1. 10 11月, 2017 4 次提交
  2. 07 11月, 2017 1 次提交
  3. 06 11月, 2017 6 次提交
  4. 05 9月, 2017 4 次提交
  5. 03 8月, 2017 1 次提交
  6. 25 7月, 2017 1 次提交
  7. 15 6月, 2017 8 次提交
  8. 08 6月, 2017 2 次提交
  9. 04 6月, 2017 2 次提交
    • A
      KVM: arm/arm64: use vcpu requests for irq injection · 325f9c64
      Andrew Jones 提交于
      Don't use request-less VCPU kicks when injecting IRQs, as a VCPU
      kick meant to trigger the interrupt injection could be sent while
      the VCPU is outside guest mode, which means no IPI is sent, and
      after it has called kvm_vgic_flush_hwstate(), meaning it won't see
      the updated GIC state until its next exit some time later for some
      other reason.  The receiving VCPU only needs to check this request
      in VCPU RUN to handle it.  By checking it, if it's pending, a
      memory barrier will be issued that ensures all state is visible.
      See "Ensuring Requests Are Seen" of
      Documentation/virtual/kvm/vcpu-requests.rst
      Signed-off-by: NAndrew Jones <drjones@redhat.com>
      Reviewed-by: NChristoffer Dall <cdall@linaro.org>
      Signed-off-by: NChristoffer Dall <cdall@linaro.org>
      325f9c64
    • C
      KVM: arm/arm64: Use uaccess functions for GICv3 {sc}active · 0710f9a6
      Christoffer Dall 提交于
      We recently rewrote the sactive and cactive handlers to take the kvm
      lock for guest accesses to these registers.  However, when accessed from
      userspace this lock is already held.  Unfortunately we forgot to change
      the private accessors for GICv3, because these are redistributor
      registers and not distributor registers.
      Signed-off-by: NChristoffer Dall <cdall@linaro.org>
      0710f9a6
  10. 24 5月, 2017 1 次提交
  11. 23 5月, 2017 3 次提交
  12. 18 5月, 2017 2 次提交
    • C
      KVM: arm/arm64: Hold slots_lock when unregistering kvm io bus devices · fa472fa9
      Christoffer Dall 提交于
      We were not holding the kvm->slots_lock as required when calling
      kvm_io_bus_unregister_dev() as required.
      
      This only affects the error path, but still, let's do our due
      diligence.
      
      Reported by: Eric Auger <eric.auger@redhat.com>
      Signed-off-by: NChristoffer Dall <cdall@linaro.org>
      Reviewed-by: NEric Auger <eric.auger@redhat.com>
      fa472fa9
    • C
      KVM: arm/arm64: Fix bug when registering redist iodevs · 552c9f47
      Christoffer Dall 提交于
      If userspace creates the VCPUs after initializing the VGIC, then we end
      up in a situation where we trigger a bug in kvm_vcpu_get_idx(), because
      it is called prior to adding the VCPU into the vcpus array on the VM.
      
      There is no tight coupling between the VCPU index and the area of the
      redistributor region used for the VCPU, so we can simply ensure that all
      creations of redistributors are serialized per VM, and increment an
      offset when we successfully add a redistributor.
      
      The vgic_register_redist_iodev() function can be called from two paths:
      vgic_redister_all_redist_iodev() which is called via the kvm_vgic_addr()
      device attribute handler.  This patch already holds the kvm->lock mutex.
      
      The other path is via kvm_vgic_vcpu_init, which is called through a
      longer chain from kvm_vm_ioctl_create_vcpu(), which releases the
      kvm->lock mutex just before calling kvm_arch_vcpu_create(), so we can
      simply take this mutex again later for our purposes.
      
      Fixes: ab6f468c10 ("KVM: arm/arm64: Register iodevs when setting redist base and creating VCPUs")
      Signed-off-by: NChristoffer Dall <cdall@linaro.org>
      Tested-by: NJean-Philippe Brucker <jean-philippe.brucker@arm.com>
      Reviewed-by: NEric Auger <eric.auger@redhat.com>
      552c9f47
  13. 15 5月, 2017 2 次提交
  14. 09 5月, 2017 3 次提交