Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1031377AbbDXPx2 (ORCPT ); Fri, 24 Apr 2015 11:53:28 -0400 Received: from mail-bn1bon0135.outbound.protection.outlook.com ([157.56.111.135]:63081 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1757964AbbDXPxX (ORCPT ); Fri, 24 Apr 2015 11:53:23 -0400 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=freescale.com; freescale.mail.onmicrosoft.com; dkim=none (message not signed) header.d=none; From: Bogdan Purcareata To: , , , , , , , , , Subject: [PATCH v2 0/2] powerpc/kvm: Enable running guests on RT Linux Date: Fri, 24 Apr 2015 15:53:11 +0000 Message-ID: <1429890793-19487-1-git-send-email-bogdan.purcareata@freescale.com> X-Mailer: git-send-email 2.1.4 X-EOPAttributedMessage: 0 X-Forefront-Antispam-Report: CIP:192.88.158.2;CTRY:US;IPV:NLI;EFV:NLI;BMV:1;SFV:NSPM;SFS:(10019020)(6009001)(339900001)(189002)(199003)(33646002)(85426001)(5001770100001)(6806004)(46102003)(47776003)(105606002)(92566002)(107886001)(229853001)(50986999)(106466001)(77156002)(49486002)(77096005)(87936001)(2201001)(36756003)(48376002)(62966003)(50226001)(50466002)(104016003)(921003)(1121003)(2101003)(4001450100001);DIR:OUT;SFP:1102;SCL:1;SRVR:BL2PR03MB307;H:az84smr01.freescale.net;FPR:;SPF:Fail;MLV:sfv;MX:1;A:1;LANG:en; MIME-Version: 1.0 Content-Type: text/plain X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB307; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(5005006)(5002010)(3002001);SRVR:BL2PR03MB307;BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB307; X-Forefront-PRVS: 05568D1FF7 X-OriginatorOrg: freescale.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Apr 2015 15:53:19.4861 (UTC) X-MS-Exchange-CrossTenant-Id: 710a03f5-10f6-4d38-9ff4-a80b81da590d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=710a03f5-10f6-4d38-9ff4-a80b81da590d;Ip=[192.88.158.2];Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR03MB307 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1667 Lines: 39 This patchset enables running KVM SMP guests with external interrupts on an underlying RT-enabled Linux. Previous to this patch, a guest with in-kernel MPIC emulation could easily panic the kernel due to preemption when delivering IPIs and external interrupts, because of the openpic spinlock becoming a sleeping mutex on PREEMPT_RT_FULL Linux. 0001: converts the openpic spinlock to a raw spinlock, in order to circumvent this behavior. While this change is targeted for a RT enabled Linux, it has no effect on upstream kvm-ppc, so send it upstream for better future maintenance. 0002: disables in-kernel MPIC emulation for guest running on RT, in order to prevent a potential DoS attack due to large system latencies. This patch is targeted to RT (due to CONFIG_PREEMPT_RT_FULL), but it can also be applied on upstream Linux, with no effect. - applied & compiled against vanilla 4.0 - applied & compiled against stable-rt 3.18-rt v2: - updated commit messages - change the fix for potentially large latencies from limiting the max number of VCPUs a guest can have to disabling the in-kernel MPIC Bogdan Purcareata (2): powerpc/kvm: Convert openpic lock to raw_spinlock powerpc/kvm: Disable in-kernel MPIC emulation for PREEMPT_RT_FULL arch/powerpc/kvm/Kconfig | 1 + arch/powerpc/kvm/mpic.c | 44 ++++++++++++++++++++++---------------------- 2 files changed, 23 insertions(+), 22 deletions(-) -- 2.1.4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/