Re: [PATCH v3 1/2] virtio-rng: fix stuck of hot-unplugging busy device

2014-09-10 Thread Amit Shah
On (Wed) 10 Sep 2014 [14:11:36], Amos Kong wrote: > When we try to hot-remove a busy virtio-rng device from QEMU monitor, > the device can't be hot-removed. Because virtio-rng driver hangs at > wait_for_completion_killable(). > > This patch exits the waiting by completing have_data completion befo

Re: [PATCH v3 2/2] virtio-rng: skip reading when we start to remove the device

2014-09-10 Thread Amit Shah
On (Wed) 10 Sep 2014 [14:11:37], Amos Kong wrote: > Before we really unregister the hwrng device, reading will get stuck if > the virtio device is reset. We should return error for reading when we > start to remove the device. > > Signed-off-by: Amos Kong > Cc: sta...@vger.kernel.org Reviewed-by

Re: RFC virtio-rng: fail to read sysfs of a busy device

2014-09-10 Thread Amos Kong
On Wed, Sep 10, 2014 at 02:49:38PM +0800, Amos Kong wrote: > On Wed, Sep 10, 2014 at 11:22:12AM +0530, Amit Shah wrote: > > On (Tue) 09 Sep 2014 [23:23:07], Amos Kong wrote: > > > (Resend to fix the subject) > > > > > > Hi Amit, Rusty > > > > > > RHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=

Re: Question about using "qemu-kvm" to create vm including "-mem-path"

2014-09-10 Thread Paolo Bonzini
Il 10/09/2014 01:54, Min Du ha scritto: > However if I add "root=/dev/vda1" in the command to create vm, which > looks like "-append root=/dev/vda1 console=ttyS0" in command line, then > "-mem-path /hugetlbfs" doesn't work: > [root@mind domain]# tail /proc/meminfo > VmallocChunk: 34359481380 kB

Re: Freebsd VM Hang while Bootup on KVM, processor Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz

2014-09-10 Thread Paolo Bonzini
Il 09/09/2014 13:12, Venkateswara Rao Nandigam ha scritto: > I have tried Freebsd10.0 64bit VM on the KVM Host running RHEL 6.4, processor > Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz. I suggest you contact Red Hat for problems with the RHEL kernel. Even if FreeBSD is technically not supported, t

Re: [PATCH 4/4] vfio/pci: Restore MSIx message prior to enabling

2014-09-10 Thread Gavin Shan
On Mon, May 19, 2014 at 01:01:10PM +1000, Gavin Shan wrote: >The MSIx vector table lives in device memory, which may be cleared as >part of a backdoor device reset. This is the case on the IBM IPR HBA >when the BIST is run on the device. When assigned to a QEMU guest, >the guest driver does a pci_s

[PATCH 2/2] virtio-rng: fix stuck in catting hwrng attributes

2014-09-10 Thread Amos Kong
When I check hwrng attributes in sysfs, cat process always gets stuck if guest has only 1 vcpu and uses a slow rng backend. Currently we check if there is any tasks waiting to be run on current cpu in rng_dev_read() by need_resched(). But need_resched() doesn't work because rng_dev_read() is execu

[PATCH 1/2] virtio-rng cleanup: move some code out of mutex protection

2014-09-10 Thread Amos Kong
It doesn't save too much cpu time as expected, just a cleanup. Signed-off-by: Amos Kong --- drivers/char/hw_random/core.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c index aa30a25..c591d7e 100644 --- a/dr

[PATCH 0/2] fix stuck in catting hwrng attributes

2014-09-10 Thread Amos Kong
If we read hwrng by long-running dd process, it takes too much cpu time. When we check hwrng attributes from sysfs by cat, it gets stuck. The problem can only be reproduced with non-smp guest with slow backend. This patchset changed hwrng core to always delay 10 jiffies, cat process have chance to

Re: [PATCH 0/2] KVM API documentation patches

2014-09-10 Thread Paolo Bonzini
Il 09/09/2014 18:27, Alex Bennée ha scritto: > Hi, > > I'm preparing to add ARM KVM GDB support and I went to read the API > documentation and found it surprisingly mute on the subject ;-) > > The first patch documents the "new" KVM_SET_GUEST_DEBUG ioctl based on > reviewing the code. I've includ

Re: [RFC PATCH v6 15/20] vfio/platform: support for maskable and automasked interrupts

2014-09-10 Thread Christoffer Dall
On Tue, Sep 02, 2014 at 06:06:17PM +0200, Antonios Motakis wrote: > On Sun, Jun 8, 2014 at 12:17 PM, Christoffer Dall > wrote: > > On Thu, Jun 05, 2014 at 07:03:23PM +0200, Antonios Motakis wrote: > >> Adds support to mask interrupts, and also for automasked interrupts. > >> Level sensitive interr

[PATCH] kvm: ioapic: conditionally delay irq delivery during eoi broadcast

2014-09-10 Thread Zhang Haoyu
Currently, we call ioapic_service() immediately when we find the irq is still active during eoi broadcast. But for real hardware, there's some dealy between the EOI writing and irq delivery (system bus latency?). So we need to emulate this behavior. Otherwise, for a guest who haven't register a pro

Re: [PATCH 2/2 v6] powerpc/kvm: common sw breakpoint instr across ppc

2014-09-10 Thread Alexander Graf
On 09.09.14 19:07, Madhavan Srinivasan wrote: > This patch extends the use of illegal instruction as software > breakpoint instruction across the ppc platform. Patch extends > booke program interrupt code to support software breakpoint. > > Signed-off-by: Madhavan Srinivasan > --- > Patch is on

[PATCH] KVM: PPC: Pass enum to kvmppc_get_last_inst

2014-09-10 Thread Alexander Graf
The kvmppc_get_last_inst function recently received a facelift that allowed us to pass an enum of the type of instruction we want to read into it rather than an unreadable boolean. Unfortunately, not all callers ended up passing the enum. This wasn't really an issue as "true" and "false" happen to

Re: [PATCH] kvm: ioapic: conditionally delay irq delivery during eoi broadcast

2014-09-10 Thread Zhang Haoyu
>+static void kvm_ioapic_eoi_inject_work(struct work_struct *work) >+{ >+ int i, ret; >+ struct kvm_ioapic *ioapic = container_of(work, struct kvm_ioapic, >+ eoi_inject.work); >+ spin_lock(&ioapic->lock); >+ for (i = 0; i < IOAPIC_NU

[GIT PULL 0/7] KVM: s390: Fixes and features for next (3.18)

2014-09-10 Thread Christian Borntraeger
://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git tags/kvm-s390-next-20140910 for you to fetch changes up to bfac1f59a1afb13a3cf225bffd04be99a49c51a6: KVM: s390/interrupt: remove double assignment (2014-09-10 12:19:45 +0200

[GIT PULL 3/7] KVM: s390: Limit guest size to 16TB

2014-09-10 Thread Christian Borntraeger
Currently we fill up a full 5 level page table to hold the guest mapping. Since commit "support gmap page tables with less than 5 levels" we can do better. Having more than 4 TB might be useful for some testing scenarios, so let's just limit ourselves to 16TB guest size. Having more than that is to

[GIT PULL 4/7] KVM: s390: unintended fallthrough for external call

2014-09-10 Thread Christian Borntraeger
We must not fallthrough if the conditions for external call are not met. Signed-off-by: Christian Borntraeger Reviewed-by: Thomas Huth Cc: sta...@vger.kernel.org --- arch/s390/kvm/interrupt.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/s390/kvm/interrupt.c b/arch/s390/kvm/interrupt

[GIT PULL 5/7] KVM: s390: get rid of constant condition in ipte_unlock_simple

2014-09-10 Thread Christian Borntraeger
Due to the earlier check we know that ipte_lock_count must be 0. No need to add a useless if. Let's make clear that we are going to always wakeup when we execute that code. Signed-off-by: Christian Borntraeger Acked-by: Heiko Carstens --- arch/s390/kvm/gaccess.c | 3 +-- 1 file changed, 1 inser

[GIT PULL 6/7] KVM: s390/cmm: Fix prefix handling for diag 10 balloon

2014-09-10 Thread Christian Borntraeger
The old handling of prefix pages was broken in the diag10 ballooner. We now rely on gmap_discard to check for start > end and do a slow path if the prefix swap pages are affected: 1. discard the pages from start to prefix 2. discard the absolute 0 pages 3. discard the pages after prefix swap to end

[GIT PULL 2/7] KVM: s390: add __must_check to interrupt deliver functions

2014-09-10 Thread Christian Borntraeger
We now propagate interrupt injection errors back to the ioctl. We should mark functions that might fail with __must_check. Signed-off-by: Christian Borntraeger Acked-by: Jens Freimann --- arch/s390/kvm/interrupt.c | 12 ++-- arch/s390/kvm/kvm-s390.h | 2 +- 2 files changed, 7 insertio

[GIT PULL 7/7] KVM: s390/interrupt: remove double assignment

2014-09-10 Thread Christian Borntraeger
r is already initialized to 0. Signed-off-by: Christian Borntraeger Reviewed-by: Thomas Huth --- arch/s390/kvm/interrupt.c | 1 - 1 file changed, 1 deletion(-) diff --git a/arch/s390/kvm/interrupt.c b/arch/s390/kvm/interrupt.c index 4abf819..4cad00a 100644 --- a/arch/s390/kvm/interrupt.c +++ b

[GIT PULL 1/7] KVM: CPACF: Enable MSA4 instructions for kvm guest

2014-09-10 Thread Christian Borntraeger
From: Tony Krowiak We have to provide a per guest crypto block for the CPUs to enable MSA4 instructions. According to icainfo on z196 or later this enables CCM-AES-128, CMAC-AES-128, CMAC-AES-192 and CMAC-AES-256. Signed-off-by: Tony Krowiak Reviewed-by: David Hildenbrand Reviewed-by: Cornelia

Re: [PATCH v4 1/6] kvm: Use APIC_DEFAULT_PHYS_BASE macro as the apic access page address.

2014-09-10 Thread Gleb Natapov
On Wed, Aug 27, 2014 at 06:17:36PM +0800, Tang Chen wrote: > We have APIC_DEFAULT_PHYS_BASE defined as 0xfee0, which is also the > address of > apic access page. So use this macro. Reviewed-by: Gleb Natapov > > Signed-off-by: Tang Chen > --- > arch/x86/kvm/svm.c | 3 ++- > arch/x86/kvm/vm

Re: [PATCH v4 2/6] kvm: Remove ept_identity_pagetable from struct kvm_arch.

2014-09-10 Thread Gleb Natapov
On Wed, Aug 27, 2014 at 06:17:37PM +0800, Tang Chen wrote: > kvm_arch->ept_identity_pagetable holds the ept identity pagetable page. But > it is never used to refer to the page at all. > > In vcpu initialization, it indicates two things: > 1. indicates if ept page is allocated > 2. indicates if a

Re: [PATCH v4 4/6] kvm, mem-hotplug: Reload L1' apic access page on migration in vcpu_enter_guest().

2014-09-10 Thread Gleb Natapov
On Tue, Sep 09, 2014 at 03:13:07PM +0800, tangchen wrote: > Hi Gleb, > > On 09/03/2014 11:04 PM, Gleb Natapov wrote: > >On Wed, Sep 03, 2014 at 09:42:30AM +0800, tangchen wrote: > >>Hi Gleb, > >> > >>On 09/03/2014 12:00 AM, Gleb Natapov wrote: > >>>.. > >>>+static void vcpu_reload_apic_access_

Re: [PATCH v2] ARM/arm64: KVM: fix use of WnR bit in kvm_is_write_fault()

2014-09-10 Thread Marc Zyngier
On 09/09/14 11:27, Ard Biesheuvel wrote: > The ISS encoding for an exception from a Data Abort has a WnR > bit[6] that indicates whether the Data Abort was caused by a > read or a write instruction. While there are several fields > in the encoding that are only valid if the ISV bit[24] is set, > Wn

[PATCH] KVM: ioapic: add check for RTC_GSI

2014-09-10 Thread Chris J Arges
cppcheck found the following error: [ioapic.c:114]: (error) Array index -1 is out of bounds. If CONFIG_X86 is not defined, RTC_GSI == -1U which means that an out of bounds error could occur when accessing &ioapic->redirtbl[RTC_GSI]. This patch adds a check to kvm_rtc_eoi_tracking_restore_one that

Your Mailbox is full

2014-09-10 Thread Betancourt, Marielena
This Message is From the Administrator Desk Due to our latest IP Security upgrades we have reason to believe that your web mail account was accessed by a third party. Protecting the security of your web mail account is our primary concern, we have limited access to sensitive web mail account fea

Re: [PATCH] KVM: EVENTFD: remove inclusion of irq.h

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 12:11:19PM +0200, Paolo Bonzini wrote: > Il 01/09/2014 10:36, Eric Auger ha scritto: > > No more needed. irq.h would be void on ARM. > > > > Signed-off-by: Eric Auger > > > > --- > > > > I don't think irq.h is needed anymore since Paul Mackerras' work. However > > I did

Re: [RFC v2 5/9] KVM: KVM-VFIO: update user API to program forwarded IRQ

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:44PM +0200, Eric Auger wrote: > add new device group commands: > - KVM_DEV_VFIO_DEVICE_FORWARD_IRQ and > KVM_DEV_VFIO_DEVICE_UNFORWARD_IRQ > > which enable to turn forwarded IRQ mode on/off. > > the kvm_arch_forwarded_irq struct embodies a forwarded IRQ > > Signed

Re: [RFC v2 7/9] KVM: KVM-VFIO: add new VFIO external API hooks

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:46PM +0200, Eric Auger wrote: > add functions that implement the gateway to the extended Capital letter when beginning a new sentence. Also the reference to 'the extended VFIO API' feels a bit weird. Can't you make your commit message a little more descriptive of th

Re: [RFC v2 8/9] KVM: KVM-VFIO: generic KVM_DEV_VFIO_DEVICE command and IRQ forwarding control

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:47PM +0200, Eric Auger wrote: > This patch introduces a new KVM_DEV_VFIO_DEVICE attribute. > > This is a new control channel which enables KVM to cooperate with > viable VFIO devices. > > The kvm-vfio device now holds a list of devices (kvm_vfio_device) > in addition

Re: [RFC v2 9/9] KVM: KVM-VFIO: ARM forwarding control

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:48PM +0200, Eric Auger wrote: > Enables forwarding control for ARM. By defining > __KVM_HAVE_ARCH_KVM_VFIO_FORWARD the patch enables > KVM_DEV_VFIO_DEVICE_FORWARD/UNFORWARD_IRQ command on ARM. As a > result it brings an optimized injection/completion handling for > for

Re: [RFC v2 0/9] KVM-VFIO IRQ forward control

2014-09-10 Thread Christoffer Dall
On Tue, Sep 02, 2014 at 03:05:41PM -0600, Alex Williamson wrote: > On Mon, 2014-09-01 at 14:52 +0200, Eric Auger wrote: > > This RFC proposes an integration of "ARM: Forwarding physical > > interrupts to a guest VM" (http://lwn.net/Articles/603514/) in > > KVM. > > > > It enables to transform a VF

Re: [RFC v2 4/9] VFIO: platform: handler tests whether the IRQ is forwarded

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:43PM +0200, Eric Auger wrote: > In case the IRQ is forwarded, the VFIO platform IRQ handler does not > need to disable the IRQ anymore. In that mode, when the handler completes add a comma after completes > the IRQ is not deactivated but only its priority is lowered.

Re: [RFC v2 6/9] VFIO: Extend external user API

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:45PM +0200, Eric Auger wrote: > New functions are added to be called from ARM KVM-VFIO device. This commit message seems somewhat random. This patch doesn't deal with anything ARM specific, it introduces some generic functions that allows users external to vfio itsel

Re: [PATCH v2] ARM/arm64: KVM: fix use of WnR bit in kvm_is_write_fault()

2014-09-10 Thread Christoffer Dall
On Tue, Sep 09, 2014 at 12:02:59PM +0100, Marc Zyngier wrote: > [resending, as ARM email server seems to be in some mood] > > On 09/09/14 11:27, Ard Biesheuvel wrote: > > The ISS encoding for an exception from a Data Abort has a WnR > > bit[6] that indicates whether the Data Abort was caused by a

Re: [PATCH v3] ARM: KVM: add irqfd support

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 10:53:04AM +0200, Eric Auger wrote: > This patch enables irqfd on ARM. > > irqfd framework enables to inject a virtual IRQ into a guest upon an > eventfd trigger. User-side uses KVM_IRQFD VM ioctl to provide KVM with > a kvm_irqfd struct that associates a VM, an eventfd, a

Re: [RFC v2 2/9] KVM: ARM: VGIC: add forwarded irq rbtree lock

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:41PM +0200, Eric Auger wrote: > add a lock related to the rb tree manipulation. The rb tree can be Ok, I can't hold myself back any longer. Please begin sentences with a capital letter. You don't do this in French? :) > searched in one thread (irqfd handler for inst

Re: [RFC v2 1/9] KVM: ARM: VGIC: fix multiple injection of level sensitive forwarded IRQ

2014-09-10 Thread Christoffer Dall
On Mon, Sep 01, 2014 at 02:52:40PM +0200, Eric Auger wrote: > Fix multiple injection of level sensitive forwarded IRQs. > With current code, the second injection fails since the state bitmaps > are not reset (process_maintenance is not called anymore). > New implementation consists in fully bypassi

[PATCH] kvm: ioapic: conditionally delay irq delivery during eoi broadcast

2014-09-10 Thread Zhang Haoyu
Currently, we call ioapic_service() immediately when we find the irq is still active during eoi broadcast. But for real hardware, there's some dealy between the EOI writing and irq delivery (system bus latency?). So we need to emulate this behavior. Otherwise, for a guest who haven't register a pro

Re: [RFC v2 8/9] KVM: KVM-VFIO: generic KVM_DEV_VFIO_DEVICE command and IRQ forwarding control

2014-09-10 Thread Alex Williamson
On Thu, 2014-09-11 at 05:10 +0200, Christoffer Dall wrote: > On Mon, Sep 01, 2014 at 02:52:47PM +0200, Eric Auger wrote: > > This patch introduces a new KVM_DEV_VFIO_DEVICE attribute. > > > > This is a new control channel which enables KVM to cooperate with > > viable VFIO devices. > > > > The kv

Re: [RFC v2 0/9] KVM-VFIO IRQ forward control

2014-09-10 Thread Alex Williamson
On Thu, 2014-09-11 at 05:10 +0200, Christoffer Dall wrote: > On Tue, Sep 02, 2014 at 03:05:41PM -0600, Alex Williamson wrote: > > On Mon, 2014-09-01 at 14:52 +0200, Eric Auger wrote: > > > This RFC proposes an integration of "ARM: Forwarding physical > > > interrupts to a guest VM" (http://lwn.net/

[PATCH v5 5/7] kvm, mem-hotplug: Reload L1's apic access page on migration when L2 is running.

2014-09-10 Thread Tang Chen
This patch only handle "L1 and L2 vm share one apic access page" situation. When L1 vm is running, if the shared apic access page is migrated, mmu_notifier will request all vcpus to exit to L0, and reload apic access page physical address for all the vcpus' vmcs (which is done by patch 5/6). And

[PATCH v5 6/7] kvm, mem-hotplug: Unpin and remove kvm_arch->apic_access_page.

2014-09-10 Thread Tang Chen
To make apic access page migratable, we do not pin it in memory now. When it is migrated, we should reload its physical address for all vmcses. But when we tried to do this, all vcpu will access kvm_arch->apic_access_page without any locking. This is not safe. Actually, we do not need kvm_arch->ap

[PATCH v5 4/7] kvm, mem-hotplug: Reload L1' apic access page on migration in vcpu_enter_guest().

2014-09-10 Thread Tang Chen
apic access page is pinned in memory. As a result, it cannot be migrated/hot-removed. Actually, it is not necessary to be pinned. The hpa of apic access page is stored in VMCS APIC_ACCESS_ADDR pointer. When the page is migrated, kvm_mmu_notifier_invalidate_page() will invalidate the corresponding

[PATCH v5 3/7] kvm: Make init_rmode_identity_map() return 0 on success.

2014-09-10 Thread Tang Chen
In init_rmode_identity_map(), there two variables indicating the return value, r and ret, and it return 0 on error, 1 on success. The function is only called by vmx_create_vcpu(), and r is redundant. This patch removes the redundant variable r, and make init_rmode_identity_map() return 0 on succes

[PATCH v5 7/7] kvm, mem-hotplug: Unpin and remove nested_vmx->apic_access_page.

2014-09-10 Thread Tang Chen
Just like we removed kvm_arch->apic_access_page, nested_vmx->apic_access_page becomes useless for the same reason. This patch removes nested_vmx->apic_access_page, and use gfn_to_page() to pin it in memory when we need it, and unpin it after then. Signed-off-by: Tang Chen --- arch/x86/kvm/vmx.

[PATCH v5 2/7] kvm: Remove ept_identity_pagetable from struct kvm_arch.

2014-09-10 Thread Tang Chen
kvm_arch->ept_identity_pagetable holds the ept identity pagetable page. But it is never used to refer to the page at all. In vcpu initialization, it indicates two things: 1. indicates if ept page is allocated 2. indicates if a memory slot for identity page is initialized Actually, kvm_arch->ept_i

[PATCH v5 0/7] kvm, mem-hotplug: Do not pin ept identity pagetable and apic access page.

2014-09-10 Thread Tang Chen
ept identity pagetable and apic access page in kvm are pinned in memory. As a result, they cannot be migrated/hot-removed. But actually they don't need to be pinned in memory. [For ept identity page] Just do not pin it. When it is migrated, guest will be able to find the new page in the next ept

[PATCH v5 1/7] kvm: Use APIC_DEFAULT_PHYS_BASE macro as the apic access page address.

2014-09-10 Thread Tang Chen
We have APIC_DEFAULT_PHYS_BASE defined as 0xfee0, which is also the address of apic access page. So use this macro. Signed-off-by: Tang Chen Reviewed-by: Gleb Natapov --- arch/x86/kvm/svm.c | 3 ++- arch/x86/kvm/vmx.c | 6 +++--- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git

Re: [PATCH] kvm: ioapic: conditionally delay irq delivery during eoi broadcast

2014-09-10 Thread Jan Kiszka
On 2014-09-11 07:06, Zhang Haoyu wrote: > Currently, we call ioapic_service() immediately when we find the irq is still > active during eoi broadcast. But for real hardware, there's some dealy between > the EOI writing and irq delivery (system bus latency?). So we need to emulate > this behavior. O

Re: [PATCH] KVM: ioapic: add check for RTC_GSI

2014-09-10 Thread Jan Kiszka
On 2014-09-10 18:53, Chris J Arges wrote: > cppcheck found the following error: > [ioapic.c:114]: (error) Array index -1 is out of bounds. > > If CONFIG_X86 is not defined, RTC_GSI == -1U which means that an out of bounds That issue is limited to the dead ia64 architecture, no other builds ioapic

Re: [PATCH 1/2] virtio-rng cleanup: move some code out of mutex protection

2014-09-10 Thread Amit Shah
On (Wed) 10 Sep 2014 [17:07:06], Amos Kong wrote: > It doesn't save too much cpu time as expected, just a cleanup. Frankly I won't bother with this. It doesn't completely remove all copying from the mutex, so it's not worthwhile. > Signed-off-by: Amos Kong > --- > drivers/char/hw_random/core.c

Re: [PATCH 2/2] virtio-rng: fix stuck in catting hwrng attributes

2014-09-10 Thread Amit Shah
On (Wed) 10 Sep 2014 [17:07:07], Amos Kong wrote: > When I check hwrng attributes in sysfs, cat process always gets > stuck if guest has only 1 vcpu and uses a slow rng backend. > > Currently we check if there is any tasks waiting to be run on > current cpu in rng_dev_read() by need_resched(). But

Re: [Qemu-devel] [question] virtio-blk performance degradationhappenedwith virito-serial

2014-09-10 Thread Amit Shah
On (Sun) 07 Sep 2014 [17:46:26], Zhang Haoyu wrote: > Hi, Paolo, Amit, > any ideas? I'll check this, thanks for testing with Linux guests. Amit -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo i