,8 @@ int __vgic_v2_perform_cpuif_access(struct kvm_vcpu *vcpu);
> >
> > void __vgic_v3_save_state(struct kvm_vcpu *vcpu);
> > void __vgic_v3_restore_state(struct kvm_vcpu *vcpu);
> > +void __vgic_v3_save_aprs(struct kvm_vcpu *vcpu);
> > +void __vgic_v3_restore_aprs(struct kvm_vcpu *vcpu);
> > int __vgic_v3_perform_cpuif_access(struct kvm_vcpu *vcpu);
> >
> > void __timer_enable_traps(struct kvm_vcpu *vcpu);
> > diff --git a/virt/kvm/arm/hyp/vgic-v3-sr.c b/virt/kvm/arm/hyp/vgic-v3-sr.c
> > index 9abf2f3c12b5..437d7af08683 100644
> > --- a/virt/kvm/arm/hyp/vgic-v3-sr.c
> > +++ b/virt/kvm/arm/hyp/vgic-v3-sr.c
> > @@ -21,6 +21,7 @@
> >
> > #include <asm/kvm_emulate.h>
> > #include <asm/kvm_hyp.h>
> > +#include <asm/kvm_mmu.h>
> >
> > #define vtr_to_max_lr_idx(v) ((v) & 0xf)
> > #define vtr_to_nr_pre_bits(v) ((((u32)(v) >> 26) & 7) + 1)
> > @@ -221,14 +222,11 @@ void __hyp_text __vgic_v3_save_state(struct kvm_vcpu *vcpu)
> >
> > if (used_lrs) {
> > int i;
> > - u32 nr_pre_bits;
> > u32 elrsr;
> >
> > elrsr = read_gicreg(ICH_ELSR_EL2);
> >
> > write_gicreg(0, ICH_HCR_EL2);
> > - val = read_gicreg(ICH_VTR_EL2);
> > - nr_pre_bits = vtr_to_nr_pre_bits(val);
> >
> > for (i = 0; i < used_lrs; i++) {
> > if (elrsr & (1 << i))
> > @@ -238,39 +236,10 @@ void __hyp_text __vgic_v3_save_state(struct kvm_vcpu *vcpu)
> >
> > __gic_v3_set_lr(0, i);
> > }
> > -
> > - switch (nr_pre_bits) {
> > - case 7:
> > - cpu_if->vgic_ap0r[3] = __vgic_v3_read_ap0rn(3);
> > - cpu_if->vgic_ap0r[2] = __vgic_v3_read_ap0rn(2);
> > - case 6:
> > - cpu_if->vgic_ap0r[1] = __vgic_v3_read_ap0rn(1);
> > - default:
> > - cpu_if->vgic_ap0r[0] = __vgic_v3_read_ap0rn(0);
> > - }
> > -
> > - switch (nr_pre_bits) {
> > - case 7:
> > - cpu_if->vgic_ap1r[3] = __vgic_v3_read_ap1rn(3);
> > - cpu_if->vgic_ap1r[2] = __vgic_v3_read_ap1rn(2);
> > - case 6:
> > - cpu_if->vgic_ap1r[1] = __vgic_v3_read_ap1rn(1);
> > - default:
> > - cpu_if->vgic_ap1r[0] = __vgic_v3_read_ap1rn(0);
> > - }
> > } else {
> > if (static_branch_unlikely(&vgic_v3_cpuif_trap) ||
> > cpu_if->its_vpe.its_vm)
> > write_gicreg(0, ICH_HCR_EL2);
> > -
> > - cpu_if->vgic_ap0r[0] = 0;
> > - cpu_if->vgic_ap0r[1] = 0;
> > - cpu_if->vgic_ap0r[2] = 0;
> > - cpu_if->vgic_ap0r[3] = 0;
> > - cpu_if->vgic_ap1r[0] = 0;
> > - cpu_if->vgic_ap1r[1] = 0;
> > - cpu_if->vgic_ap1r[2] = 0;
> > - cpu_if->vgic_ap1r[3] = 0;
> > }
> >
> > val = read_gicreg(ICC_SRE_EL2);
> > @@ -287,8 +256,6 @@ void __hyp_text __vgic_v3_restore_state(struct kvm_vcpu *vcpu)
> > {
> > struct vgic_v3_cpu_if *cpu_if = &vcpu->arch.vgic_cpu.vgic_v3;
> > u64 used_lrs = vcpu->arch.vgic_cpu.used_lrs;
> > - u64 val;
> > - u32 nr_pre_bits;
> > int i;
> >
> > /*
> > @@ -306,32 +273,9 @@ void __hyp_text __vgic_v3_restore_state(struct kvm_vcpu *vcpu)
> > write_gicreg(cpu_if->vgic_vmcr, ICH_VMCR_EL2);
> > }
> >
> > - val = read_gicreg(ICH_VTR_EL2);
> > - nr_pre_bits = vtr_to_nr_pre_bits(val);
> > -
> > if (used_lrs) {
> > write_gicreg(cpu_if->vgic_hcr, ICH_HCR_EL2);
> >
> > - switch (nr_pre_bits) {
> > - case 7:
> > - __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[3], 3);
> > - __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[2], 2);
> > - case 6:
> > - __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[1], 1);
> > - default:
> > - __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[0], 0);
> > - }
> > -
> > - switch (nr_pre_bits) {
> > - case 7:
> > - __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[3], 3);
> > - __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[2], 2);
> > - case 6:
> > - __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[1], 1);
> > - default:
> > - __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[0], 0);
> > - }
> > -
> > for (i = 0; i < used_lrs; i++)
> > __gic_v3_set_lr(cpu_if->vgic_lr[i], i);
> > } else {
> > @@ -364,6 +308,72 @@ void __hyp_text __vgic_v3_restore_state(struct kvm_vcpu *vcpu)
> > ICC_SRE_EL2);
> > }
> >
> > +void __hyp_text __vgic_v3_save_aprs(struct kvm_vcpu *vcpu)
> > +{
> > + struct vgic_v3_cpu_if *cpu_if;
> > + u64 val;
> > + u32 nr_pre_bits;
> > +
> > + vcpu = kern_hyp_va(vcpu);
> > + cpu_if = &vcpu->arch.vgic_cpu.vgic_v3;
> > +
> > + val = read_gicreg(ICH_VTR_EL2);
> > + nr_pre_bits = vtr_to_nr_pre_bits(val);
> > +
> > + switch (nr_pre_bits) {
> > + case 7:
> > + cpu_if->vgic_ap0r[3] = __vgic_v3_read_ap0rn(3);
> > + cpu_if->vgic_ap0r[2] = __vgic_v3_read_ap0rn(2);
> > + case 6:
> > + cpu_if->vgic_ap0r[1] = __vgic_v3_read_ap0rn(1);
> > + default:
> > + cpu_if->vgic_ap0r[0] = __vgic_v3_read_ap0rn(0);
> > + }
> > +
> > + switch (nr_pre_bits) {
> > + case 7:
> > + cpu_if->vgic_ap1r[3] = __vgic_v3_read_ap1rn(3);
> > + cpu_if->vgic_ap1r[2] = __vgic_v3_read_ap1rn(2);
> > + case 6:
> > + cpu_if->vgic_ap1r[1] = __vgic_v3_read_ap1rn(1);
> > + default:
> > + cpu_if->vgic_ap1r[0] = __vgic_v3_read_ap1rn(0);
> > + }
> > +}
> > +
> > +void __hyp_text __vgic_v3_restore_aprs(struct kvm_vcpu *vcpu)
> > +{
> > + struct vgic_v3_cpu_if *cpu_if;
> > + u64 val;
> > + u32 nr_pre_bits;
> > +
> > + vcpu = kern_hyp_va(vcpu);
> > + cpu_if = &vcpu->arch.vgic_cpu.vgic_v3;
> > +
> > + val = read_gicreg(ICH_VTR_EL2);
> > + nr_pre_bits = vtr_to_nr_pre_bits(val);
> > +
> > + switch (nr_pre_bits) {
> > + case 7:
> > + __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[3], 3);
> > + __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[2], 2);
> > + case 6:
> > + __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[1], 1);
> > + default:
> > + __vgic_v3_write_ap0rn(cpu_if->vgic_ap0r[0], 0);
> > + }
> > +
> > + switch (nr_pre_bits) {
> > + case 7:
> > + __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[3], 3);
> > + __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[2], 2);
> > + case 6:
> > + __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[1], 1);
> > + default:
> > + __vgic_v3_write_ap1rn(cpu_if->vgic_ap1r[0], 0);
> > + }
> > +}
> > +
> > void __hyp_text __vgic_v3_init_lrs(void)
> > {
> > int max_lr_idx = vtr_to_max_lr_idx(read_gicreg(ICH_VTR_EL2));
> > diff --git a/virt/kvm/arm/vgic/vgic-v2.c b/virt/kvm/arm/vgic/vgic-v2.c
> > index 1e5f3eb6973d..ca7cfee9f353 100644
> > --- a/virt/kvm/arm/vgic/vgic-v2.c
> > +++ b/virt/kvm/arm/vgic/vgic-v2.c
> > @@ -446,7 +446,6 @@ void vgic_v2_save_state(struct kvm_vcpu *vcpu)
> > {
> > struct kvm *kvm = vcpu->kvm;
> > struct vgic_dist *vgic = &kvm->arch.vgic;
> > - struct vgic_v2_cpu_if *cpu_if = &vcpu->arch.vgic_cpu.vgic_v2;
> > void __iomem *base = vgic->vctrl_base;
> > u64 used_lrs = vcpu->arch.vgic_cpu.used_lrs;
> >
> > @@ -454,11 +453,8 @@ void vgic_v2_save_state(struct kvm_vcpu *vcpu)
> > return;
> >
> > if (used_lrs) {
> > - cpu_if->vgic_apr = readl_relaxed(base + GICH_APR);
> > save_lrs(vcpu, base);
> > writel_relaxed(0, base + GICH_HCR);
> > - } else {
> > - cpu_if->vgic_apr = 0;
> > }
> > }
> >
> > @@ -476,7 +472,6 @@ void vgic_v2_restore_state(struct kvm_vcpu *vcpu)
> >
> > if (used_lrs) {
> > writel_relaxed(cpu_if->vgic_hcr, base + GICH_HCR);
> > - writel_relaxed(cpu_if->vgic_apr, base + GICH_APR);
> > for (i = 0; i < used_lrs; i++) {
> > writel_relaxed(cpu_if->vgic_lr[i],
> > base + GICH_LR0 + (i * 4));
> > @@ -490,6 +485,7 @@ void vgic_v2_load(struct kvm_vcpu *vcpu)
> > struct vgic_dist *vgic = &vcpu->kvm->arch.vgic;
> >
> > writel_relaxed(cpu_if->vgic_vmcr, vgic->vctrl_base + GICH_VMCR);
> > + writel_relaxed(cpu_if->vgic_apr, vgic->vctrl_base + GICH_APR);
> > }
> >
> > void vgic_v2_put(struct kvm_vcpu *vcpu)
> > @@ -498,4 +494,5 @@ void vgic_v2_put(struct kvm_vcpu *vcpu)
> > struct vgic_dist *vgic = &vcpu->kvm->arch.vgic;
> >
> > cpu_if->vgic_vmcr = readl_relaxed(vgic->vctrl_base + GICH_VMCR);
> > + cpu_if->vgic_apr = readl_relaxed(vgic->vctrl_base + GICH_APR);
> > }
> > diff --git a/virt/kvm/arm/vgic/vgic-v3.c b/virt/kvm/arm/vgic/vgic-v3.c
> > index b76e21f3e6bd..4bafcd1e6bb8 100644
> > --- a/virt/kvm/arm/vgic/vgic-v3.c
> > +++ b/virt/kvm/arm/vgic/vgic-v3.c
> > @@ -16,6 +16,7 @@
> > #include <linux/kvm.h>
> > #include <linux/kvm_host.h>
> > #include <kvm/arm_vgic.h>
> > +#include <asm/kvm_hyp.h>
> > #include <asm/kvm_mmu.h>
> > #include <asm/kvm_asm.h>
> >
> > @@ -587,6 +588,8 @@ void vgic_v3_load(struct kvm_vcpu *vcpu)
> > */
> > if (likely(cpu_if->vgic_sre))
> > kvm_call_hyp(__vgic_v3_write_vmcr, cpu_if->vgic_vmcr);
> > +
> > + kvm_call_hyp(__vgic_v3_restore_aprs, vcpu);
> > }
> >
> > void vgic_v3_put(struct kvm_vcpu *vcpu)
> > @@ -595,4 +598,6 @@ void vgic_v3_put(struct kvm_vcpu *vcpu)
> >
> > if (likely(cpu_if->vgic_sre))
> > cpu_if->vgic_vmcr = kvm_call_hyp(__vgic_v3_read_vmcr);
> > +
> > + kvm_call_hyp(__vgic_v3_save_aprs, vcpu);
> > }
> >
>
> An unfortunate consequence of the save/restore de-aggregation process in
> this series is that we end-up doing quite a few EL2 calls in the !VHE
> case. We should probably think of consolidating those behind a single
> EL2 call if they have a measurable impact.
We could, but the trap to EL2 (without saving all GP regs beyond the
normal calling convention) is really cheap, so I don't think it *is*
that bad, but it *feels* bad. Also, few of these are in the criticial
path, right?
I'll admit that I haven't measured non-VHE GICv3 impact of this series
(only non-VHE GICv2 which saw a small improvement).
>
> In the meantime:
>
> Reviewed-by: Marc Zyngier <marc.zyngier@arm.com>
>
Thanks,
-Christoffer
next prev parent reply other threads:[~2018-02-22 14:44 UTC|newest]
Thread overview: 138+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-02-15 21:02 [PATCH v4 00/40] Optimize KVM/ARM for VHE systems Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 01/40] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN Christoffer Dall
2018-02-21 9:32 ` Marc Zyngier
2018-02-21 17:05 ` Andrew Jones
2018-02-15 21:02 ` [PATCH v4 02/40] KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init Christoffer Dall
2018-02-21 11:05 ` Marc Zyngier
2018-02-15 21:02 ` [PATCH v4 03/40] KVM: arm64: Avoid storing the vcpu pointer on the stack Christoffer Dall
2018-02-19 15:50 ` Julien Grall
2018-02-22 8:43 ` Christoffer Dall
2018-02-21 11:34 ` Marc Zyngier
2018-02-22 9:02 ` Christoffer Dall
2018-02-22 9:35 ` Marc Zyngier
2018-02-22 9:49 ` Andrew Jones
2018-02-21 17:32 ` Andrew Jones
2018-02-22 9:10 ` Christoffer Dall
2018-02-22 9:56 ` Andrew Jones
2018-02-22 10:24 ` Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 04/40] KVM: arm64: Rework hyp_panic for VHE and non-VHE Christoffer Dall
2018-02-21 17:32 ` Andrew Jones
2018-02-15 21:02 ` [PATCH v4 05/40] KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 06/40] KVM: arm/arm64: Get rid of vcpu->arch.irq_lines Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 07/40] KVM: arm/arm64: Add kvm_vcpu_load_sysregs and kvm_vcpu_put_sysregs Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 08/40] KVM: arm/arm64: Introduce vcpu_el1_is_32bit Christoffer Dall
2018-02-21 12:05 ` Marc Zyngier
2018-02-22 9:11 ` Christoffer Dall
2018-02-21 17:34 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 09/40] KVM: arm64: Move debug dirty flag calculation out of world switch Christoffer Dall
2018-02-21 17:35 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 10/40] KVM: arm64: Slightly improve debug save/restore functions Christoffer Dall
2018-02-21 17:39 ` Andrew Jones
2018-02-21 17:52 ` Marc Zyngier
2018-02-22 8:05 ` Andrew Jones
2018-02-24 18:32 ` Christoffer Dall
2018-02-24 20:16 ` Marc Zyngier
2018-02-15 21:03 ` [PATCH v4 11/40] KVM: arm64: Improve debug register save/restore flow Christoffer Dall
2018-02-21 17:40 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 12/40] KVM: arm64: Factor out fault info population and gic workarounds Christoffer Dall
2018-02-21 17:41 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 13/40] KVM: arm64: Introduce VHE-specific kvm_vcpu_run Christoffer Dall
2018-02-21 17:43 ` Andrew Jones
2018-02-21 18:18 ` Andrew Jones
2018-02-22 9:16 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 14/40] KVM: arm64: Remove kern_hyp_va() use in VHE switch function Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 15/40] KVM: arm64: Don't deactivate VM on VHE systems Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 16/40] KVM: arm64: Remove noop calls to timer save/restore from VHE switch Christoffer Dall
2018-02-21 17:43 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 17/40] KVM: arm64: Move userspace system registers into separate function Christoffer Dall
2018-02-19 17:21 ` Julien Grall
2018-02-22 9:18 ` Christoffer Dall
2018-02-21 12:21 ` Marc Zyngier
2018-02-15 21:03 ` [PATCH v4 18/40] KVM: arm64: Rewrite sysreg alternatives to static keys Christoffer Dall
2018-02-21 17:44 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 19/40] KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 20/40] KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe Christoffer Dall
2018-02-21 17:47 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 21/40] KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 22/40] KVM: arm64: Don't save the host ELR_EL2 and SPSR_EL2 on VHE systems Christoffer Dall
2018-02-21 17:49 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 23/40] KVM: arm64: Change 32-bit handling of VM system registers Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 24/40] KVM: arm64: Rewrite system register accessors to read/write functions Christoffer Dall
2018-02-19 18:12 ` Julien Grall
2018-02-22 9:18 ` Christoffer Dall
2018-02-21 13:32 ` Marc Zyngier
2018-02-22 9:22 ` Christoffer Dall
2018-02-22 10:48 ` Marc Zyngier
2018-02-22 11:10 ` Christoffer Dall
2018-02-22 13:26 ` Marc Zyngier
2018-02-22 13:34 ` Andrew Jones
2018-02-22 14:35 ` Christoffer Dall
2018-02-22 15:11 ` Andrew Jones
2018-02-22 15:58 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 25/40] KVM: arm64: Introduce framework for accessing deferred sysregs Christoffer Dall
2018-02-21 14:16 ` Marc Zyngier
2018-02-22 13:40 ` Andrew Jones
2018-02-22 14:56 ` Christoffer Dall
2018-02-22 17:40 ` Julien Grall
2018-02-15 21:03 ` [PATCH v4 26/40] KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 Christoffer Dall
2018-02-21 14:47 ` Marc Zyngier
2018-02-22 9:25 ` Christoffer Dall
2018-02-22 13:49 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 27/40] KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 Christoffer Dall
2018-02-21 15:08 ` Marc Zyngier
2018-02-22 13:51 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 28/40] KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE Christoffer Dall
2018-02-21 15:33 ` Marc Zyngier
2018-02-23 18:05 ` Christoffer Dall
2018-02-22 14:04 ` Andrew Jones
2018-02-22 18:30 ` Julien Grall
2018-02-22 18:31 ` Julien Grall
2018-02-22 19:49 ` Christoffer Dall
2018-02-22 19:48 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 29/40] KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers Christoffer Dall
2018-02-21 15:44 ` Marc Zyngier
2018-02-22 14:30 ` Andrew Jones
2018-02-23 11:35 ` Julien Grall
2018-02-15 21:03 ` [PATCH v4 30/40] KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put Christoffer Dall
2018-02-21 16:27 ` Marc Zyngier
2018-02-22 18:15 ` Christoffer Dall
2018-02-22 14:35 ` Andrew Jones
2018-02-22 14:58 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 31/40] KVM: arm64: Move common VHE/non-VHE trap config in separate functions Christoffer Dall
2018-02-21 17:59 ` Marc Zyngier
2018-02-22 18:17 ` Christoffer Dall
2018-02-25 21:27 ` Christoffer Dall
2018-02-22 15:34 ` Andrew Jones
2018-02-23 14:30 ` Julien Grall
2018-02-23 17:48 ` Christoffer Dall
2018-02-25 21:29 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 32/40] KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions Christoffer Dall
2018-02-21 18:11 ` Marc Zyngier
2018-02-22 15:38 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 33/40] KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE Christoffer Dall
2018-02-21 18:20 ` Marc Zyngier
2018-02-22 18:57 ` Christoffer Dall
2018-02-22 15:51 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 34/40] KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE Christoffer Dall
2018-02-21 18:26 ` Marc Zyngier
2018-02-22 19:04 ` Christoffer Dall
2018-02-22 15:54 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 35/40] KVM: arm/arm64: Get rid of vgic_elrsr Christoffer Dall
2018-02-22 9:45 ` Marc Zyngier
2018-02-23 14:44 ` Julien Grall
2018-02-23 17:50 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 36/40] KVM: arm/arm64: Handle VGICv2 save/restore from the main VGIC code Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 37/40] KVM: arm/arm64: Move arm64-only vgic-v2-sr.c file to arm64 Christoffer Dall
2018-02-22 12:33 ` Marc Zyngier
2018-02-22 14:37 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 38/40] KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE Christoffer Dall
2018-02-22 12:32 ` Marc Zyngier
2018-02-22 14:42 ` Christoffer Dall
2018-02-22 15:01 ` Marc Zyngier
2018-02-22 16:02 ` Christoffer Dall
2018-02-22 17:21 ` Marc Zyngier
2018-02-22 19:28 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 39/40] KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load Christoffer Dall
2018-02-22 13:11 ` Marc Zyngier
2018-02-22 14:44 ` Christoffer Dall [this message]
2018-02-15 21:03 ` [PATCH v4 40/40] KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs Christoffer Dall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180222144443.GP29376@cbox \
--to=christoffer.dall@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).