[PATCH V2 RFC 9/9] virtio_scsi: verify if queue is broken after virtqueue_get_buf()

2013-10-24 Thread Heinz Graalfs
If virtqueue_get_buf() returned with a NULL pointer avoid a possibly endless loop by checking for a broken virtqueue. Signed-off-by: Heinz Graalfs --- drivers/scsi/virtio_scsi.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/scsi/virtio_scsi.c b/drivers/scsi/virtio

[PATCH V2 RFC 6/9] virtio_blk: verify if queue is broken after virtqueue_get_buf()

2013-10-24 Thread Heinz Graalfs
In case virtqueue_get_buf() returned with a NULL pointer verify if the virtqueue is broken in order to leave while loop. Signed-off-by: Heinz Graalfs --- drivers/block/virtio_blk.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/block/virtio_blk.c b/drivers/block/virtio_blk.c index

[PATCH V2 RFC 5/9] virtio_ring: add new function virtqueue_is_broken()

2013-10-24 Thread Heinz Graalfs
Add new function virtqueue_is_broken(). Callers of virtqueue_get_buf() should check for a broken queue. Signed-off-by: Heinz Graalfs --- drivers/virtio/virtio_ring.c | 8 include/linux/virtio.h | 2 ++ 2 files changed, 10 insertions(+) diff --git a/drivers/virtio/virtio_ring.c b/

[PATCH V2 RFC 7/9] virtio_console: verify if queue is broken after virtqueue_get_buf()

2013-10-24 Thread Heinz Graalfs
If virtqueue_get_buf() returns with a NULL pointer it should be verified if the virtqueue is broken, in order to avoid loop calling cpu_relax(). Signed-off-by: Heinz Graalfs --- drivers/char/virtio_console.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/char/v

[PATCH V2 RFC 2/9] virtio_ring: let virtqueue_{kick()/notify()} return a bool

2013-10-24 Thread Heinz Graalfs
virtqueue_{kick()/notify()} should exploit the new host notification API. If the notify call returned with a negative value the host kick failed (e.g. a kick triggered after a device was hot-unplugged). In this case the virtqueue is set to 'broken' and false is returned, otherwise true. Signed-off

[PATCH V2 RFC 1/9] virtio_ring: change host notification API

2013-10-24 Thread Heinz Graalfs
Currently a host kick error is silently ignored and not reflected in the virtqueue of a particular virtio device. Changing the notify API for guest->host notification seems to be one prerequisite in order to be able to handle such errors in the context where the kick is triggered. This patch chan

[PATCH V2 RFC 3/9] virtio_net: verify if virtqueue_kick() succeeded

2013-10-24 Thread Heinz Graalfs
Verify if a host kick succeeded by checking return value of virtqueue_kick(). Signed-off-by: Heinz Graalfs --- drivers/net/virtio_net.c | 9 + 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c index ab2e5d0..6584e3a 100644 -

[PATCH V2 RFC 0/9] virtio: fix hang(loop) after hot-unplug vlan

2013-10-24 Thread Heinz Graalfs
Hi, this patch-set solves a hang situation when a vlan network device is hot-unplugged from a KVM guest. On System z there exists no handshake mechanism between host and guest when a device is hot-unplugged. The device is removed and no further I/O is possible. The guest is notified about the ha

[PATCH V2 RFC 4/9] virtio_test: verify if virtqueue_kick() succeeded

2013-10-24 Thread Heinz Graalfs
Verify if a host kick succeeded by checking return value of virtqueue_kick(). Signed-off-by: Heinz Graalfs --- tools/virtio/virtio_test.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/tools/virtio/virtio_test.c b/tools/virtio/virtio_test.c index 8e3e432..8691317 100644 --

[PATCH V2 RFC 8/9] virtio_net: verify if queue is broken after virtqueue_get_buf()

2013-10-24 Thread Heinz Graalfs
If a virtqueue_get_buf() call returns a NULL pointer a possibly endless while loop should be avoided by checking for a broken virtqueue. Signed-off-by: Heinz Graalfs --- drivers/net/virtio_net.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/virtio_net.c b/driv

[WorldCIST'14]: World Conference on IST; Proceedings by Springer

2013-10-24 Thread Maria Lemos
Apologies if you are receiving this mail more than once... ** WorldCIST'14 The 2014 World Conference on Information Systems and Technologies April 15 - 18, Madeira Island,