HI,
I've just been looking through the patches Greg KH has stored for
3.5-stable and this doesn't seem to be amongst them.
I can't see any way in which it contravenes the stable rules and, given
there's a distinct possibility of a mix of i386, kvm-1.1.x and a 3.5
kernel resulting in a crash,
This is the hypercall documentation patch series
First patch covers KVM specific hypercall information.
second patch is has typo fix for vmcall instruction
comment in kvm_para.h
Third patch includes a veryful documentation on PowerPC
hypercalls originally written by Alex
Changes since initial po
From: Raghavendra K T
Thanks Alex for KVM_HC_FEATURES inputs and Jan for VAPIC_POLL_IRQ,
and Peter (HPA) for suggesting hypercall ABI addition.
Signed-off-by: Raghavendra K T
---
TODO: We need to add history details of each hypercall as suggested by HPA,
which I could not trace easily. Hope it
From: Alexander Graf
Signed-off-by: Alexander Graf
Signed-off-by: Raghavendra K T
---
Documentation/virtual/kvm/ppc-pv.txt | 22 ++
1 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/Documentation/virtual/kvm/ppc-pv.txt
b/Documentation/virtual/kvm/ppc-pv.tx
From: Raghavendra K T
Signed-off-by: Raghavendra K T
---
arch/x86/include/asm/kvm_para.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/include/asm/kvm_para.h b/arch/x86/include/asm/kvm_para.h
index 2f7712e..20f5697 100644
--- a/arch/x86/include/asm/kvm_para
On 08/07/2012 01:10 PM, Raghavendra K T wrote:
From: Alexander Graf
Signed-off-by: Alexander Graf
Signed-off-by: Raghavendra K T
---
Sorry it meant to be 3/3.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo
On 08/07/2012 01:09 PM, Raghavendra K T wrote:
This is the hypercall documentation patch series
First patch covers KVM specific hypercall information.
second patch has typo fix for vmcall instruction
comment in kvm_para.h
Third patch includes a very useful documentation on PowerPC
hypercalls or
On 08/06/2012 11:25 PM, Scott Wood wrote:
> On 08/05/2012 04:00 AM, Avi Kivity wrote:
>> On 08/04/2012 01:32 AM, Benjamin Herrenschmidt wrote:
>>> On Fri, 2012-08-03 at 15:05 -0300, Marcelo Tosatti wrote:
>>>
See kvm_arch_process_async_events() call to qemu_system_reset_request()
in targe
This patch introduces bio-based IO path for virtio-blk.
Compared to request-based IO path, bio-based IO path uses driver
provided ->make_request_fn() method to bypasses the IO scheduler. It
handles the bio to device directly without allocating a request in block
layer. This reduces the IO path in
We need to support both REQ_FLUSH and REQ_FUA for bio based path since
it does not get the sequencing of REQ_FUA into REQ_FLUSH that request
based drivers can request.
REQ_FLUSH is emulated by:
A) If the bio has no data to write:
1. Send VIRTIO_BLK_T_FLUSH to device,
2. In the flush I/O completion
Hi, all
This version reworked on REQ_FLUSH and REQ_FUA support as suggested by
Christoph and dropped the block core bits since Jens has picked them up.
Fio test shows bio-based IO path gives the following performance improvement:
1) Ramdisk device
With bio-based IO path, sequential read/wri
On 08/07/2012 04:32 AM, David Gibson wrote:
> On Tue, Aug 07, 2012 at 06:57:57AM +1000, Benjamin Herrenschmidt wrote:
>> On Mon, 2012-08-06 at 13:13 +1000, David Gibson wrote:
>> > So, I'm still trying to nut out the implications for H_CEDE, and think
>> > if there are any other hypercalls that mig
On 08/06/2012 11:17 PM, Christoph Hellwig wrote:
On Thu, Aug 02, 2012 at 02:43:04PM +0800, Asias He wrote:
Even if it has a payload waiting is highly suboptimal and it should
use a non-blocking sequencing like it is done in the request layer.
So, for REQ_FLUSH, what we need is that send out th
At least after review is done I really think this patch sopuld be folded
into the previous one.
Some more comments below:
> @@ -58,6 +58,12 @@ struct virtblk_req
> struct bio *bio;
> struct virtio_blk_outhdr out_hdr;
> struct virtio_scsi_inhdr in_hdr;
> + struct work_struct
On Tue, Aug 07, 2012 at 04:47:13PM +0800, Asias He wrote:
> 1) Ramdisk device
> With bio-based IO path, sequential read/write, random read/write
> IOPS boost : 28%, 24%, 21%, 16%
> Latency improvement: 32%, 17%, 21%, 16%
> 2) Fusion IO device
> With bio-based IO path, se
Changelog:
- introduce KVM_PFN_ERR_RO_FAULT instead of dummy page
- introduce KVM_HVA_ERR_BAD and optimize error hva indicators
The test case can be found at:
http://lkml.indiana.edu/hypermail/linux/kernel/1207.2/00819/migrate-perf.tar.bz2
In current code, if we map a readonly memory space from h
Check flags when memslot is registered from userspace as Avi's suggestion
Signed-off-by: Xiao Guangrong
---
virt/kvm/kvm_main.c | 12
1 files changed, 12 insertions(+), 0 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index a2e85af..7b94d70 100644
--- a/virt/
Quote Avi's comment:
| KVM_MEMSLOT_INVALID is actually an internal symbol, not used by
| userspace. Please move it to kvm_host.h.
Also, move KVM_MEMSLOT_INVALID to the highest bit
Signed-off-by: Xiao Guangrong
---
include/linux/kvm.h |1 -
include/linux/kvm_host.h |2 ++
2 files c
It can instead of hva_to_pfn_atomic
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c |5 +
include/linux/kvm_host.h |3 ++-
virt/kvm/kvm_main.c | 14 --
3 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu
This set of functions is only used to read data from host space, in the
later patch, we will only get a readonly hva in gfn_to_hva_read, and
the function name is a good hint to let gfn_to_hva_read to pair with
kvm_read_hva()/kvm_read_hva_atomic()
Signed-off-by: Xiao Guangrong
---
virt/kvm/kvm_ma
We do too many things in hva_to_pfn, this patch reorganize the code,
let it be better readable
Signed-off-by: Xiao Guangrong
---
virt/kvm/kvm_main.c | 159 +++
1 files changed, 97 insertions(+), 62 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/
In current code, we always map writable pfn for the read-fault, in order
to support readonly memslot, we map writable pfn only if 'writable'
is not NULL
Signed-off-by: Xiao Guangrong
---
virt/kvm/kvm_main.c | 24 +++-
1 files changed, 23 insertions(+), 1 deletions(-)
diff
In the later patch, it indicates failure when we try to get a writable
pfn from the readonly memslot
Signed-off-by: Xiao Guangrong
---
include/linux/kvm_host.h |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 187c9
Then, remove bad_hva and inline kvm_is_error_hva
Signed-off-by: Xiao Guangrong
---
include/linux/kvm_host.h |8 +++-
virt/kvm/kvm_main.c | 13 +
2 files changed, 8 insertions(+), 13 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 83
In the later patch, it indicates failure when we try to get a writable
hva from the readonly slot
Signed-off-by: Xiao Guangrong
---
include/linux/kvm_host.h |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 7737
In current code, if we map a readonly memory space from host to guest
and the page is not currently mapped in the host, we will get a fault-pfn
and async is not allowed, then the vm will crash
We introduce readonly memory region to map ROM/ROMD to the guest, read access
is happy for readonly memsl
Introduce set_mmio_exit_info to cleanup the common code
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/x86.c | 33 +
1 files changed, 17 insertions(+), 16 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 4c86239..8cde327 100644
--- a/arch
Introduce write_readonly_mem in mmio-exit-info to indicate this exit is
caused by write access on readonly memslot
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/x86.c | 12
include/linux/kvm.h |3 +++
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c |
On 03.08.2012, at 07:30, Bharat Bhushan wrote:
> This patch adds the watchdog emulation in KVM. The watchdog
> emulation is enabled by KVM_ENABLE_CAP(KVM_CAP_PPC_BOOKE_WATCHDOG) ioctl.
> The kernel timer are used for watchdog emulation and emulates
> h/w watchdog state machine. On watchdog timer
On 03.08.2012, at 07:30, Bharat Bhushan wrote:
> I am sending this as a separate patch for easiness on review.
> Once reviewed I will merge this with watchdog patch.
Please don't merge, but rather make 2 different patches out of it:
1) Introduce kvmppc_handle_requests()
2) Implement watchdo
On 03.08.2012, at 09:08, Bharat Bhushan wrote:
> From: Bharat Bhushan
>
> IAC/DAC are defined as 32 bit while they are 64 bit wide. So ONE_REG
> interface is added to set/get them.
>
> Signed-off-by: Bharat Bhushan
> ---
> arch/powerpc/include/asm/kvm.h | 12 ++
> arch/powerpc/inclu
On 03.08.2012, at 09:08, Bharat Bhushan wrote:
> Current kvmppc_booke_handlers uses the same macro (KVM_HANDLER) and
> all handlers are considered to be the same size. This will not be
> the case if we want to use different macros for different handlers.
>
> This patch improves the kvmppc_booke_
On 03.08.2012, at 09:08, Bharat Bhushan wrote:
> Installed debug handler will be used for guest debug support and
> debug facility emulation features (patches for these features
> will follow this patch).
>
> Signed-off-by: Liu Yu
> [bharat.bhus...@freescale.com: Substantial changes]
> Signed-o
This patch set adds a very simple implementation of MMU notifiers for the
e500 target. Along the way, I stumbled over a few other things that I've
put into the same patch set, namely:
* e500 prerequisites
* icache flushing on page map (probably also hits ARM!)
* exit trace point for e500
Al
Our mapping code assumes that TLB0 entries are always mapped. However, after
calling clear_tlb_refs() this is no longer the case.
Map them dynamically if we find an entry unmapped in TLB0.
Signed-off-by: Alexander Graf
---
arch/powerpc/kvm/e500_tlb.c |8 ++--
1 files changed, 6 insertio
The e500 target has lived without mmu notifiers ever since it got
introduced, but fails for the user space check on them with hugetlbfs.
So in order to get that one working, implement mmu notifiers in a
reasonably dumb fashion and be happy. On embedded hardware, we almost
never end up with mmu not
We're already counting remote TLB flushes in a variable, but don't export
it to user space yet. Do so, so we know what's going on.
Signed-off-by: Alexander Graf
---
arch/powerpc/kvm/booke.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/arch/powerpc/kvm/booke.c b/arch/p
Some archs need to ensure that their icache is flushed when mapping a new
page. Add a callback to the generic code for an arch to implement any cache
flush logic it may need.
Signed-off-by: Alexander Graf
---
virt/kvm/kvm_main.c |6 +-
1 files changed, 5 insertions(+), 1 deletions(-)
di
When we map a page that wasn't icache cleared before, do so when first
mapping it in KVM using the same information bits as the Linux mapping
logic. That way we are 100% sure that any page we map does not have stale
entries in the icache.
What we really would need is a method to flush the icache o
Architecture code might want to figure out if an hva that it gets for example
via the mmu notifier callbacks actually is in guest mapped memory, and if so,
in which memory slot.
This patch introduces a helper function to enable it to do so. It is a
prerequisite for the e500 mmu notifier implementa
Semantically, the "SYNC" cap means that we have mmu notifiers available.
Express this in our #ifdef'ery around the feature, so that we can be sure
we don't miss out on ppc targets when they get their implementation.
Signed-off-by: Alexander Graf
---
arch/powerpc/kvm/powerpc.c |8 +++-
1
We want to have tracing information on guest exits for booke as well
as book3s. Since most information is identical, use a common trace point.
Signed-off-by: Alexander Graf
---
arch/powerpc/kvm/book3s_pr.c |2 +-
arch/powerpc/kvm/booke.c |3 ++
arch/powerpc/kvm/trace.h | 79 +++
This is against today's linux-next.
KVM is using test_and_set_bit_le() for this missing function; this patch
series corrects this usage.
As some drivers have their own definitions of set_bit_le(), a bit of
preparation is also needed.
Although these are differently implemented, especially for b
From: Ben Hutchings
There are now standard functions for dealing with little-endian bit
arrays, so use them instead of our own implementations.
Signed-off-by: Ben Hutchings
Signed-off-by: Takuya Yoshikawa
---
drivers/net/ethernet/sfc/efx.c|4 ++--
drivers/net/ethernet/sfc/net_driv
From: Takuya Yoshikawa
To introduce generic set_bit_le() later, we remove our own definition
and use a proper non-atomic bitops function: __set_bit_le().
Signed-off-by: Takuya Yoshikawa
Acked-by: Grant Grundler
---
drivers/net/ethernet/dec/tulip/de2104x.c|7 ++-
drivers/net/ethern
From: Takuya Yoshikawa
Needed to replace test_and_set_bit_le() in virt/kvm/kvm_main.c which is
being used for this missing function.
Signed-off-by: Takuya Yoshikawa
Acked-by: Arnd Bergmann
---
include/asm-generic/bitops/le.h | 10 ++
1 files changed, 10 insertions(+), 0 deletions(-)
From: Takuya Yoshikawa
Needed to replace test_and_set_bit_le() in virt/kvm/kvm_main.c which is
being used for this missing function.
Signed-off-by: Takuya Yoshikawa
Acked-by: Benjamin Herrenschmidt
---
arch/powerpc/include/asm/bitops.h | 10 ++
1 files changed, 10 insertions(+), 0 d
From: Takuya Yoshikawa
Now that we have defined generic set_bit_le() we do not need to use
test_and_set_bit_le() for atomically setting a bit.
Signed-off-by: Takuya Yoshikawa
Cc: Avi Kivity
Cc: Marcelo Tosatti
---
virt/kvm/kvm_main.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(
On Mon, Aug 06, 2012 at 03:08:28PM +0300, Avi Kivity wrote:
> On 08/06/2012 02:49 PM, Gleb Natapov wrote:
> > On Mon, Aug 06, 2012 at 02:39:52PM +0300, Avi Kivity wrote:
> >> On 08/06/2012 02:05 PM, Gleb Natapov wrote:
> >> > On Mon, Aug 06, 2012 at 12:28:05PM +0300, Avi Kivity wrote:
> >> >> On 08
On (Fri) 03 Aug 2012 [15:57:49], Marcelo Tosatti wrote:
>
> kvm_guest_time_update unconditionally clears hv_clock.flags field,
> so the notification never reaches the guest.
>
> Fix it by allowing PVCLOCK_GUEST_STOPPED to passthrough.
>
> Signed-off-by: Marcelo Tosatti
Reviewed-by: Amit Shah
On Tue, Aug 07, 2012 at 11:46:35AM +0300, Avi Kivity wrote:
> On 08/07/2012 04:32 AM, David Gibson wrote:
> > On Tue, Aug 07, 2012 at 06:57:57AM +1000, Benjamin Herrenschmidt wrote:
> >> On Mon, 2012-08-06 at 13:13 +1000, David Gibson wrote:
> >> > So, I'm still trying to nut out the implications f
On 08/07/2012 03:14 PM, David Gibson wrote:
> On Tue, Aug 07, 2012 at 11:46:35AM +0300, Avi Kivity wrote:
>> On 08/07/2012 04:32 AM, David Gibson wrote:
>> > On Tue, Aug 07, 2012 at 06:57:57AM +1000, Benjamin Herrenschmidt wrote:
>> >> On Mon, 2012-08-06 at 13:13 +1000, David Gibson wrote:
>> >> >
Juan Quintela wrote:
> Hi
>
> Please send in any agenda items you are interested in covering.
As there are no agenda, today call got cancelled.
Happy hacking, Juan.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majord
On Wed, 2012-08-01 at 07:57 +0800, Fengguang Wu wrote:
> >
> > What was the next lines? I bet you it was "PASSED". Which means it did
> > not fail. This is the second bug you found that has to do with RCU being
> > called in 'idle'. The one that Paul posted a patch for.
>
> Yeah, PASSED!
I have
On 08/07/2012 01:57 PM, Alexander Graf wrote:
> The e500 target has lived without mmu notifiers ever since it got
> introduced, but fails for the user space check on them with hugetlbfs.
>
> So in order to get that one working, implement mmu notifiers in a
> reasonably dumb fashion and be happy. O
On Tue, Aug 07, 2012 at 09:29:33AM -0400, Steven Rostedt wrote:
> On Wed, 2012-08-01 at 07:57 +0800, Fengguang Wu wrote:
> > >
> > > What was the next lines? I bet you it was "PASSED". Which means it did
> > > not fail. This is the second bug you found that has to do with RCU being
> > > called in
On 08/07/2012 01:57 PM, Alexander Graf wrote:
> Some archs need to ensure that their icache is flushed when mapping a new
> page. Add a callback to the generic code for an arch to implement any cache
> flush logic it may need.
>
> Signed-off-by: Alexander Graf
> ---
> virt/kvm/kvm_main.c |6
On 2012-08-03 14:57, Marcelo Tosatti wrote:
kvm_guest_time_update unconditionally clears hv_clock.flags field,
so the notification never reaches the guest.
Fix it by allowing PVCLOCK_GUEST_STOPPED to passthrough.
Signed-off-by: Marcelo Tosatti
Reviewed-by: Eric B Munson
--
To unsubscribe f
On 07.08.2012, at 15:32, Avi Kivity wrote:
> On 08/07/2012 01:57 PM, Alexander Graf wrote:
>> Some archs need to ensure that their icache is flushed when mapping a new
>> page. Add a callback to the generic code for an arch to implement any cache
>> flush logic it may need.
>>
>> Signed-off-by
On 07.08.2012, at 15:30, Avi Kivity wrote:
> On 08/07/2012 01:57 PM, Alexander Graf wrote:
>> The e500 target has lived without mmu notifiers ever since it got
>> introduced, but fails for the user space check on them with hugetlbfs.
>>
>> So in order to get that one working, implement mmu not
On 08/07/2012 04:44 PM, Alexander Graf wrote:
>
>>
>> Is this the correct place? Who says the caller of hva_to_pfn() is going
>> to map it?
>
> I don't think anyone is. However, we need the struct page, and all the
> generic kvm mm code tries hard to hide it from its users. The alternative
>
On 08/06/2012 08:20 PM, Peter Maydell wrote:
> On 3 July 2012 10:01, Christoffer Dall wrote:
>> From: Christoffer Dall
>>
>> Userspace can inject IRQs and FIQs through the KVM_IRQ_LINE VM ioctl.
>> This ioctl is used since the sematics are in fact two lines that can be
>> either raised or lowered
On 07.08.2012, at 15:58, Avi Kivity wrote:
> On 08/07/2012 04:44 PM, Alexander Graf wrote:
>>
>>>
>>> Is this the correct place? Who says the caller of hva_to_pfn() is going
>>> to map it?
>>
>> I don't think anyone is. However, we need the struct page, and all the
>> generic kvm mm code t
On 08/07/2012 05:08 PM, Alexander Graf wrote:
>
>
> On 07.08.2012, at 15:58, Avi Kivity wrote:
>
>> On 08/07/2012 04:44 PM, Alexander Graf wrote:
>>>
Is this the correct place? Who says the caller of hva_to_pfn() is going
to map it?
>>>
>>> I don't think anyone is. However, w
On 7 August 2012 14:59, Avi Kivity wrote:
> On 08/06/2012 08:20 PM, Peter Maydell wrote:
>> On 3 July 2012 10:01, Christoffer Dall wrote:
>>> From: Christoffer Dall
>>>
>>> Userspace can inject IRQs and FIQs through the KVM_IRQ_LINE VM ioctl.
>>> This ioctl is used since the sematics are in fact
On 07.08.2012, at 16:10, Avi Kivity wrote:
> On 08/07/2012 05:08 PM, Alexander Graf wrote:
>>
>>
>> On 07.08.2012, at 15:58, Avi Kivity wrote:
>>
>>> On 08/07/2012 04:44 PM, Alexander Graf wrote:
>
> Is this the correct place? Who says the caller of hva_to_pfn() is going
>>>
On 08/07/2012 04:52 PM, Alexander Graf wrote:
>>>
>>> +/* MMU Notifiers */
>>> +
>>> +int kvm_unmap_hva(struct kvm *kvm, unsigned long hva)
>>> +{
>>> +/* Is this a guest page? */
>>> +if (!hva_to_memslot(kvm, hva))
>>> +return 0;
>>> +
>>> +/*
>>> +
On 08/07/2012 05:14 PM, Alexander Graf wrote:
>
>
> On 07.08.2012, at 16:10, Avi Kivity wrote:
>
>> On 08/07/2012 05:08 PM, Alexander Graf wrote:
>>>
>>>
>>> On 07.08.2012, at 15:58, Avi Kivity wrote:
>>>
On 08/07/2012 04:44 PM, Alexander Graf wrote:
>
>>
>> Is this the c
On 07.08.2012, at 16:14, Avi Kivity wrote:
> On 08/07/2012 04:52 PM, Alexander Graf wrote:
+/* MMU Notifiers */
+
+int kvm_unmap_hva(struct kvm *kvm, unsigned long hva)
+{
+/* Is this a guest page? */
+if (!hva_to_memslot(kvm,
On 07.08.2012, at 16:20, Avi Kivity wrote:
> On 08/07/2012 05:14 PM, Alexander Graf wrote:
>>
>>
>> On 07.08.2012, at 16:10, Avi Kivity wrote:
>>
>>> On 08/07/2012 05:08 PM, Alexander Graf wrote:
On 07.08.2012, at 15:58, Avi Kivity wrote:
> On 08/07/2012 04:44 PM
On 08/07/2012 05:12 PM, Peter Maydell wrote:
> On 7 August 2012 14:59, Avi Kivity wrote:
>> On 08/06/2012 08:20 PM, Peter Maydell wrote:
>>> On 3 July 2012 10:01, Christoffer Dall
>>> wrote:
From: Christoffer Dall
Userspace can inject IRQs and FIQs through the KVM_IRQ_LINE VM ioc
On 08/07/2012 05:24 PM, Alexander Graf wrote:
>>>
>>> Pre-map? How?
>>
>> In arch code before you install the page in a pte/tlbe.
>
> So how do I get to the struct page in there?
>
pfn_to_page()
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list:
On 7 August 2012 15:28, Avi Kivity wrote:
> On 08/07/2012 05:12 PM, Peter Maydell wrote:
>> On 7 August 2012 14:59, Avi Kivity wrote:
>>> What do you mean by "per-vcpu version of KVM_IRQ_LINE"?
>>
>> The ARM VGIC implementation implements "I need to raise per-CPU
>> interrupt X" by providing a vc
Hi,
I've been working on a new virtio transport for s390 replacing the
existing s390-virtio transport. Patches to Linux, qemu and the virtio
spec will follow.
Why?
s390-virtio is quite limited in the number of supported devices (all
related structures need to fit into a single specially mapped
Hi,
the following patches implement support for a virtual channel
subsystem in the host (virtio-ccw on the host is handled by
user space).
Patches 1 and 2 add support for injecting I/O interrupts and
(some) machine checks via the already existing mechanisms.
The most important parts are those han
Add support for handling I/O interrupts (standard, subchannel-related
ones and rudimentary adapter interrupts).
The subchannel-identifying parameters are encoded into the interrupt
type.
I/O interrupts are floating, so they can't be injected on a specific
vcpu.
Signed-off-by: Cornelia Huck
---
Add support for injecting machine checks (only repressible
conditions for now).
This is a bit more involved than I/O interrupts, for these reasons:
- Machine checks come in both floating and cpu varieties.
- We don't have a bit for machine checks enabling, but have to use
a roundabout approach
kvm will need to use some css-related structures (pmcw, schib, orb),
so let's move the definitions from drivers/s390/cio/ to include/asm/.
Signed-off-by: Cornelia Huck
---
arch/s390/include/asm/orb.h | 69 +++
arch/s390/include/asm/schib.h | 52 +
This will be needed by the new virtio-ccw transport.
Signed-off-by: Cornelia Huck
---
arch/s390/include/asm/ccwdev.h | 5 +
drivers/s390/cio/device_ops.c | 10 ++
2 files changed, 15 insertions(+)
diff --git a/arch/s390/include/asm/ccwdev.h b/arch/s390/include/asm/ccwdev.h
index 1
Running under a kvm host does not necessarily imply the presence of
a page mapped above the main memory with the virtio information;
however, the code includes a hard coded access to that page.
Instead, check for the presence of the page and exit gracefully
before we hit an addressing exception if
Signed-off-by: Cornelia Huck
---
Documentation/virtual/kvm/api.txt | 2 +-
arch/s390/kvm/kvm-s390.c | 26 ++
2 files changed, 27 insertions(+), 1 deletion(-)
diff --git a/Documentation/virtual/kvm/api.txt
b/Documentation/virtual/kvm/api.txt
index bf33aaa..140e7
There's no need to keep __MAX_SUBCHANNEL and __MAX_SSID private to the
common I/O layer when __MAX_CSSID is usable by everybody.
Signed-off-by: Cornelia Huck
---
arch/s390/include/asm/cio.h | 2 ++
drivers/s390/cio/css.h | 3 ---
2 files changed, 2 insertions(+), 3 deletions(-)
diff --git
Provide a mechanism for qemu to provide fully virtual subchannels to
the guest. In the KVM case, this relies on the kernel's css support.
The !KVM case is not yet supported.
Signed-off-by: Cornelia Huck
---
hw/s390x/Makefile.objs | 1 +
hw/s390x/css.c | 440
Add a new virtio transport that uses channel commands to perform
virtio operations.
Add a new machine type s390-ccw that uses this virtio-ccw transport
and make it the default machine for s390.
Signed-off-by: Cornelia Huck
---
hw/qdev-monitor.c | 5 +
hw/s390-virtio.c | 268 +++
Hi,
following are the qemu parts for supporting virtual channel I/O
and the new virtio-ccw transport.
Patch 1 pulls in the new interface definitions.
Patch 2 contains the ground work for supporting virtual subchannels
(kvm only).
Patch 3 implements the new virtio-ccw transport.
Patch 4 makes v
This code is transport agnostic and can be used by both the legacy
virtio code and virtio_ccw.
Signed-off-by: Cornelia Huck
---
drivers/s390/kvm/Makefile | 2 +-
drivers/s390/kvm/early_printk.c | 42 +
drivers/s390/kvm/kvm_virtio.c | 29 ++
Add a driver for kvm guests that matches virtual ccw devices provided
by the host as virtio bridge devices.
These virtio-ccw devices use a special set of channel commands in order
to perform virtio functions.
Signed-off-by: Cornelia Huck
---
arch/s390/include/asm/irq.h | 1 +
arch/s390/kern
This patch enables using both virtio-xxx-s390 and virtio-xxx-ccw
by making the alias lookup code verify that a driver is actually
registered.
(Only included in order to allow testing of virtio-ccw; should be
replaced by cleaning up the virtio bus model.)
Not-signed-off-by: Cornelia Huck
---
blo
Add specifications for the new s390 specific virtio-ccw transport.
Signed-off-by: Cornelia Huck
---
virtio-spec.lyx | 433 +++
1 files changed, 433 insertions(+), 0 deletions(-)
diff --git a/virtio-spec.lyx b/virtio-spec.lyx
index 7a073f4..52
Hi,
here's an update to the virtio spec describing the basics of
the virtio-ccw mechanism.
Cornelia Huck (1):
virtio-spec: Add virtio-ccw spec.
virtio-spec.lyx | 433 +++
1 files changed, 433 insertions(+), 0 deletions(-)
--
1.7.5.4
--
T
Signed-off-by: Cornelia Huck
---
linux-headers/asm-s390/kvm.h | 2 +-
linux-headers/asm-s390/kvm_para.h | 2 +-
linux-headers/linux/kvm.h | 63 +++
3 files changed, 65 insertions(+), 2 deletions(-)
diff --git a/linux-headers/asm-s390/kvm.h b/lin
Explicitely catch all channel I/O related instructions intercepts
in the kernel and set condition code 3 for them.
This paws the way for properly handling these instructions later
on.
Note: This is not architecture compliant (the previous code wasn't
either) since setting cc 3 is not the correct
Hi,
the following patches are for Linux running as a guest under a
host with virtio-ccw support.
Patch 1 makes the kvm_virtio driver exit gracefully if the page
containing s390-virtio information it expects is not present; it
could probably go in seperately from the other patches.
Patch 2 export
On 2 August 2012 10:14, Jan Kiszka wrote:
> On 2012-07-26 16:35, Peter Maydell wrote:
>> This patch series removes all uses of kvm_irqchip_in_kernel()
>> from architecture-independent code, by creating a set of more
>> specific functions instead to test for the particular aspects
>> of behaviour t
> -Original Message-
> From: Alexander Graf [mailto:ag...@suse.de]
> Sent: Tuesday, August 07, 2012 3:38 PM
> To: Bhushan Bharat-R65777
> Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Bhushan Bharat-R65777
> Subject: Re: [PATCH 1/2] KVM: PPC: booke: Add watchdog emulation
>
>
> On 0
> -Original Message-
> From: kvm-ppc-ow...@vger.kernel.org [mailto:kvm-ppc-ow...@vger.kernel.org] On
> Behalf Of Alexander Graf
> Sent: Tuesday, August 07, 2012 4:18 PM
> To: Bhushan Bharat-R65777
> Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Bhushan Bharat-R65777
> Subject: Re: [PA
Hi Linus,
The following changes since commit 42a579a0f960081cd16fc945036e4780c3ad3202:
Merge branches 'timers-urgent-for-linus' and 'perf-urgent-for-linus' of
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip (2012-08-05 22:28:49
+0300)
are available in the git repository at:
git://g
On 08/07/2012 05:47 AM, Alexander Graf wrote:
>> diff --git a/arch/powerpc/kvm/booke_interrupts.S
>> b/arch/powerpc/kvm/booke_interrupts.S
>> index 3539805..890673c 100644
>> --- a/arch/powerpc/kvm/booke_interrupts.S
>> +++ b/arch/powerpc/kvm/booke_interrupts.S
>> @@ -73,6 +73,51 @@ _GLOBAL(kvmppc
On Tue, Aug 7, 2012 at 2:52 PM, Cornelia Huck wrote:
> Add a new virtio transport that uses channel commands to perform
> virtio operations.
>
> Add a new machine type s390-ccw that uses this virtio-ccw transport
> and make it the default machine for s390.
>
> Signed-off-by: Cornelia Huck
> ---
>
On Tue, Aug 7, 2012 at 2:52 PM, Cornelia Huck wrote:
> Provide a mechanism for qemu to provide fully virtual subchannels to
> the guest. In the KVM case, this relies on the kernel's css support.
> The !KVM case is not yet supported.
>
> Signed-off-by: Cornelia Huck
> ---
> hw/s390x/Makefile.objs
1 - 100 of 133 matches
Mail list logo