[Zesty,v4,09/10] KVM: PPC: Reserve KVM_CAP_SPAPR_TCE_VFIO capability number

Submitted by Jose Ricardo Ziviani on Aug. 7, 2017, 3:45 p.m.

Details

Message ID 1502120705-8290-10-git-send-email-joserz@linux.vnet.ibm.com
State New
Headers show

Commit Message

Jose Ricardo Ziviani Aug. 7, 2017, 3:45 p.m.
From: Alexey Kardashevskiy <aik@ozlabs.ru>

BugLink: http://bugs.launchpad.net/bugs/1686019

Small change on file include/uapi/linux/kvm.h due to conflics with
defines included by MIPS and S390 patches.

This adds a capability number for in-kernel support for VFIO on
SPAPR platform.

The capability will tell the user space whether in-kernel handlers of
H_PUT_TCE can handle VFIO-targeted requests or not. If not, the user space
must not attempt allocating a TCE table in the host kernel via
the KVM_CREATE_SPAPR_TCE KVM ioctl because in that case TCE requests
will not be passed to the user space which is desired action in
the situation like that.

Signed-off-by: Alexey Kardashevskiy <aik@ozlabs.ru>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
(backported from commit 4898d3f49b5b156c33f0ae0f49ede417ab86195e)
Signed-off-by: Jose Ricardo Ziviani <joserz@linux.vnet.ibm.com>
---
 include/uapi/linux/kvm.h | 1 +
 1 file changed, 1 insertion(+)

Comments

Kleber Souza Aug. 17, 2017, 10:21 a.m.
On 08/07/17 17:45, Jose Ricardo Ziviani wrote:
> From: Alexey Kardashevskiy <aik@ozlabs.ru>
> 
> BugLink: http://bugs.launchpad.net/bugs/1686019
> 
> Small change on file include/uapi/linux/kvm.h due to conflics with
> defines included by MIPS and S390 patches.
>

Same comment as for patch 03/10, please add this info bellow the
original Sign-offs.

> This adds a capability number for in-kernel support for VFIO on
> SPAPR platform.
> 
> The capability will tell the user space whether in-kernel handlers of
> H_PUT_TCE can handle VFIO-targeted requests or not. If not, the user space
> must not attempt allocating a TCE table in the host kernel via
> the KVM_CREATE_SPAPR_TCE KVM ioctl because in that case TCE requests
> will not be passed to the user space which is desired action in
> the situation like that.
> 
> Signed-off-by: Alexey Kardashevskiy <aik@ozlabs.ru>
> Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
> Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
> (backported from commit 4898d3f49b5b156c33f0ae0f49ede417ab86195e)
> Signed-off-by: Jose Ricardo Ziviani <joserz@linux.vnet.ibm.com>
> ---
>  include/uapi/linux/kvm.h | 1 +
>  1 file changed, 1 insertion(+)
> 
> diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h
> index 1f50f21..655c845 100644
> --- a/include/uapi/linux/kvm.h
> +++ b/include/uapi/linux/kvm.h
> @@ -873,6 +873,7 @@ struct kvm_ppc_smmu_info {
>  #define KVM_CAP_PPC_HTM 132
>  #define KVM_CAP_PPC_MMU_RADIX 134
>  #define KVM_CAP_PPC_MMU_HASH_V3 135
> +#define KVM_CAP_SPAPR_TCE_VFIO 142
>  
>  #ifdef KVM_CAP_IRQ_ROUTING
>  
>

Patch hide | download patch | download mbox

diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h
index 1f50f21..655c845 100644
--- a/include/uapi/linux/kvm.h
+++ b/include/uapi/linux/kvm.h
@@ -873,6 +873,7 @@  struct kvm_ppc_smmu_info {
 #define KVM_CAP_PPC_HTM 132
 #define KVM_CAP_PPC_MMU_RADIX 134
 #define KVM_CAP_PPC_MMU_HASH_V3 135
+#define KVM_CAP_SPAPR_TCE_VFIO 142
 
 #ifdef KVM_CAP_IRQ_ROUTING