From: Paul Mackerras <paulus@ozlabs.org>
To: "Paolo Bonzini" <pbonzini@redhat.com>,
"Radim Krčmář" <rkrcmar@redhat.com>,
kvm@vger.kernel.org
Cc: kvm-ppc@vger.kernel.org
Subject: Re: [GIT PULL] Please pull my kvm-ppc-next-5.2-1 tag
Date: Fri, 10 May 2019 08:46:09 +1000 [thread overview]
Message-ID: <20190509224609.GA5685@blackberry> (raw)
In-Reply-To: <20190502040646.GA3661@blackberry>
On Thu, May 02, 2019 at 02:06:46PM +1000, Paul Mackerras wrote:
> Paolo or Radim,
>
> Please do a pull from my kvm-ppc-next-5.2-1 tag to get a PPC update
> for 5.2. The main new feature here is that we can now let guests
> access the POWER9 XIVE interrupt controller directly for things like
> acknowledge, EOI, enable and disable on interrupts, rather than
> requiring guests to do hypercalls for these operations.
>
> I have merged in the topic/ppc-kvm branch from the powerpc tree
> because one of the patches there is a prerequisite for the XIVE patch
> series. That's why there are changes to arch/powerpc/kernel in the
> diffstat.
>
> Stephen Rothwell noted a conflict between my tree and the kvm-arm tree
> because we have both allocated new capability numbers.
>
> The XIVE patch series also modifies generic KVM code to add mmap and
> release methods on KVM devices.
>
> Thanks,
> Paul.
Ping?
> The following changes since commit 345077c8e172c255ea0707214303ccd099e5656b:
>
> KVM: PPC: Book3S: Protect memslots while validating user address (2019-04-05 14:37:24 +1100)
>
> are available in the git repository at:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc tags/kvm-ppc-next-5.2-1
>
> for you to fetch changes up to 0caecf5b00199636eb2d32201199ecd6be52558d:
>
> KVM: PPC: Book3S HV: XIVE: Clear escalation interrupt pointers on device close (2019-04-30 19:41:01 +1000)
>
> ----------------------------------------------------------------
> PPC KVM update for 5.2
>
> * Support for guests to access the new POWER9 XIVE interrupt controller
> hardware directly, reducing interrupt latency and overhead for guests.
>
> * In-kernel implementation of the H_PAGE_INIT hypercall.
>
> * Reduce memory usage of sparsely-populated IOMMU tables.
>
> * Several bug fixes.
>
> ----------------------------------------------------------------
> Alexey Kardashevskiy (3):
> KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest
> KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers
> KVM: PPC: Book3S: Allocate guest TCEs on demand too
>
> Cédric Le Goater (17):
> powerpc/xive: add OPAL extensions for the XIVE native exploitation support
> KVM: PPC: Book3S HV: Add a new KVM device for the XIVE native exploitation mode
> KVM: PPC: Book3S HV: XIVE: Introduce a new capability KVM_CAP_PPC_IRQ_XIVE
> KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
> KVM: PPC: Book3S HV: XIVE: Add a control to configure a source
> KVM: PPC: Book3S HV: XIVE: Add controls for the EQ configuration
> KVM: PPC: Book3S HV: XIVE: Add a global reset control
> KVM: PPC: Book3S HV: XIVE: Add a control to sync the sources
> KVM: PPC: Book3S HV: XIVE: Add a control to dirty the XIVE EQ pages
> KVM: PPC: Book3S HV: XIVE: Add get/set accessors for the VP XIVE state
> KVM: Introduce a 'mmap' method for KVM devices
> KVM: PPC: Book3S HV: XIVE: Add a TIMA mapping
> KVM: PPC: Book3S HV: XIVE: Add a mapping for the source ESB pages
> KVM: PPC: Book3S HV: XIVE: Add passthrough support
> KVM: PPC: Book3S HV: XIVE: Activate XIVE exploitation mode
> KVM: Introduce a 'release' method for KVM devices
> KVM: PPC: Book3S HV: XIVE: Replace the 'destroy' method by a 'release' method
>
> Michael Neuling (1):
> powerpc: Add force enable of DAWR on P9 option
>
> Palmer Dabbelt (1):
> KVM: PPC: Book3S HV: smb->smp comment fixup
>
> Paul Mackerras (6):
> KVM: PPC: Book3S HV: Fix XICS-on-XIVE H_IPI when priority = 0
> KVM: PPC: Book3S HV: Move HPT guest TLB flushing to C code
> KVM: PPC: Book3S HV: Flush TLB on secondary radix threads
> Merge remote-tracking branch 'remotes/powerpc/topic/ppc-kvm' into kvm-ppc-next
> KVM: PPC: Book3S HV: XIVE: Prevent races when releasing device
> KVM: PPC: Book3S HV: XIVE: Clear escalation interrupt pointers on device close
>
> Suraj Jitindar Singh (4):
> KVM: PPC: Book3S HV: Implement virtual mode H_PAGE_INIT handler
> KVM: PPC: Book3S HV: Implement real mode H_PAGE_INIT handler
> KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code
> KVM: PPC: Book3S HV: Save/restore vrsave register in kvmhv_p9_guest_entry()
>
> Documentation/powerpc/DAWR-POWER9.txt | 32 +
> Documentation/virtual/kvm/api.txt | 10 +
> Documentation/virtual/kvm/devices/xive.txt | 197 +++++
> arch/powerpc/include/asm/hw_breakpoint.h | 8 +
> arch/powerpc/include/asm/kvm_host.h | 11 +-
> arch/powerpc/include/asm/kvm_ppc.h | 41 +-
> arch/powerpc/include/asm/opal-api.h | 7 +-
> arch/powerpc/include/asm/opal.h | 7 +
> arch/powerpc/include/asm/xive.h | 17 +
> arch/powerpc/include/uapi/asm/kvm.h | 46 +
> arch/powerpc/kernel/hw_breakpoint.c | 62 +-
> arch/powerpc/kernel/process.c | 9 +-
> arch/powerpc/kernel/ptrace.c | 3 +-
> arch/powerpc/kvm/Makefile | 2 +-
> arch/powerpc/kvm/book3s.c | 42 +-
> arch/powerpc/kvm/book3s_64_vio.c | 96 ++-
> arch/powerpc/kvm/book3s_64_vio_hv.c | 105 ++-
> arch/powerpc/kvm/book3s_hv.c | 155 ++--
> arch/powerpc/kvm/book3s_hv_builtin.c | 57 ++
> arch/powerpc/kvm/book3s_hv_rm_mmu.c | 144 ++++
> arch/powerpc/kvm/book3s_hv_rmhandlers.S | 103 +--
> arch/powerpc/kvm/book3s_xive.c | 250 ++++--
> arch/powerpc/kvm/book3s_xive.h | 37 +
> arch/powerpc/kvm/book3s_xive_native.c | 1249 ++++++++++++++++++++++++++++
> arch/powerpc/kvm/book3s_xive_template.c | 78 +-
> arch/powerpc/kvm/powerpc.c | 37 +
> arch/powerpc/platforms/powernv/opal-call.c | 3 +
> arch/powerpc/sysdev/xive/native.c | 110 +++
> include/linux/kvm_host.h | 10 +
> include/uapi/linux/kvm.h | 3 +
> virt/kvm/kvm_main.c | 24 +
> 31 files changed, 2670 insertions(+), 285 deletions(-)
> create mode 100644 Documentation/virtual/kvm/devices/xive.txt
> create mode 100644 arch/powerpc/kvm/book3s_xive_native.c
prev parent reply other threads:[~2019-05-09 22:47 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-05-02 4:06 [GIT PULL] Please pull my kvm-ppc-next-5.2-1 tag Paul Mackerras
2019-05-09 22:46 ` Paul Mackerras [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190509224609.GA5685@blackberry \
--to=paulus@ozlabs.org \
--cc=kvm-ppc@vger.kernel.org \
--cc=kvm@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=rkrcmar@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox