1. 30 1月, 2017 1 次提交
  2. 25 1月, 2017 2 次提交
  3. 13 1月, 2017 1 次提交
  4. 25 12月, 2016 1 次提交
  5. 09 12月, 2016 1 次提交
  6. 24 11月, 2016 1 次提交
  7. 14 11月, 2016 2 次提交
  8. 05 11月, 2016 2 次提交
  9. 28 9月, 2016 1 次提交
  10. 22 9月, 2016 5 次提交
    • V
      ARM: KVM: Support vgic-v3 · acda5430
      Vladimir Murzin 提交于
      This patch allows to build and use vgic-v3 in 32-bit mode.
      
      Unfortunately, it can not be split in several steps without extra
      stubs to keep patches independent and bisectable.  For instance,
      virt/kvm/arm/vgic/vgic-v3.c uses function from vgic-v3-sr.c, handling
      access to GICv3 cpu interface from the guest requires vgic_v3.vgic_sre
      to be already defined.
      
      It is how support has been done:
      
      * handle SGI requests from the guest
      
      * report configured SRE on access to GICv3 cpu interface from the guest
      
      * required vgic-v3 macros are provided via uapi.h
      
      * static keys are used to select GIC backend
      
      * to make vgic-v3 build KVM_ARM_VGIC_V3 guard is removed along with
        the static inlines
      Acked-by: NMarc Zyngier <marc.zyngier@arm.com>
      Reviewed-by: NChristoffer Dall <christoffer.dall@linaro.org>
      Signed-off-by: NVladimir Murzin <vladimir.murzin@arm.com>
      Signed-off-by: NChristoffer Dall <christoffer.dall@linaro.org>
      acda5430
    • V
      KVM: arm: vgic: Support 64-bit data manipulation on 32-bit host systems · d7d0a11e
      Vladimir Murzin 提交于
      We have couple of 64-bit registers defined in GICv3 architecture, so
      unsigned long accesses to these registers will only access a single
      32-bit part of that regitser. On the other hand these registers can't
      be accessed as 64-bit with a single instruction like ldrd/strd or
      ldmia/stmia if we run a 32-bit host because KVM does not support
      access to MMIO space done by these instructions.
      
      It means that a 32-bit guest accesses these registers in 32-bit
      chunks, so the only thing we need to do is to ensure that
      extract_bytes() always takes 64-bit data.
      Acked-by: NMarc Zyngier <marc.zyngier@arm.com>
      Signed-off-by: NVladimir Murzin <vladimir.murzin@arm.com>
      Signed-off-by: NChristoffer Dall <christoffer.dall@linaro.org>
      d7d0a11e
    • V
      KVM: arm: vgic: Fix compiler warnings when built for 32-bit · e533a37f
      Vladimir Murzin 提交于
      Well, this patch is looking ahead of time, but we'll get following
      compiler warnings as soon as we introduce vgic-v3 to 32-bit world
      
        CC      arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.o
      arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.c: In function 'vgic_mmio_read_v3r_typer':
      arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.c:184:35: warning: left shift count >= width of type [-Wshift-count-overflow]
        value = (mpidr & GENMASK(23, 0)) << 32;
                                         ^
      In file included from ./include/linux/kernel.h:10:0,
                       from ./include/asm-generic/bug.h:13,
                       from ./arch/arm/include/asm/bug.h:59,
                       from ./include/linux/bug.h:4,
                       from ./include/linux/io.h:23,
                       from ./arch/arm/include/asm/arch_gicv3.h:23,
                       from ./include/linux/irqchip/arm-gic-v3.h:411,
                       from arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.c:14:
      arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.c: In function 'vgic_v3_dispatch_sgi':
      ./include/linux/bitops.h:6:24: warning: left shift count >= width of type [-Wshift-count-overflow]
       #define BIT(nr)   (1UL << (nr))
                              ^
      arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.c:614:20: note: in expansion of macro 'BIT'
        broadcast = reg & BIT(ICC_SGI1R_IRQ_ROUTING_MODE_BIT);
                          ^
      Let's fix them now.
      Acked-by: NMarc Zyngier <marc.zyngier@arm.com>
      Signed-off-by: NVladimir Murzin <vladimir.murzin@arm.com>
      Signed-off-by: NChristoffer Dall <christoffer.dall@linaro.org>
      e533a37f
    • V
      KVM: arm64: vgic-its: Introduce config option to guard ITS specific code · 7a1ff708
      Vladimir Murzin 提交于
      By now ITS code guarded with KVM_ARM_VGIC_V3 config option which was
      introduced to hide everything specific to vgic-v3 from 32-bit world.
      We are going to support vgic-v3 in 32-bit world and KVM_ARM_VGIC_V3
      will gone, but we don't have support for ITS there yet and we need to
      continue keeping ITS away.
      Introduce the new config option to prevent ITS code being build in
      32-bit mode when support for vgic-v3 is done.
      Signed-off-by: NVladimir Murzin <vladimir.murzin@arm.com>
      Acked-by: NMarc Zyngier <marc.zyngier@arm.com>
      Signed-off-by: NChristoffer Dall <christoffer.dall@linaro.org>
      7a1ff708
    • V
      arm64: KVM: Use static keys for selecting the GIC backend · 5a7a8426
      Vladimir Murzin 提交于
      Currently GIC backend is selected via alternative framework and this
      is fine. We are going to introduce vgic-v3 to 32-bit world and there
      we don't have patching framework in hand, so we can either check
      support for GICv3 every time we need to choose which backend to use or
      try to optimise it by using static keys. The later looks quite
      promising because we can share logic involved in selecting GIC backend
      between architectures if both uses static keys.
      
      This patch moves arm64 from alternative to static keys framework for
      selecting GIC backend. For that we embed static key into vgic_global
      and enable the key during vgic initialisation based on what has
      already been exposed by the host GIC driver.
      Acked-by: NMarc Zyngier <marc.zyngier@arm.com>
      Signed-off-by: NVladimir Murzin <vladimir.murzin@arm.com>
      Signed-off-by: NChristoffer Dall <christoffer.dall@linaro.org>
      5a7a8426
  11. 08 9月, 2016 5 次提交
  12. 17 8月, 2016 1 次提交
  13. 16 8月, 2016 3 次提交
  14. 12 8月, 2016 1 次提交
  15. 10 8月, 2016 2 次提交
  16. 09 8月, 2016 1 次提交
  17. 24 7月, 2016 1 次提交
  18. 23 7月, 2016 2 次提交
    • E
      KVM: arm/arm64: Enable MSI routing · 995a0ee9
      Eric Auger 提交于
      Up to now, only irqchip routing entries could be set. This patch
      adds the capability to insert MSI routing entries.
      
      For ARM64, let's also increase KVM_MAX_IRQ_ROUTES to 4096: this
      include SPI irqchip routes plus MSI routes. In the future this
      might be extended.
      Signed-off-by: NEric Auger <eric.auger@redhat.com>
      Reviewed-by: NAndre Przywara <andre.przywara@arm.com>
      Signed-off-by: NMarc Zyngier <marc.zyngier@arm.com>
      995a0ee9
    • E
      KVM: arm/arm64: Enable irqchip routing · 180ae7b1
      Eric Auger 提交于
      This patch adds compilation and link against irqchip.
      
      Main motivation behind using irqchip code is to enable MSI
      routing code. In the future irqchip routing may also be useful
      when targeting multiple irqchips.
      
      Routing standard callbacks now are implemented in vgic-irqfd:
      - kvm_set_routing_entry
      - kvm_set_irq
      - kvm_set_msi
      
      They only are supported with new_vgic code.
      
      Both HAVE_KVM_IRQCHIP and HAVE_KVM_IRQ_ROUTING are defined.
      KVM_CAP_IRQ_ROUTING is advertised and KVM_SET_GSI_ROUTING is allowed.
      
      So from now on IRQCHIP routing is enabled and a routing table entry
      must exist for irqfd injection to succeed for a given SPI. This patch
      builds a default flat irqchip routing table (gsi=irqchip.pin) covering
      all the VGIC SPI indexes. This routing table is overwritten by the
      first first user-space call to KVM_SET_GSI_ROUTING ioctl.
      
      MSI routing setup is not yet allowed.
      Signed-off-by: NEric Auger <eric.auger@redhat.com>
      Signed-off-by: NMarc Zyngier <marc.zyngier@arm.com>
      180ae7b1
  19. 19 7月, 2016 7 次提交