[PATCH v2 0/2] powerpc/kvm: Enable running guests on RT Linux

2015-04-24 Thread Bogdan Purcareata
lied & compiled against stable-rt 3.18-rt v2: - updated commit messages - change the fix for potentially large latencies from limiting the max number of VCPUs a guest can have to disabling the in-kernel MPIC Bogdan Purcareata (2): powerpc/kvm: Convert openpic lock to raw_spinlock pow

[PATCH v2 2/2] powerpc/kvm: Disable in-kernel MPIC emulation for PREEMPT_RT_FULL

2015-04-24 Thread Bogdan Purcareata
small. Secondly, this should incentivize the development of a proper openpic emulation that would be better suited for RT. Signed-off-by: Bogdan Purcareata --- arch/powerpc/kvm/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/powerpc/kvm/Kconfig b/arch/powerpc/kvm/Kconfig index 11

[PATCH v2 1/2] powerpc/kvm: Convert openpic lock to raw_spinlock

2015-04-24 Thread Bogdan Purcareata
Signed-off-by: Bogdan Purcareata --- arch/powerpc/kvm/mpic.c | 44 ++-- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/arch/powerpc/kvm/mpic.c b/arch/powerpc/kvm/mpic.c index 6249cdc..2f70660 100644 --- a/arch/powerpc/kvm/mpic.c +++ b/arch

[PATCH] powerpc/mpic: Remove WHOAMI readback after EOI

2015-03-24 Thread Bogdan Purcareata
quired (at least on BookE platforms). The benefit of this change is saving a MMIO trap per interrupt when running in a KVM guest. [1] https://patchwork.ozlabs.org/patch/429098/ [2] https://patchwork.ozlabs.org/patch/433557/ Signed-off-by: Bogdan Purcareata --- arch/powerpc/sysdev/mpic.c | 1 - 1 fi

[PATCH 2/2] powerpc/kvm: Limit MAX_VCPUS for guests running on RT Linux

2015-02-18 Thread Bogdan Purcareata
-off-by: Mihai Caraman Signed-off-by: Bogdan Purcareata Reviewed-by: Scott Wood --- arch/powerpc/include/asm/kvm_host.h | 6 ++ 1 file changed, 6 insertions(+) diff --git a/arch/powerpc/include/asm/kvm_host.h b/arch/powerpc/include/asm/kvm_host.h index 8ef0512..6f6b928 100644 --- a/arch

[PATCH 1/2] powerpc/kvm: Convert openpic lock to raw_spinlock

2015-02-18 Thread Bogdan Purcareata
(us) 7062 [1] https://lkml.org/lkml/2010/1/11/289 Signed-off-by: Bogdan Purcareata Reviewed-by: Scott Wood --- arch/powerpc/kvm/mpic.c | 44 ++-- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/arch/powerpc/kvm/mpic.c b/arch

[PATCH 0/2] powerpc/kvm: Enable running guests on RT Linux

2015-02-18 Thread Bogdan Purcareata
ave a hanging CONFIG_PREEMPT_RT_FULL check there, with no effect, or send it against linux-stable-rt. Please apply as you consider appropriate. - applied & compiled against upstream 3.19 - applied & compiled against stable-rt 3.14-rt (0002 with minor fuzz) Bogdan Purcareata (2): powerpc

[PATCH v4 3/3] powerpc: Enable HAVE_ARCH_SECCOMP_FILTER

2015-02-18 Thread Bogdan Purcareata
Signed-off-by: Bogdan Purcareata --- arch/powerpc/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index 22b0940..2588b57 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -104,6 +104,7 @@ config PPC select

[PATCH v4 1/3] powerpc: Don't force ENOSYS as error on syscall fail

2015-02-18 Thread Bogdan Purcareata
acing v2: - move setting ENOSYS as errno from the syscall entry assembly to do_syscall_trace_enter, only in the specific case Signed-off-by: Bogdan Purcareata --- arch/powerpc/kernel/entry_32.S | 7 ++- arch/powerpc/kernel/entry_64.S | 5 +++-- arch/powerpc/kernel/ptrace.c | 4 +++- 3

[PATCH v4 2/3] powerpc: Relax secure computing on syscall entry trace

2015-02-18 Thread Bogdan Purcareata
The secure_computing_strict will just force the kernel to panic on secure_computing failure. Once SECCOMP_FILTER support is enabled in the kernel, syscalls can be denied without system failure. v4: - rebase on top of 3.19 v3,v2: no changes Signed-off-by: Bogdan Purcareata --- arch/powerpc

[PATCH v4 0/3] powerpc: Enable seccomp filter support

2015-02-18 Thread Bogdan Purcareata
syscall entry assembly to do_syscall_trace_enter Bogdan Purcareata (3): powerpc: Don't force ENOSYS as error on syscall fail powerpc: Relax secure computing on syscall entry trace powerpc: Enable HAVE_ARCH_SECCOMP_FILTER arch/powerpc/Kconfig | 1 + arch/powerpc/kernel/entry_32.

[PATCH v3 2/3] powerpc: Relax secure computing on syscall entry trace

2015-02-13 Thread Bogdan Purcareata
The secure_computing_strict will just force the kernel to panic on secure_computing failure. Once SECCOMP_FILTER support is enabled in the kernel, syscalls can be denied without system failure. Signed-off-by: Bogdan Purcareata --- arch/powerpc/kernel/ptrace.c | 4 +++- 1 file changed, 3

[PATCH v3 3/3] powerpc: Enable HAVE_ARCH_SECCOMP_FILTER

2015-02-13 Thread Bogdan Purcareata
Signed-off-by: Bogdan Purcareata --- arch/powerpc/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index 22b0940..2588b57 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -104,6 +104,7 @@ config PPC select

[PATCH v3 1/3] powerpc: Don't force ENOSYS as error on syscall fail

2015-02-13 Thread Bogdan Purcareata
ly to do_syscall_trace_enter, only in the specific case Signed-off-by: Bogdan Purcareata --- arch/powerpc/kernel/entry_32.S | 7 ++- arch/powerpc/kernel/entry_64.S | 5 +++-- arch/powerpc/kernel/ptrace.c | 4 +++- 3 files changed, 12 insertions(+), 4 deletions(-) diff --git a/arch/powerpc/kernel/entry_3

[PATCH v3 0/3] powerpc: Enable seccomp filter support

2015-02-13 Thread Bogdan Purcareata
://groups.google.com/forum/#!topic/libseccomp/oz42LfMDsxg [2] https://groups.google.com/forum/#!topic/libseccomp/TQWfCt_nD7c v3: - keep setting ENOSYS in syscall entry assembly when syscall tracing is disabled v2: - move setting ENOSYS from syscall entry assembly to do_syscall_trace_enter Bogdan Purcareata (3

[PATCH 3/3] powerpc: Enable HAVE_ARCH_SECCOMP_FILTER

2015-02-11 Thread Bogdan Purcareata
Signed-off-by: Bogdan Purcareata --- arch/powerpc/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index a2a168e..72f363e 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -104,6 +104,7 @@ config PPC select

[PATCH 2/3] powerpc: Relax secure computing on syscall entry trace

2015-02-11 Thread Bogdan Purcareata
The secure_computing_strict will just force the kernel to panic on secure_computing failure. Once SECCOMP_FILTER support is enabled in the kernel, syscalls can be denied without system failure. Signed-off-by: Bogdan Purcareata --- arch/powerpc/kernel/ptrace.c | 4 +++- 1 file changed, 3

[PATCH v2 0/3] powerpc: Enable seccomp filter support

2015-02-11 Thread Bogdan Purcareata
/forum/#!topic/libseccomp/ktR-bQr1tGw v2: - move setting ENOSYS from syscall entry assembly to do_syscall_trace_enter Bogdan Purcareata (3): powerpc: Don't force ENOSYS as error on syscall fail powerpc: Relax secure computing on syscall entry trace powerpc: Enable HAVE_ARCH_SECCOMP_F

[PATCH v2 1/3] powerpc: Don't force ENOSYS as error on syscall fail

2015-02-11 Thread Bogdan Purcareata
YS on do_syscall_trace_enter failure. v2: - move setting ENOSYS as errno from the syscall entry assembly to do_syscall_trace_enter, only in the specific case Signed-off-by: Bogdan Purcareata --- arch/powerpc/kernel/entry_32.S | 2 +- arch/powerpc/kernel/entry_64.S | 1 - arch/powerpc/kernel/ptrace.c

[PATCH] powerpc: Enable HAVE_ARCH_SECCOMP_FILTER

2015-02-09 Thread Bogdan Purcareata
Signed-off-by: Bogdan Purcareata --- arch/powerpc/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index a2a168e..72f363e 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -104,6 +104,7 @@ config PPC select

[PATCH 2/3] powerpc: Relax secure computing on syscall entry trace

2015-02-09 Thread Bogdan Purcareata
The secure_computing_strict will just force the kernel to panic on secure_computing failure. Once SECCOMP_FILTER support is enabled in the kernel, syscalls can be denied without system failure. Signed-off-by: Bogdan Purcareata --- arch/powerpc/kernel/ptrace.c | 4 +++- 1 file changed, 3

[PATCH 0/3] powerpc: Enable seccomp filter support

2015-02-09 Thread Bogdan Purcareata
/forum/#!topic/libseccomp/ktR-bQr1tGw Bogdan Purcareata (3): powerpc: Don't force ENOSYS as error on syscall fail powerpc: Relax secure computing on syscall entry trace powerpc: Enable HAVE_ARCH_SECCOMP_FILTER arch/powerpc/Kconfig | 1 + arch/powerpc/kernel/entry_32.

[RFC][PATCH 1/3] powerpc: Don't force ENOSYS as error on syscall fail

2015-02-08 Thread Bogdan Purcareata
er to keep overhead at a minimum. Signed-off-by: Bogdan Purcareata --- arch/powerpc/kernel/entry_32.S | 3 ++- arch/powerpc/kernel/entry_64.S | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/powerpc/kernel/entry_32.S b/arch/powerpc/kernel/entry_32.S index 59848e5..52

[PATCH v2] powerpc/mpic: Add DT option to skip readback after EOI

2015-01-27 Thread Bogdan Purcareata
, make the readback optional and configurable through the device tree. Skipping the readback saves a MMIO trap per interrupt. v2: updated commit message Signed-off-by: Scott Wood [add DT binding, update commit message] Signed-off-by: Bogdan Purcareata --- Documentation/devicetree/bindings/p

[PATCH] powerpc/mpic: Add DT option to skip readback after EOI

2015-01-14 Thread Bogdan Purcareata
Scott Wood Signed-off-by: Bogdan Purcareata --- Documentation/devicetree/bindings/powerpc/fsl/mpic.txt | 13 + arch/powerpc/include/asm/mpic.h| 2 ++ arch/powerpc/sysdev/mpic.c | 8 +++- 3 files changed, 22 insertions(+), 1 del