1. 31 8月, 2017 2 次提交
  2. 25 7月, 2017 2 次提交
  3. 14 7月, 2017 2 次提交
  4. 06 7月, 2017 1 次提交
    • Q
      virtio-scsi-ccw: use ioeventfd even when KVM is disabled · cda3c19f
      QingFeng Hao 提交于
      This patch is based on a similar patch from Stefan Hajnoczi -
      commit c324fd0a ("virtio-pci: use ioeventfd even when KVM is disabled")
      
      Do not check kvm_eventfds_enabled() when KVM is disabled since it
      always returns 0.  Since commit 8c56c1a5
      ("memory: emulate ioeventfd") it has been possible to use ioeventfds in
      qtest or TCG mode.
      
      This patch makes -device virtio-scsi-ccw,iothread=iothread0 work even
      when KVM is disabled.
      Currently we don't have an equivalent to "memory: emulate ioeventfd"
      for ccw yet, but that this doesn't hurt and qemu-iotests 068 can pass with
      skipping iothread arguments.
      
      I have tested that virtio-scsi-ccw works under tcg both with and without
      iothread.
      
      This patch fixes qemu-iotests 068, which was accidentally merged early
      despite the dependency on ioeventfd.
      Signed-off-by: NQingFeng Hao <haoqf@linux.vnet.ibm.com>
      Reviewed-by: NCornelia Huck <cohuck@redhat.com>
      Message-Id: <20170704132350.11874-2-haoqf@linux.vnet.ibm.com>
      Reviewed-by: NStefan Hajnoczi <stefanha@redhat.com>
      Signed-off-by: NChristian Borntraeger <borntraeger@de.ibm.com>
      cda3c19f
  5. 24 6月, 2017 1 次提交
  6. 23 6月, 2017 2 次提交
  7. 14 6月, 2017 2 次提交
    • D
      s390x/cpumodel: wire up cpu type + id for TCG · 076d4d39
      David Hildenbrand 提交于
      Let's properly expose the CPU type (machine-type number) via "STORE CPU
      ID" and "STORE SUBSYSTEM INFORMATION".
      
      As TCG emulates basic mode, the CPU identification number has the format
      "Annnnn", whereby A is the CPU address, and n are parts of the CPU serial
      number (0 for us for now).
      
      A specification exception will be injected if the address is not aligned
      to a double word. Low address protection will not be checked as
      we're missing some more general support for that.
      Signed-off-by: NDavid Hildenbrand <david@redhat.com>
      Message-Id: <20170609133426.11447-3-david@redhat.com>
      Signed-off-by: NRichard Henderson <rth@twiddle.net>
      076d4d39
    • D
      target/s390x: rework PGM interrupt psw.addr handling · becf8217
      David Hildenbrand 提交于
      We can tell from the program interrupt code, whether a program interrupt
      has to forward the address in the PGM new PSW
      (suppressing/terminated/completed) to point at the next instruction, or
      if it is nullifying and the PSW address does not have to be incremented.
      
      So let's not modify the PSW address outside of the injection path and
      handle this internally. We just have to handle instruction length
      auto detection if no valid instruction length can be provided.
      
      This should fix various program interrupt injection paths, where the
      PSW was not properly forwarded.
      Signed-off-by: NDavid Hildenbrand <david@redhat.com>
      Message-Id: <20170609142156.18767-3-david@redhat.com>
      Signed-off-by: NRichard Henderson <rth@twiddle.net>
      becf8217
  8. 07 6月, 2017 3 次提交
  9. 19 5月, 2017 2 次提交
  10. 13 5月, 2017 2 次提交
  11. 13 1月, 2017 1 次提交
    • A
      qom/cpu: move tlb_flush to cpu_common_reset · 1f5c00cf
      Alex Bennée 提交于
      It is a common thing amongst the various cpu reset functions want to
      flush the SoftMMU's TLB entries. This is done either by calling
      tlb_flush directly or by way of a general memset of the CPU
      structure (sometimes both).
      
      This moves the tlb_flush call to the common reset function and
      additionally ensures it is only done for the CONFIG_SOFTMMU case and
      when tcg is enabled.
      
      In some target cases we add an empty end_of_reset_fields structure to the
      target vCPU structure so have a clear end point for any memset which
      is resetting value in the structure before CPU_COMMON (where the TLB
      structures are).
      
      While this is a nice clean-up in general it is also a precursor for
      changes coming to cputlb for MTTCG where the clearing of entries
      can't be done arbitrarily across vCPUs. Currently the cpu_reset
      function is usually called from the context of another vCPU as the
      architectural power up sequence is run. By using the cputlb API
      functions we can ensure the right behaviour in the future.
      Signed-off-by: NAlex Bennée <alex.bennee@linaro.org>
      Reviewed-by: NRichard Henderson <rth@twiddle.net>
      Reviewed-by: NDavid Gibson <david@gibson.dropbear.id.au>
      1f5c00cf
  12. 21 12月, 2016 1 次提交
    • T
      Move target-* CPU file into a target/ folder · fcf5ef2a
      Thomas Huth 提交于
      We've currently got 18 architectures in QEMU, and thus 18 target-xxx
      folders in the root folder of the QEMU source tree. More architectures
      (e.g. RISC-V, AVR) are likely to be included soon, too, so the main
      folder of the QEMU sources slowly gets quite overcrowded with the
      target-xxx folders.
      To disburden the main folder a little bit, let's move the target-xxx
      folders into a dedicated target/ folder, so that target-xxx/ simply
      becomes target/xxx/ instead.
      
      Acked-by: Laurent Vivier <laurent@vivier.eu> [m68k part]
      Acked-by: Bastian Koppelmann <kbastian@mail.uni-paderborn.de> [tricore part]
      Acked-by: Michael Walle <michael@walle.cc> [lm32 part]
      Acked-by: Cornelia Huck <cornelia.huck@de.ibm.com> [s390x part]
      Reviewed-by: Christian Borntraeger <borntraeger@de.ibm.com> [s390x part]
      Acked-by: Eduardo Habkost <ehabkost@redhat.com> [i386 part]
      Acked-by: Artyom Tarasenko <atar4qemu@gmail.com> [sparc part]
      Acked-by: Richard Henderson <rth@twiddle.net> [alpha part]
      Acked-by: Max Filippov <jcmvbkbc@gmail.com> [xtensa part]
      Reviewed-by: David Gibson <david@gibson.dropbear.id.au> [ppc part]
      Acked-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> [cris&microblaze part]
      Acked-by: Guan Xuetao <gxt@mprc.pku.edu.cn> [unicore32 part]
      Signed-off-by: NThomas Huth <thuth@redhat.com>
      fcf5ef2a
  13. 31 10月, 2016 1 次提交
  14. 07 10月, 2016 1 次提交
  15. 27 9月, 2016 1 次提交
    • A
      cpus: pass CPUState to run_on_cpu helpers · e0eeb4a2
      Alex Bennée 提交于
      CPUState is a fairly common pointer to pass to these helpers. This means
      if you need other arguments for the async_run_on_cpu case you end up
      having to do a g_malloc to stuff additional data into the routine. For
      the current users this isn't a massive deal but for MTTCG this gets
      cumbersome when the only other parameter is often an address.
      
      This adds the typedef run_on_cpu_func for helper functions which has an
      explicit CPUState * passed as the first parameter. All the users of
      run_on_cpu and async_run_on_cpu have had their helpers updated to use
      CPUState where available.
      Signed-off-by: NAlex Bennée <alex.bennee@linaro.org>
      [Sergey Fedorov:
       - eliminate more CPUState in user data;
       - remove unnecessary user data passing;
       - fix target-s390x/kvm.c and target-s390x/misc_helper.c]
      Signed-off-by: NSergey Fedorov <sergey.fedorov@linaro.org>
      Acked-by: David Gibson <david@gibson.dropbear.id.au> (ppc parts)
      Reviewed-by: Christian Borntraeger <borntraeger@de.ibm.com> (s390 parts)
      Signed-off-by: NAlex Bennée <alex.bennee@linaro.org>
      Message-Id: <1470158864-17651-3-git-send-email-alex.bennee@linaro.org>
      Reviewed-by: NRichard Henderson <rth@twiddle.net>
      Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
      e0eeb4a2
  16. 15 9月, 2016 1 次提交
  17. 06 9月, 2016 4 次提交
  18. 05 9月, 2016 1 次提交
    • D
      s390x/kvm: 2 byte software breakpoint support · b60fae32
      David Hildenbrand 提交于
      Diag 501 (4 bytes) was used until now for software breakpoints on s390.
      As instructions on s390 might be 2 bytes long, temporarily overwriting them
      with 4 bytes is evil and can result in very strange guest behaviour.
      
      We make use of invalid instruction 0x0000 as new sw breakpoint instruction.
      We have to enable interception of that instruction in KVM using a
      capability.
      
      If no software breakpoint has been inserted at the reported position, an
      operation exception has to be injected into the guest. Otherwise a
      breakpoint has been hit and the pc has to be rewound.
      
      If KVM doesn't yet support interception of instruction 0x0000 the
      existing mechanism exploiting diag 501 is used. To keep overhead low,
      interception of instruction 0x0000 will only be enabled if sw breakpoints
      are really used.
      Reviewed-by: NChristian Borntraeger <borntraeger@de.ibm.com>
      Signed-off-by: NDavid Hildenbrand <dahi@linux.vnet.ibm.com>
      Signed-off-by: NCornelia Huck <cornelia.huck@de.ibm.com>
      b60fae32
  19. 12 7月, 2016 2 次提交
  20. 29 6月, 2016 1 次提交
  21. 19 5月, 2016 4 次提交
  22. 17 5月, 2016 1 次提交
  23. 13 5月, 2016 1 次提交
  24. 10 3月, 2016 1 次提交