On Tue, Mar 05, 2013 at 03:47:24AM +, Marc Zyngier wrote:
> Provide the kvm.h file that defines the user space visible
> interface.
>
> Signed-off-by: Marc Zyngier
> ---
> arch/arm64/include/uapi/asm/kvm.h | 112
> ++
> 1 file changed, 112 insertions(+)
>
On 2013-03-07 08:51, Gleb Natapov wrote:
> On Mon, Mar 04, 2013 at 08:40:29PM +0100, Jan Kiszka wrote:
>> The logic for calculating the value with which we call kvm_set_cr0/4 was
>> broken (will definitely be visible with nested unrestricted guest mode
>> support). Also, we performed the check rega
On 2013-03-07 09:12, Jan Kiszka wrote:
> On 2013-03-07 08:51, Gleb Natapov wrote:
>> On Mon, Mar 04, 2013 at 08:40:29PM +0100, Jan Kiszka wrote:
>>> The logic for calculating the value with which we call kvm_set_cr0/4 was
>>> broken (will definitely be visible with nested unrestricted guest mode
>>
On Thu, Mar 07, 2013 at 09:12:19AM +0100, Jan Kiszka wrote:
> On 2013-03-07 08:51, Gleb Natapov wrote:
> > On Mon, Mar 04, 2013 at 08:40:29PM +0100, Jan Kiszka wrote:
> >> The logic for calculating the value with which we call kvm_set_cr0/4 was
> >> broken (will definitely be visible with nested un
On Thu, Mar 07, 2013 at 09:27:10AM +0100, Jan Kiszka wrote:
> On 2013-03-07 09:12, Jan Kiszka wrote:
> > On 2013-03-07 08:51, Gleb Natapov wrote:
> >> On Mon, Mar 04, 2013 at 08:40:29PM +0100, Jan Kiszka wrote:
> >>> The logic for calculating the value with which we call kvm_set_cr0/4 was
> >>> bro
On 2013-03-07 09:43, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 09:12:19AM +0100, Jan Kiszka wrote:
>> On 2013-03-07 08:51, Gleb Natapov wrote:
>>> On Mon, Mar 04, 2013 at 08:40:29PM +0100, Jan Kiszka wrote:
The logic for calculating the value with which we call kvm_set_cr0/4 was
broke
On Thu, Mar 07, 2013 at 09:53:49AM +0100, Jan Kiszka wrote:
> On 2013-03-07 09:43, Gleb Natapov wrote:
> > On Thu, Mar 07, 2013 at 09:12:19AM +0100, Jan Kiszka wrote:
> >> On 2013-03-07 08:51, Gleb Natapov wrote:
> >>> On Mon, Mar 04, 2013 at 08:40:29PM +0100, Jan Kiszka wrote:
> The logic for
On Thu, Mar 07, 2013 at 08:26:20AM +0800, Asias He wrote:
> On Wed, Mar 06, 2013 at 10:21:09AM +0100, Stefan Hajnoczi wrote:
> > On Wed, Mar 06, 2013 at 02:16:30PM +0800, Asias He wrote:
> > > +static struct tcm_vhost_evt *tcm_vhost_allocate_evt(struct vhost_scsi
> > > *vs,
> > > + u32 event, u32
On 03/05/2013 08:49 PM, Chegu Vinod wrote:
On 3/4/2013 10:02 AM, Raghavendra K T wrote:
From: Raghavendra K T
Note that we mark as preempted only when vcpu's task state was
Running during preemption.
Thanks Jiannan, Avi for preemption notifier ideas. Thanks Gleb, PeterZ
for their precious sug
On Thu, Mar 07, 2013 at 09:58:04AM +0100, Stefan Hajnoczi wrote:
> On Thu, Mar 07, 2013 at 08:26:20AM +0800, Asias He wrote:
> > On Wed, Mar 06, 2013 at 10:21:09AM +0100, Stefan Hajnoczi wrote:
> > > On Wed, Mar 06, 2013 at 02:16:30PM +0800, Asias He wrote:
> > > > +static struct tcm_vhost_evt *tcm
On 05.03.2013, at 04:47, Marc Zyngier wrote:
> Provide 64bit system register handling, modeled after the cp15
> handling for ARM.
>
> Signed-off-by: Marc Zyngier
> ---
> arch/arm64/include/asm/kvm_coproc.h | 51 ++
> arch/arm64/include/uapi/asm/kvm.h | 56 +++
> arch/arm64/kvm/sys_regs.c
On 05.03.2013, at 04:47, Marc Zyngier wrote:
> Define the saved/restored registers for 64bit guests.
>
> Signed-off-by: Marc Zyngier
> ---
> arch/arm64/include/asm/kvm_asm.h | 68
> 1 file changed, 68 insertions(+)
> create mode 100644 arch/arm64/include/
On 2013-03-07 09:57, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 09:53:49AM +0100, Jan Kiszka wrote:
>> On 2013-03-07 09:43, Gleb Natapov wrote:
>>> On Thu, Mar 07, 2013 at 09:12:19AM +0100, Jan Kiszka wrote:
On 2013-03-07 08:51, Gleb Natapov wrote:
> On Mon, Mar 04, 2013 at 08:40:29PM +
On 28.02.2013, at 17:53, Scott Wood wrote:
> On 02/28/2013 10:51:10 AM, Alexander Graf wrote:
>> On 28.02.2013, at 17:31, Scott Wood wrote:
>> > On 02/27/2013 10:13:15 PM, Bharat Bhushan wrote:
>> >> Instruction emulation return EMULATE_DO_PAPR when it requires
>> >> exit to userspace on book3s.
On Thu, Mar 07, 2013 at 11:37:43AM +0100, Jan Kiszka wrote:
> On 2013-03-07 09:57, Gleb Natapov wrote:
> > On Thu, Mar 07, 2013 at 09:53:49AM +0100, Jan Kiszka wrote:
> >> On 2013-03-07 09:43, Gleb Natapov wrote:
> >>> On Thu, Mar 07, 2013 at 09:12:19AM +0100, Jan Kiszka wrote:
> On 2013-03-07
On 2013-03-07 12:06, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 11:37:43AM +0100, Jan Kiszka wrote:
>> On 2013-03-07 09:57, Gleb Natapov wrote:
>>> On Thu, Mar 07, 2013 at 09:53:49AM +0100, Jan Kiszka wrote:
On 2013-03-07 09:43, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 09:12:19AM +
On Thu, Mar 07, 2013 at 12:25:26PM +0100, Jan Kiszka wrote:
> On 2013-03-07 12:06, Gleb Natapov wrote:
> > On Thu, Mar 07, 2013 at 11:37:43AM +0100, Jan Kiszka wrote:
> >> On 2013-03-07 09:57, Gleb Natapov wrote:
> >>> On Thu, Mar 07, 2013 at 09:53:49AM +0100, Jan Kiszka wrote:
> On 2013-03-07
On Wed, Mar 06, 2013 at 04:03:22PM +0900, Takuya Yoshikawa wrote:
> Note: the first two patches are from my other work.
>
> Takuya Yoshikawa (3):
> KVM: MMU: Fix and clean up for_each_gfn_* macros
> KVM: MMU: Use list_for_each_entry_safe in kvm_mmu_commit_zap_page()
> KVM: MMU: Introduce a h
On 2013-03-07 12:50, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 12:25:26PM +0100, Jan Kiszka wrote:
>> On 2013-03-07 12:06, Gleb Natapov wrote:
>>> On Thu, Mar 07, 2013 at 11:37:43AM +0100, Jan Kiszka wrote:
On 2013-03-07 09:57, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 09:53:49AM +
On Thu, Mar 07, 2013 at 12:57:27PM +0100, Jan Kiszka wrote:
> >> Ah, sorry, you are not seeing what I'm looking at: The test will change
> >> for L2 context once unrestricted guest mode is added. At that point, it
> >> makes more sense to split it into one version that checks against
> >> VMXON_CR0
hi,
I'm running a virtual machine with the following command:
LC_ALL=C
PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/sbin:/sbin:/bin
QEMU_AUDIO_DRV=none /usr/bin/kvm -S -M pc-1.0 -enable-kvm -m 4096 -smp
2,sockets=2,cores=1,threads=1 -name korfu_ceph -uuid
a9131b8f-d087-26f4-2ca9-018505f11838
On 2013-03-07 13:05, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 12:57:27PM +0100, Jan Kiszka wrote:
Ah, sorry, you are not seeing what I'm looking at: The test will change
for L2 context once unrestricted guest mode is added. At that point, it
makes more sense to split it into one
On Thu, Mar 07, 2013 at 01:18:24PM +0100, Jan Kiszka wrote:
> On 2013-03-07 13:05, Gleb Natapov wrote:
> > On Thu, Mar 07, 2013 at 12:57:27PM +0100, Jan Kiszka wrote:
> Ah, sorry, you are not seeing what I'm looking at: The test will change
> for L2 context once unrestricted guest mode is
On 2013-03-07 13:21, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 01:18:24PM +0100, Jan Kiszka wrote:
>> On 2013-03-07 13:05, Gleb Natapov wrote:
>>> On Thu, Mar 07, 2013 at 12:57:27PM +0100, Jan Kiszka wrote:
>> Ah, sorry, you are not seeing what I'm looking at: The test will change
>> fo
On Thu, Mar 07, 2013 at 05:47:26PM +0800, Asias He wrote:
> On Thu, Mar 07, 2013 at 09:58:04AM +0100, Stefan Hajnoczi wrote:
> > On Thu, Mar 07, 2013 at 08:26:20AM +0800, Asias He wrote:
> > > On Wed, Mar 06, 2013 at 10:21:09AM +0100, Stefan Hajnoczi wrote:
> > > > On Wed, Mar 06, 2013 at 02:16:30P
On Thu, Mar 07, 2013 at 01:48:55PM +0100, Jan Kiszka wrote:
> On 2013-03-07 13:21, Gleb Natapov wrote:
> > On Thu, Mar 07, 2013 at 01:18:24PM +0100, Jan Kiszka wrote:
> >> On 2013-03-07 13:05, Gleb Natapov wrote:
> >>> On Thu, Mar 07, 2013 at 12:57:27PM +0100, Jan Kiszka wrote:
> >> Ah, sorry,
On 28.02.2013, at 05:13, Bharat Bhushan wrote:
> This patch adds the one_reg interface to get the special instruction
> to be used for setting software breakpoint from userspace.
>
> Signed-off-by: Bharat Bhushan
> ---
> Documentation/virtual/kvm/api.txt |1 +
> arch/powerpc/include/asm/
The logic for calculating the value with which we call kvm_set_cr0/4 was
broken (will definitely be visible with nested unrestricted guest mode
support). Also, we performed the check regarding CR0_ALWAYSON too early
when in guest mode.
What really needs to be done on both CR0 and CR4 is to mask ou
On 28.02.2013, at 05:13, Bharat Bhushan wrote:
> This patch defines the interface parameter for KVM_SET_GUEST_DEBUG
> ioctl support. Follow up patches will use this for setting up
> hardware breakpoints, watchpoints and software breakpoints.
>
> Also kvm_arch_vcpu_ioctl_set_guest_debug() is brou
On 28.02.2013, at 05:13, Bharat Bhushan wrote:
> On Guest entry: if guest is wants to use the debug register then
> save h/w debug register in host_dbg_reg and load the debug registers
> with shadow_dbg_reg. Otherwise leave h/w debug registers as is.
Why can't we switch the majority of registers
On Thu, Mar 07, 2013 at 02:08:07PM +0100, Jan Kiszka wrote:
> The logic for calculating the value with which we call kvm_set_cr0/4 was
> broken (will definitely be visible with nested unrestricted guest mode
> support). Also, we performed the check regarding CR0_ALWAYSON too early
> when in guest m
On 28.02.2013, at 05:13, Bharat Bhushan wrote:
> This patch adds the debug stub support on booke/bookehv.
> Now QEMU debug stub can use hw breakpoint, watchpoint and
> software breakpoint to debug guest.
>
> Signed-off-by: Bharat Bhushan
> ---
> arch/powerpc/include/uapi/asm/kvm.h | 22 +-
On 07.03.2013, at 04:29, Paul Mackerras wrote:
> This adds a new ioctl, KVM_SET_IRQ_ARCHITECTURE, which is intended to
> be called by userspace to specify that it wishes the kernel to emulate
> a specific interrupt controller architecture. This doesn't imply the
> creation of any specific device
On 28.02.2013, at 05:13, Bharat Bhushan wrote:
> Installed debug handler will be used for guest debug support
> and debug facility emulation features (patches for these
> features will follow this patch).
>
> Signed-off-by: Liu Yu
> [bharat.bhus...@freescale.com: Substantial changes]
> Signed-o
virtio-s390 on kvm can use a cookie value passed to guest
to optimize channel/VQ lookups.
Document this.
Signed-off-by: Michael S. Tsirkin
---
diff --git a/virtio-spec.lyx b/virtio-spec.lyx
index 72d956c..91aed06 100644
--- a/virtio-spec.lyx
+++ b/virtio-spec.lyx
@@ -10627,7 +10626,252 @@ Guest-
On Thu, Mar 07, 2013 at 07:57:23AM +0100, Marc Zyngier wrote:
> On Wed, 6 Mar 2013 20:40:00 -0800, Christoffer Dall
>
> wrote:
> > On Wed, Mar 6, 2013 at 7:54 PM, Marc Zyngier
> wrote:
> >> On Wed, 6 Mar 2013 16:31:48 -0800, Christoffer Dall
> >>
> >> wrote:
> >>
> >> Hi Christoffer,
> >>
> >>>
On Thu, Mar 7, 2013 at 10:40 AM, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 07:57:23AM +0100, Marc Zyngier wrote:
>> On Wed, 6 Mar 2013 20:40:00 -0800, Christoffer Dall
>>
>> wrote:
>> > On Wed, Mar 6, 2013 at 7:54 PM, Marc Zyngier
>> wrote:
>> >> On Wed, 6 Mar 2013 16:31:48 -0800, Christoffe
On Thu, Mar 07, 2013 at 03:32:14PM +0200, Gleb Natapov wrote:
> On Thu, Mar 07, 2013 at 02:08:07PM +0100, Jan Kiszka wrote:
> > The logic for calculating the value with which we call kvm_set_cr0/4 was
> > broken (will definitely be visible with nested unrestricted guest mode
> > support). Also, we
On Thu, Mar 07, 2013 at 07:57:23AM +0100, Marc Zyngier wrote:
> On Wed, 6 Mar 2013 20:40:00 -0800, Christoffer Dall
>
> wrote:
> > On Wed, Mar 6, 2013 at 7:54 PM, Marc Zyngier
> wrote:
> >> On Wed, 6 Mar 2013 16:31:48 -0800, Christoffer Dall
> >>
> >> wrote:
> >>
> >> Hi Christoffer,
> >>
> >>>
On Mon, Mar 04, 2013 at 11:31:46PM +0530, Raghavendra K T wrote:
> This patch series further filters better vcpu candidate to yield to
> in PLE handler. The main idea is to record the preempted vcpus using
> preempt notifiers and iterate only those preempted vcpus in the
> handler. Note that the v
On Thu, Mar 7, 2013 at 11:09 AM, Marcelo Tosatti wrote:
> On Thu, Mar 07, 2013 at 07:57:23AM +0100, Marc Zyngier wrote:
>> On Wed, 6 Mar 2013 20:40:00 -0800, Christoffer Dall
>>
>> wrote:
>> > On Wed, Mar 6, 2013 at 7:54 PM, Marc Zyngier
>> wrote:
>> >> On Wed, 6 Mar 2013 16:31:48 -0800, Christo
On Tue, Mar 05, 2013 at 04:42:01PM +0100, Paolo Bonzini wrote:
> Test various ways of sending an INIT interrupt to the bootstrap processor.
> In all cases, the processor should start executing from 0xfff0 and
> other devices should be untouched.
>
> With the patches I just sent to qemu-devel (
On Tue, Mar 05, 2013 at 01:14:39PM +0100, Christian Borntraeger wrote:
> Marcelo, Gleb,
>
> here are some patches to cleanup/fix some aspects of the KVM
> memory management on s390. Since these patches mostly touch
> files names */kvm*/ lets push them via the kvm tree.
> Please queue for 3.10.
>
On Thu, 2013-03-07 at 14:11 +1100, Paul Mackerras wrote:
> On Wed, Mar 06, 2013 at 09:52:16PM -0300, Marcelo Tosatti wrote:
> > On Wed, Mar 06, 2013 at 10:29:12AM -0600, Michael Wolf wrote:
> > > I looked at doing that once but was told that I was changing the
> > > interface in an unacceptable way
On Wed, 2013-03-06 at 23:30 -0300, Marcelo Tosatti wrote:
> On Wed, Mar 06, 2013 at 10:27:13AM -0600, Michael Wolf wrote:
> > On Tue, 2013-03-05 at 22:41 -0300, Marcelo Tosatti wrote:
> > > On Tue, Mar 05, 2013 at 02:22:08PM -0600, Michael Wolf wrote:
> > > > Sorry for the delay in the response. I
On Wed, 2013-03-06 at 23:30 -0300, Marcelo Tosatti wrote:
> On Wed, Mar 06, 2013 at 10:27:13AM -0600, Michael Wolf wrote:
> > On Tue, 2013-03-05 at 22:41 -0300, Marcelo Tosatti wrote:
> > > On Tue, Mar 05, 2013 at 02:22:08PM -0600, Michael Wolf wrote:
> > > > Sorry for the delay in the response. I
On Thu, Mar 07, 2013 at 01:53:13PM +0200, Gleb Natapov wrote:
> On Wed, Mar 06, 2013 at 04:03:22PM +0900, Takuya Yoshikawa wrote:
> > Note: the first two patches are from my other work.
> >
> > Takuya Yoshikawa (3):
> > KVM: MMU: Fix and clean up for_each_gfn_* macros
> > KVM: MMU: Use list_fo
From: Jason Wang
Date: Thu, 7 Mar 2013 12:31:56 +0800
> After commit 2b8b328b61c799957a456a5a8dab8cc7dea68575 (vhost_net: handle
> polling
> errors when setting backend), we in fact track the polling state through
> poll->wqh, so there's no need to duplicate the work with an extra
> vhost_net_p
On Thu, Mar 07, 2013 at 03:15:09PM -0600, Michael Wolf wrote:
> >
> > Makes sense?
> >
> > Not sure what the concrete way to report stolen time relative to hard
> > capping is (probably easier inside the scheduler, where run_delay is
> > calculated).
> >
> > Reporting the hard capping to the gue
Hi Jan,
I'm trying to use your kvm-kmod git repo to build KVM git master
against the latest two Fedora 18 kernels (3.7.9-205 and 3.8.1-201),
and I'm running into a bit of trouble:
$ ./configure --kerneldir=/lib/modules/3.7.9-205.fc18.x86_64/build
$ make sync
$ make
make -C /lib/modules/3.7.9-20
On Thu, 2013-03-07 at 18:25 -0300, Marcelo Tosatti wrote:
> On Thu, Mar 07, 2013 at 03:15:09PM -0600, Michael Wolf wrote:
> > >
> > > Makes sense?
> > >
> > > Not sure what the concrete way to report stolen time relative to hard
> > > capping is (probably easier inside the scheduler, where run_de
On Thu, 2013-03-07 at 08:55 +0800, Asias He wrote:
> On Wed, Mar 06, 2013 at 03:28:00PM +0100, Paolo Bonzini wrote:
> > Il 05/03/2013 23:51, Nicholas A. Bellinger ha scritto:
> > > For making progress with Paolo's vhost-scsi branch on my side, this was
> > > still being blocked by bios boot hangs:
From: Yang Zhang
Hi Ingo and Peter,
The second patch (2/5 KVM: VMX: Register a new IPI for posted interrupt)
tries to register an new IPI for posted interrupt which is used by KVM.
Please help to review it.
The follwoing patches are adding the Posted Interrupt supporting to KVM:
The first patch
From: Yang Zhang
The "acknowledge interrupt on exit" feature controls processor behavior
for external interrupt acknowledgement. When this control is set, the
processor acknowledges the interrupt controller to acquire the
interrupt vector on VM exit.
After enabling this feature, an interrupt whi
From: Yang Zhang
Posted Interrupt feature requires a special IPI to deliver posted interrupt
to guest. And it should has a high priority so the interrupt will not be
blocked by others.
Normally, the posted interrupt will be consumed by vcpu if target vcpu is
running and transparent to OS. But in
From: Yang Zhang
If posted interrupt is avaliable, then uses it to inject virtual
interrupt to guest.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/irq.c |2 +-
arch/x86/kvm/lapic.c | 16 +---
arch/x86/kvm/lapic.h |1 +
arch/x86/kvm/x86.c |4
4 files changed, 19
From: Yang Zhang
Only deliver the posted interrupt when target vcpu is running
and there is no previous interrupt pending in pir.
Signed-off-by: Yang Zhang
---
arch/x86/include/asm/kvm_host.h |3 ++
arch/x86/kvm/lapic.c| 13
arch/x86/kvm/lapic.h|1 +
From: Yang Zhang
Detect the posted interrupt feature. If it exists, then set it in vmcs_config.
Signed-off-by: Yang Zhang
---
arch/x86/include/asm/vmx.h |4 ++
arch/x86/kvm/vmx.c | 87 ++--
2 files changed, 71 insertions(+), 20 deletions(-)
On Thu, Mar 07, 2013 at 04:34:16PM -0600, Michael Wolf wrote:
> On Thu, 2013-03-07 at 18:25 -0300, Marcelo Tosatti wrote:
> > On Thu, Mar 07, 2013 at 03:15:09PM -0600, Michael Wolf wrote:
> > > >
> > > > Makes sense?
> > > >
> > > > Not sure what the concrete way to report stolen time relative to
On Thu, Mar 07, 2013 at 01:53:05PM +0100, Stefan Hajnoczi wrote:
> On Thu, Mar 07, 2013 at 05:47:26PM +0800, Asias He wrote:
> > On Thu, Mar 07, 2013 at 09:58:04AM +0100, Stefan Hajnoczi wrote:
> > > On Thu, Mar 07, 2013 at 08:26:20AM +0800, Asias He wrote:
> > > > On Wed, Mar 06, 2013 at 10:21:09A
On Thu, Mar 07, 2013 at 10:54:37PM -0300, Marcelo Tosatti wrote:
> On Thu, Mar 07, 2013 at 04:34:16PM -0600, Michael Wolf wrote:
> > On Thu, 2013-03-07 at 18:25 -0300, Marcelo Tosatti wrote:
> > > On Thu, Mar 07, 2013 at 03:15:09PM -0600, Michael Wolf wrote:
> > > > >
> > > > > Makes sense?
> > >
Changes in v2:
- Remove code duplication in tcm_vhost_{hotplug,hotunplug}
- Fix racing of vs_events_nr
- Add flush fix patch to this series
Asias He (6):
tcm_vhost: Add missed lock in vhost_scsi_clear_endpoint()
tcm_vhost: Introduce tcm_vhost_check_feature()
tcm_vhost: Introduce tcm_vhost_ch
tv_tpg->tv_tpg_vhost_count should be protected by tv_tpg->tv_tpg_mutex.
Signed-off-by: Asias He
---
drivers/vhost/tcm_vhost.c | 4
1 file changed, 4 insertions(+)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index 9951297..b3e50d7 100644
--- a/drivers/vhost/tcm_vhost.
This helper is useful to check if a feature is supported.
Signed-off-by: Asias He
---
drivers/vhost/tcm_vhost.c | 12
1 file changed, 12 insertions(+)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index b3e50d7..39654f4 100644
--- a/drivers/vhost/tcm_vhost.c
++
This helper is useful to check if vs->vs_endpoint is setup by
vhost_scsi_set_endpoint()
Signed-off-by: Asias He
---
drivers/vhost/tcm_vhost.c | 12
1 file changed, 12 insertions(+)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index 39654f4..b71e946 100644
---
vs->vs_endpoint is protected by the vs->dev.mutex. Use
tcm_vhost_check_endpoint() to do check. The helper does the needed
locking for us.
Signed-off-by: Asias He
---
drivers/vhost/tcm_vhost.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/
In commit 365a7150094 ([SCSI] virtio-scsi: hotplug support for
virtio-scsi), hotplug support is added to virtio-scsi.
This patch adds hotplug and hotunplug support to tcm_vhost.
You can create or delete a LUN in targetcli to hotplug or hotunplug a
LUN in guest.
Signed-off-by: Asias He
---
driv
We also need to flush the vhost_works. One is the completion vhost_work, the
other is event vhost_work.
Signed-off-by: Asias He
---
drivers/vhost/tcm_vhost.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index af80c7f..f80a545 100644
On Thu, Mar 07, 2013 at 02:45:48PM -0800, Nicholas A. Bellinger wrote:
> On Thu, 2013-03-07 at 08:55 +0800, Asias He wrote:
> > On Wed, Mar 06, 2013 at 03:28:00PM +0100, Paolo Bonzini wrote:
> > > Il 05/03/2013 23:51, Nicholas A. Bellinger ha scritto:
> > > > For making progress with Paolo's vhost-
On Thu, 7 Mar 2013 16:09:00 -0300, Marcelo Tosatti
wrote:
> On Thu, Mar 07, 2013 at 07:57:23AM +0100, Marc Zyngier wrote:
>> On Wed, 6 Mar 2013 20:40:00 -0800, Christoffer Dall
>>
>> wrote:
>> > On Wed, Mar 6, 2013 at 7:54 PM, Marc Zyngier
>> wrote:
>> >> On Wed, 6 Mar 2013 16:31:48 -0800, Chris
On Thu, 7 Mar 2013 11:33:12 +0100, Alexander Graf wrote:
> On 05.03.2013, at 04:47, Marc Zyngier wrote:
>
>> Define the saved/restored registers for 64bit guests.
>>
>> Signed-off-by: Marc Zyngier
>> ---
>> arch/arm64/include/asm/kvm_asm.h | 68
>>
>> 1 f
On Thu, 7 Mar 2013 11:30:20 +0100, Alexander Graf wrote:
> On 05.03.2013, at 04:47, Marc Zyngier wrote:
>
>> Provide 64bit system register handling, modeled after the cp15
>> handling for ARM.
>>
>> Signed-off-by: Marc Zyngier
>> ---
>> arch/arm64/include/asm/kvm_coproc.h | 51 ++
>> arch/arm64
On Thu, 7 Mar 2013 10:09:03 +0200, "Michael S. Tsirkin"
wrote:
> On Tue, Mar 05, 2013 at 03:47:24AM +, Marc Zyngier wrote:
>> Provide the kvm.h file that defines the user space visible
>> interface.
>>
>> Signed-off-by: Marc Zyngier
>> ---
>> arch/arm64/include/uapi/asm/kvm.h | 112
>>
As we have known, in KVM full virtualization, guest VM is running in
non-root mode and KVM is running in root mode. While, in non-root mode,
guest kernel is running in Ring 0 and Apps are running in Ring 3.
However, what about the ring privilege for host linux?
In my knowledge, host linux is
Hello all:
I meet an issue when testing multiqueue virtio-net. When I testing guest
small packets stream sending performance with netperf. I find an
regression of multiqueue. When I run 2 sessions of TCP_STREAM test with
1024 byte from guest to local host, I get following result:
1q result: 3457.
On 03/08/2013 12:40 AM, Marcelo Tosatti wrote:
On Mon, Mar 04, 2013 at 11:31:46PM +0530, Raghavendra K T wrote:
This patch series further filters better vcpu candidate to yield to
in PLE handler. The main idea is to record the preempted vcpus using
preempt notifiers and iterate only those pree
On Thu, 7 Mar 2013 20:02:21 +0200
"Michael S. Tsirkin" wrote:
> virtio-s390 on kvm can use a cookie value passed to guest
s/virtio-s390/virtio-ccw/ (to avoid confusion with s390-virtio, which
was never specced)
> to optimize channel/VQ lookups.
> Document this.
>
> Signed-off-by: Michael S. Ts
77 matches
Mail list logo