Displaying 20 results from an estimated 50 matches for "kvm_run".
2008 Mar 20
1
[RFC/PATCH 06/15] kvm-s390: sie intercept handling
...tte <cotte at de.ibm.com>
From: Christian Borntraeger <borntraeger at de.ibm.com>
This path introduces handling of sie intercepts in three flavors: Intercepts
are either handled completely in-kernel by kvm_handle_sie_intercept(),
or passed to userspace with corresponding data in struct kvm_run in case
kvm_handle_sie_intercept() returns -ENOTSUPP.
In case of partial execution in kernel with the need of userspace support,
kvm_handle_sie_intercept() may choose to set up struct kvm_run and return
-EREMOTE.
The trivial intercept reasons are handled in this patch:
handle_noop() just does noth...
2008 Mar 20
1
[RFC/PATCH 06/15] kvm-s390: sie intercept handling
...tte <cotte at de.ibm.com>
From: Christian Borntraeger <borntraeger at de.ibm.com>
This path introduces handling of sie intercepts in three flavors: Intercepts
are either handled completely in-kernel by kvm_handle_sie_intercept(),
or passed to userspace with corresponding data in struct kvm_run in case
kvm_handle_sie_intercept() returns -ENOTSUPP.
In case of partial execution in kernel with the need of userspace support,
kvm_handle_sie_intercept() may choose to set up struct kvm_run and return
-EREMOTE.
The trivial intercept reasons are handled in this patch:
handle_noop() just does noth...
2008 Mar 20
1
[RFC/PATCH 12/15] kvm-s390: API documentation
...error code: program interrupts, and interprocessor signals. Valid
+floating interrupts are:
+KVM_S390_INT_VIRTIO
+KVM_S390_INT_SERVICE
+
+3. ioctl calls to the kvm-vcpu file descriptor
+KVM does support the following ioctls on s390 that are common with other
+architectures and do behave the same:
+KVM_RUN
+KVM_GET_REGS
+KVM_SET_REGS
+KVM_GET_SREGS
+KVM_SET_SREGS
+KVM_GET_FPU
+KVM_SET_FPU
+
+In addition, on s390 the following architecture specific ioctls for the
+kvm-vcpu file descriptor are supported:
+ioctl: KVM_S390_INTERRUPT
+args: struct kvm_s390_interrupt *
+see also: include/linux/kvm.h
+Thi...
2008 Mar 20
1
[RFC/PATCH 12/15] kvm-s390: API documentation
...error code: program interrupts, and interprocessor signals. Valid
+floating interrupts are:
+KVM_S390_INT_VIRTIO
+KVM_S390_INT_SERVICE
+
+3. ioctl calls to the kvm-vcpu file descriptor
+KVM does support the following ioctls on s390 that are common with other
+architectures and do behave the same:
+KVM_RUN
+KVM_GET_REGS
+KVM_SET_REGS
+KVM_GET_SREGS
+KVM_SET_SREGS
+KVM_GET_FPU
+KVM_SET_FPU
+
+In addition, on s390 the following architecture specific ioctls for the
+kvm-vcpu file descriptor are supported:
+ioctl: KVM_S390_INTERRUPT
+args: struct kvm_s390_interrupt *
+see also: include/linux/kvm.h
+Thi...
2019 Feb 28
2
Regression with "arm64: KVM: Skip MMIO insn after emulation" on 4.4 stable
Hello,
In my testing of crosvm[1] with Linux 4.4.175, I am observing failures
on a 'kevin' Chromebook (RK3399) device - the guest kernel does not
even get to the point of printing its first messages, and the host
seems to be spinning at 100% CPU in KVM_RUN.
I narrowed this down to the 4.4 stable backport of "arm64: KVM: Skip
MMIO insn after emulation" - with this patch reverted, I can boot the
guest kernel as normal again.
Unfortunately, I am unable to easily test with a newer upstream kernel
(this board is using the Chrome OS kernel with...
2019 Feb 28
2
Regression with "arm64: KVM: Skip MMIO insn after emulation" on 4.4 stable
Hello,
In my testing of crosvm[1] with Linux 4.4.175, I am observing failures
on a 'kevin' Chromebook (RK3399) device - the guest kernel does not
even get to the point of printing its first messages, and the host
seems to be spinning at 100% CPU in KVM_RUN.
I narrowed this down to the 4.4 stable backport of "arm64: KVM: Skip
MMIO insn after emulation" - with this patch reverted, I can boot the
guest kernel as normal again.
Unfortunately, I am unable to easily test with a newer upstream kernel
(this board is using the Chrome OS kernel with...
2008 Mar 20
0
[RFC/PATCH 10/15] kvm-s390: intercepts for diagnose instructions
...=====================================
--- kvm.orig/include/linux/kvm.h
+++ kvm/include/linux/kvm.h
@@ -75,6 +75,7 @@ struct kvm_irqchip {
#define KVM_EXIT_SET_TPR 11
#define KVM_EXIT_TPR_ACCESS 12
#define KVM_EXIT_S390_SIEIC 13
+#define KVM_EXIT_S390_RESET 14
/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
struct kvm_run {
@@ -147,6 +148,13 @@ struct kvm_run {
__u16 ipa;
__u32 ipb;
} s390_sieic;
+ /* KVM_EXIT_S390_RESET */
+#define KVM_S390_RESET_POR 1
+#define KVM_S390_RESET_CLEAR 2
+#define KVM_S390_RESET_SUBSYSTEM 4
+#define KVM_S390_R...
2019 Aug 13
1
[RFC PATCH v6 14/92] kvm: introspection: handle introspection commands before returning to guest
...= true;
> + break;
> + }
> + }
>
> - waited = true;
> - schedule();
> + finish_swait(&vcpu->wq, &wait);
> +
> + if (do_kvmi_work)
> + kvmi_handle_requests(vcpu);
> + else
> + break;
> }
Is this needed? Or can it just go back to KVM_RUN and handle
KVM_REQ_INTROSPECTION there (in which case it would be basically
premature optimization)?
Paolo
2020 Feb 07
0
[RFC PATCH v7 29/78] KVM: x86: export kvm_vcpu_ioctl_x86_get_xsave()
...4
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -872,6 +872,8 @@ int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
int kvm_arch_vcpu_set_guest_debug(struct kvm_vcpu *vcpu,
struct kvm_guest_debug *dbg);
int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run);
+void kvm_vcpu_ioctl_x86_get_xsave(struct kvm_vcpu *vcpu,
+ struct kvm_xsave *guest_xsave);
int kvm_arch_init(void *opaque);
void kvm_arch_exit(void);
2020 Feb 07
0
[RFC PATCH v7 26/78] KVM: x86: export kvm_arch_vcpu_set_guest_debug()
...vcpu,
struct kvm_mp_state *mp_state);
int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
struct kvm_guest_debug *dbg);
+int kvm_arch_vcpu_set_guest_debug(struct kvm_vcpu *vcpu,
+ struct kvm_guest_debug *dbg);
int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run);
int kvm_arch_init(void *opaque);
2008 Mar 31
4
[04/17] [PATCH] Add kvm arch-specific core code for kvm/ia64.-V8
Zhang, Xiantao wrote:
>>From 62895ff991d48398a77afdbf7f2bef127e802230 Mon Sep 17 00:00:00 2001
> From: Xiantao Zhang <xiantao.zhang at intel.com>
> Date: Fri, 28 Mar 2008 09:49:57 +0800
> Subject: [PATCH] KVM: IA64: Add kvm arch-specific core code for
> kvm/ia64.
>
> kvm_ia64.c is created to handle kvm ia64-specific core logic.
> Signed-off-by: Xiantao Zhang
2008 Mar 31
4
[04/17] [PATCH] Add kvm arch-specific core code for kvm/ia64.-V8
Zhang, Xiantao wrote:
>>From 62895ff991d48398a77afdbf7f2bef127e802230 Mon Sep 17 00:00:00 2001
> From: Xiantao Zhang <xiantao.zhang at intel.com>
> Date: Fri, 28 Mar 2008 09:49:57 +0800
> Subject: [PATCH] KVM: IA64: Add kvm arch-specific core code for
> kvm/ia64.
>
> kvm_ia64.c is created to handle kvm ia64-specific core logic.
> Signed-off-by: Xiantao Zhang
2019 Feb 28
2
Regression with "arm64: KVM: Skip MMIO insn after emulation" on 4.4 stable
...gt; >
> > In my testing of crosvm[1] with Linux 4.4.175, I am observing failures
> > on a 'kevin' Chromebook (RK3399) device - the guest kernel does not
> > even get to the point of printing its first messages, and the host
> > seems to be spinning at 100% CPU in KVM_RUN.
> >
> > I narrowed this down to the 4.4 stable backport of "arm64: KVM: Skip
> > MMIO insn after emulation" - with this patch reverted, I can boot the
> > guest kernel as normal again.
> >
> > Unfortunately, I am unable to easily test with a newer up...
2019 Feb 28
2
Regression with "arm64: KVM: Skip MMIO insn after emulation" on 4.4 stable
...gt; >
> > In my testing of crosvm[1] with Linux 4.4.175, I am observing failures
> > on a 'kevin' Chromebook (RK3399) device - the guest kernel does not
> > even get to the point of printing its first messages, and the host
> > seems to be spinning at 100% CPU in KVM_RUN.
> >
> > I narrowed this down to the 4.4 stable backport of "arm64: KVM: Skip
> > MMIO insn after emulation" - with this patch reverted, I can boot the
> > guest kernel as normal again.
> >
> > Unfortunately, I am unable to easily test with a newer up...
2008 Mar 20
34
[RFC/PATCH 00/15] kvm on big iron
This patch series introduces a backend for kvm to run on IBM System z
machines that uses the mainframe's sie virtualization capability. This
work runs 64bit guests on z800/z890/z900/z990/z9/z10 class machines with
a 64bit linux host. Userspace will follow once we're done brushing it
over.
The patch queue consists of the following patches, which can be applied
in sequence on top of kvm.git
2008 Mar 20
34
[RFC/PATCH 00/15] kvm on big iron
This patch series introduces a backend for kvm to run on IBM System z
machines that uses the mainframe's sie virtualization capability. This
work runs 64bit guests on z800/z890/z900/z990/z9/z10 class machines with
a 64bit linux host. Userspace will follow once we're done brushing it
over.
The patch queue consists of the following patches, which can be applied
in sequence on top of kvm.git
2015 Oct 26
0
[PATCH 5/7] linux-headers/kvm: KVM_EXIT_HYPERV type and struct
...76
@@ -184,6 +198,7 @@ struct kvm_s390_skeys {
#define KVM_EXIT_SYSTEM_EVENT 24
#define KVM_EXIT_S390_STSI 25
#define KVM_EXIT_IOAPIC_EOI 26
+#define KVM_EXIT_HYPERV 27
/* For KVM_EXIT_INTERNAL_ERROR */
/* Emulate instruction failed. */
@@ -338,6 +353,8 @@ struct kvm_run {
struct {
__u8 vector;
} eoi;
+ /* KVM_EXIT_HYPERV */
+ struct kvm_hyperv_exit hyperv;
/* Fix the size of the union. */
char padding[256];
};
--
2.4.3
2019 Feb 28
0
Regression with "arm64: KVM: Skip MMIO insn after emulation" on 4.4 stable
...kamp wrote:
> Hello,
>
> In my testing of crosvm[1] with Linux 4.4.175, I am observing failures
> on a 'kevin' Chromebook (RK3399) device - the guest kernel does not
> even get to the point of printing its first messages, and the host
> seems to be spinning at 100% CPU in KVM_RUN.
>
> I narrowed this down to the 4.4 stable backport of "arm64: KVM: Skip
> MMIO insn after emulation" - with this patch reverted, I can boot the
> guest kernel as normal again.
>
> Unfortunately, I am unable to easily test with a newer upstream kernel
> (this board...
2019 Feb 28
0
Regression with "arm64: KVM: Skip MMIO insn after emulation" on 4.4 stable
...t;>> In my testing of crosvm[1] with Linux 4.4.175, I am observing failures
>>> on a 'kevin' Chromebook (RK3399) device - the guest kernel does not
>>> even get to the point of printing its first messages, and the host
>>> seems to be spinning at 100% CPU in KVM_RUN.
>>>
>>> I narrowed this down to the 4.4 stable backport of "arm64: KVM: Skip
>>> MMIO insn after emulation" - with this patch reverted, I can boot the
>>> guest kernel as normal again.
>>>
>>> Unfortunately, I am unable to easily test...
2015 Oct 09
0
[PATCH 2/2] kvm/x86: Hyper-V kvm exit
...76
@@ -184,6 +198,7 @@ struct kvm_s390_skeys {
#define KVM_EXIT_SYSTEM_EVENT 24
#define KVM_EXIT_S390_STSI 25
#define KVM_EXIT_IOAPIC_EOI 26
+#define KVM_EXIT_HYPERV 27
/* For KVM_EXIT_INTERNAL_ERROR */
/* Emulate instruction failed. */
@@ -338,6 +353,8 @@ struct kvm_run {
struct {
__u8 vector;
} eoi;
+ /* KVM_EXIT_HYPERV */
+ struct kvm_hyperv_exit hyperv;
/* Fix the size of the union. */
char padding[256];
};
--
2.1.4