Liu Yu wrote:
> If the guest hypervisor node contains "has-idle" property.
>
> Signed-off-by: Liu Yu
> ---
> v5: no change
>
> arch/powerpc/kernel/epapr_hcalls.S | 29 +
> arch/powerpc/kernel/epapr_paravirt.c | 11 ++-
> 2 files changed, 39 insertions(+
Liu Yu-B13201 wrote:
>
>> -Original Message-
>> From: tiejun.chen [mailto:tiejun.c...@windriver.com]
>> Sent: Tuesday, February 21, 2012 6:54 PM
>> To: Liu Yu-B13201
>> Cc: ag...@suse.de; kvm-...@vger.kernel.org; kvm@vger.kernel.org;
>> lin
>> +/*
>> + * Host interrupt handlers may have clobbered these guest-readable
>> + * SPRGs, so we need to reload them here with the guest's values.
>> + */
>> +lwz r3, VCPU_VRSAVE(r4)
>> +lwz r5, VCPU_SHARED_SPRG4(r11)
>> +mtspr SPRN_VRSAVE, r3
>> +lwz
On 04/02/2013 06:47 AM, Scott Wood wrote:
Currently, devices that are emulated inside KVM are configured in a
hardcoded manner based on an assumption that any given architecture
only has one way to do it. If there's any need to access device state,
it is done through inflexible one-purpose-only
On 04/03/2013 01:30 AM, Scott Wood wrote:
On 04/02/2013 01:59:57 AM, tiejun.chen wrote:
On 04/02/2013 06:47 AM, Scott Wood wrote:
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index ff71541..ed033c0 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -2158,6 +2158,17 @@ out
On 04/03/2013 09:34 AM, Scott Wood wrote:
On 04/02/2013 08:28:01 PM, tiejun.chen wrote:
On 04/03/2013 01:30 AM, Scott Wood wrote:
On 04/02/2013 01:59:57 AM, tiejun.chen wrote:
On 04/02/2013 06:47 AM, Scott Wood wrote:
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index ff71541
On 04/08/2013 06:32 PM, Bharat Bhushan wrote:
From: Bharat Bhushan
"ehpriv" instruction is used for setting software breakpoints
by user space. This patch adds support to exit to user space
with "run->debug" have relevant information.
Signed-off-by: Bharat Bhushan
---
arch/powerpc/kvm/e500_
On 04/11/2013 06:03 PM, Mihai Caraman wrote:
Add e6500 core to Kconfig description.
Signed-off-by: Mihai Caraman
---
v3:
- No change
arch/powerpc/kvm/Kconfig |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/powerpc/kvm/Kconfig b/arch/powerpc/kvm/Kconfig
i
On 04/25/2013 05:09 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: tiejun.chen [mailto:tiejun.c...@windriver.com]
Sent: Friday, April 19, 2013 1:03 PM
To: Caraman Mihai Claudiu-B02008
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org
Subject: Re: [PATCH 8/8 v3] KVM: PPC
On 04/25/2013 05:32 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: tiejun.chen [mailto:tiejun.c...@windriver.com]
Sent: Thursday, April 25, 2013 12:17 PM
To: Caraman Mihai Claudiu-B02008
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org
Subject: Re: [PATCH 8/8 v3] KVM
On 04/25/2013 08:11 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: kvm-ppc-ow...@vger.kernel.org [mailto:kvm-ppc-
ow...@vger.kernel.org] On Behalf Of Tiejun Chen
Sent: Thursday, April 25, 2013 2:46 PM
To: ga...@kernel.crashing.org
Cc: linuxppc-...@lists.ozlabs.org; kvm-.
On 04/25/2013 07:32 PM, Caraman Mihai Claudiu-B02008 wrote:
Is the flowing is fine with that generic machine, ppce500, to boot
P5040DS with
64bit,
./qemu-system-ppc64 -enable-kvm -m 1048 -nographic -M ppce500 -kernel
uImage
-initrd ramdisk.gz -L . -append "root=/dev/ram rw console=ttyS0,115200"
On 04/26/2013 11:11 AM, tiejun.chen wrote:
On 04/25/2013 07:32 PM, Caraman Mihai Claudiu-B02008 wrote:
Is the flowing is fine with that generic machine, ppce500, to boot
P5040DS with
64bit,
./qemu-system-ppc64 -enable-kvm -m 1048 -nographic -M ppce500 -kernel
uImage
-initrd ramdisk.gz -L
On 04/26/2013 06:45 PM, Alexander Graf wrote:
On 08.04.2013, at 12:32, Bharat Bhushan wrote:
From: Bharat Bhushan
"ehpriv" instruction is used for setting software breakpoints
by user space. This patch adds support to exit to user space
with "run->debug" have relevant information.
Signed-of
On 05/06/2013 11:10 AM, Tiejun Chen wrote:
For the external interrupt, the decrementer exception and the doorbell
excpetion, we also need to soft-disable interrupts while doing as host
interrupt handlers since the DO_KVM hook is always performed to skip
EXCEPTION_COMMON then miss this original ch
On 05/06/2013 10:58 PM, Alexander Graf wrote:
On 05/06/2013 04:53 AM, Tiejun Chen wrote:
Actually E500MC also support doorbell exception, and CONFIG_PPC_E500MC
can cover BOOK3E/BOOK3E_64 as well.
Signed-off-by: Tiejun Chen
---
arch/powerpc/kvm/booke.c |2 +-
1 file changed, 1 insertion(+
On 05/07/2013 07:50 AM, Scott Wood wrote:
On 05/05/2013 10:13:17 PM, tiejun.chen wrote:
On 05/06/2013 11:10 AM, Tiejun Chen wrote:
For the external interrupt, the decrementer exception and the doorbell
excpetion, we also need to soft-disable interrupts while doing as host
interrupt handlers
On 05/07/2013 10:06 AM, Scott Wood wrote:
On 05/06/2013 08:56:25 PM, tiejun.chen wrote:
On 05/07/2013 07:50 AM, Scott Wood wrote:
On 05/05/2013 10:13:17 PM, tiejun.chen wrote:
On 05/06/2013 11:10 AM, Tiejun Chen wrote:
For the external interrupt, the decrementer exception and the doorbell
On 05/07/2013 11:32 AM, Scott Wood wrote:
booke64 was not maintaing consistent lazy ee state when exiting the
One typo ;-)
s/maintaing/maintaining
guest, leading to warnings and worse.
booke32 was less affected due to the absence of lazy ee, but it was
still feeding bad information into tr
On 05/07/2013 09:33 AM, tiejun.chen wrote:
On 05/06/2013 10:58 PM, Alexander Graf wrote:
On 05/06/2013 04:53 AM, Tiejun Chen wrote:
Actually E500MC also support doorbell exception, and CONFIG_PPC_E500MC
can cover BOOK3E/BOOK3E_64 as well.
Signed-off-by: Tiejun Chen
---
arch/powerpc/kvm
On 05/08/2013 07:40 AM, Scott Wood wrote:
On 05/07/2013 06:06:30 AM, Tiejun Chen wrote:
We also can direct ISI exception to Guest like DSI.
Signed-off-by: Tiejun Chen
---
arch/powerpc/kvm/booke_emulate.c |3 +++
arch/powerpc/kvm/e500mc.c|3 ++-
2 files changed, 5 insertions(+)
On 05/08/2013 05:20 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
Behalf Of tiejun.chen
Sent: Wednesday, May 08, 2013 4:54 AM
To: Wood Scott-B07421
Cc: ag...@suse.de; kvm-...@vger.kernel.org; kvm
On 05/09/2013 03:33 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Linuxppc-dev [mailto:linuxppc-dev-
bounces+bharat.bhushan=freescale@lists.ozlabs.org] On Behalf Of Caraman
Mihai Claudiu-B02008
Sent: Wednesday, May 08, 2013 6:44 PM
To: Wood Scott-B07421; tiejun.chen
Cc
On 05/09/2013 03:51 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: tiejun.chen [mailto:tiejun.c...@windriver.com]
Sent: Thursday, May 09, 2013 1:18 PM
To: Bhushan Bharat-R65777
Cc: Caraman Mihai Claudiu-B02008; Wood Scott-B07421; linuxppc-
d...@lists.ozlabs.org; ag
On 05/09/2013 04:12 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Kevin Hao [mailto:haoke...@gmail.com]
Sent: Thursday, May 09, 2013 1:38 PM
To: Bhushan Bharat-R65777
Cc: tiejun.chen; Caraman Mihai Claudiu-B02008; kvm@vger.kernel.org; Wood Scott-
B07421; ag...@suse.de; kvm
On 05/09/2013 04:23 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Linuxppc-dev [mailto:linuxppc-dev-
bounces+bharat.bhushan=freescale@lists.ozlabs.org] On Behalf Of Caraman
Mihai Claudiu-B02008
Sent: Wednesday, May 08, 2013 6:44 PM
To: Wood Scott-B07421; tiejun.chen
Cc
On 05/09/2013 06:00 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: tiejun.chen [mailto:tiejun.c...@windriver.com]
Sent: Thursday, May 09, 2013 3:15 PM
To: Bhushan Bharat-R65777
Cc: Caraman Mihai Claudiu-B02008; Wood Scott-B07421; linuxppc-
d...@lists.ozlabs.org; ag
On 05/08/2013 05:28 PM, tiejun.chen wrote:
On 05/08/2013 05:20 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
Behalf Of tiejun.chen
Sent: Wednesday, May 08, 2013 4:54 AM
To: Wood Scott-B07421
Cc: ag
On 05/09/2013 07:21 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: tiejun.chen [mailto:tiejun.c...@windriver.com]
Sent: Thursday, May 09, 2013 3:48 PM
To: Bhushan Bharat-R65777
Cc: Caraman Mihai Claudiu-B02008; Wood Scott-B07421; linuxppc-
d...@lists.ozlabs.org; ag
On 05/09/2013 07:34 PM, Caraman Mihai Claudiu-B02008 wrote:
VF stands for virtualization fault see MAS8[VF] and we may use it for
virtualized
Looks KVM PPC have no this mechanism currently since I don't find MAS8_VF
is
used in kernel, right?
Yes but 'we may use it' in the feature, I have a fu
On 05/10/2013 11:34 AM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of
Scott Wood
Sent: Friday, May 10, 2013 8:40 AM
To: Alexander Graf; Benjamin Herrenschmidt
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.
diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c
index 4e05f8c..f8659aa 100644
--- a/arch/powerpc/kvm/powerpc.c
+++ b/arch/powerpc/kvm/powerpc.c
@@ -64,12 +64,14 @@ int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu)
{
int r = 1;
- WARN_ON_ONCE(!irqs_disabled())
On 05/11/2013 03:39 AM, Alexander Graf wrote:
Am 10.05.2013 um 21:22 schrieb Scott Wood :
On 05/10/2013 12:57:33 PM, Alexander Graf wrote:
Could you guys please collect performance data during the next weeks on both
guest-directed ISIs as well as VF MMIOs (preferably with in-kernel MMIO), s
On 05/13/2013 04:32 PM, nitesh narayan lal wrote:
Hi,
I am doing the virtio performance analysis on PowerPC,with the updated
QEMU I had observed that the EMUL_MTSPR instruction counts in KVM Exit
Sounds you are saying this behaviour is only reproduced after you update QEMU.
If so, you can use
On 06/26/2013 01:42 PM, Bharat Bhushan wrote:
"ehpriv" instruction is used for setting software breakpoints
by user space. This patch adds support to exit to user space
with "run->debug" have relevant information.
As this is the first point we are using run->debug, also defined
the run->debug st
On 06/26/2013 04:44 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: tiejun.chen [mailto:tiejun.c...@windriver.com]
Sent: Wednesday, June 26, 2013 12:25 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; ag...@suse.de; Wood Scott-
B07421; b
On 06/07/2013 08:16 AM, Scott Wood wrote:
Most of these have been posted before, but I grouped them together as
there are some contextual dependencies between them.
Gleb/Paolo: As Alex doesn't appear to be back yet, can you apply these
if there's no objection over the next few days?
Scott and
On 07/09/2013 04:53 PM, Alexander Graf wrote:
Am 09.07.2013 um 09:21 schrieb "tiejun.chen" :
On 06/07/2013 08:16 AM, Scott Wood wrote:
Most of these have been posted before, but I grouped them together as
there are some contextual dependencies between them.
Gleb/Paolo: As Al
On 07/10/2013 05:33 AM, Alexander Graf wrote:
On 09.07.2013, at 11:09, tiejun.chen wrote:
On 07/09/2013 04:53 PM, Alexander Graf wrote:
Am 09.07.2013 um 09:21 schrieb "tiejun.chen" :
On 06/07/2013 08:16 AM, Scott Wood wrote:
Most of these have been posted before, but I gr
On 07/10/2013 05:49 PM, Alexander Graf wrote:
On 10.07.2013, at 08:02, Tiejun Chen wrote:
We should ensure the preemption cannot occur while calling get_paca()
insdide hard_irq_disable(), otherwise the paca_struct may be the
wrong one just after. And btw, we may update timing stats in this cas
On 07/11/2013 03:15 AM, Scott Wood wrote:
On 07/10/2013 01:02:19 AM, Tiejun Chen wrote:
We should ensure the preemption cannot occur while calling get_paca()
insdide hard_irq_disable(), otherwise the paca_struct may be the
wrong one just after. And btw, we may update timing stats in this case.
On 07/12/2013 08:19 AM, Benjamin Herrenschmidt wrote:
On Thu, 2013-07-11 at 15:07 +0200, Alexander Graf wrote:
Ok, let me quickly explain the problem.
We are leaving host context, switching slowly into guest context.
During that transition we call get_paca() indirectly (apparently by
another ca
On 07/12/2013 12:36 AM, Scott Wood wrote:
On 07/11/2013 11:30:41 AM, Alexander Graf wrote:
On 11.07.2013, at 18:18, Scott Wood wrote:
> On 07/11/2013 08:07:30 AM, Alexander Graf wrote:
>> get_paca() warns when we're preemptible. We're only not preemptible when
either preempt is disabled or irq
On 07/12/2013 11:57 AM, Benjamin Herrenschmidt wrote:
On Fri, 2013-07-12 at 10:13 +0800, tiejun.chen wrote:
#define hard_irq_disable()do {\
u8 _was_enabled = get_paca()->soft_enabled; \
Current problem I met is issued from the above l
On 07/13/2013 07:05 AM, Benjamin Herrenschmidt wrote:
On Fri, 2013-07-12 at 12:50 -0500, Scott Wood wrote:
[1] SOFT_DISABLE_INTS seems an odd name for something that updates the
software state to be consistent with interrupts being *hard* disabled.
I can sort of see the logic in it, but it's co
On 07/13/2013 01:50 AM, Scott Wood wrote:
On 07/11/2013 10:22:28 PM, tiejun.chen wrote:
If so, why not to remove directly hard_irq_disable() inside
kvmppc_handle_exit() by reverting that commit, "kvm/ppc/booke64: Fix lazy ee
handling in kvmppc_handle_exit()"?
Then we can use SOFT_DI
On 07/15/2013 10:47 AM, Benjamin Herrenschmidt wrote:
On Mon, 2013-07-15 at 10:20 +0800, tiejun.chen wrote:
What about SOFT_IRQ_DISABLE? This is close to name
hard_irq_disable() :) And
then remove all DISABLE_INTS as well?
Or RECONCILE_IRQ_STATE...
But sounds this doesn't imply thi
On 07/14/2013 12:13 PM, Benjamin Herrenschmidt wrote:
On Fri, 2013-07-12 at 12:54 +0800, tiejun.chen wrote:
Is the following fine?
powerpc: to access local paca after hard irq disabled
We can access paca directly after hard interrupt disabled, and
this can avoid accessing wrong paca when
On 07/16/2013 01:27 AM, Scott Wood wrote:
On 07/14/2013 09:20:00 PM, tiejun.chen wrote:
On 07/13/2013 07:05 AM, Benjamin Herrenschmidt wrote:
On Fri, 2013-07-12 at 12:50 -0500, Scott Wood wrote:
[1] SOFT_DISABLE_INTS seems an odd name for something that updates the
software state to be
On 07/18/2013 02:04 PM, Bharat Bhushan wrote:
If there is a struct page for the requested mapping then it's
normal DDR and the mapping sets "M" bit (coherent, cacheable)
else this is treated as I/O and we set "I + G" (cache inhibited, guarded)
This helps setting proper TLB mapping for direct a
On 07/18/2013 03:12 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: "“tiejun.chen”" [mailto:tiejun.c...@windriver.com]
Sent: Thursday, July 18, 2013 11:56 AM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; ag...@suse.de; Wood Sco
On 07/18/2013 04:08 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: kvm-ppc-ow...@vger.kernel.org [mailto:kvm-ppc-ow...@vger.kernel.org] On
Behalf Of "“tiejun.chen”"
Sent: Thursday, July 18, 2013 1:01 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kerne
On 07/18/2013 02:04 PM, Bharat Bhushan wrote:
If there is a struct page for the requested mapping then it's
normal DDR and the mapping sets "M" bit (coherent, cacheable)
else this is treated as I/O and we set "I + G" (cache inhibited, guarded)
This helps setting proper TLB mapping for direct a
On 07/18/2013 04:25 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Bhushan Bharat-R65777
Sent: Thursday, July 18, 2013 1:53 PM
To: '"“tiejun.chen”"'
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; ag...@suse.de; Wood Scott-
B07421
Subject: RE: [PAT
On 07/18/2013 05:44 PM, Alexander Graf wrote:
On 18.07.2013, at 10:55, �tiejun.chen� wrote:
On 07/18/2013 04:25 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Bhushan Bharat-R65777
Sent: Thursday, July 18, 2013 1:53 PM
To: '"�tiejun.chen�"'
Cc: kvm
On 07/18/2013 05:48 PM, Alexander Graf wrote:
On 18.07.2013, at 10:25, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Bhushan Bharat-R65777
Sent: Thursday, July 18, 2013 1:53 PM
To: '"�tiejun.chen�"'
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; ag...
On 07/18/2013 06:00 PM, Alexander Graf wrote:
On 18.07.2013, at 11:56, “tiejun.chen” wrote:
On 07/18/2013 05:44 PM, Alexander Graf wrote:
On 18.07.2013, at 10:55, �tiejun.chen� wrote:
On 07/18/2013 04:25 PM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Bhushan Bharat
On 07/18/2013 06:12 PM, Alexander Graf wrote:
On 18.07.2013, at 12:08, “tiejun.chen” wrote:
On 07/18/2013 05:48 PM, Alexander Graf wrote:
On 18.07.2013, at 10:25, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Bhushan Bharat-R65777
Sent: Thursday, July 18, 2013 1:53 PM
On 07/18/2013 06:27 PM, Alexander Graf wrote:
On 18.07.2013, at 12:19, “tiejun.chen” wrote:
On 07/18/2013 06:12 PM, Alexander Graf wrote:
On 18.07.2013, at 12:08, “tiejun.chen” wrote:
On 07/18/2013 05:48 PM, Alexander Graf wrote:
On 18.07.2013, at 10:25, Bhushan Bharat-R65777 wrote
On 08/01/2013 07:12 PM, Bharat Bhushan wrote:
KVM uses same WIM tlb attributes as the corresponding qemu pte.
For this we now search the linux pte for the requested page and
get these cache caching/coherency attributes from pte.
Signed-off-by: Bharat Bhushan
---
v1->v2
- Use Linux pte for wim
On 08/01/2013 07:12 PM, Bharat Bhushan wrote:
KVM need to lookup linux pte for getting TLB attributes (WIMGE).
This is similar to how book3s does.
This will be used in follow-up patches.
Signed-off-by: Bharat Bhushan
---
v1->v2
- This is a new change in this version
arch/powerpc/include/as
On 08/01/2013 07:12 PM, Bharat Bhushan wrote:
"G" bit in MAS2 indicates whether the page is Guarded.
There is no reason to stop guest setting "E", so allow him.
Could we merge patch 2 and 3 into only one.
Tiejun
Signed-off-by: Bharat Bhushan
---
v1->v2
- no change
arch/powerpc/kvm/e5
On 08/07/2013 04:50 AM, Scott Wood wrote:
On Tue, 2013-08-06 at 17:31 +0800, Tiejun Chen wrote:
We should revert this commit to rework.
Signed-off-by: Tiejun Chen
This breaks bisect.
Hmm...
Maybe I can squash these two patches into one.
Tiejun
--
To unsubscribe from this list: send the l
On 08/15/2013 05:01 AM, Benjamin Herrenschmidt wrote:
On Wed, 2013-08-14 at 14:34 -0500, Scott Wood wrote:
On Wed, 2013-08-14 at 13:56 +0200, Alexander Graf wrote:
On 07.08.2013, at 04:05, Tiejun Chen wrote:
We enter with interrupts disabled in hardware, but we need to
call SOFT_DISABLE_INTS
On 10/21/2013 05:49 PM, Tiejun Chen wrote:
We enter with interrupts disabled in hardware, but we need to
call SOFT_DISABLE_INTS anyway to ensure that the software state
OOPS! Here I should change this with RECONCILE_IRQ_STATE :( Please ignore this
to see next version directly.
Tiejun
is ke
On 10/23/2013 09:26 AM, Tiejun Chen wrote:
We enter with interrupts disabled in hardware, but we need to
call RECONCILE_IRQ_STATE anyway to ensure that the software state
is kept in sync instead of calling hard_irq_disable() directly.
Signed-off-by: Tiejun Chen
---
v5:
Fix one typo in the comm
Alex,
I suppose Scott already elaborate anything you want to know.
Tiejun
On 11/19/2013 05:09 AM, Alexander Graf wrote:
On 18.11.2013, at 03:34, �tiejun.chen� wrote:
On 10/23/2013 09:26 AM, Tiejun Chen wrote:
We enter with interrupts disabled in hardware, but we need to
call
67 matches
Mail list logo