Re: [PATCH 1/1] vhost-vsock: add VIRTIO_F_RING_PACKED to feaure_bits

2024-05-15 Thread Halil Pasic
On Tue, 7 May 2024 21:26:30 +0200 Halil Pasic wrote: > > Not having VIRTIO_F_RING_PACKED in feature_bits[] is a problem when the > > vhost-vsock device does not offer the feature bit VIRTIO_F_RING_PACKED > > but the in QEMU device is configured to try to use the packed layo

Re: [PATCH 1/1] vhost-vsock: add VIRTIO_F_RING_PACKED to feaure_bits

2024-05-07 Thread Halil Pasic
On Mon, 29 Apr 2024 13:33:34 +0200 Halil Pasic wrote: > Not having VIRTIO_F_RING_PACKED in feature_bits[] is a problem when the > vhost-vsock device does not offer the feature bit VIRTIO_F_RING_PACKED > but the in QEMU device is configured to try to use the packed layout > (the vir

[PATCH 1/1] vhost-vsock: add VIRTIO_F_RING_PACKED to feaure_bits

2024-04-29 Thread Halil Pasic
ly support it, and one gets to keep the pieces. Fixes: 74b3e46630 ("virtio: add property to enable packed virtqueue") Reported-by: Marc Hartmayer Signed-off-by: Halil Pasic --- This is a minimal fix, that follows the current patterns in the codebase, and not necessarily the best one. I don't

Re: [PATCH v2 3/3] s390x/pci: drive ISM reset from subsystem reset

2024-01-23 Thread Halil Pasic
On Mon, 22 Jan 2024 10:06:38 -0500 Matthew Rosato wrote: > On 1/19/24 4:07 PM, Halil Pasic wrote: > > On Thu, 18 Jan 2024 13:51:51 -0500 > > Matthew Rosato wrote: > > > >> diff --git a/hw/s390x/s390-virtio-ccw.c b/hw/s390x/s390-virtio-ccw.c > >&

Re: [PATCH 4/5] hw/s390x/css-bridge: switch virtual-css bus to 3-phase-reset

2024-01-22 Thread Halil Pasic
all that method > in the hold phase of 3-phase reset. > > Signed-off-by: Peter Maydell Reviewed-by: Halil Pasic

Re: [PATCH v2 3/3] s390x/pci: drive ISM reset from subsystem reset

2024-01-19 Thread Halil Pasic
On Thu, 18 Jan 2024 13:51:51 -0500 Matthew Rosato wrote: > diff --git a/hw/s390x/s390-virtio-ccw.c b/hw/s390x/s390-virtio-ccw.c > index eaf61d3640..c99682b07d 100644 > --- a/hw/s390x/s390-virtio-ccw.c > +++ b/hw/s390x/s390-virtio-ccw.c > @@ -118,6 +118,14 @@ static void subsystem_reset(void) >

Re: [PATCH] MAINTAINERS: Fix a couple s390 paths

2023-11-08 Thread Halil Pasic
: split out s390x sections") > Signed-off-by: Eric Farman Reviewed-by: Halil Pasic

Re: [PATCH for-8.2] hw/s390x/s390-virtio-ccw: Remove superfluous code to set the NIC model

2023-08-14 Thread Halil Pasic
> qemu_check_nic_model() - and this in turn calls qemu_find_nic_model() > which contains the same check for nd->model being NULL again. So we > can remove this from the calling site now. > > Signed-off-by: Thomas Huth Reviewed-by: Halil Pasic

Re: css_clear_io_interrupt() error handling

2023-05-11 Thread Halil Pasic
On Thu, 11 May 2023 14:20:51 +0200 Markus Armbruster wrote: [..] > > > > In my opinion the best way to deal with such situations would be to > > abort() in test/development and log a warning in production. Of course > > Understand, but... > > > assert() wouldn't give me that, and it wouldn't

Re: css_clear_io_interrupt() error handling

2023-05-10 Thread Halil Pasic
On Wed, 10 May 2023 08:32:12 +0200 Markus Armbruster wrote: > Halil Pasic writes: > > > On Mon, 08 May 2023 11:01:55 +0200 > > Cornelia Huck wrote: > > > >> On Mon, May 08 2023, Markus Armbruster wrote: [..] > > and we do check for availability

Re: css_clear_io_interrupt() error handling

2023-05-09 Thread Halil Pasic
On Mon, 08 May 2023 11:01:55 +0200 Cornelia Huck wrote: > On Mon, May 08 2023, Markus Armbruster wrote: > > > css_clear_io_interrupt() aborts on unexpected ioctl() errors, and I > > wonder whether that's appropriate. Let's have a closer look: Just for my understanding, was there a field

Re: [PATCH v2] virtio: refresh vring region cache after updating a virtqueue size

2023-03-27 Thread Halil Pasic
On Mon, 27 Mar 2023 08:29:09 -0400 "Michael S. Tsirkin" wrote: > On Mon, Mar 27, 2023 at 01:06:19PM +0200, Cornelia Huck wrote: > > On Wed, Mar 22 2023, Halil Pasic wrote: > > > > > On Wed, 22 Mar 2023 10:52:31 +0100 > > > Cornelia Huck wrote: >

Re: [PATCH v2] virtio: refresh vring region cache after updating a virtqueue size

2023-03-24 Thread Halil Pasic
On Wed, 22 Mar 2023 18:24:33 +0100 Halil Pasic wrote: > > > --- a/hw/s390x/virtio-ccw.c > > > +++ b/hw/s390x/virtio-ccw.c > > > @@ -237,6 +237,7 @@ static int virtio_ccw_set_vqs(SubchDev *sch, > > > VqInfoBlock *info, &

Re: [PATCH v2] virtio: refresh vring region cache after updating a virtqueue size

2023-03-22 Thread Halil Pasic
On Wed, 22 Mar 2023 10:52:31 +0100 Cornelia Huck wrote: [..] > > > > diff --git a/hw/s390x/virtio-ccw.c b/hw/s390x/virtio-ccw.c > > index e33e5207ab..f44de1a8c1 100644 > > --- a/hw/s390x/virtio-ccw.c > > +++ b/hw/s390x/virtio-ccw.c > > @@ -237,6 +237,7 @@ static int virtio_ccw_set_vqs(SubchDev

Re: [PATCH 2/2] target/s390x: kvm: Honor storage keys during emulation

2022-05-24 Thread Halil Pasic
On Tue, 24 May 2022 12:43:29 +0200 Thomas Huth wrote: > On 19/05/2022 15.53, Janis Schoetterl-Glausch wrote: > > On 5/19/22 12:05, Thomas Huth wrote: > >> On 06/05/2022 17.39, Janis Schoetterl-Glausch wrote: > >>> Storage key controlled protection is currently not honored when > >>>

Re: [PATCH 4/4] virtio-ccw: do not include headers for all virtio devices

2022-03-31 Thread Halil Pasic
On Mon, 28 Mar 2022 16:30:19 +0200 Paolo Bonzini wrote: > Signed-off-by: Paolo Bonzini Reviewed-by: Halil Pasic

Re: [PATCH 3/4] virtio-ccw: move device type declarations to .c files

2022-03-31 Thread Halil Pasic
#include "net/net.h" > #include "hw/virtio/virtio.h" > @@ -19,6 +20,7 @@ > #include "hw/virtio/virtio-net.h" > #include "qemu/bitops.h" > #include "qemu/error-report.h" > +#include "qemu/log.h" Unrelated? Reviewed-by: Halil Pasic

Re: [PATCH 2/4] virtio-ccw: move vhost_ccw_scsi to a separate file

2022-03-31 Thread Halil Pasic
On Mon, 28 Mar 2022 16:30:17 +0200 Paolo Bonzini wrote: > Remove unecessary use of #ifdef CONFIG_VHOST_SCSI, instead just use a > separate file and a separate rule in meson.build. > > Signed-off-by: Paolo Bonzini Reviewed-by: Halil Pasic

Re: [PATCH 1/4] s390x: follow qdev tree to detect SCSI device on a CCW bus

2022-03-30 Thread Halil Pasic
that is only the case for the default configuration of QEMU's s390x > target. > > Signed-off-by: Paolo Bonzini Reviewed-by: Halil Pasic

Re: [PATCH 10/27] Replace config-time define HOST_WORDS_BIGENDIAN

2022-03-16 Thread Halil Pasic
TM For the s390x parts I'm involved in: Acked-by: Halil Pasic [..] > --- a/include/exec/cpu-all.h > +++ b/include/exec/cpu-all.h > @@ -34,13 +34,13 @@ > > /* some important defines: > * > - * HOST_WORDS_BIGENDIAN : if defined, the host cpu is big endian and > + * HOST_BIG_END

Re: [PATCH 10/27] Replace config-time define HOST_WORDS_BIGENDIAN

2022-03-16 Thread Halil Pasic
On Wed, 16 Mar 2022 11:28:59 +0100 Thomas Huth wrote: > On 16/03/2022 10.53, marcandre.lur...@redhat.com wrote: > > From: Marc-André Lureau > > > > Replace a config-time define with a compile time condition > > define (compatible with clang and gcc) that must be declared prior to > > its

Re: [PATCH v3 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-03-10 Thread Halil Pasic
ping On Mon, 7 Mar 2022 12:29:39 +0100 Halil Pasic wrote: > Unlike most virtio features ACCESS_PLATFORM is considered mandatory by > QEMU, i.e. the driver must accept it if offered by the device. The > virtio specification says that the driver SHOULD accept the > ACCESS_PLAT

[PATCH v3 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-03-07 Thread Halil Pasic
the driver didn't negotiate ACCESS_PLATFORM. So let us make ACCESS_PLATFORM mandatory for the driver regardless of whether the get_dma_as() callback is implemented or not. Signed-off-by: Halil Pasic Fixes: 2943b53f68 ("virtio: force VIRTIO_F_IOMMU_PLATFORM") --- v2 -> v3: * Rebas

Re: [PATCH v2 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-03-07 Thread Halil Pasic
On Sun, 6 Mar 2022 05:15:20 -0500 "Michael S. Tsirkin" wrote: > I tried to apply this on top of > virtio: fix the condition for iommu_platform not supported > and it fails. > Can you rebase this on top of my tree pls? Will do right away! BTW I don't think your tree is mentioned in the

[PATCH v2 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-03-04 Thread Halil Pasic
the driver didn't negotiate ACCESS_PLATFORM. So let us make ACCESS_PLATFORM mandatory for the driver regardless of whether the get_dma_as() callback is implemented or not. Signed-off-by: Halil Pasic Fixes: 2943b53f68 ("virtio: force VIRTIO_F_IOMMU_PLATFORM") --- v2 -> v2: *

Re: [PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-03-04 Thread Halil Pasic
On Fri, 4 Mar 2022 03:12:03 -0500 "Michael S. Tsirkin" wrote: > On Thu, Feb 10, 2022 at 02:29:29PM +0100, Halil Pasic wrote: > > On Thu, 10 Feb 2022 12:19:25 +0100 > > Cornelia Huck wrote: > > > > [..] > > > > > > Nope, that's not

Re: [PATCH] tests/avocado/machine_s390_ccw_virtio: Adapt test to new default resolution

2022-02-21 Thread Halil Pasic
on to 1280x800 (WXGA)") > Signed-off-by: Thomas Huth Looks good! Acked-by: Halil Pasic > --- > tests/avocado/machine_s390_ccw_virtio.py | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/tests/avocado/machine_s390_ccw_virtio.py > b/tests/avocado

Re: [PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-10 Thread Halil Pasic
On Thu, 10 Feb 2022 12:19:25 +0100 Cornelia Huck wrote: [..] > > Nope, that's not my problem. We make sure that the bit is persistent, we > fail realization if the bit got removed by the callback when required, > and we fail feature validation if the driver removes the bit, which is > in a

Re: [PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-10 Thread Halil Pasic
On Thu, 10 Feb 2022 10:55:13 +0100 Cornelia Huck wrote: > On Wed, Feb 09 2022, Halil Pasic wrote: > > > On Wed, 09 Feb 2022 18:24:56 +0100 > > Cornelia Huck wrote: > > > >> On Wed, Feb 09 2022, Halil Pasic wrote: > >> > @@ -78,16 +78,19 @

Re: [PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-09 Thread Halil Pasic
On Wed, 09 Feb 2022 18:24:56 +0100 Cornelia Huck wrote: > On Wed, Feb 09 2022, Halil Pasic wrote: > > > Unlike most virtio features ACCESS_PLATFORM is considered mandatory by > > QEMU, i.e. the driver must accept it if offered by the device. The > > virtio specificat

[PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-09 Thread Halil Pasic
the driver didn't negotiate ACCESS_PLATFORM. So let us make ACCESS_PLATFORM mandatory for the driver regardless of whether the get_dma_as() callback is implemented or not. Signed-off-by: Halil Pasic Fixes: 2943b53f68 ("virtio: force VIRTIO_F_IOMMU_PLATFORM") --- RFC -> v1: * Twe

Re: [RFC PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-07 Thread Halil Pasic
On Mon, 7 Feb 2022 16:46:04 -0300 Daniel Henrique Barboza wrote: > On 2/7/22 11:46, Halil Pasic wrote: > > On Mon, 7 Feb 2022 08:46:34 -0300 > > Daniel Henrique Barboza wrote: > > > > I have considered this and decided against it. The reason why is > > if

Re: [RFC PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-07 Thread Halil Pasic
On Mon, 07 Feb 2022 16:21:31 +0100 Cornelia Huck wrote: > On Mon, Feb 07 2022, Halil Pasic wrote: > > > On Mon, 07 Feb 2022 14:41:58 +0100 > > Cornelia Huck wrote: > > >> OTOH, the decision to make it mandatory is certainly sound, and covered > &

Re: [RFC PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-07 Thread Halil Pasic
On Mon, 07 Feb 2022 14:41:58 +0100 Cornelia Huck wrote: > On Mon, Feb 07 2022, Daniel Henrique Barboza wrote: > > > On 2/3/22 13:45, Halil Pasic wrote: > >> Unlike most virtio features ACCESS_PATFORM is considered mandatory, i.e. > > s/ACCESS_PATFORM

Re: [RFC PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-07 Thread Halil Pasic
On Mon, 7 Feb 2022 08:46:34 -0300 Daniel Henrique Barboza wrote: > On 2/3/22 13:45, Halil Pasic wrote: > > Unlike most virtio features ACCESS_PATFORM is considered mandatory, i.e. > > the driver must accept it if offered by the device. The virtio > > specification says t

Re: [PATCH v4 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-07 Thread Halil Pasic
On Fri, 4 Feb 2022 20:15:27 -0500 "Michael S. Tsirkin" wrote: > On Sat, Feb 05, 2022 at 01:02:05AM +0100, Halil Pasic wrote: > > On Fri, 4 Feb 2022 08:05:25 -0500 > > "Michael S. Tsirkin" wrote: > > > > > On Thu, Feb 03, 2022 at 05:06:35PM

[PATCH v5 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-07 Thread Halil Pasic
s no device capability is needed. In this situation claiming that the device does not support iommu_plattform=on is counter-productive. So let us stop doing that! Signed-off-by: Halil Pasic Reported-by: Jakob Naucke Fixes: 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but unsupporte

Re: [PATCH v4 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-04 Thread Halil Pasic
On Fri, 4 Feb 2022 08:05:25 -0500 "Michael S. Tsirkin" wrote: > On Thu, Feb 03, 2022 at 05:06:35PM +0100, Halil Pasic wrote: > > On Wed, 2 Feb 2022 20:54:38 +0100 > > Halil Pasic wrote: > > > > > } > > > @@ -82,9 +78,14 @@ void virtio_bu

Re: [PATCH 03/10] hw/s390x/virtio: Add missing 'cpu.h' include

2022-02-04 Thread Halil Pasic
On Thu, 3 Feb 2022 20:37:56 +0100 Philippe Mathieu-Daudé via wrote: > CPUS390XState is declared in "cpu.h". > > Signed-off-by: Philippe Mathieu-Daudé No objections :) Acked-by: Halil Pasic

[RFC PATCH 1/1] virtio: fix feature negotiation for ACCESS_PLATFORM

2022-02-03 Thread Halil Pasic
of whether the get_dma_as() callback is implemented or not. Signed-off-by: Halil Pasic Fixes: 2943b53f68 ("virtio: force VIRTIO_F_IOMMU_PLATFORM") --- This patch is based on: https://www.mail-archive.com/qemu-devel@nongnu.org/msg866199.html During the review of "virtio: fix the con

Re: [PATCH v4 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-03 Thread Halil Pasic
On Wed, 2 Feb 2022 20:54:38 +0100 Halil Pasic wrote: > } > @@ -82,9 +78,14 @@ void virtio_bus_device_plugged(VirtIODevice *vdev, Error > **errp) > return; > } > > +vdev_has_iommu = virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM); >

[PATCH v4 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-02 Thread Halil Pasic
s no device capability is needed. In this situation claiming that the device does not support iommu_plattform=on is counter-productive. So let us stop doing that! Signed-off-by: Halil Pasic Reported-by: Jakob Naucke Fixes: 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but unsupporte

Re: [PATCH v3 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-02 Thread Halil Pasic
On Wed, 2 Feb 2022 10:24:51 -0300 Daniel Henrique Barboza wrote: > On 2/1/22 22:15, Halil Pasic wrote: > > On Tue, 1 Feb 2022 16:31:22 -0300 > > Daniel Henrique Barboza wrote: > > > >> On 2/1/22 15:33, Halil Pasic wrote: > >>> On Tue, 1 Feb 2022 12

Re: [PATCH v3 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-02 Thread Halil Pasic
On Wed, 2 Feb 2022 02:06:12 -0500 "Michael S. Tsirkin" wrote: [..] > > In my opinion not forcing the guest to negotiate IOMMU_PLATFORM when > > ->get_dma_as() is not set is at least unfortunate. Please observe, that > > virtio-pci is not affected by this omission because for virtio-pci > >

Re: [PATCH v3 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-01 Thread Halil Pasic
On Tue, 1 Feb 2022 16:31:22 -0300 Daniel Henrique Barboza wrote: > On 2/1/22 15:33, Halil Pasic wrote: > > On Tue, 1 Feb 2022 12:36:25 -0300 > > Daniel Henrique Barboza wrote: > > > >>> +vdev_has_iommu = virtio_host_has_feature(vde

Re: [PATCH v3 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-01 Thread Halil Pasic
On Tue, 1 Feb 2022 12:36:25 -0300 Daniel Henrique Barboza wrote: > > +vdev_has_iommu = virtio_host_has_feature(vdev, > > VIRTIO_F_IOMMU_PLATFORM); > > if (klass->get_dma_as != NULL && has_iommu) { > > virtio_add_feature(>host_features, VIRTIO_F_IOMMU_PLATFORM); > >

Re: [PATCH v3 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-01 Thread Halil Pasic
On Tue, 1 Feb 2022 11:52:06 -0500 "Michael S. Tsirkin" wrote: > > > +bool vdev_has_iommu = false; > > > > Isn't vdev_has_iommu set unconditionally before you try to use it? > > I'd like to know too. Yes it is. Was meant as a conservative thing. AFAIR in C stuff on stack is not

Re: [PATCH v3 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-01 Thread Halil Pasic
On Tue, 1 Feb 2022 14:39:15 +0100 Halil Pasic wrote: > The commit 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but > unsupported") claims to fail the device hotplug when iommu_platform CC-ing Daniel with his new email address.

[PATCH v3 1/1] virtio: fix the condition for iommu_platform not supported

2022-02-01 Thread Halil Pasic
, and thus no device capability is needed. In this situation claiming that the device does not support iommu_plattform=on is counter-productive. So let us stop doing that! Signed-off-by: Halil Pasic Reported-by: Jakob Naucke Fixes: 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but

Re: [PATCH v2 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-28 Thread Halil Pasic
On Fri, 28 Jan 2022 08:02:39 -0300 Daniel Henrique Barboza wrote: > > We may be able to differentiate between the two using ->dma_as, but for > > that it needs to be set up correctly: whenever you require translation > > it should be something different than address_space_memory. The question >

Re: [PATCH v2 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-27 Thread Halil Pasic
On Thu, 27 Jan 2022 18:34:23 -0300 Daniel Henrique Barboza wrote: > On 1/27/22 10:28, Halil Pasic wrote: > > ping^2 > > > > Also adding Brijesh and Daniel, as I believe you guys should be > > interested in this, and I'm yet to receive review. > > > > @Br

Re: [PATCH v2 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-27 Thread Halil Pasic
+0100 Halil Pasic wrote: > ping > > On Mon, 17 Jan 2022 13:02:38 +0100 > Halil Pasic wrote: > > > The commit 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but > > unsupported") claims to fail the device hotplug when iommu_platform > > is

Re: [PATCH v2 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-25 Thread Halil Pasic
ping On Mon, 17 Jan 2022 13:02:38 +0100 Halil Pasic wrote: > The commit 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but > unsupported") claims to fail the device hotplug when iommu_platform > is requested, but not supported by the (vhost) device. On

[PATCH v2 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-17 Thread Halil Pasic
, and thus no device capability is needed. In this situation claiming that the device does not support iommu_plattform=on is counter-productive. So let us stop doing that! Signed-off-by: Halil Pasic Reported-by: Jakob Naucke Fixes: 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but

Re: [PATCH 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-14 Thread Halil Pasic
On Thu, 13 Jan 2022 20:54:52 +0100 Halil Pasic wrote: > > > This is the very reason for which commit 7ef7e6e3b ("vhost: correctly > > > turn on VIRTIO_F_IOMMU_PLATFORM") for, which fences _F_ACCESS_PLATFORM > > > form the vhost device that does not need it,

Re: [PATCH 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-13 Thread Halil Pasic
On Thu, 13 Jan 2022 12:11:42 -0500 "Michael S. Tsirkin" wrote: > On Thu, Jan 13, 2022 at 05:51:31PM +0100, Halil Pasic wrote: > > The commit 04ceb61a40 ("virtio: Fail if iommu_platform is requested, but > > unsupported") claims to fail the device hotplug w

[PATCH 1/1] virtio: fix the condition for iommu_platform not supported

2022-01-13 Thread Halil Pasic
ondition for detecting the situation when _F_ACCESS_PLATFORM is requested, but no I/O translation by the device, and thus no device capability is needed. In this situation claiming that the device does not support iommu_plattform=on is counter-productive. So let us stop doing that! Signed-off-b

Re: [RFC PATCH] MAINTAINERS: Add myself to s390 I/O areas

2022-01-12 Thread Halil Pasic
On Wed, 12 Jan 2022 17:40:44 +0100 Eric Farman wrote: > After the recent restructuring, I'd like to volunteer to help > in some of the s390 I/O areas. > > Built on "[PATCH RFC v2] MAINTAINERS: split out s390x sections" > > Signed-off-by: Eric Farman Ac

Re: [PATCH qemu] s390x/css: fix PMCW invalid mask

2021-12-23 Thread Halil Pasic
6 and 7 need to be zero. > > > > As both PMCW_FLAGS_MASK_INVALID and ioinst_schib_valid() are only used > > by ioinst_handle_msch(), adjust the mask accordingly. > > > > Fixes: db1c8f53bfb1 ("s390: Channel I/O basic definitions.") > > Signed-off-by: N

Re: [PATCH RFC] MAINTAINERS: split out s390x sections

2021-12-22 Thread Halil Pasic
On Tue, 21 Dec 2021 17:11:58 +0100 Cornelia Huck wrote: > Any objections if I move the sections as outlined above and keep the > acks I already have? No objections here! Regards, Halil

Re: [PATCH RFC] MAINTAINERS: split out s390x sections

2021-12-21 Thread Halil Pasic
On Mon, 20 Dec 2021 12:54:19 +0100 Cornelia Huck wrote: > Split out some more specialized devices etc., so that we can build > smarter lists of people to be put on cc: in the future. > > Signed-off-by: Cornelia Huck LGTM Acked-by: Halil Pasic

Re: [PATCH qemu] s390x/css: fix PMCW invalid mask

2021-12-20 Thread Halil Pasic
On Mon, 20 Dec 2021 11:44:44 +0100 Pierre Morel wrote: > > > > The PoP says that the machine shall ignore other fields > > of the PMCW when an MSCH is performed. I.e. we should not update > > "our" pmcw.flags bit 5 from 0 to 1 even if 1 was supplied, and > > thus STSCH should keep storing the

Re: [PATCH qemu] s390x/css: fix PMCW invalid mask

2021-12-17 Thread Halil Pasic
On Fri, 17 Dec 2021 18:13:47 +0100 Pierre Morel wrote: > >> Previously, we required bits 5, 6 and 7 to be zero (0x07 == 0b111). But, > >> as per the principles of operation, bit 5 is ignored in MSCH and bits 0, > >> 1, 6 and 7 need to be zero. > > > > On a second thought, don't we have to

Re: [PATCH qemu] s390x/css: fix PMCW invalid mask

2021-12-17 Thread Halil Pasic
On Fri, 17 Dec 2021 14:58:11 +0100 Halil Pasic wrote: > On Thu, 16 Dec 2021 14:16:57 +0100 > Nico Boehr wrote: > > > Previously, we required bits 5, 6 and 7 to be zero (0x07 == 0b111). But, > > as per the principles of operation, bit 5 is ignored in MSCH and bits 0

Re: [PATCH qemu] s390x/css: fix PMCW invalid mask

2021-12-17 Thread Halil Pasic
oinst_handle_msch(), adjust the mask accordingly. > > Fixes: db1c8f53bfb1 ("s390: Channel I/O basic definitions.") > Signed-off-by: Nico Boehr > Reviewed-by: Pierre Morel > Reviewed-by: Halil Pasic > Reviewed-by: Janosch Frank

Re: [RFC PATCH v2 0/5] virtio: early detect 'modern' virtio

2021-12-09 Thread Halil Pasic
On Wed, 8 Dec 2021 13:56:19 -0500 "Michael S. Tsirkin" wrote: > On Fri, Nov 12, 2021 at 03:57:44PM +0100, Halil Pasic wrote: > > This is an early RFC for a transport specific early detecton of > > modern virtio, which is most relevant for transitional devices on big &

Re: [PATCH v1 1/1] osdep: asynchronous teardown for shutdown on Linux

2021-12-07 Thread Halil Pasic
On Mon, 6 Dec 2021 11:47:55 + Daniel P. Berrangé wrote: > On Mon, Dec 06, 2021 at 12:43:12PM +0100, Claudio Imbrenda wrote: > > On Mon, 6 Dec 2021 11:21:10 + > > Daniel P. Berrangé wrote: > > > > > On Mon, Dec 06, 2021 at 12:06:11PM +0100, Claudio Imbrenda wrote: > > > > This patch

Re: [PATCH 1/4] s390x/pci: use a reserved ID for the default PCI group

2021-12-02 Thread Halil Pasic
On Thu, 2 Dec 2021 12:11:38 -0500 Matthew Rosato wrote: > > > > What happens if we migrate a VM from old to new QEMU? Won't the guest be > > able to observe the change? > > > > Yes, technically -- But # itself is not really all that important, it > is provided from CLP Q PCI FN to be

Re: [RFC PATCH v2 0/5] virtio: early detect 'modern' virtio

2021-11-29 Thread Halil Pasic
On Tue, 23 Nov 2021 14:13:40 +0100 Halil Pasic wrote: > On Fri, 12 Nov 2021 15:57:44 +0100 > Halil Pasic wrote: > > > This is an early RFC for a transport specific early detecton of > > modern virtio, which is most relevant for transitional devices on big > > end

Re: [RFC PATCH v2 0/5] virtio: early detect 'modern' virtio

2021-11-23 Thread Halil Pasic
On Fri, 12 Nov 2021 15:57:44 +0100 Halil Pasic wrote: > This is an early RFC for a transport specific early detecton of > modern virtio, which is most relevant for transitional devices on big > endian platforms, when drivers access the config space before > FEATURES_OK is set.

Re: [PATCH 1/1] MAINTAINERS: update email address of Christian Borntraeger

2021-11-23 Thread Halil Pasic
ap. > > Signed-off-by: Christian Borntraeger Acked-by: Halil Pasic > --- > .mailmap| 1 + > MAINTAINERS | 6 +++--- > 2 files changed, 4 insertions(+), 3 deletions(-) > > diff --git a/.mailmap b/.mailmap > index 8beb2f95ae28..c45d1c530144 100644 > ---

Re: [RFC PATCH v2 1/5] virtio: introduce virtio_force_modern()

2021-11-16 Thread Halil Pasic
On Mon, 15 Nov 2021 17:57:28 +0100 Cornelia Huck wrote: > On Mon, Nov 15 2021, Halil Pasic wrote: > > > On Fri, 12 Nov 2021 16:37:20 +0100 > > Cornelia Huck wrote: > > > >> On Fri, Nov 12 2021, Halil Pasic wrote: > >> > >> > Lega

Re: [RFC PATCH v2 1/5] virtio: introduce virtio_force_modern()

2021-11-15 Thread Halil Pasic
On Fri, 12 Nov 2021 16:37:20 +0100 Cornelia Huck wrote: > On Fri, Nov 12 2021, Halil Pasic wrote: > > > Legacy vs modern should be detected via transport specific means. We > > can't wait till feature negotiation is done. Let us introduce > > virtio_force_modern() as a

Re: [RFC PATCH v1 1/3] virtio: introduce virtio_force_modern()

2021-11-12 Thread Halil Pasic
On Fri, 12 Nov 2021 16:55:10 +0100 Cornelia Huck wrote: > On Fri, Nov 12 2021, Halil Pasic wrote: > > > On Fri, 29 Oct 2021 16:53:25 +0200 > > Cornelia Huck wrote: > > > >> On Fri, Oct 29 2021, Halil Pasic wrote: > >> > >> > Lega

Re: [RFC PATCH v1 1/3] virtio: introduce virtio_force_modern()

2021-11-12 Thread Halil Pasic
On Fri, 29 Oct 2021 16:53:25 +0200 Cornelia Huck wrote: > On Fri, Oct 29 2021, Halil Pasic wrote: > > > Legacy vs modern should be detected via transport specific means. We > > can't wait till feature negotiation is done. Let us introduce > > virtio_force_modern() as a

[RFC PATCH v2 1/5] virtio: introduce virtio_force_modern()

2021-11-12 Thread Halil Pasic
is added for the situations where the device needs to do more than just setting the VIRTIO_F_VERSION_1 feature bit. For example, when vhost is involved, we may need to propagate the features to the vhost device. Signed-off-by: Halil Pasic --- I'm still struggling with how to deal with vhost-user

[RFC PATCH v2 4/5] vhost: push features to backend on force_modern

2021-11-12 Thread Halil Pasic
FEATURES_OK). Signed-off-by: Halil Pasic --- hw/virtio/vhost.c | 17 + include/hw/virtio/vhost.h | 2 ++ 2 files changed, 19 insertions(+) diff --git a/hw/virtio/vhost.c b/hw/virtio/vhost.c index b4b29413e6..5764970298 100644 --- a/hw/virtio/vhost.c +++ b/hw/virtio/vhost.c

[RFC PATCH v2 5/5] virtio-net: handle force_modern for vhost

2021-11-12 Thread Halil Pasic
Signed-off-by: Halil Pasic --- Inspired by virtio_net_set_features() which I don't quite understand. Why do we have to do vhost_net_ack_features() for each possible queue? --- hw/net/virtio-net.c | 20 1 file changed, 20 insertions(+) diff --git a/hw/net/virtio-net.c b/hw

[RFC PATCH v2 3/5] virtio-pci: use virtio_force_modern()

2021-11-12 Thread Halil Pasic
Let us detect usage via the modern interface by tapping into the place that implements the 'modern' reset. Signed-off-by: Halil Pasic --- hw/virtio/virtio-pci.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hw/virtio/virtio-pci.c b/hw/virtio/virtio-pci.c index 6e16e2705c..8dd862da21

[RFC PATCH v2 2/5] virtio-ccw: use virtio_force_modern()

2021-11-12 Thread Halil Pasic
anness starts working as it should for devices that comply to the virtio spec. Signed-off-by: Halil Pasic --- hw/s390x/virtio-ccw.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/hw/s390x/virtio-ccw.c b/hw/s390x/virtio-ccw.c index 6a2df1c1e9..88fbe87942 100644 --- a/hw/s390x/virtio-ccw.c ++

[RFC PATCH v2 0/5] virtio: early detect 'modern' virtio

2021-11-12 Thread Halil Pasic
-> v2: * add callback * tweak feature manipulation * add generic handling for vhost that needs to be called by devices * add handling for virtio Halil Pasic (5): virtio: introduce virtio_force_modern() virtio-ccw: use virtio_force_modern() virtio-pci: use virtio_force_modern() vhost: p

Re: [RFC PATCH v1 0/3] virtio: early detect 'modern' virtio

2021-11-09 Thread Halil Pasic
On Fri, 5 Nov 2021 03:42:33 -0400 "Michael S. Tsirkin" wrote: > > This series was only lightly tested. > > I think it's a good enough approach, and we are getting close > to release. For vhost - a new callback just for that? Would be ok. > Or just invoke set features - if this works. As of

[RFC PATCH v1 3/3] virtio-pci: use virtio_force_modern()

2021-10-28 Thread Halil Pasic
Let us detect usage via the modern interface by tapping into the place that implements the 'modern' reset. Signed-off-by: Halil Pasic --- hw/virtio/virtio-pci.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hw/virtio/virtio-pci.c b/hw/virtio/virtio-pci.c index 6e16e2705c..8dd862da21

[RFC PATCH v1 2/3] virtio-ccw: use virtio_force_modern

2021-10-28 Thread Halil Pasic
anness starts working as it should for devices that comply to the virtio spec. Signed-off-by: Halil Pasic --- hw/s390x/virtio-ccw.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/hw/s390x/virtio-ccw.c b/hw/s390x/virtio-ccw.c index 6a2df1c1e9..88fbe87942 100644 --- a/hw/s390x/virtio-ccw.c ++

[RFC PATCH v1 1/3] virtio: introduce virtio_force_modern()

2021-10-28 Thread Halil Pasic
-by: Halil Pasic --- I'm still struggling with how to deal with vhost-user and co. The problem is that I'm not very familiar with the life-cycle of, let us say, a vhost_user device. Looks to me like the vhost part might be just an implementation detail, and could even become a hot swappable thing

[RFC PATCH v1 0/3] virtio: early detect 'modern' virtio

2021-10-28 Thread Halil Pasic
in the situation described in the previous paragraph, when the config is managed by a vhost device (and thus outside QEMU). This series was only lightly tested. Halil Pasic (3): virtio: introduce virtio_force_modern() virtio-ccw: use virtio_force_modern virtio-pci: use virtio_force_modern

Re: [PATCH v3 1/1] virtio: write back F_VERSION_1 before validate

2021-10-13 Thread Halil Pasic
On Wed, 13 Oct 2021 08:24:53 -0400 "Michael S. Tsirkin" wrote: > > > OK this looks good! How about a QEMU patch to make it spec compliant on > > > BE? > > > > Who is going to do that? Halil? you? Conny? > > Halil said he'll do it... Right, Halil? I can do it but not right away. Maybe in a

Re: [PATCH 2/3] s390x/kvm: step down as maintainer

2021-10-12 Thread Halil Pasic
On Tue, 12 Oct 2021 16:40:39 +0200 Cornelia Huck wrote: > I'm no longer involved with KVM/s390 on the kernel side, and I don't > have enough resources to work on the s390 KVM cpus support, so I'll > step down. > > Signed-off-by: Cornelia Huck Acked-by: Halil Pasic Tha

Re: [PATCH 3/3] s390x virtio-ccw machine: step down as maintainer

2021-10-12 Thread Halil Pasic
On Tue, 12 Oct 2021 16:40:40 +0200 Cornelia Huck wrote: > I currently don't have time to work on the s390x virtio-ccw machine > anymore, so let's step down. (I will, however, continue as a > maintainer for the virtio-ccw *transport*.) > > Signed-off-by: Cornelia Huck Acked-

[PATCH v3 1/1] virtio: write back F_VERSION_1 before validate

2021-10-10 Thread Halil Pasic
, so at least that's not a regression. No devices except virtio net and virtio blk seem to be affected. Long term the right thing to do is to fix the hypervisors. Cc: #v4.11 Signed-off-by: Halil Pasic Fixes: 82e89ea077b9 ("virtio-blk: Add validation for block size in config space") Fi

Re: [PATCH v2 1/1] virtio: write back F_VERSION_1 before validate

2021-10-08 Thread Halil Pasic
On Fri, 8 Oct 2021 09:05:03 -0400 "Michael S. Tsirkin" wrote: > On Fri, Oct 08, 2021 at 02:34:22PM +0200, Halil Pasic wrote: > > The virtio specification virtio-v1.1-cs01 states: "Transitional devices > > MUST detect Legacy drivers by detecting that VIRTI

[PATCH v2 1/1] virtio: write back F_VERSION_1 before validate

2021-10-08 Thread Halil Pasic
atter renders virtio-blk unusable with DASD backing, because things simply don't work with the default. Cc: #v4.11 Signed-off-by: Halil Pasic Fixes: 82e89ea077b9 ("virtio-blk: Add validation for block size in config space") Fixes: fe36cbe0671e ("virtio_net: clear MTU wh

Re: [PATCH 1/1] virtio: write back F_VERSION_1 before validate

2021-10-07 Thread Halil Pasic
On Thu, 07 Oct 2021 17:25:52 +0200 Cornelia Huck wrote: > On Thu, Oct 07 2021, Halil Pasic wrote: > > > On Thu, 07 Oct 2021 13:52:24 +0200 > > Cornelia Huck wrote: > > > >> On Wed, Oct 06 2021, Halil Pasic wrote: > >> > >>

Re: [PATCH 1/1] virtio: write back F_VERSION_1 before validate

2021-10-07 Thread Halil Pasic
On Thu, 07 Oct 2021 13:52:24 +0200 Cornelia Huck wrote: > On Wed, Oct 06 2021, Halil Pasic wrote: > > > The virtio specification virtio-v1.1-cs01 states: Transitional devices > > MUST detect Legacy drivers by detecting that VIRTIO_F_VERSION_1 has not > > been ac

[PATCH 1/1] virtio: write back F_VERSION_1 before validate

2021-10-06 Thread Halil Pasic
negotiation is complete. However, we already have regression so let's try to address it. Signed-off-by: Halil Pasic Fixes: 82e89ea077b9 ("virtio-blk: Add validation for block size in config space") Fixes: fe36cbe0671e ("virtio_net: clear MTU when out of range") Reported-by

Re: [RFC PATCH 1/1] virtio: write back features before verify

2021-10-05 Thread Halil Pasic
On Tue, 05 Oct 2021 13:13:31 +0200 Cornelia Huck wrote: > On Tue, Oct 05 2021, Halil Pasic wrote: > > > On Mon, 4 Oct 2021 05:07:13 -0400 > > "Michael S. Tsirkin" wrote: > >> Well we established that we can know. Here's an alternative explanation:

Re: [RFC PATCH 1/1] virtio: write back features before verify

2021-10-05 Thread Halil Pasic
On Tue, 5 Oct 2021 03:53:17 -0400 "Michael S. Tsirkin" wrote: > > Wouldn't a call from transport code into virtio core > > be more handy? What I have in mind is stuff like vhost-user and vdpa. My > > understanding is, that for vhost setups where the config is outside qemu, > > we probably need a

Re: [RFC PATCH 1/1] virtio: write back features before verify

2021-10-05 Thread Halil Pasic
On Mon, 4 Oct 2021 05:07:13 -0400 "Michael S. Tsirkin" wrote: > On Mon, Oct 04, 2021 at 04:23:23AM +0200, Halil Pasic wrote: > > On Sat, 2 Oct 2021 14:13:37 -0400 > > "Michael S. Tsirkin" wrote: > > > > > > Anyone else have

Re: [RFC PATCH 1/1] virtio: write back features before verify

2021-10-05 Thread Halil Pasic
On Mon, 4 Oct 2021 09:11:04 -0400 "Michael S. Tsirkin" wrote: > > >> static inline bool virtio_access_is_big_endian(VirtIODevice *vdev) > > >> { > > >> #if defined(LEGACY_VIRTIO_IS_BIENDIAN) > > >> return virtio_is_big_endian(vdev); > > >> #elif defined(TARGET_WORDS_BIGENDIAN) > > >> if

Re: [PATCH] block: introduce max_hw_iov for use in scsi-generic

2021-09-23 Thread Halil Pasic
On Thu, 23 Sep 2021 16:28:11 +0200 Halil Pasic wrote: > Can't we use some of the established constants instead of hard coding a > qemu specific IOV_MAX? > > POSIX.1 seems to guarantee the availability of IOV_MAX in > according to: https://man7.org/linux/man-pages/man2/readv.2.

  1   2   3   4   5   6   7   8   9   10   >