This patch exports the SIE hardware control block to userspace
via the mapping of the vcpu file descriptor.
Signed-off-by: Carsten Otte co...@de.ibm.com
---
---
arch/s390/include/asm/kvm_host.h |2 ++
virt/kvm/kvm_main.c |5 +
2 files changed, 7 insertions(+)
--- a/arch
This patch fixes definition of the idle_mask and the local_int array
in kvm_s390_float_interrupt. Previous definition had 64 cpus max
hardcoded instead of using KVM_MAX_VCPUS.
Signed-off-by: Carsten Otte co...@de.ibm.com
---
Index: linux-2.5-cecsim/arch/s390/include/asm/kvm_host.h
This patch disables in-kernel handling of SIE intercepts for user
controlled virtual machines. All intercepts are passed to userspace
via KVM_EXIT_SIE exit reason just like SIE intercepts that cannot be
handled in-kernel for regular KVM guests.
Signed-off-by: Carsten Otte co...@de.ibm.com
This patch makes sure user controlled virtual machines do not use a
system control area (sca). This is needed in order to create
virtual machines with more cpus than the size of the sca [64].
Signed-off-by: Carsten Otte co...@de.ibm.com
---
Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c
This patch fixes the return code of kvm_arch_vcpu_ioctl in case
of an unkown ioctl number.
Signed-off-by: Carsten Otte co...@de.ibm.com
---
Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c
===
--- linux-2.5-cecsim.orig/arch/s390/kvm
On 01.12.2011 14:26, Avi Kivity wrote:
On 12/01/2011 02:57 PM, Carsten Otte wrote:
This patch exports the SIE hardware control block to userspace
via the mapping of the vcpu file descriptor.
else if (vmf-pgoff == KVM_COALESCED_MMIO_PAGE_OFFSET)
page = virt_to_page(vcpu
From: Cornelia Huck cornelia.h...@de.ibm.com
SIGP sense running may cause an intercept on higher level
virtualization, so handle it by checking the CPUSTAT_RUNNING flag.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
arch/s390/include/asm
-off-by: Christian Borntraeger borntrae...@de.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
arch/s390/kvm/kvm-s390.c |1 +
1 file changed, 1 insertion(+)
--- a/arch/s390/kvm/kvm-s390.c
+++ b/arch/s390/kvm/kvm-s390.c
@@ -127,6 +127,7 @@ int kvm_dev_ioctl_check_extension(long e
Hi Avi,
these patches are bugfixes for kvm on s390. Could you please apply
them?
thanks,
Carsten
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
...@kernel.org
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
arch/s390/include/asm/kvm_host.h |2 +-
arch/s390/kvm/diag.c |2 +-
arch/s390/kvm/intercept.c|3 ++-
arch/s390/kvm/interrupt.c|1 +
arch
separate the
address translation from walking the vmas.
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
arch/s390/kvm/priv.c | 10 --
1 file changed, 8 insertions(+), 2 deletions(-)
diff -urpN linux-2.6/arch/s390/kvm/priv.c linux
From: Martin Schwidefsky schwidef...@de.ibm.com
Add FAULT_FLAG_RETRY_NOWAIT to the fault flags if the host is processing
a guest fault. In case of a fault retry exit sie64a() with the gmap_fault
indication set. This makes it possible to handle asynchronous page faults
without the need for mm
Hi Avi,
these patches implement asynchronous page faults for kvm on s390.
Sorry for being slower on sending patches than you're reviewing,
I guess these will answer your question on __gmap_fault ;-).
I think we should push both of these via Martin, his patch alone
would break kvm on s390, mine
From: Carsten Otte co...@de.ibm.com
This patch adds support for pseudo page faults. The corresponding
interface is implemented according to the documentation in CP
programming services.
Diagnose 258 allows to register compare and check masks for pseudo
page faults, and the guest can cancel
On 17.11.2011 14:18, Avi Kivity wrote:
+ copy_from_guest(vcpu,pfault_token, vcpu-arch.pfault_token,
+ 8);
Missing error check?
Good catch, will fix.
+ init = kzalloc(sizeof(*init), GFP_ATOMIC);
+ if (!init)
+ return;
+
+ done =
On 17.11.2011 15:18, Avi Kivity wrote:
Backports to distros, even if you happened to name my favourite, do not
override upstream considerations. as soon as we find time doesn't
inspire confidence either. If async_pf.c is better, let's do that (btw
async_pf.c did not find itself in generic code
On 20.09.2011 14:11, Avi Kivity wrote:
ACK, with Alex's changes. Why are kvm changes not going in through the
kvm tree? Or at least kvm@ review?
It slipped through as I've put it into our CVS to test against Martin's
changes. Sorry about that, we'll make sure it won't happen again.
so long,
From: Carsten Otte co...@de.ibm.com
This patch gives userspace access to the guest visible storage keys. Three
operations are supported:
KVM_S390_KEYOP_SSKE for setting storage keys, similar to the set storage key
extended (SSKE) instruction.
KVM_S390_KEYOP_ISKE for reading storage key content
On 31.03.2011 23:47, Alexander Graf wrote:
Did you take a look at kuli?
Right. If you want to take kuli as a start, and GPL is acceptable for
you ;-).
If kuli seems right, I suggest to go ahead and make an upstream git
repository for it. I'd be happy to keep contributing the s390 parts to
On 15.05.2010 10:26, Alexander Graf wrote:
On S390, I'm also still sceptical if the implementation we have really works. A
device injects an S390_INTERRUPT with its address and on the next vcpu_run, an
according interrupt is issued. But what happens if two devices trigger an
S390_INTERRUPT
On 15.05.2010 10:26, Alexander Graf wrote:
On S390, I'm also still sceptical if the implementation we have really works. A
device injects an S390_INTERRUPT with its address and on the next vcpu_run, an
according interrupt is issued. But what happens if two devices trigger an
S390_INTERRUPT
Wei Yongjun wrote:
This patch fixed possible memory leak in kvm_arch_vcpu_create()
under s390, which would happen when kvm_arch_vcpu_create() fails.
Good catch, thanks!
Acked-by: Carsten Otte co...@de.ibm.com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
very low into user address space.
This patch should go into 2.6.32, it prevents running smp guests with qemu.
Signed-off-by: Carsten Otte co...@de.ibm.com
Reported-by: Alexander Graf ag...@suse.de
---
sigp.c |6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
Index: kvm/arch/s390/kvm
Avi Kivity wrote:
@@ -116,6 +117,11 @@
__u64 cr8;
__u64 apic_base;
+#ifdef CONFIG_S390
+/* the processor status word for s390 */
+__u64 psw_mask; /* psw upper half */
+__u64 psw_addr; /* psw lower half */
+#endif
Doesn't this break backward compatibility by changing the
Avi Kivity wrote:
gdb is hardly performance critical. Is that the only reason for the
change?
Right, gdb is not performance critical. gdb is the reason for moving it
out of the union, performance is the reason for having it in kvm_run at all.
There's only more reason to it: with a little
Avi Kivity wrote:
Right, but why? x86 qemu doesn't care about either pc or eflags (with
in-kernel irqchip, which s390 essentially is).
For different reasons. Most prominent for setting the condition code,
which is a sideband result of most instructions that indicates whether or
not the
Avi Kivity wrote:
On x86 we avoid emulating instructions in userspace. Instead the kernel
requests userspace to do something (triggered by the instruction), and
the kernel does anything which might be implied by the instruction (like
copying the result into a register, or updating pc).
An
(copying some s390 people)
On 07/10/2009 02:47 PM, Julia Lawall wrote:
In a recent version of linux-next, the function kvm_s390_handle_wait
contains the following code:
add_wait_queue(vcpu-arch.local_int.wq,wait);
while (list_empty(vcpu-arch.local_int.list)
Am Sun, 8 Feb 2009 04:26:16 -0200
schrieb Marcelo Tosatti mtosa...@redhat.com:
Its confusing that there is the exact same check below, with kvm-lock
held, and that both are needed since assignment happens under the lock.
Can you also make it straightforward while fixing the bug please.
. This way
we can ensure a consistent update of the memory for the entire
smp configuration.
Signed-off-by: Carsten Otte co...@de.ibm.com
---
arch/s390/kvm/kvm-s390.c | 25 +
1 file changed, 21 insertions(+), 4 deletions(-)
Index: kvm/arch/s390/kvm/kvm-s390.c
This check verifies that the guest we're trying to run in KVM_RUN
has some memory assigned to it. It enters an endless exception
loop if this is not the case.
Reported-by: Mijo Safradin m...@linux.vnet.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
arch/s390/kvm/kvm-s390.c |6
KVM common code should'nt try to create the same virtual cpu twice.
In case of s390, it crashes badly in kvm_arch_vcpu_create.
Reported-by: Mijo Safradin m...@linux.vnet.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
virt/kvm/kvm_main.c |3 +++
1 file changed, 3 insertions
Am Thu, 5 Feb 2009 17:05:01 +0100
schrieb Carsten Otte co...@de.ibm.com:
KVM common code should'nt try to create the same virtual cpu twice.
In case of s390, it crashes badly in kvm_arch_vcpu_create.
This patch is broken, will refresh it. Please do _NOT_ apply (!)
--
To unsubscribe from
KVM common code should'nt try to create the same virtual cpu twice.
In case of s390, it crashes badly in kvm_arch_vcpu_create.
Reported-by: Mijo Safradin m...@linux.vnet.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
virt/kvm/kvm_main.c |3 +++
1 file changed, 3 insertions
Am Thu, 22 Jan 2009 12:17:07 +0100
schrieb heica...@linux.vnet.ibm.com:
Why don't you just remove the printk? IMHO it's rather pointless.
It is'nt: It infoms the user why his guest is going to crash
even though it has performed an operation that is perfectly
legal according to the spec.
--
To
Am Thu, 22 Jan 2009 13:58:57 +0200
schrieb Avi Kivity a...@redhat.com:
Right, either inject an exception to the guest (if appropriate for the
arch), or return -ESOMETHING from ioctl(KVM_RUN).
Yea that's what we do. We let userland handle the intercept,
and there we let the guest die gracefully
Hi Avi,
now that we're moving closer to the merge window, please look at the
following patches. I'd love to see them in 2.6.27. There is no need to
hurry any of these into 2.6.26 because our console patches are waiting
for the merge window in Rustys queue too, which makes .26 unusable with
kuli.
-off-by: Christian Borntraeger [EMAIL PROTECTED]
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
---
arch/s390/kvm/kvm-s390.c |9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
Index: kvm/arch/s390/kvm/kvm-s390.c
101 - 138 of 138 matches
Mail list logo