From: Paul Mackerras <paulus@ozlabs.org>
To: "Paolo Bonzini" <pbonzini@redhat.com>,
"Radim Krčmář" <rkrcmar@redhat.com>,
kvm@vger.kernel.org
Cc: kvm-ppc@vger.kernel.org
Subject: Re: [GIT PULL] Please pull my kvm-ppc-next-5.2-1 tag
Date: Thu, 09 May 2019 22:46:09 +0000 [thread overview]
Message-ID: <20190509224609.GA5685@blackberry> (raw)
In-Reply-To: <20190502040646.GA3661@blackberry>
On Thu, May 02, 2019 at 02:06:46PM +1000, Paul Mackerras wrote:
> Paolo or Radim,
>
> Please do a pull from my kvm-ppc-next-5.2-1 tag to get a PPC update
> for 5.2. The main new feature here is that we can now let guests
> access the POWER9 XIVE interrupt controller directly for things like
> acknowledge, EOI, enable and disable on interrupts, rather than
> requiring guests to do hypercalls for these operations.
>
> I have merged in the topic/ppc-kvm branch from the powerpc tree
> because one of the patches there is a prerequisite for the XIVE patch
> series. That's why there are changes to arch/powerpc/kernel in the
> diffstat.
>
> Stephen Rothwell noted a conflict between my tree and the kvm-arm tree
> because we have both allocated new capability numbers.
>
> The XIVE patch series also modifies generic KVM code to add mmap and
> release methods on KVM devices.
>
> Thanks,
> Paul.
Ping?
> The following changes since commit 345077c8e172c255ea0707214303ccd099e5656b:
>
> KVM: PPC: Book3S: Protect memslots while validating user address (2019-04-05 14:37:24 +1100)
>
> are available in the git repository at:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc tags/kvm-ppc-next-5.2-1
>
> for you to fetch changes up to 0caecf5b00199636eb2d32201199ecd6be52558d:
>
> KVM: PPC: Book3S HV: XIVE: Clear escalation interrupt pointers on device close (2019-04-30 19:41:01 +1000)
>
> ----------------------------------------------------------------
> PPC KVM update for 5.2
>
> * Support for guests to access the new POWER9 XIVE interrupt controller
> hardware directly, reducing interrupt latency and overhead for guests.
>
> * In-kernel implementation of the H_PAGE_INIT hypercall.
>
> * Reduce memory usage of sparsely-populated IOMMU tables.
>
> * Several bug fixes.
>
> ----------------------------------------------------------------
> Alexey Kardashevskiy (3):
> KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest
> KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers
> KVM: PPC: Book3S: Allocate guest TCEs on demand too
>
> Cédric Le Goater (17):
> powerpc/xive: add OPAL extensions for the XIVE native exploitation support
> KVM: PPC: Book3S HV: Add a new KVM device for the XIVE native exploitation mode
> KVM: PPC: Book3S HV: XIVE: Introduce a new capability KVM_CAP_PPC_IRQ_XIVE
> KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
> KVM: PPC: Book3S HV: XIVE: Add a control to configure a source
> KVM: PPC: Book3S HV: XIVE: Add controls for the EQ configuration
> KVM: PPC: Book3S HV: XIVE: Add a global reset control
> KVM: PPC: Book3S HV: XIVE: Add a control to sync the sources
> KVM: PPC: Book3S HV: XIVE: Add a control to dirty the XIVE EQ pages
> KVM: PPC: Book3S HV: XIVE: Add get/set accessors for the VP XIVE state
> KVM: Introduce a 'mmap' method for KVM devices
> KVM: PPC: Book3S HV: XIVE: Add a TIMA mapping
> KVM: PPC: Book3S HV: XIVE: Add a mapping for the source ESB pages
> KVM: PPC: Book3S HV: XIVE: Add passthrough support
> KVM: PPC: Book3S HV: XIVE: Activate XIVE exploitation mode
> KVM: Introduce a 'release' method for KVM devices
> KVM: PPC: Book3S HV: XIVE: Replace the 'destroy' method by a 'release' method
>
> Michael Neuling (1):
> powerpc: Add force enable of DAWR on P9 option
>
> Palmer Dabbelt (1):
> KVM: PPC: Book3S HV: smb->smp comment fixup
>
> Paul Mackerras (6):
> KVM: PPC: Book3S HV: Fix XICS-on-XIVE H_IPI when priority = 0
> KVM: PPC: Book3S HV: Move HPT guest TLB flushing to C code
> KVM: PPC: Book3S HV: Flush TLB on secondary radix threads
> Merge remote-tracking branch 'remotes/powerpc/topic/ppc-kvm' into kvm-ppc-next
> KVM: PPC: Book3S HV: XIVE: Prevent races when releasing device
> KVM: PPC: Book3S HV: XIVE: Clear escalation interrupt pointers on device close
>
> Suraj Jitindar Singh (4):
> KVM: PPC: Book3S HV: Implement virtual mode H_PAGE_INIT handler
> KVM: PPC: Book3S HV: Implement real mode H_PAGE_INIT handler
> KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code
> KVM: PPC: Book3S HV: Save/restore vrsave register in kvmhv_p9_guest_entry()
>
> Documentation/powerpc/DAWR-POWER9.txt | 32 +
> Documentation/virtual/kvm/api.txt | 10 +
> Documentation/virtual/kvm/devices/xive.txt | 197 +++++
> arch/powerpc/include/asm/hw_breakpoint.h | 8 +
> arch/powerpc/include/asm/kvm_host.h | 11 +-
> arch/powerpc/include/asm/kvm_ppc.h | 41 +-
> arch/powerpc/include/asm/opal-api.h | 7 +-
> arch/powerpc/include/asm/opal.h | 7 +
> arch/powerpc/include/asm/xive.h | 17 +
> arch/powerpc/include/uapi/asm/kvm.h | 46 +
> arch/powerpc/kernel/hw_breakpoint.c | 62 +-
> arch/powerpc/kernel/process.c | 9 +-
> arch/powerpc/kernel/ptrace.c | 3 +-
> arch/powerpc/kvm/Makefile | 2 +-
> arch/powerpc/kvm/book3s.c | 42 +-
> arch/powerpc/kvm/book3s_64_vio.c | 96 ++-
> arch/powerpc/kvm/book3s_64_vio_hv.c | 105 ++-
> arch/powerpc/kvm/book3s_hv.c | 155 ++--
> arch/powerpc/kvm/book3s_hv_builtin.c | 57 ++
> arch/powerpc/kvm/book3s_hv_rm_mmu.c | 144 ++++
> arch/powerpc/kvm/book3s_hv_rmhandlers.S | 103 +--
> arch/powerpc/kvm/book3s_xive.c | 250 ++++--
> arch/powerpc/kvm/book3s_xive.h | 37 +
> arch/powerpc/kvm/book3s_xive_native.c | 1249 ++++++++++++++++++++++++++++
> arch/powerpc/kvm/book3s_xive_template.c | 78 +-
> arch/powerpc/kvm/powerpc.c | 37 +
> arch/powerpc/platforms/powernv/opal-call.c | 3 +
> arch/powerpc/sysdev/xive/native.c | 110 +++
> include/linux/kvm_host.h | 10 +
> include/uapi/linux/kvm.h | 3 +
> virt/kvm/kvm_main.c | 24 +
> 31 files changed, 2670 insertions(+), 285 deletions(-)
> create mode 100644 Documentation/virtual/kvm/devices/xive.txt
> create mode 100644 arch/powerpc/kvm/book3s_xive_native.c
WARNING: multiple messages have this Message-ID (diff)
From: Paul Mackerras <paulus@ozlabs.org>
To: "Paolo Bonzini" <pbonzini@redhat.com>,
"Radim Krčmář" <rkrcmar@redhat.com>,
kvm@vger.kernel.org
Cc: kvm-ppc@vger.kernel.org
Subject: Re: [GIT PULL] Please pull my kvm-ppc-next-5.2-1 tag
Date: Fri, 10 May 2019 08:46:09 +1000 [thread overview]
Message-ID: <20190509224609.GA5685@blackberry> (raw)
In-Reply-To: <20190502040646.GA3661@blackberry>
On Thu, May 02, 2019 at 02:06:46PM +1000, Paul Mackerras wrote:
> Paolo or Radim,
>
> Please do a pull from my kvm-ppc-next-5.2-1 tag to get a PPC update
> for 5.2. The main new feature here is that we can now let guests
> access the POWER9 XIVE interrupt controller directly for things like
> acknowledge, EOI, enable and disable on interrupts, rather than
> requiring guests to do hypercalls for these operations.
>
> I have merged in the topic/ppc-kvm branch from the powerpc tree
> because one of the patches there is a prerequisite for the XIVE patch
> series. That's why there are changes to arch/powerpc/kernel in the
> diffstat.
>
> Stephen Rothwell noted a conflict between my tree and the kvm-arm tree
> because we have both allocated new capability numbers.
>
> The XIVE patch series also modifies generic KVM code to add mmap and
> release methods on KVM devices.
>
> Thanks,
> Paul.
Ping?
> The following changes since commit 345077c8e172c255ea0707214303ccd099e5656b:
>
> KVM: PPC: Book3S: Protect memslots while validating user address (2019-04-05 14:37:24 +1100)
>
> are available in the git repository at:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc tags/kvm-ppc-next-5.2-1
>
> for you to fetch changes up to 0caecf5b00199636eb2d32201199ecd6be52558d:
>
> KVM: PPC: Book3S HV: XIVE: Clear escalation interrupt pointers on device close (2019-04-30 19:41:01 +1000)
>
> ----------------------------------------------------------------
> PPC KVM update for 5.2
>
> * Support for guests to access the new POWER9 XIVE interrupt controller
> hardware directly, reducing interrupt latency and overhead for guests.
>
> * In-kernel implementation of the H_PAGE_INIT hypercall.
>
> * Reduce memory usage of sparsely-populated IOMMU tables.
>
> * Several bug fixes.
>
> ----------------------------------------------------------------
> Alexey Kardashevskiy (3):
> KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest
> KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers
> KVM: PPC: Book3S: Allocate guest TCEs on demand too
>
> Cédric Le Goater (17):
> powerpc/xive: add OPAL extensions for the XIVE native exploitation support
> KVM: PPC: Book3S HV: Add a new KVM device for the XIVE native exploitation mode
> KVM: PPC: Book3S HV: XIVE: Introduce a new capability KVM_CAP_PPC_IRQ_XIVE
> KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
> KVM: PPC: Book3S HV: XIVE: Add a control to configure a source
> KVM: PPC: Book3S HV: XIVE: Add controls for the EQ configuration
> KVM: PPC: Book3S HV: XIVE: Add a global reset control
> KVM: PPC: Book3S HV: XIVE: Add a control to sync the sources
> KVM: PPC: Book3S HV: XIVE: Add a control to dirty the XIVE EQ pages
> KVM: PPC: Book3S HV: XIVE: Add get/set accessors for the VP XIVE state
> KVM: Introduce a 'mmap' method for KVM devices
> KVM: PPC: Book3S HV: XIVE: Add a TIMA mapping
> KVM: PPC: Book3S HV: XIVE: Add a mapping for the source ESB pages
> KVM: PPC: Book3S HV: XIVE: Add passthrough support
> KVM: PPC: Book3S HV: XIVE: Activate XIVE exploitation mode
> KVM: Introduce a 'release' method for KVM devices
> KVM: PPC: Book3S HV: XIVE: Replace the 'destroy' method by a 'release' method
>
> Michael Neuling (1):
> powerpc: Add force enable of DAWR on P9 option
>
> Palmer Dabbelt (1):
> KVM: PPC: Book3S HV: smb->smp comment fixup
>
> Paul Mackerras (6):
> KVM: PPC: Book3S HV: Fix XICS-on-XIVE H_IPI when priority = 0
> KVM: PPC: Book3S HV: Move HPT guest TLB flushing to C code
> KVM: PPC: Book3S HV: Flush TLB on secondary radix threads
> Merge remote-tracking branch 'remotes/powerpc/topic/ppc-kvm' into kvm-ppc-next
> KVM: PPC: Book3S HV: XIVE: Prevent races when releasing device
> KVM: PPC: Book3S HV: XIVE: Clear escalation interrupt pointers on device close
>
> Suraj Jitindar Singh (4):
> KVM: PPC: Book3S HV: Implement virtual mode H_PAGE_INIT handler
> KVM: PPC: Book3S HV: Implement real mode H_PAGE_INIT handler
> KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code
> KVM: PPC: Book3S HV: Save/restore vrsave register in kvmhv_p9_guest_entry()
>
> Documentation/powerpc/DAWR-POWER9.txt | 32 +
> Documentation/virtual/kvm/api.txt | 10 +
> Documentation/virtual/kvm/devices/xive.txt | 197 +++++
> arch/powerpc/include/asm/hw_breakpoint.h | 8 +
> arch/powerpc/include/asm/kvm_host.h | 11 +-
> arch/powerpc/include/asm/kvm_ppc.h | 41 +-
> arch/powerpc/include/asm/opal-api.h | 7 +-
> arch/powerpc/include/asm/opal.h | 7 +
> arch/powerpc/include/asm/xive.h | 17 +
> arch/powerpc/include/uapi/asm/kvm.h | 46 +
> arch/powerpc/kernel/hw_breakpoint.c | 62 +-
> arch/powerpc/kernel/process.c | 9 +-
> arch/powerpc/kernel/ptrace.c | 3 +-
> arch/powerpc/kvm/Makefile | 2 +-
> arch/powerpc/kvm/book3s.c | 42 +-
> arch/powerpc/kvm/book3s_64_vio.c | 96 ++-
> arch/powerpc/kvm/book3s_64_vio_hv.c | 105 ++-
> arch/powerpc/kvm/book3s_hv.c | 155 ++--
> arch/powerpc/kvm/book3s_hv_builtin.c | 57 ++
> arch/powerpc/kvm/book3s_hv_rm_mmu.c | 144 ++++
> arch/powerpc/kvm/book3s_hv_rmhandlers.S | 103 +--
> arch/powerpc/kvm/book3s_xive.c | 250 ++++--
> arch/powerpc/kvm/book3s_xive.h | 37 +
> arch/powerpc/kvm/book3s_xive_native.c | 1249 ++++++++++++++++++++++++++++
> arch/powerpc/kvm/book3s_xive_template.c | 78 +-
> arch/powerpc/kvm/powerpc.c | 37 +
> arch/powerpc/platforms/powernv/opal-call.c | 3 +
> arch/powerpc/sysdev/xive/native.c | 110 +++
> include/linux/kvm_host.h | 10 +
> include/uapi/linux/kvm.h | 3 +
> virt/kvm/kvm_main.c | 24 +
> 31 files changed, 2670 insertions(+), 285 deletions(-)
> create mode 100644 Documentation/virtual/kvm/devices/xive.txt
> create mode 100644 arch/powerpc/kvm/book3s_xive_native.c
next prev parent reply other threads:[~2019-05-09 22:46 UTC|newest]
Thread overview: 68+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-02-22 5:14 [GIT PULL] Please pull my kvm-ppc-next-5.1-1 tag Paul Mackerras
2019-02-22 5:23 ` Masahiro Yamada
2019-02-22 5:52 ` Paul Mackerras
2019-02-22 6:46 ` Masahiro Yamada
2019-02-22 9:46 ` Paul Mackerras
2019-02-22 16:43 ` Paolo Bonzini
2019-03-01 3:37 ` [GIT PULL] Please pull my kvm-ppc-next-5.1-2 tag Paul Mackerras
2019-03-01 5:21 ` [GIT PULL] Please pull my kvm-ppc-next-5.1-3 tag Paul Mackerras
2019-03-14 3:31 ` Paul Mackerras
2019-03-15 18:13 ` Paolo Bonzini
2019-05-02 4:06 ` [GIT PULL] Please pull my kvm-ppc-next-5.2-1 tag Paul Mackerras
2019-05-02 4:06 ` Paul Mackerras
2019-05-09 22:46 ` Paul Mackerras [this message]
2019-05-09 22:46 ` Paul Mackerras
2019-05-14 10:13 ` [GIT PULL] Please pull my kvm-ppc-next-5.2-2 tag Paul Mackerras
2019-05-14 10:13 ` Paul Mackerras
2019-05-15 21:40 ` Paolo Bonzini
2019-05-15 21:40 ` Paolo Bonzini
2019-08-28 23:23 ` [GIT PULL] Please pull my kvm-ppc-next-5.4-1 tag Paul Mackerras
2019-08-28 23:23 ` Paul Mackerras
2019-09-06 12:04 ` Paul Mackerras
2019-09-06 12:04 ` Paul Mackerras
2019-09-10 14:51 ` Paolo Bonzini
2019-09-10 14:51 ` Paolo Bonzini
2019-10-31 11:13 ` [GIT PULL] Please pull my kvm-ppc-next-5.5-1 tag Paul Mackerras
2019-10-31 11:13 ` Paul Mackerras
2019-10-31 23:36 ` Paolo Bonzini
2019-10-31 23:36 ` Paolo Bonzini
2019-11-25 0:58 ` [GIT PULL] Please pull my kvm-ppc-next-5.5-2 tag Paul Mackerras
2019-11-25 0:58 ` Paul Mackerras
2019-11-25 10:29 ` Paolo Bonzini
2019-11-25 10:29 ` Paolo Bonzini
2019-11-25 23:44 ` Paul Mackerras
2019-11-25 23:44 ` Paul Mackerras
2019-11-26 8:52 ` Paolo Bonzini
2019-11-26 8:52 ` Paolo Bonzini
2020-01-21 3:33 ` [GIT PULL] Please pull my kvm-ppc-next-5.6-1 tag Paul Mackerras
2020-01-21 3:33 ` Paul Mackerras
2020-01-21 16:15 ` Paolo Bonzini
2020-01-21 16:15 ` Paolo Bonzini
2020-01-30 0:54 ` [GIT PULL] Please pull my kvm-ppc-next-5.6-2 tag Paul Mackerras
2020-01-30 0:54 ` Paul Mackerras
2020-03-30 23:08 ` [GIT PULL] Please pull my kvm-ppc-next-5.7-1 tag Paul Mackerras
2020-03-30 23:08 ` Paul Mackerras
2020-03-31 14:47 ` Paolo Bonzini
2020-03-31 14:47 ` Paolo Bonzini
2020-06-01 23:53 ` [GIT PULL] Please pull my kvm-ppc-next-5.8-1 tag Paul Mackerras
2020-06-01 23:53 ` Paul Mackerras
2020-06-04 18:58 ` Paolo Bonzini
2020-06-04 18:58 ` Paolo Bonzini
2020-06-11 0:48 ` Paul Mackerras
2020-06-11 0:48 ` Paul Mackerras
2020-06-11 1:01 ` Paolo Bonzini
2020-06-11 1:01 ` Paolo Bonzini
2020-07-28 5:51 ` [GIT PULL] Please pull my kvm-ppc-next-5.9-1 tag Paul Mackerras
2020-07-28 5:51 ` Paul Mackerras
2020-08-05 0:02 ` Paul Mackerras
2020-08-05 0:02 ` Paul Mackerras
2020-08-07 12:23 ` Paolo Bonzini
2020-08-07 12:23 ` Paolo Bonzini
2020-09-22 4:19 ` [GIT PULL] Please pull my kvm-ppc-next-5.10-1 tag Paul Mackerras
2020-09-22 4:19 ` Paul Mackerras
2020-09-22 12:18 ` Paolo Bonzini
2020-09-22 12:18 ` Paolo Bonzini
2021-02-11 7:25 ` [GIT PULL] Please pull my kvm-ppc-next-5.12-1 tag Paul Mackerras
2021-02-11 7:25 ` Paul Mackerras
2021-02-11 13:00 ` Paolo Bonzini
2021-02-11 13:00 ` Paolo Bonzini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190509224609.GA5685@blackberry \
--to=paulus@ozlabs.org \
--cc=kvm-ppc@vger.kernel.org \
--cc=kvm@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=rkrcmar@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.