Le 17/11/2016 à 08:08, Hailiang Zhang a écrit :
> Hi Laurent,
>
> On 2016/11/15 16:44, Laurent Vivier wrote:
>> Le 14/11/2016 à 14:54, Stefan Hajnoczi a écrit :
>>> On Mon, Nov 14, 2016 at 10:36:45AM +0800, Hailiang Zhang wrote:
ping ?
Anyone pick this up?
>>>
>>> The original
Hello,
On 11/17/2016 05:36 AM, Alastair D'Silva wrote:
> From: Alastair D'Silva
>
> The imx25 chip provides 3 i2c buses, but they have all been named
> "i2c", which makes it difficult to predict which bus a device will
> be connected to when specified on the command line.
On 17/11/2016 04:18, David Gibson wrote:
> On Wed, Nov 16, 2016 at 09:39:31AM +0100, Thomas Huth wrote:
>> The ppc64 postcopy test does not work with KVM-PR, and it is also
>> causing annoying warning messages when run on a x86 host. So let's
>> use KVM here only if we know that we're running
Hi Laurent,
On 2016/11/15 16:44, Laurent Vivier wrote:
Le 14/11/2016 à 14:54, Stefan Hajnoczi a écrit :
On Mon, Nov 14, 2016 at 10:36:45AM +0800, Hailiang Zhang wrote:
ping ?
Anyone pick this up?
The original patch that added these lines went through Amit Shah and
David Gilbert. I have
On 17/11/16 17:12, Alex Williamson wrote:
> On Thu, 17 Nov 2016 16:41:14 +1100
> Alexey Kardashevskiy wrote:
>
>> On 17/11/16 07:46, Kirti Wankhede wrote:
>>> Add task structure to vfio_dma structure. Task structure is used for:
>>> - During DMA_UNMAP, same task who mapped it or
On 17/11/16 03:02, Igor Mammedov wrote:
> This series removes global MAX_CPUMASK_BITS constant
> so that it won't inderectly influence maximum CPUs count
> supported by different targets.
>
> It replaces statically allocated bitmasks with dynamically
> allocated ones using '-smp maxcpus' value
On 11/17/2016 11:11 AM, Alexey Kardashevskiy wrote:
> On 17/11/16 07:46, Kirti Wankhede wrote:
>> Add task structure to vfio_dma structure. Task structure is used for:
>> - During DMA_UNMAP, same task who mapped it or other task who shares same
>> address space is allowed to unmap, otherwise
On Wed, 11/16 17:46, Stefan Hajnoczi wrote:
> The new AioPollFn io_poll() argument to aio_set_fd_handler() and
> aio_set_event_handler() is used in the next patch.
>
> Keep this code change separate due to the number of files it touches.
>
> Signed-off-by: Stefan Hajnoczi
>
On Thu, 17 Nov 2016 16:41:14 +1100
Alexey Kardashevskiy wrote:
> On 17/11/16 07:46, Kirti Wankhede wrote:
> > Add task structure to vfio_dma structure. Task structure is used for:
> > - During DMA_UNMAP, same task who mapped it or other task who shares same
> > address space is
On 17/11/16 07:46, Kirti Wankhede wrote:
> Add task structure to vfio_dma structure. Task structure is used for:
> - During DMA_UNMAP, same task who mapped it or other task who shares same
> address space is allowed to unmap, otherwise unmap fails.
> QEMU maps few iova ranges initially, then fork
On 17/11/16 05:05, Paolo Bonzini wrote:
> Following the recent refactoring of virtio notifiers [1], more specifically
> the patch ed08a2a0b ("virtio: use virtio_bus_set_host_notifier to
> start/stop ioeventfd") that uses virtio_bus_set_host_notifier [2]
> by default, core virtio code requires
On 16/11/16 19:38, Felipe Franciosi wrote:
>
>> On 16 Nov 2016, at 04:05, Alexey Kardashevskiy wrote:
>>
>> On 11/11/16 01:45, Christian Borntraeger wrote:
>>> On 11/09/2016 01:44 PM, Felipe Franciosi wrote:
Following the recent refactor of virtio notfiers [1], more
On 11/17/2016 7:45 AM, Dong Jia Shi wrote:
> * Kirti Wankhede [2016-11-17 02:16:24 +0530]:
>
> Hi Kirti,
>
>> diff --git a/drivers/vfio/mdev/vfio_mdev.c b/drivers/vfio/mdev/vfio_mdev.c
> [...]
>
>> @@ -51,6 +78,11 @@ static void vfio_mdev_release(void *device_data)
>>
Add a notifier calback to parent's ops structure of mdev device so that per
device notifer for vfio module is registered through vfio_mdev module.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: Iafa6f1721aecdd6e50eb93b153b5621e6d29b637
---
Added blocking notifier to IOMMU TYPE1 driver to notify vendor drivers
about DMA_UNMAP.
Exported two APIs vfio_register_notifier() and vfio_unregister_notifier().
Notifier should be registered, if external user wants to use
vfio_pin_pages()/vfio_unpin_pages() APIs to pin/unpin pages.
Vendor driver
VFIO IOMMU drivers are designed for the devices which are IOMMU capable.
Mediated device only uses IOMMU APIs, the underlying hardware can be
managed by an IOMMU domain.
Aim of this change is:
- To use most of the code of TYPE1 IOMMU driver for mediated devices
- To support direct assigned device
On 11/17/2016 5:27 AM, Alex Williamson wrote:
> On Thu, 17 Nov 2016 02:16:22 +0530
> Kirti Wankhede wrote:
>> @@ -931,6 +1344,24 @@ static void vfio_iommu_type1_detach_group(void
>> *iommu_data,
>>
>> mutex_lock(>lock);
>>
>> +if (iommu->external_domain) {
>>
The spapr-vlan device in QEMU has always presented it's MAC address in
the device tree as an 8 byte value, even though PAPR requires it to be
6 bytes. This is because, at the time, AIX required the value to be 8
bytes. However, modern versions of AIX only support the (correct) 6
byte value so
On Wed, Nov 16, 2016 at 06:07:28PM -0200, Jose Ricardo Ziviani wrote:
> bcdctsq.: Decimal convert to signed quadword. It is possible to
> convert packed decimal values to signed quadwords.
>
> Signed-off-by: Jose Ricardo Ziviani
> ---
> target-ppc/helper.h
On Wed, Nov 16, 2016 at 06:07:30PM -0200, Jose Ricardo Ziviani wrote:
> bcdsetsgn.: Decimal set sign. This instruction copies the register
> value to the result register but adjust the signal according to
> the preferred sign value.
>
> Signed-off-by: Jose Ricardo Ziviani
On Wed, Nov 16, 2016 at 09:39:31AM +0100, Thomas Huth wrote:
> The ppc64 postcopy test does not work with KVM-PR, and it is also
> causing annoying warning messages when run on a x86 host. So let's
> use KVM here only if we know that we're running with KVM-HV (which
> automatically also means that
On Wed, Nov 16, 2016 at 06:07:29PM -0200, Jose Ricardo Ziviani wrote:
> bcdcpsgn.: Decimal copy sign. Given two registers vra and vrb, it
> copies the vra value with vrb sign to the result register vrt.
>
> Signed-off-by: Jose Ricardo Ziviani
> ---
>
On Mon, Nov 14, 2016 at 07:34:59PM +0100, Juan Quintela wrote:
> Thomas Huth wrote:
> > qemu_savevm_state_iterate() expects the iterators to return 1
> > when they are done, and 0 if there is still something left to do.
> > However, ram_save_iterate() does not obey this rule and
On Wed, Nov 16, 2016 at 02:17:47PM +0100, Thomas Huth wrote:
> On 16.11.2016 13:37, Greg Kurz wrote:
> > On Wed, 16 Nov 2016 12:24:50 +
> > "Dr. David Alan Gilbert" wrote:
> >
> >> * Greg Kurz (gr...@kaod.org) wrote:
> >>> On Wed, 16 Nov 2016 09:39:31 +0100
> >>> Thomas
On Mon, Nov 14, 2016 at 07:59:28PM -0500, Peter Xu wrote:
> When one IOMMU memory region is splitted into multiple memory sections,
> vfio will register multiple same notifiers to a vIOMMU for the same
> region. That's not sensible. What we need is to register one IOMMU
> notifier for each IOMMU
On Wed, Nov 16, 2016 at 06:07:27PM -0200, Jose Ricardo Ziviani wrote:
> bcdcfsq.: Decimal convert from signed quadword. It is possible to
I think there should be a "not" in there.
> convert values less than 10^31-1 or greater than -10^31-1 to be
> represented in packed decimal format.
>
>
On Wed, Nov 16, 2016 at 08:25:17PM +0100, Richard Henderson wrote:
> Cc: qemu-...@nongnu.org
> Cc: David Gibson
> Signed-off-by: Richard Henderson
Reviewed-by: David Gibson
> ---
> target-ppc/helper.h | 4
>
In the init operation of handle backend dirver, it allocates a
handle_data struct and opens a mount file. We should free these
resources when the 9pfs device is unrealized. This is what this
patch does.
Signed-off-by: Li Qiang
---
hw/9pfs/9p-handle.c | 9 +
1 file
Currently, the backend of VirtFS doesn't have a cleanup
function. This will lead resource leak issues if the backed
driver allocates resources. This patch addresses this issue.
Signed-off-by: Li Qiang
---
Changes since the v1:
-move the cleanup stuff above calls to g_free
-add
Unrealize should undo things that were set during realize in
reverse order. So should do in the error path in realize.
Signed-off-by: Li Qiang
---
Changes since the v2:
-adjust the order in the error path in realize
hw/9pfs/9p.c | 4 ++--
1 file changed, 2 insertions(+), 2
In the init operation of proxy backend dirver, it allocates a
V9fsProxy struct and some other resources. We should free these
resources when the 9pfs device is unrealized. This is what this
patch does.
Signed-off-by: Li Qiang
---
Changes since the v2:
-only close proxy->sockfd
Currently, the backend of VirtFS doesn't have a cleanup
function. This will leak some resources in handle and proxy
backend driver. This patchset addresses this issue.
Li Qiang (4):
9pfs: adjust the order of resource cleanup in device unrealize
9pfs: add cleanup operation in FileOperations
On 11/17/2016 04:46 AM, Kirti Wankhede wrote:
> Added blocking notifier to IOMMU TYPE1 driver to notify vendor drivers
> about DMA_UNMAP.
> Exported two APIs vfio_register_notifier() and vfio_unregister_notifier().
> Notifier should be registered, if external user wants to use
>
When I run this test disk image:
http://wiki.qemu.org/download/ppc-virtexml507-linux-2_6_34.tgz
I see these error messages:
/selftest.sh: line 6: /usr/bin/sha1test: not found
/selftest.sh: line 7: /usr/bin/hmactest: not found
Maybe /usr/bin/sha1sum is what the first test should be. I don't see
* Kirti Wankhede [2016-11-17 02:16:24 +0530]:
Hi Kirti,
> diff --git a/drivers/vfio/mdev/vfio_mdev.c b/drivers/vfio/mdev/vfio_mdev.c
[...]
> @@ -51,6 +78,11 @@ static void vfio_mdev_release(void *device_data)
> if (likely(parent->ops->release))
>
On 16/11/16 01:02, Andrea Bolognani wrote:
> On Tue, 2016-11-01 at 13:46 +1100, David Gibson wrote:
>> On Mon, Oct 31, 2016 at 03:10:23PM +1100, Alexey Kardashevskiy wrote:
>>>
>>> On 31/10/16 13:53, David Gibson wrote:
On Fri, Oct 28, 2016 at 12:07:12PM +0200, Greg Kurz wrote:
>
> -Original Message-
> From: Stefan Hajnoczi [mailto:stefa...@redhat.com]
> Sent: Thursday, November 17, 2016 4:18 AM
> To: qemu-devel@nongnu.org
> Cc: Gonglei (Arei); Michael S. Tsirkin; Stefan Hajnoczi
> Subject: [PATCH] virtio-crypto: fix virtio_queue_set_notification() race
>
>
* Kirti Wankhede [2016-11-16 20:47:18 +0530]:
>
>
> On 11/16/2016 12:07 PM, Dong Jia Shi wrote:
> > * Kirti Wankhede [2016-11-15 20:59:55 +0530]:
> >
> > Hi Kirti,
> >
> > [...]
> >
> >> diff --git a/drivers/vfio/mdev/vfio_mdev.c
(next-20161116), where many of the /chosen and /memory nodes
in arm devicetree files have been removed. This results in a kernel hang
(sabrelite) or qemu abort (imx25-pdk).
hw/arm/boot.c | 17 +
1 file changed, 17 insertions(+)
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
index 9
Added error_report where version_ids do not match in vmstate_load_state.
Signed-off-by: Jianjun Duan
---
migration/vmstate.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/migration/vmstate.c b/migration/vmstate.c
index 2f9d4ba..0e6fce4 100644
---
Add a test for QTAILQ migration to tests/test-vmstate.c.
Signed-off-by: Jianjun Duan
---
tests/test-vmstate.c | 160 +++
1 file changed, 160 insertions(+)
diff --git a/tests/test-vmstate.c b/tests/test-vmstate.c
index
Currently we cannot directly transfer a QTAILQ instance because of the
limitation in the migration code. Here we introduce an approach to
transfer such structures. We created VMStateInfo vmstate_info_qtailq
for QTAILQ. Similar VMStateInfo can be created for other data structures
such as list.
Current migration code cannot handle some data structures such as
QTAILQ in qemu/queue.h. Here we extend the signatures of put/get
in VMStateInfo so that customized handling is supported. put now
will return int type.
Signed-off-by: Jianjun Duan
---
Hi all,
I addressed some review comments. Comments are welcome.
v13: - Changed some QTAILQ related macro names to match existing ones.
Previous versions are:
v12: - Fixed type for put_qtailq which caused build break.
(link:
On Thu, 17 Nov 2016 02:16:23 +0530
Kirti Wankhede wrote:
> @@ -1321,12 +1350,11 @@ static void vfio_iommu_unmap_unpin_reaccount(struct
> vfio_iommu *iommu)
>
> static void vfio_sanity_check_pfn_list(struct vfio_iommu *iommu)
> {
> - struct rb_node *n, *p;
> +
On Thu, 17 Nov 2016 02:16:22 +0530
Kirti Wankhede wrote:
> @@ -931,6 +1344,24 @@ static void vfio_iommu_type1_detach_group(void
> *iommu_data,
>
> mutex_lock(>lock);
>
> + if (iommu->external_domain) {
> + group =
On Wed, Nov 16, 2016 at 09:53:06PM +, Stefan Hajnoczi wrote:
> Disabling notifications during virtqueue processing reduces the number of
> exits. The virtio-net device already uses virtio_queue_set_notifications()
> but
> virtio-blk and virtio-scsi do not.
>
> The following benchmark shows
On Mon, Nov 7, 2016 at 4:34 PM, Alistair Francis
wrote:
> The Cadence UART device emulator calculates speed by dividing the
> baud rate by a 'baud rate generator' & 'baud rate divider' value.
> The device specification defines these register values to be
> non-zero
On Fri, Nov 11, 2016 at 8:06 PM, Edgar E. Iglesias
wrote:
> On Fri, Nov 11, 2016 at 06:51:20PM -0800, Alistair Francis wrote:
>> This patch fixes the generic-loader file loading to only set the program
>> counter if a CPU is specified. This follows what is written in the
The guest does not need to kick the virtqueue while we are processing
it. This reduces the number of vmexits during periods of heavy I/O.
Signed-off-by: Stefan Hajnoczi
---
hw/scsi/virtio-scsi.c | 36 +---
1 file changed, 21 insertions(+),
virtio_queue_notify_vq() checks vdev->broken before invoking the
handler, virtio_queue_notify_aio_vq() should too.
Signed-off-by: Stefan Hajnoczi
---
hw/virtio/virtio.c | 4
1 file changed, 4 insertions(+)
diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c
index
Disabling notifications during virtqueue processing reduces the number of
exits. The virtio-net device already uses virtio_queue_set_notifications() but
virtio-blk and virtio-scsi do not.
The following benchmark shows a 15% reduction in virtio-blk-pci MMIO exits:
(host)$ qemu-system-x86_64 \
The guest does not need to kick the virtqueue while we are processing
it. This reduces the number of vmexits during periods of heavy I/O.
Signed-off-by: Stefan Hajnoczi
---
hw/block/virtio-blk.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
On 11/16/2016 03:32 PM, Farhan Ali wrote:
On 11/16/2016 03:16 PM, Michael S. Tsirkin wrote:
On Wed, Nov 16, 2016 at 03:03:13PM -0500, Farhan Ali wrote:
Hi Paolo,
I was able to test your patches in our s390 environment. I don't see
the
qemu crashes anymore which I noticed before.
On Wed, Nov 16, 2016 at 04:05:31PM -0500, Paolo Bonzini wrote:
>
>
> - Original Message -
> > From: "Michael S. Tsirkin"
> > To: "Paolo Bonzini"
> > Cc: qemu-devel@nongnu.org, "alex williamson" ,
> >
Hi,
Your series seems to have some coding style problems. See output below for
more information:
Type: series
Subject: [Qemu-devel] [patch v3 00/18] tcg field extract primitives
Message-id: 1479326625-10682-1-git-send-email-...@twiddle.net
=== TEST SCRIPT BEGIN ===
#!/bin/bash
BASE=base
n=1
On 11/16/2016 03:16 PM, Michael S. Tsirkin wrote:
On Wed, Nov 16, 2016 at 03:03:13PM -0500, Farhan Ali wrote:
Hi Paolo,
I was able to test your patches in our s390 environment. I don't see the
qemu crashes anymore which I noticed before.
Testing a guest running high stress I/O workload,
--
Christopher Oliver
qemu-patch
Description: Binary data
Adding myself as a maintainer of mediated device framework,
a sub module of VFIO.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I58f6717783e0d4008ca31f4a5c4494696bae8571
---
MAINTAINERS | 9 +
1 file changed, 9 insertions(+)
Add file Documentation/vfio-mediated-device.txt that include details of
mediated device framework.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I137dd646442936090d92008b115908b7b2c7bc5d
---
Documentation/vfio-mediated-device.txt | 298
On 11/16/2016 01:48 PM, Christopher Oliver wrote:
>
>
Attaching the patch (rather than including it inline) requires reviewers
to save the attachment off to a file in order to even see what you
wrote. To save others some time, I'm pasting the text and replying inline:
> The following patch is
Vendor driver using mediated device framework would use same mechnism to
validate and prepare IRQs. Introducing this function to reduce code
replication in multiple drivers.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id:
Add a notifier calback to parent's ops structure of mdev device so that per
device notifer for vfio module is registered through vfio_mdev module.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: Iafa6f1721aecdd6e50eb93b153b5621e6d29b637
---
This change rearrange functions to have common function to increment
container_users
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Reviewed-by: Jike Song
Change-Id: I8bdeb352bc8439b107ffd519480fd4dc238677f2
---
Hi Paolo,
I was able to test your patches in our s390 environment. I don't see the
qemu crashes anymore which I noticed before.
Testing a guest running high stress I/O workload, without iothreads does
show a delay in guest response time. But running
the same test with iothreads seems to
Add find_iommu_group()
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Reviewed-by: Jike Song
Reviewed-by: Dong Jia Shi
Change-Id: I9d372f1ebe9eb01a5a21374b8a2b03f7df73601f
---
This patch (hack?) works around the slowness in SEEK_HOLE for large dense files
on Linux tmpfs. It may improve life elsewhere as well, and the penalty of the
checks
should be vanishingly small where it is not needed.
If I'm subtly (or not so subtly) wrong, please fire back.
Sincerely,
--
Defined device API strings. Vendor driver using mediated device
framework should use corresponding string for device_api attribute.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I42d29f475f02a7132ce13297fbf2b48f1da10995
---
Added APIs for pining and unpining set of pages. These call back into
backend iommu module to actually pin and unpin pages.
Added two new callback functions to struct vfio_iommu_driver_ops. Backend
IOMMU module that supports pining and unpinning pages for mdev devices
should provide these
The Sample driver creates mdev device that simulates serial port over PCI
card.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I857f8f12f8b275f2498dfe8c628a5cdc7193b1b2
---
Documentation/vfio-mediated-device.txt | 103 ++-
On Wed, Nov 16, 2016 at 10:57 AM, Alex Bennée wrote:
>
> Pranith Kumar writes:
>
>> Unconditionally enable locking checks in debug builds so that we get
>> wider testing. Using tcg_debug_assert() allows us to remove
>> DEBUG_LOCKING define.
>
>
- Original Message -
> From: "Michael S. Tsirkin"
> To: "Paolo Bonzini"
> Cc: qemu-devel@nongnu.org, "alex williamson" ,
> borntrae...@de.ibm.com, fel...@nutanix.com
> Sent: Wednesday, November 16, 2016 9:39:24 PM
>
This patch rearranges functions to get vfio_group from device
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Reviewed-by: Jike Song
Change-Id: I1f93262bdbab75094bc24b087b29da35ba70c4c6
---
drivers/vfio/vfio.c | 23
Added details of sysfs ABI for mediated device framework
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: Icb0fd4ed58a2fa793fbcb1c3d5009a4403c1f3ac
---
Documentation/ABI/testing/sysfs-bus-vfio-mdev | 111 ++
1 file
Added blocking notifier to IOMMU TYPE1 driver to notify vendor drivers
about DMA_UNMAP.
Exported two APIs vfio_register_notifier() and vfio_unregister_notifier().
Notifier should be registered, if external user wants to use
vfio_pin_pages()/vfio_unpin_pages() APIs to pin/unpin pages.
Vendor driver
Vendor driver using mediated device framework should use
vfio_info_add_capability() to add capabilities.
Introduced this function to reduce code duplication in vendor drivers.
vfio_info_cap_shift() manipulated a data buffer to add an offset to each
element in a chain. This data buffer is
vfio_mdev driver registers with mdev core driver.
mdev core driver creates mediated device and calls probe routine of
vfio_mdev driver for each device.
Probe routine of vfio_mdev driver adds mediated device to VFIO core module
This driver forms a shim layer that pass through VFIO devices
Update arguments of vaddr_get_pfn() to take struct mm_struct *mm as input
argument.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I885fd4cd4a9f66f4ee2c1caf58267464ec239f52
---
drivers/vfio/vfio_iommu_type1.c | 32
Updated vfio_platform_common.c file to use
vfio_set_irqs_validate_and_prepare()
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: Id87cd6b78ae901610b39bf957974baa6f40cd7b0
---
drivers/vfio/platform/vfio_platform_common.c | 31
Added task structure as input argument to vfio_lock_acct() function.
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I5d3673cc9d3786bb436b395d5f74537f1a36da80
---
drivers/vfio/vfio_iommu_type1.c | 30 --
1 file
This series adds Mediated device support to Linux host kernel. Purpose
of this series is to provide a common interface for mediated device
management that can be used by different devices. This series introduces
Mdev core module that creates and manages mediated devices, VFIO based
driver for
VFIO IOMMU drivers are designed for the devices which are IOMMU capable.
Mediated device only uses IOMMU APIs, the underlying hardware can be
managed by an IOMMU domain.
Aim of this change is:
- To use most of the code of TYPE1 IOMMU driver for mediated devices
- To support direct assigned device
Updated vfio_pci.c file to use vfio_set_irqs_validate_and_prepare()
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I9f3daba89d8dba5cb5b01a8cff420412f30686c7
---
drivers/vfio/pci/vfio_pci.c | 34 +++---
1 file
Design for Mediated Device Driver:
Main purpose of this driver is to provide a common interface for mediated
device management that can be used by different drivers of different
devices.
This module provides a generic interface to create the device, add it to
mediated bus, add device to IOMMU
> > +void virtio_notify_irqfd(VirtIODevice *vdev, VirtQueue *vq)
> > +{
> > +if (!virtio_should_notify(vdev, vq)) {
> > +return;
> > +}
> > +
> > +trace_virtio_notify_irqfd(vdev, vq);
> > +virtio_set_isr(vq->vdev, 0x1);
>
> So here, I think we need a comment with parts of
Add task structure to vfio_dma structure. Task structure is used for:
- During DMA_UNMAP, same task who mapped it or other task who shares same
address space is allowed to unmap, otherwise unmap fails.
QEMU maps few iova ranges initially, then fork threads and from the child
thread calls DMA_UNMAP
Update msix_sparse_mmap_cap() to use vfio_info_add_capability()
Update region type capability to use vfio_info_add_capability()
Signed-off-by: Kirti Wankhede
Signed-off-by: Neo Jia
Change-Id: I52bb28c7875a6da5a79ddad1843e6088aff58a45
---
On Wed, Nov 16, 2016 at 07:03:27PM +0100, Laszlo Ersek wrote:
> On 11/16/16 15:05, Paolo Bonzini wrote:
> >
> >
> > On 16/11/2016 14:18, Michael S. Tsirkin wrote:
> >>> - we could have another magic 0xB2 value, which is implemented directly
> >>> in QEMU and sets 0xB3 to a magic value. Then
Hi Michael,
On 10/13/2016 07:50 PM, Michael S. Tsirkin wrote:
Hi!
So it looks like we face a problem with cross-version
migration when using vhost. It's not new but became more
acute with the advent of vhost user.
For users to be able to migrate between different versions
of the hypervisor the
On Wed, Nov 16, 2016 at 01:03:14PM -0700, Alex Williamson wrote:
> On Wed, 16 Nov 2016 21:50:46 +0200
> "Aviv B.D." wrote:
>
> > On Wed, Nov 16, 2016 at 5:34 PM, Alex Williamson > > wrote:
> >
> > > On Wed, 16 Nov 2016 15:54:56 +0200
> > >
On Wed, Nov 16, 2016 at 03:03:13PM -0500, Farhan Ali wrote:
> Hi Paolo,
>
> I was able to test your patches in our s390 environment. I don't see the
> qemu crashes anymore which I noticed before.
>
> Testing a guest running high stress I/O workload, without iothreads does
> show a delay in guest
On Wed, Nov 16, 2016 at 06:37:30PM +0100, Laszlo Ersek wrote:
> On 11/16/16 13:47, Paolo Bonzini wrote:
> >
> >> If the consensus is that the patch is a QEMU bugfix (as opposed to a
> >> feature) and that it is eligible for the currently supported upstream
> >> stable branches, that's the best,
On Wed, Nov 16, 2016 at 07:05:51PM +0100, Paolo Bonzini wrote:
> Dataplane has been omitting forever the step of setting ISR when
> an interrupt is raised. This caused little breakage, because the
> specification actually says that ISR may not be updated in MSI mode.
>
> Some versions of the
bcdsetsgn.: Decimal set sign. This instruction copies the register
value to the result register but adjust the signal according to
the preferred sign value.
Signed-off-by: Jose Ricardo Ziviani
---
target-ppc/helper.h | 1 +
target-ppc/int_helper.c
We must check for new virtqueue buffers after re-enabling notifications.
This prevents the race condition where the guest added buffers just
after we stopped popping the virtqueue but before we re-enabled
notifications.
I think the virtio-crypto code was based on virtio-net but this crucial
On Wed, Nov 16, 2016 at 03:38:11PM -0500, Paolo Bonzini wrote:
> > > +void virtio_notify_irqfd(VirtIODevice *vdev, VirtQueue *vq)
> > > +{
> > > +if (!virtio_should_notify(vdev, vq)) {
> > > +return;
> > > +}
> > > +
> > > +trace_virtio_notify_irqfd(vdev, vq);
> > > +
Reviewed-by: David Gibson
Signed-off-by: Richard Henderson
---
tcg/ppc/tcg-target.h | 4 ++--
tcg/ppc/tcg-target.inc.c | 10 ++
2 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/tcg/ppc/tcg-target.h b/tcg/ppc/tcg-target.h
bcdctsq.: Decimal convert to signed quadword. It is possible to
convert packed decimal values to signed quadwords.
Signed-off-by: Jose Ricardo Ziviani
---
target-ppc/helper.h | 1 +
target-ppc/int_helper.c | 39
On Wed, Nov 16, 2016 at 01:04:00PM -0500, Paolo Bonzini wrote:
> > I guess that's what the next paragraph is about:
> >
> > > - we could have another magic 0xB2 value, which is implemented directly
> > > in QEMU and sets 0xB3 to a magic value. Then OVMF can invoke it
> > > after SMBASE
On 11/15/2016 11:16 PM, Laurent Vivier wrote:
This is a cleanup patch. It adds call to tcg_temp_free()
when it is missing.
Signed-off-by: Laurent Vivier
---
target-m68k/translate.c | 41 -
1 file changed, 32 insertions(+), 9
1 - 100 of 268 matches
Mail list logo