From: Alexander Graf <agraf@suse.de>
To: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>, kvm-ppc <kvm-ppc@vger.kernel.org>,
KVM list <kvm@vger.kernel.org>
Subject: [PULL 00/28] ppc patch queue 2012-12-06
Date: Thu, 6 Dec 2012 01:40:49 +0100 [thread overview]
Message-ID: <1354754477-15472-1-git-send-email-agraf@suse.de> (raw)
Hi Marcelo / Gleb,
This is my current patch queue for ppc. Please pull.
Major changes this time around include:
- Book3S PR: Multiple fixes for POWER7 hosts
- Book3S HV: Prepare for full state exposure (live migration)
- Add eventfd support
- BookE: Add final bits for 64bit BookE support
Alex
The following changes since commit 45e3cc7d9fe69844cd12d51c511e1e98d156bbe1:
Jan Kiszka (1):
KVM: x86: Fix uninitialized return code
are available in the git repository at:
git://github.com/agraf/linux-2.6.git for-upstream
Alexander Graf (3):
KVM: Distangle eventfd code from irqchip
KVM: PPC: Support eventfd
KVM: PPC: Make EPCR a valid field for booke64 and bookehv
Michael Ellerman (1):
MAINTAINERS: Add git tree link for PPC KVM
Mihai Caraman (11):
KVM: PPC: e500: Silence bogus GCC warning in tlb code
KVM: PPC: booke: Fix get_tb() compile error on 64-bit
KVM: PPC: bookehv: Remove GET_VCPU macro from exception handler
KVM: PPC: bookehv64: Add support for interrupt handling
KVM: PPC: e500: Add emulation helper for getting instruction ea
KVM: PPC: Mask ea's high 32-bits in 32/64 instr emulation
KVM: PPC: e500: Mask MAS2 EPN high 32-bits in 32/64 tlbwe emulation
KVM: PPC: booke: Extend MAS2 EPN mask for 64-bit
KVM: PPC: bookehv: Add guest computation mode for irq delivery
KVM: PPC: bookehv: Add EPCR support in mtspr/mfspr emulation
KVM: PPC: booke: Get/set guest EPCR register using ONE_REG interface
Paul Mackerras (13):
KVM: PPC: Book3S HV: Restructure HPT entry creation code
KVM: PPC: Book3S HV: Fix bug causing loss of page dirty state
KVM: PPC: Book3S HV: Add a mechanism for recording modified HPTEs
KVM: PPC: Book3S HV: Make a HPTE removal function available
KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT
KVM: PPC: Book3S HV: Reset reverse-map chains when resetting the HPT
KVM: PPC: Book3S HV: Report correct HPT entry index when reading HPT
KVM: PPC: Book3S HV: Don't give the guest RW access to RO pages
KVM: PPC: Book3S PR: Emulate PURR, SPURR and DSCR registers
KVM: PPC: Book3S PR: Fix VSX handling
KVM: PPC: Book3S PR: MSR_DE doesn't exist on Book 3S
KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations
KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking
Documentation/virtual/kvm/api.txt | 55 ++++
MAINTAINERS | 1 +
arch/powerpc/include/asm/kvm_book3s.h | 10 +-
arch/powerpc/include/asm/kvm_book3s_64.h | 31 ++
arch/powerpc/include/asm/kvm_booke_hv_asm.h | 25 ++
arch/powerpc/include/asm/kvm_host.h | 13 +-
arch/powerpc/include/asm/kvm_ppc.h | 23 ++
arch/powerpc/include/asm/mmu-book3e.h | 2 +-
arch/powerpc/include/asm/mmu-hash64.h | 10 +
arch/powerpc/include/asm/reg.h | 1 +
arch/powerpc/include/uapi/asm/kvm.h | 27 ++
arch/powerpc/kernel/asm-offsets.c | 4 +-
arch/powerpc/kvm/Kconfig | 1 +
arch/powerpc/kvm/Makefile | 5 +-
arch/powerpc/kvm/book3s_64_mmu_hv.c | 407 ++++++++++++++++++++++++++-
arch/powerpc/kvm/book3s_emulate.c | 16 +-
arch/powerpc/kvm/book3s_exports.c | 3 -
arch/powerpc/kvm/book3s_hv.c | 32 ++-
arch/powerpc/kvm/book3s_hv_ras.c | 144 ++++++++++
arch/powerpc/kvm/book3s_hv_rm_mmu.c | 139 ++++++++--
arch/powerpc/kvm/book3s_hv_rmhandlers.S | 131 +++++----
arch/powerpc/kvm/book3s_pr.c | 114 ++++----
arch/powerpc/kvm/book3s_rmhandlers.S | 3 -
arch/powerpc/kvm/booke.c | 36 +++-
arch/powerpc/kvm/booke.h | 1 +
arch/powerpc/kvm/booke_emulate.c | 14 +-
arch/powerpc/kvm/bookehv_interrupts.S | 145 +++++++++-
arch/powerpc/kvm/e500.h | 8 +-
arch/powerpc/kvm/e500_emulate.c | 14 +-
arch/powerpc/kvm/e500_tlb.c | 38 +--
arch/powerpc/kvm/powerpc.c | 34 +++-
include/linux/kvm_host.h | 12 +-
include/uapi/linux/kvm.h | 3 +
virt/kvm/eventfd.c | 6 +
34 files changed, 1279 insertions(+), 229 deletions(-)
create mode 100644 arch/powerpc/kvm/book3s_hv_ras.c
next reply other threads:[~2012-12-06 0:40 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-06 0:40 Alexander Graf [this message]
2012-12-06 0:40 ` [PATCH 01/28] KVM: Distangle eventfd code from irqchip Alexander Graf
2012-12-06 0:40 ` [PATCH 02/28] KVM: PPC: Support eventfd Alexander Graf
2012-12-06 0:40 ` [PATCH 03/28] KVM: PPC: Book3S HV: Restructure HPT entry creation code Alexander Graf
2012-12-06 0:40 ` [PATCH 04/28] KVM: PPC: Book3S HV: Fix bug causing loss of page dirty state Alexander Graf
2012-12-06 0:40 ` [PATCH 05/28] KVM: PPC: Book3S HV: Add a mechanism for recording modified HPTEs Alexander Graf
2012-12-06 0:40 ` [PATCH 06/28] KVM: PPC: Book3S HV: Make a HPTE removal function available Alexander Graf
2012-12-06 0:40 ` [PATCH 07/28] KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT Alexander Graf
2012-12-06 0:40 ` [PATCH 08/28] KVM: PPC: Book3S HV: Reset reverse-map chains when resetting " Alexander Graf
2012-12-06 0:40 ` [PATCH 09/28] KVM: PPC: Book3S HV: Report correct HPT entry index when reading HPT Alexander Graf
2012-12-06 0:40 ` [PATCH 10/28] KVM: PPC: Book3S HV: Don't give the guest RW access to RO pages Alexander Graf
2012-12-06 0:41 ` [PATCH 11/28] KVM: PPC: Book3S PR: Emulate PURR, SPURR and DSCR registers Alexander Graf
2012-12-06 0:41 ` [PATCH 12/28] KVM: PPC: Book3S PR: Fix VSX handling Alexander Graf
2012-12-06 0:41 ` [PATCH 13/28] KVM: PPC: Book3S PR: MSR_DE doesn't exist on Book 3S Alexander Graf
2012-12-06 0:41 ` [PATCH 14/28] MAINTAINERS: Add git tree link for PPC KVM Alexander Graf
2012-12-06 0:41 ` [PATCH 15/28] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations Alexander Graf
2012-12-06 0:41 ` [PATCH 16/28] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking Alexander Graf
2012-12-06 0:41 ` [PATCH 17/28] KVM: PPC: e500: Silence bogus GCC warning in tlb code Alexander Graf
2012-12-06 0:41 ` [PATCH 18/28] KVM: PPC: booke: Fix get_tb() compile error on 64-bit Alexander Graf
2012-12-06 0:41 ` [PATCH 19/28] KVM: PPC: bookehv: Remove GET_VCPU macro from exception handler Alexander Graf
2012-12-06 0:41 ` [PATCH 20/28] KVM: PPC: bookehv64: Add support for interrupt handling Alexander Graf
2012-12-06 0:41 ` [PATCH 21/28] KVM: PPC: e500: Add emulation helper for getting instruction ea Alexander Graf
2012-12-06 0:41 ` [PATCH 22/28] KVM: PPC: Mask ea's high 32-bits in 32/64 instr emulation Alexander Graf
2012-12-06 0:41 ` [PATCH 23/28] KVM: PPC: e500: Mask MAS2 EPN high 32-bits in 32/64 tlbwe emulation Alexander Graf
2012-12-06 0:41 ` [PATCH 24/28] KVM: PPC: booke: Extend MAS2 EPN mask for 64-bit Alexander Graf
2012-12-06 0:41 ` [PATCH 25/28] KVM: PPC: Make EPCR a valid field for booke64 and bookehv Alexander Graf
2012-12-06 0:41 ` [PATCH 26/28] KVM: PPC: bookehv: Add guest computation mode for irq delivery Alexander Graf
2012-12-06 0:41 ` [PATCH 27/28] KVM: PPC: bookehv: Add EPCR support in mtspr/mfspr emulation Alexander Graf
2012-12-06 0:41 ` [PATCH 28/28] KVM: PPC: booke: Get/set guest EPCR register using ONE_REG interface Alexander Graf
2012-12-09 20:44 ` [PULL 00/28] ppc patch queue 2012-12-06 Marcelo Tosatti
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1354754477-15472-1-git-send-email-agraf@suse.de \
--to=agraf@suse.de \
--cc=gleb@redhat.com \
--cc=kvm-ppc@vger.kernel.org \
--cc=kvm@vger.kernel.org \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).