On Thu, May 16, 2013 at 02:32:30PM -0600, Alex Williamson wrote:
We'd like to hold another virtualization microconference as part of this
year's Linux Plumbers Conference. To do so, we need to show that
there's enough interest, materials, and people willing to attend.
Convenience info:
Rusty Russell ru...@rustcorp.com.au wrote:
Macro still isn't usable, because userspace can't know whether it's the
new or old.
We need to either remove it from UAPI, or rename it to
VIRTIO_PCI_CONFIG_OFF.
Surely, if userspace is using it as is, you can't remove it, rename it or
alter it?
Lets provide functions to prevent KVM from reentering SIE and
to kick cpus out of SIE. We cannot use the common kvm_vcpu_kick code,
since we need to kick out guests in places that hold architecture
specific locks (e.g. pgste lock) which might be necessary on the
other cpus - so no waiting
Dont use the same bit as user referenced.
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/include/asm/pgtable.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/s390/include/asm/pgtable.h b/arch/s390/include/asm/pgtable.h
index
From: Martin Schwidefsky schwidef...@de.ibm.com
The RCP byte is a part of the PGSTE value, the existing RCP_xxx names
are inaccurate. As the defines describe bits and pieces of the PGSTE,
the names should start with PGSTE_. The KVM_UR_BIT and KVM_UC_BIT are
part of the PGSTE as well, give them
The guest prefix pages must be mapped writeable all the time
while SIE is running, otherwise the guest might see random
behaviour. (pinned at the pte level) Turns out that mlocking is
not enough, the page table entry (not the page) might change or
become r/o. This patch uses the gmap notifiers to
On heavy paging load some guest cpus started to loop in gmap_ipte_notify.
This was visible as stalled cpus inside the guest. The gmap_ipte_notifier
tries to map a user page and then made sure that the pte is valid and
writable. Turns out that with the software change bit tracking the pte
can
Lets track in a private bit if the sie control block is active.
We want to track this as closely as possible, so we also have to
instrument the interrupt and program check handler. Lets use the
existing HANDLE_SIE_INTERCEPT macro.
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
From: Martin Schwidefsky schwidef...@de.ibm.com
The PSW can wrap if the guest has been running in the 24 bit or 31 bit
addressing mode. Use __rewind_psw to find the correct address.
Signed-off-by: Martin Schwidefsky schwidef...@de.ibm.com
Signed-off-by: Christian Borntraeger
Gleb, Paolo, Marcelo,
here are some low level changes to kvm on s390 that we have been
cooking for a while now.
Patch s390/pgtable: fix ipte notify bit will go via Martins
tree into 3.10, but is included to reduce the amount of merge
conflicts.
Patch s390: fix gmap_ipte_notifier vs. software
From: Martin Schwidefsky schwidef...@de.ibm.com
Do not automatically restart the sie instruction in entry64.S after an
interrupt, return to the caller with a reason code instead. That allows
to deal with RCU and other conditions in C code.
Signed-off-by: Martin Schwidefsky schwidef...@de.ibm.com
Frederic Weisbecker fweis...@gmail.com writes:
On Thu, May 16, 2013 at 12:52:03AM +0200, Frederic Weisbecker wrote:
On Mon, Mar 25, 2013 at 02:14:20PM -0700, Kevin Hilman wrote:
Gleb Natapov g...@redhat.com writes:
On Sun, Mar 24, 2013 at 02:44:26PM +0100, Frederic Weisbecker wrote:
On Fri, May 17, 2013 at 07:09:42AM -0700, Kevin Hilman wrote:
Frederic Weisbecker fweis...@gmail.com writes:
On Thu, May 16, 2013 at 12:52:03AM +0200, Frederic Weisbecker wrote:
On Mon, Mar 25, 2013 at 02:14:20PM -0700, Kevin Hilman wrote:
Gleb Natapov g...@redhat.com writes:
On
Frederic Weisbecker fweis...@gmail.com writes:
On Fri, May 17, 2013 at 07:09:42AM -0700, Kevin Hilman wrote:
Frederic Weisbecker fweis...@gmail.com writes:
On Thu, May 16, 2013 at 12:52:03AM +0200, Frederic Weisbecker wrote:
On Mon, Mar 25, 2013 at 02:14:20PM -0700, Kevin Hilman wrote:
The KVM module uses the standard MIPS cache management routines, which use
min_low_pfn.
This creates and indirect dependency, requiring min_low_pfn to be exported.
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/kernel/mips_ksyms.c | 6 ++
1 file changed, 6 insertions(+)
diff
The following patch set fixes a few issues with KVM/MIPS32 in Linux 3.10.
--
Sanjay Lal (3):
KVM/MIPS32: Move include/asm/kvm.h = include/uapi/asm/kvm.h since it
is a user visible API.
KVM/MIPS32: Wrap calls to gfn_to_pfn() with srcu_read_lock/unlock()
KVM/MIPS32: Fix up KVM breakage
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/include/asm/kvm.h | 55
arch/mips/include/uapi/asm/kvm.h | 55
2 files changed, 55 insertions(+), 55 deletions(-)
delete mode 100644
- As suggested by Gleb, wrap calls to gfn_to_pfn() with srcu_read_lock/unlock().
Memory slots should be acccessed from a SRCU read section.
- kvm_mips_map_page() now returns an error code to it's callers, instead of
calling panic()
if it cannot find a mapping for a particular gfn.
The ASID paramters have default values which are then patched @ runtime
as part of the TLB initialization. The fixup does not work since KVM
is a kernel module and we end up with the default mask of 0xfc0 instead of
the standard ASID mask of 0xff for MIPS32R2 processors.
I've posted the issue on
KVM core expects arch code to acquire the srcu lock when calling
gfn_to_memslot and similar functions.
Signed-off-by: Scott Wood scottw...@freescale.com
---
Resending as it doesn't seem to have made it to the mailing list
archives or patchwork.
v2: Eliminate need_srcu and move the locking into
On 05/17/2013 02:06 PM, Sanjay Lal wrote:
The KVM module uses the standard MIPS cache management routines, which use
min_low_pfn.
This creates and indirect dependency, requiring min_low_pfn to be exported.
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/kernel/mips_ksyms.c | 6
On Fri, May 17, 2013 at 02:25:12PM -0700, Sanjay Lal wrote:
Date: Fri, 17 May 2013 14:25:12 -0700
From: Sanjay Lal sanj...@kymasys.com
To: kvm@vger.kernel.org
Cc: linux-m...@linux-mips.org, r...@linux-mips.org, g...@redhat.com,
mtosa...@redhat.com, Sanjay Lal sanj...@kymasys.com
Subject:
KVM core expects arch code to acquire the srcu lock when calling
gfn_to_memslot and similar functions.
Signed-off-by: Scott Wood scottw...@freescale.com
---
Resending as it doesn't seem to have made it to the mailing list
archives or patchwork.
v2: Eliminate need_srcu and move the locking into
23 matches
Mail list logo