[{"id":3675600,"web_url":"http://patchwork.ozlabs.org/comment/3675600/","msgid":"<CAKmqyKNHFSEQfWJ2eygX=KSRQQvjAEDvi-f51SknW3zrSFZksA@mail.gmail.com>","list_archive_url":null,"date":"2026-04-10T01:45:40","subject":"Re: [PATCH v5 4/6] target/riscv: Implement SMMPT fence instructions","submitter":{"id":64571,"url":"http://patchwork.ozlabs.org/api/people/64571/","name":"Alistair Francis","email":"alistair23@gmail.com"},"content":"On Thu, Apr 9, 2026 at 12:08 AM LIU Zhiwei <zhiwei_liu@linux.alibaba.com> wrote:\n>\n> This patch completes the SMMPT implementation by adding support for the\n> new fence instructions: `mfence.spa` and `minval.spa`.\n>\n> According to the specification, these instructions act as memory ordering\n> fences for MPT updates. In QEMU's TCG model, this is conservatively\n> implemented by flushing the entire TLB, which ensures that any subsequent\n> memory accesses will re-evaluate permissions and see the effects of any prior\n> MPT modifications.\n>\n> The instructions are privileged and will cause an illegal instruction\n> exception if executed outside of M-mode.\n>\n> Co-authored-by: Huang Tao <eric.huang@linux.alibaba.com>\n> Co-authored-by: TANG Tiancheng <lyndra@linux.alibaba.com>\n> Signed-off-by: LIU Zhiwei <zhiwei_liu@linux.alibaba.com>\n> Reviewed-by: Daniel Henrique Barboza <dbarboza@ventanamicro.com>\n\nReviewed-by: Alistair Francis <alistair.francis@wdc.com>\n\nAlistair\n\n> ---\n>  target/riscv/insn32.decode                    |  2 ++\n>  .../riscv/insn_trans/trans_privileged.c.inc   | 30 +++++++++++++++++++\n>  2 files changed, 32 insertions(+)\n>\n> diff --git a/target/riscv/insn32.decode b/target/riscv/insn32.decode\n> index 6e35c4b1e6..84cec57daf 100644\n> --- a/target/riscv/insn32.decode\n> +++ b/target/riscv/insn32.decode\n> @@ -120,6 +120,8 @@ sret        0001000    00010 00000 000 00000 1110011\n>  mret        0011000    00010 00000 000 00000 1110011\n>  wfi         0001000    00101 00000 000 00000 1110011\n>  sfence_vma  0001001    ..... ..... 000 00000 1110011 @sfence_vma\n> +mfence_spa  1000011    ..... ..... 000 00000 1110011 @sfence_vma\n> +minval_spa  0000011    ..... ..... 000 00000 1110011 @sfence_vma\n>\n>  # *** NMI ***\n>  mnret       0111000    00010 00000 000 00000 1110011\n> diff --git a/target/riscv/insn_trans/trans_privileged.c.inc b/target/riscv/insn_trans/trans_privileged.c.inc\n> index 8a62b4cfcd..5ec6bf5991 100644\n> --- a/target/riscv/insn_trans/trans_privileged.c.inc\n> +++ b/target/riscv/insn_trans/trans_privileged.c.inc\n> @@ -160,3 +160,33 @@ static bool trans_sfence_vma(DisasContext *ctx, arg_sfence_vma *a)\n>  #endif\n>      return false;\n>  }\n> +\n> +#define REQUIRE_SMSDID(ctx) do {          \\\n> +    if (!ctx->cfg_ptr->ext_smsdid) {      \\\n> +        return false;                     \\\n> +    }                                     \\\n> +} while (0)\n> +\n> +static bool do_mfence_spa(DisasContext *ctx)\n> +{\n> +#ifndef CONFIG_USER_ONLY\n> +    REQUIRE_SMSDID(ctx);\n> +    if (ctx->priv != PRV_M) {\n> +        return false;\n> +    }\n> +    decode_save_opc(ctx, 0);\n> +    gen_helper_tlb_flush_all(tcg_env);\n> +    return true;\n> +#endif\n> +    return false;\n> +}\n> +\n> +static bool trans_mfence_spa(DisasContext *ctx, arg_mfence_spa *a)\n> +{\n> +    return do_mfence_spa(ctx);\n> +}\n> +\n> +static bool trans_minval_spa(DisasContext *ctx, arg_minval_spa *a)\n> +{\n> +    return do_mfence_spa(ctx);\n> +}\n> --\n> 2.43.0\n>","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=kA/fTHYR;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fsKQx04x9z1yGb\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 10 Apr 2026 11:46:33 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wB0wp-0001sN-38; Thu, 09 Apr 2026 21:46:15 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <alistair23@gmail.com>)\n id 1wB0wl-0001rZ-Fh\n for qemu-devel@nongnu.org; Thu, 09 Apr 2026 21:46:11 -0400","from mail-ej1-x634.google.com ([2a00:1450:4864:20::634])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <alistair23@gmail.com>)\n id 1wB0wj-0003vs-NW\n for qemu-devel@nongnu.org; Thu, 09 Apr 2026 21:46:11 -0400","by mail-ej1-x634.google.com with SMTP id\n a640c23a62f3a-b9bfcbaa81eso243229366b.1\n for <qemu-devel@nongnu.org>; Thu, 09 Apr 2026 18:46:09 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; t=1775785568; cv=none;\n d=google.com; s=arc-20240605;\n b=iB3AZbkYt0nq0AV5JWmo+yMLPhGlRNPSZIiEKktgpGKDfntLWDMzIsrKxQpDRmdGVl\n R8fZbjpo4PU/BA876LBveqdieG66OT1RhVSmazJKxtbZos2gWpFvvk3NFHm3ANjdQoIo\n NVJmhODrtxRDo45C0WfiradDyXjnGzoCVjk+cjHDVSo4hv33xdjlxxCzacwqRlsd71Wv\n LfrUyLlUi1JhJYoxH/PyCXZVug7kh4GLLWB2aRL1o07t180EE8CSBRi75JloUd7O+5h7\n wUJjURwWslg7tbin3FhH4gnxbbAN6nu9gw2FiJG1rNVMdXUPLgq/jN+3R5KJTkZHE7x+\n x7lA==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:dkim-signature;\n bh=48O1IHH1DQP+ZObYjU1/cjoGrzQ06gIxprk0HEWRSPc=;\n fh=cWfiSq/oFyTN/DKvcJSgQUgJ4u5YSKmpf6by/WUOfgI=;\n b=S8qd7W40uBzsaEwfheig2GgC7K2FFNZsV2qHzUyxEqhBmBciiw+iAMjueoK68cCc9L\n xhanutMS+4Syeo4PRQxgCh4J/8P3VjocOyAsNUfbCNG9jy7uY3BKbVufaEziextsbqE+\n uXtGNgU7NpwfxzQaZ5D2XVMwvBdOAgU1igwCJCEVw3N8yTINl6HaHpxnpIffocGpJLyE\n VsMgZ9SWPduMa3QxZjYkckreX4xom+s1e0W7drwfGpgTCW4mJAY0y3HTbACHX9VqnhEa\n NUzSTJStQfOTjdFIju3htMwq1rvu8GOvtcz+7c0QjqLCR33IgtlfjjrjzDN5Kapwe0Uf\n 1CNQ==; darn=nongnu.org","ARC-Authentication-Results":"i=1; mx.google.com; arc=none","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1775785568; x=1776390368; darn=nongnu.org;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:from:to:cc:subject:date\n :message-id:reply-to;\n bh=48O1IHH1DQP+ZObYjU1/cjoGrzQ06gIxprk0HEWRSPc=;\n b=kA/fTHYRRdYzP8A0YD1j6pKFHCHZKaF0lQ5T6Eb3K8t1KK0nFlh8s7BpT/XqzGo6L6\n 5KoJuhKG0NOKCODb1CQTHscz0o3mThLRyWB107gUWmE2KjtEGFIcWXU1JeG/x4Uzt6X6\n 4gdc2v33cm/bBv8Pbn76XS2NfGJA8Jp4DLEgL9tfLZxJ8TGW/MzGP7fmUMV7t3YnP3IJ\n AaDwxMhDvAAcykTLLDEmzZ2kj4Ko0uZwBfcCEbKOu3DOELf1jwojNjaXafH/v1nxzaps\n rPaLYWN1e8o9EJyVYa0vEzESLXUoCK4pGUvsr8eTmi1Oa0QZLp9jrmNzyXeZavcZZX5f\n qa2Q==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775785568; x=1776390368;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=48O1IHH1DQP+ZObYjU1/cjoGrzQ06gIxprk0HEWRSPc=;\n b=q6Di3Pq37F16W/5gwP3NpKGQnSgkGHbqDv7HtQX7XzvF0yD7LvOCHVDWha1Q66qt4f\n pNimEhCSLn2CO7rUtpkpDr/W/ZnqH6VlWDr3X9LDdv8RmgNm8ONuySmRxfrfmH174q76\n 0rwJE7pLnt+r9poNsh6X0cNDNN9Rvjrffp6lyKAJNoPlmYTtr6TluiTmGqmQkhFczbLF\n yaKLBSuDLZtLbhnu/mk+wm4xAE8gR92aKhcIDBZT5AAvz0zxxJ3PsGaTnXruEIC4HA/E\n 0+IvSSHb41Nt3JyFDqPBNCwNxvAbndc/JXV7L5Rirgh+00olEgtgmsPj9MIbsM5KTBdP\n qPWQ==","X-Gm-Message-State":"AOJu0YyNeu5kRM8rN3AVERGsSPTJ5PEa1Mn+o0ulD3ispypazCEZVm5f\n mLl4CHcNhygxhW/h050gkSgz26/mRO/f0lwxB9E6Iqf+wqwcvWH55O+tKoY2+J+mXof69ivJOd3\n t1oaLDLLiTXJpgBmN+jqOoRrU4SflOv4=","X-Gm-Gg":"AeBDietcGrEgSJetAj5GD26wBFiC+I+mEs69Pd2if8Utsuex9/ReBey9qa3hyibpjT5\n 2cAuR/UZ9aMJhci8x1aQOBmlwm0+vhO2BKDrYFjTgLMQRkTxC0GSo0qr6d/H+Ifj6j3vMTbXBA+\n kfKSAkbJ3iWXpH5acXB+OHcvT5HhoPwO9rvywmRxv2j6jFF4gf61dsn/zZF//9dMa3XGgWlpPwk\n mVlrE40sh9X5R1IKD7tl3lfSETC7Xj2b8UCc2k9TbCqgy69tEhCceuvyg5+QOLLvjhs+7c080Mw\n 47fcUlO+XkNmcQW3IQ311nXunulxy8e41qPtjg==","X-Received":"by 2002:a17:907:a806:b0:b9c:3ba2:2da8 with SMTP id\n a640c23a62f3a-b9d72aeb9b9mr88133866b.52.1775785567624; Thu, 09 Apr 2026\n 18:46:07 -0700 (PDT)","MIME-Version":"1.0","References":"<20260408140635.42546-1-zhiwei_liu@linux.alibaba.com>\n <20260408140635.42546-5-zhiwei_liu@linux.alibaba.com>","In-Reply-To":"<20260408140635.42546-5-zhiwei_liu@linux.alibaba.com>","From":"Alistair Francis <alistair23@gmail.com>","Date":"Fri, 10 Apr 2026 11:45:40 +1000","X-Gm-Features":"AQROBzBqoJ7tXl5khSC8HqlK8OpR3lOGe-7FZWCcwcHu5D8d8xnu26uNKatFtxU","Message-ID":"\n <CAKmqyKNHFSEQfWJ2eygX=KSRQQvjAEDvi-f51SknW3zrSFZksA@mail.gmail.com>","Subject":"Re: [PATCH v5 4/6] target/riscv: Implement SMMPT fence instructions","To":"LIU Zhiwei <zhiwei_liu@linux.alibaba.com>","Cc":"qemu-devel@nongnu.org, qemu-riscv@nongnu.org, chao.liu.zevorn@gmail.com,\n palmer@dabbelt.com, daniel.barboza@oss.qualcomm.com, liwei1518@gmail.com,\n Huang Tao <eric.huang@linux.alibaba.com>,\n TANG Tiancheng <lyndra@linux.alibaba.com>,\n Daniel Henrique Barboza <dbarboza@ventanamicro.com>","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable","Received-SPF":"pass client-ip=2a00:1450:4864:20::634;\n envelope-from=alistair23@gmail.com; helo=mail-ej1-x634.google.com","X-Spam_score_int":"-17","X-Spam_score":"-1.8","X-Spam_bar":"-","X-Spam_report":"(-1.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3676548,"web_url":"http://patchwork.ozlabs.org/comment/3676548/","msgid":"<CANzO1D1m3Jht1BNuPi3MvCr=iQRHWSgEGZqHryNof=m4Dra7SA@mail.gmail.com>","list_archive_url":null,"date":"2026-04-13T08:19:08","subject":"Re: [PATCH v5 4/6] target/riscv: Implement SMMPT fence instructions","submitter":{"id":79604,"url":"http://patchwork.ozlabs.org/api/people/79604/","name":"Frank Chang","email":"frank.chang@sifive.com"},"content":"Hi Zhiwei,\n\nLIU Zhiwei <zhiwei_liu@linux.alibaba.com> 於 2026年4月9日週四 上午3:24寫道：\n>\n> This patch completes the SMMPT implementation by adding support for the\n> new fence instructions: `mfence.spa` and `minval.spa`.\n>\n> According to the specification, these instructions act as memory ordering\n> fences for MPT updates. In QEMU's TCG model, this is conservatively\n> implemented by flushing the entire TLB, which ensures that any subsequent\n> memory accesses will re-evaluate permissions and see the effects of any prior\n> MPT modifications.\n>\n> The instructions are privileged and will cause an illegal instruction\n> exception if executed outside of M-mode.\n>\n> Co-authored-by: Huang Tao <eric.huang@linux.alibaba.com>\n> Co-authored-by: TANG Tiancheng <lyndra@linux.alibaba.com>\n> Signed-off-by: LIU Zhiwei <zhiwei_liu@linux.alibaba.com>\n> Reviewed-by: Daniel Henrique Barboza <dbarboza@ventanamicro.com>\n> ---\n>  target/riscv/insn32.decode                    |  2 ++\n>  .../riscv/insn_trans/trans_privileged.c.inc   | 30 +++++++++++++++++++\n>  2 files changed, 32 insertions(+)\n>\n> diff --git a/target/riscv/insn32.decode b/target/riscv/insn32.decode\n> index 6e35c4b1e6..84cec57daf 100644\n> --- a/target/riscv/insn32.decode\n> +++ b/target/riscv/insn32.decode\n> @@ -120,6 +120,8 @@ sret        0001000    00010 00000 000 00000 1110011\n>  mret        0011000    00010 00000 000 00000 1110011\n>  wfi         0001000    00101 00000 000 00000 1110011\n>  sfence_vma  0001001    ..... ..... 000 00000 1110011 @sfence_vma\n> +mfence_spa  1000011    ..... ..... 000 00000 1110011 @sfence_vma\n> +minval_spa  0000011    ..... ..... 000 00000 1110011 @sfence_vma\n>\n>  # *** NMI ***\n>  mnret       0111000    00010 00000 000 00000 1110011\n> diff --git a/target/riscv/insn_trans/trans_privileged.c.inc b/target/riscv/insn_trans/trans_privileged.c.inc\n> index 8a62b4cfcd..5ec6bf5991 100644\n> --- a/target/riscv/insn_trans/trans_privileged.c.inc\n> +++ b/target/riscv/insn_trans/trans_privileged.c.inc\n> @@ -160,3 +160,33 @@ static bool trans_sfence_vma(DisasContext *ctx, arg_sfence_vma *a)\n>  #endif\n>      return false;\n>  }\n> +\n> +#define REQUIRE_SMSDID(ctx) do {          \\\n> +    if (!ctx->cfg_ptr->ext_smsdid) {      \\\n> +        return false;                     \\\n> +    }                                     \\\n> +} while (0)\n> +\n> +static bool do_mfence_spa(DisasContext *ctx)\n> +{\n> +#ifndef CONFIG_USER_ONLY\n> +    REQUIRE_SMSDID(ctx);\n> +    if (ctx->priv != PRV_M) {\n> +        return false;\n> +    }\n> +    decode_save_opc(ctx, 0);\n> +    gen_helper_tlb_flush_all(tcg_env);\n> +    return true;\n> +#endif\n> +    return false;\n> +}\n> +\n> +static bool trans_mfence_spa(DisasContext *ctx, arg_mfence_spa *a)\n> +{\n> +    return do_mfence_spa(ctx);\n> +}\n> +\n> +static bool trans_minval_spa(DisasContext *ctx, arg_minval_spa *a)\n> +{\n> +    return do_mfence_spa(ctx);\n> +}\n\nThe spec says that:\n\"When Svinval is implemented with Smsdid, the MINVAL.SPA instruction\nmust be implemented to\nsupport such fine-granular invalidation of physical memory\naccess-permission caches.\"\n\nSo I think we should call REQUIRE_SVINVAL() for MINVAL.SPA.\nHowever, trans_privileged.c.inc is included before trans_svinval.c.inc.\nSo it might be better to separate these instructions into trans_smmpt.c.inc\nand include it after trans_svinval.c.inc.\n\nRegards,\nFrank Chang\n\n> --\n> 2.43.0\n>\n>","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=sifive.com header.i=@sifive.com header.a=rsa-sha256\n header.s=google header.b=J9kAr7+K;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fvL1k6nb2z1yDF\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 13 Apr 2026 18:20:09 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wCCW4-0004B8-SP; Mon, 13 Apr 2026 04:19:32 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <frank.chang@sifive.com>)\n id 1wCCW1-0004AS-2g\n for qemu-devel@nongnu.org; Mon, 13 Apr 2026 04:19:29 -0400","from mail-pf1-x435.google.com ([2607:f8b0:4864:20::435])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <frank.chang@sifive.com>)\n id 1wCCVx-00027j-QJ\n for qemu-devel@nongnu.org; Mon, 13 Apr 2026 04:19:28 -0400","by mail-pf1-x435.google.com with SMTP id\n d2e1a72fcca58-82f431c0ab6so220053b3a.0\n for <qemu-devel@nongnu.org>; Mon, 13 Apr 2026 01:19:24 -0700 (PDT)","from mail-dy1-f182.google.com (mail-dy1-f182.google.com.\n [74.125.82.182]) by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-82f0c50cd34sm11044463b3a.54.2026.04.13.01.19.20\n for <qemu-devel@nongnu.org>\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Mon, 13 Apr 2026 01:19:20 -0700 (PDT)","by mail-dy1-f182.google.com with SMTP id\n 5a478bee46e88-2d9916deb14so747857eec.0\n for <qemu-devel@nongnu.org>; Mon, 13 Apr 2026 01:19:20 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=sifive.com; s=google; t=1776068363; x=1776673163; darn=nongnu.org;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:from:to:cc:subject:date\n :message-id:reply-to;\n bh=H5SO0u6mvsYx2Er9GPM2Ae6cAoCEMLwS+a9b90sE9fY=;\n b=J9kAr7+KiuxCeCM3XiY4FqkCPxviU9E1gtacviaKmDw6aUhD2s60j2AN5JviArtNH3\n Aqq+tJNcNqFvGfWTMwwyTP4kok3NY3p95G6ctU5NxUEhXypiOb5ywshIWRqqhV5ZQvm9\n lblUyen94BObzJcNb7VyKu8NHyHj3GiLJHsma8kXfta8F2YwR1g90PGbtse609Gw8HZ7\n 86tg9YPZ7+txiYQavIGsNsBhtQTc3p9KxXmSAfXjcJi2o1byBkIlGOxlGwbEm23WCp0t\n nZRbRs3qIcoBixbOgFBi8GotmX20ufIgb062Yky2iJlfpgtfPhfw9HD/LnYbiQFXVrhL\n 8uBQ==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776068363; x=1776673163;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=H5SO0u6mvsYx2Er9GPM2Ae6cAoCEMLwS+a9b90sE9fY=;\n b=HufQQN9vLoOqFWjpAzIYtT68AnUZ/rdBUvJ89c0LUnneoj9cxJfl000f/EIJlBRCX0\n mbNWlHSTKfJOHh+DMkgVbb9TqaRHKJEUH/E3+C0MyjlYuoRkFJxGn2Q6oVXtSk7at39M\n Vu0pEoeqT/GRJrWvojxbFenkLpZxkZcmCLOb4LyKGcuzpO9F3oUP5Sg8ijmDFFj60Nw9\n G5InR9ntVg7vKav00Rv3mLts7TO1Zl/TDPAH3pdQNmQ6j8jXSe1uPlEMwTl5j84A64C3\n dqS/I3dSIWJq5TxJZPxCxructg02oGx/23gJ6wFJFJDuwHp+NGQEQsT9Xbgvcu/lZfmO\n Lpyw==","X-Gm-Message-State":"AOJu0YyIDbmxkVuPCGJ4u2c+laWGS9xhWUS9Avkkn7dVkIjO0CQ9o6ti\n SXKAvEHgHgCiS0pbZHvhplIfJQ/OeSrFAEHKCimysqKy8kPE0sZX9EG0f/rrPMuLT43v1LDj4Pf\n ZTq3YTmGDICXqq6afQSl1yAu9OWswy12yV7m2TH8RQUnSC9t4KcagFqDZ7C9P5UgZWEiN5QW36E\n qq6LWpZ0vsilLp+hIIBLZTILZMEweMb4ixpnQjgeFDhrW4gUZD","X-Gm-Gg":"AeBDieu/UbHNTSv0B4DqCLxMgsD8WMZg59h0/Fnum9BMilafpsmsOhfPYRpICi0AQ6r\n R6+TDFhmQbVNoycK9Q+aUqgu+iJKj35Q4FCM2sncndwfRAyYZPFOa4LM3000jGJeQ536biTJXMA\n 1hXWGzsr27K6WCX7knidfRftz+LI8tGNHh46vEPvc0i+fdQoO9A49iEfdOugUQSEwgWLgFStayh\n 0f8k8LM2Uyl2nNLPWOvPWMKNzNfIC5aFRbRNGFj32UyMKdIiPIv43TdqHqOpnfG2Uf3WsuPt4Lq\n xZAoN4IOAbOe+vE5YS60E5X/si/RkK2JdO+6NMIB4brRj8jgmiv49XCbjfsTjclY1baS2NMRyBm\n IFYF9hUqh1xKY1LJue+/O2XYXCRjw2mhOQmLzj6IgpWs866Fb9JWHwwDyB1TK8AjKDBfxyoSK/q\n xkungU4B5VJZ4dsFnWUzVTv5adj6z0TCcppqFgV72mjU8WLJedfOma+V4g7iR7H8eC6A==","X-Received":["by 2002:a05:6a00:e13:b0:823:3079:7c7 with SMTP id\n d2e1a72fcca58-82f0c2f7a36mr13587732b3a.29.1776068361683;\n Mon, 13 Apr 2026 01:19:21 -0700 (PDT)","by 2002:a05:7300:8c85:b0:2be:8216:57db with SMTP id\n 5a478bee46e88-2d5873ad987mr6250054eec.3.1776068359715; Mon, 13 Apr 2026\n 01:19:19 -0700 (PDT)"],"MIME-Version":"1.0","References":"<20260408140635.42546-1-zhiwei_liu@linux.alibaba.com>\n <20260408140635.42546-5-zhiwei_liu@linux.alibaba.com>","In-Reply-To":"<20260408140635.42546-5-zhiwei_liu@linux.alibaba.com>","From":"Frank Chang <frank.chang@sifive.com>","Date":"Mon, 13 Apr 2026 16:19:08 +0800","X-Gmail-Original-Message-ID":"\n <CANzO1D1m3Jht1BNuPi3MvCr=iQRHWSgEGZqHryNof=m4Dra7SA@mail.gmail.com>","X-Gm-Features":"AQROBzDlQBeDu4axNKOHGLK79oUM32wm7upOSCSPbvUDVoLJlHQjsJa93v_aOL4","Message-ID":"\n <CANzO1D1m3Jht1BNuPi3MvCr=iQRHWSgEGZqHryNof=m4Dra7SA@mail.gmail.com>","Subject":"Re: [PATCH v5 4/6] target/riscv: Implement SMMPT fence instructions","To":"LIU Zhiwei <zhiwei_liu@linux.alibaba.com>","Cc":"qemu-devel@nongnu.org, qemu-riscv@nongnu.org, chao.liu.zevorn@gmail.com,\n palmer@dabbelt.com, alistair23@gmail.com, daniel.barboza@oss.qualcomm.com,\n liwei1518@gmail.com, Huang Tao <eric.huang@linux.alibaba.com>,\n TANG Tiancheng <lyndra@linux.alibaba.com>,\n Daniel Henrique Barboza <dbarboza@ventanamicro.com>","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable","Received-SPF":"pass client-ip=2607:f8b0:4864:20::435;\n envelope-from=frank.chang@sifive.com; helo=mail-pf1-x435.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}}]