Re: [PATCH RFC 00/11] qemu: towards virtio-1 host support

2014-10-22 Thread Jan Kiszka
On 2014-10-22 22:34, Benjamin Herrenschmidt wrote: > On Wed, 2014-10-22 at 16:17 +0200, Jan Kiszka wrote: >> I thought about this again, and I'm not sure anymore if we can use >> ACPI >> to "black-list" the incompatible virtio devices. Reason: hotplug. To >> my >> understanding, the ACPI DRHD table

Re: [PATCH] KVM: x86: Enable Intel AVX-512 for guest

2014-10-22 Thread Chao Peng
On Wed, Oct 22, 2014 at 12:17:33PM +0200, Paolo Bonzini wrote: > On 10/22/2014 11:35 AM, Chao Peng wrote: > > Expose Intel AVX-512 feature bits to guest. Also add checks for > > xcr0 AVX512 related bits according to spec: > > http://download-software.intel.com/sites/default/files/managed/71/2e/3194

RE: A question about HTL VM-Exit handling time

2014-10-22 Thread Wu, Feng
> -Original Message- > From: Paolo Bonzini [mailto:paolo.bonz...@gmail.com] On Behalf Of Paolo > Bonzini > Sent: Wednesday, October 22, 2014 2:40 AM > To: Wu, Feng; kvm@vger.kernel.org > Cc: Xiao Guangrong > Subject: Re: A question about HTL VM-Exit handling time > > > > On 10/16/2014

Re: reduce networking latency

2014-10-22 Thread Michael S. Tsirkin
On Wed, Oct 22, 2014 at 04:35:07PM -0400, David Xu wrote: > 2014-10-15 14:30 GMT-04:00 David Xu : > > 2014-09-29 5:04 GMT-04:00 Michael S. Tsirkin : > >> On Wed, Sep 24, 2014 at 02:40:53PM -0400, David Xu wrote: > >>> Hi Michael, > >>> > >>> I found this interesting project from KVM TODO website: >

[PATCH] target-i386: add Intel AVX-512 support

2014-10-22 Thread Chao Peng
Add AVX512 feature bits, register definition and corresponding xsave/vmstate support. Signed-off-by: Chao Peng --- target-i386/cpu.c | 10 -- target-i386/cpu.h | 61 ++ target-i386/kvm.c | 19 +++ target-i386/machine.c | 87

[PATCH v12 5/6] arm: KVM: dirty log read write protect support

2014-10-22 Thread Mario Smarduch
This patch adds support to track VM dirty pages, between dirty log reads. Pages that have been dirtied since last log read are write protected again, in preparation of next dirty log read. In addition ARMv7 dirty log read function is pushed up to generic layer. Signed-off-by: Mario Smarduch ---

[PATCH v12 6/6] arm: KVM: ARMv7 dirty page logging 2nd stage page fault

2014-10-22 Thread Mario Smarduch
This patch adds support for handling 2nd stage page faults during migration, it disables faulting in huge pages, and dissolves huge pages to page tables. In case migration is canceled huge pages are used again. Reviewed-by: Christoffer Dall Signed-off-by: Mario Smarduch --- arch/arm/kvm/mmu.c |

[PATCH v12 4/6] arm: KVM: Add initial dirty page locking infrastructure

2014-10-22 Thread Mario Smarduch
Patch adds support for initial write protection of VM memlsot. This patch series assumes that huge PUDs will not be used in 2nd stage tables, which is awlays valid on ARMv7. Signed-off-by: Mario Smarduch --- arch/arm/include/asm/kvm_host.h |2 + arch/arm/include/asm/kvm_mmu.h

[PATCH v12 3/6] arm: KVM: Add ARMv7 API to flush TLBs

2014-10-22 Thread Mario Smarduch
This patch adds ARMv7 architecture TLB Flush function. Acked-by: Christoffer Dall Signed-off-by: Mario Smarduch --- arch/arm/include/asm/kvm_asm.h |1 + arch/arm/include/asm/kvm_host.h | 12 arch/arm/kvm/Kconfig|1 + arch/arm/kvm/interrupts.S | 11 +++

[PATCH v12 1/6] KVM: Add architecture-defined TLB flush support

2014-10-22 Thread Mario Smarduch
This patch adds support for architecture implemented VM TLB flush, currently ARMv7 defines HAVE_KVM_ARCH_TLB_FLUSH_ALL. This leaves other architectures unaffected using the generic version. In subsequent patch ARMv7 defines HAVE_KVM_ARCH_TLB_FLUSH_ALL and it's own TLB flush interface. Signed-off-

[PATCH v12 0/6] arm/KVM: dirty page logging support for ARMv7 (3.17.0-rc1)

2014-10-22 Thread Mario Smarduch
This patch series introduces dirty page logging for ARMv7 and adds some degree of generic dirty logging support for x86, armv7 and later armv8. I implemented Alex's suggestion after he took a look at the patches at kvm forum to simplify the generic/arch split - leaving mips, powerpc, s390, (ia6

[PATCH v12 2/6] KVM: Add generic support for dirty page logging

2014-10-22 Thread Mario Smarduch
This patch defines KVM_GENERIC_DIRTYLOG, and moves dirty log read function to it's own file virt/kvm/dirtylog.c. x86 is updated to use the generic dirty log interface, selecting KVM_GENERIC_DIRTYLOG in its Kconfig and makefile. No other architectures are affected, each uses it's own version. This

Re: reduce networking latency

2014-10-22 Thread David Xu
2014-10-15 14:30 GMT-04:00 David Xu : > 2014-09-29 5:04 GMT-04:00 Michael S. Tsirkin : >> On Wed, Sep 24, 2014 at 02:40:53PM -0400, David Xu wrote: >>> Hi Michael, >>> >>> I found this interesting project from KVM TODO website: >>> >>> allow handling short packets from softirq or VCPU context >>>

Re: [PATCH RFC 00/11] qemu: towards virtio-1 host support

2014-10-22 Thread Benjamin Herrenschmidt
On Wed, 2014-10-22 at 16:17 +0200, Jan Kiszka wrote: > I thought about this again, and I'm not sure anymore if we can use > ACPI > to "black-list" the incompatible virtio devices. Reason: hotplug. To > my > understanding, the ACPI DRHD tables won't change during runtime when a > device shows up or

Re: [PATCH] x86,kvm,vmx: Don't trap writes to CR4.TSD

2014-10-22 Thread Paolo Bonzini
On 10/22/2014 09:10 PM, Andy Lutomirski wrote: > On Tue, Oct 7, 2014 at 5:16 PM, Andy Lutomirski wrote: >> CR4.TSD is guest-owned; don't trap writes to it in VMX guests. This >> avoids a VM exit on context switches into or out of a PR_TSC_SIGSEGV >> task. > > Friendly ping. I suspect this got l

Re: [PATCH 2/4] mm: introduce mm_forbids_zeropage function

2014-10-22 Thread Andrew Morton
On Wed, 22 Oct 2014 21:45:52 +0200 Dominik Dingel wrote: > > > +#ifndef mm_forbids_zeropage > > > +#define mm_forbids_zeropage(X) (0) > > > +#endif > > > > Can we document this please? What it does, why it does it. We should > > also specify precisely which arch header file is responsible fo

Re: [PATCH 2/4] mm: introduce mm_forbids_zeropage function

2014-10-22 Thread Dominik Dingel
On Wed, 22 Oct 2014 12:22:23 -0700 Andrew Morton wrote: > On Wed, 22 Oct 2014 13:09:28 +0200 Dominik Dingel > wrote: > > > Add a new function stub to allow architectures to disable for > > an mm_structthe backing of non-present, anonymous pages with > > read-only empty zero pages. > > > > ...

Re: [PATCH 2/4] mm: introduce mm_forbids_zeropage function

2014-10-22 Thread Andrew Morton
On Wed, 22 Oct 2014 13:09:28 +0200 Dominik Dingel wrote: > Add a new function stub to allow architectures to disable for > an mm_structthe backing of non-present, anonymous pages with > read-only empty zero pages. > > ... > > --- a/include/linux/mm.h > +++ b/include/linux/mm.h > @@ -56,6 +56,10

Re: [PATCH] x86,kvm,vmx: Don't trap writes to CR4.TSD

2014-10-22 Thread Andy Lutomirski
On Tue, Oct 7, 2014 at 5:16 PM, Andy Lutomirski wrote: > CR4.TSD is guest-owned; don't trap writes to it in VMX guests. This > avoids a VM exit on context switches into or out of a PR_TSC_SIGSEGV > task. Friendly ping. I suspect this got lost in KVM Forum, etc. --Andy > > I think that this fi

Re: Infinite IRQ injection loop in QEMU

2014-10-22 Thread Paolo Bonzini
On 10/22/2014 05:33 PM, John Snow wrote: > > I've been working on improving the AHCI device emulation for QEMU but > have recently run into an issue where Windows 8 guests -- upon trying to > resume from hibernation -- manage to trigger an infinite IRQ injection > loop where it seems that the IR

Re: [PATCH v8 07/18] vfio/platform: return info for device memory mapped IO regions

2014-10-22 Thread Antonios Motakis
On Wed, Oct 22, 2014 at 6:46 PM, Alex Williamson wrote: > On Wed, 2014-10-22 at 15:54 +0200, Antonios Motakis wrote: >> On Tue, Oct 21, 2014 at 6:34 PM, Alex Williamson >> wrote: >> > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote: >> >> This patch enables the IOCTLs VFIO_DEVICE_GET_RE

Re: [PATCH v8 09/18] vfio/platform: support MMAP of MMIO regions

2014-10-22 Thread Alex Williamson
On Wed, 2014-10-22 at 15:55 +0200, Antonios Motakis wrote: > On Tue, Oct 21, 2014 at 6:51 PM, Alex Williamson > wrote: > > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote: > >> Allow to memory map the MMIO regions of the device so userspace can > >> directly access them. PIO regions are

Re: [PATCH v8 07/18] vfio/platform: return info for device memory mapped IO regions

2014-10-22 Thread Alex Williamson
On Wed, 2014-10-22 at 15:54 +0200, Antonios Motakis wrote: > On Tue, Oct 21, 2014 at 6:34 PM, Alex Williamson > wrote: > > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote: > >> This patch enables the IOCTLs VFIO_DEVICE_GET_REGION_INFO ioctl call, > >> which allows the user to learn about

Re: Question about physical page allocation to the guest

2014-10-22 Thread Xiao Guangrong
On 10/20/14 2:09 AM, Steven wrote: Hi, Eric, I am trying to understand how KVM allocates physical pages to the guest and your slides clarify a lot of questions. (https://events.linuxfoundation.org/slides/2011/linuxcon-japan/lcj2011_guangrong.pdf) However, I still have some difficulty in figuri

Infinite IRQ injection loop in QEMU

2014-10-22 Thread John Snow
Hello all; I've been working on improving the AHCI device emulation for QEMU but have recently run into an issue where Windows 8 guests -- upon trying to resume from hibernation -- manage to trigger an infinite IRQ injection loop where it seems that the IRQ never quite properly gets cleared.

Re: [PATCH RFC 04/11] virtio_ring: implement endian reversal based on VERSION_1 feature.

2014-10-22 Thread Michael S. Tsirkin
On Wed, Oct 22, 2014 at 04:28:34PM +0200, Cornelia Huck wrote: > On Wed, 22 Oct 2014 17:02:26 +0300 > "Michael S. Tsirkin" wrote: > > > On Tue, Oct 07, 2014 at 04:39:45PM +0200, Cornelia Huck wrote: > > > From: Rusty Russell > > > > > > [Cornelia Huck: we don't need the vq->vring.num -> vq->rin

Re: [PATCH RFC 00/11] qemu: towards virtio-1 host support

2014-10-22 Thread Michael S. Tsirkin
On Wed, Oct 22, 2014 at 04:17:40PM +0200, Jan Kiszka wrote: > On 2014-10-22 10:44, Michael S. Tsirkin wrote: > > On Wed, Oct 08, 2014 at 11:04:28AM +0200, Cornelia Huck wrote: > >> On Tue, 07 Oct 2014 18:24:22 -0700 > >> Andy Lutomirski wrote: > >> > >>> On 10/07/2014 07:39 AM, Cornelia Huck wrote

Re: [PATCH RFC 04/11] virtio_ring: implement endian reversal based on VERSION_1 feature.

2014-10-22 Thread Cornelia Huck
On Wed, 22 Oct 2014 17:02:26 +0300 "Michael S. Tsirkin" wrote: > On Tue, Oct 07, 2014 at 04:39:45PM +0200, Cornelia Huck wrote: > > From: Rusty Russell > > > > [Cornelia Huck: we don't need the vq->vring.num -> vq->ring_mask change] > > Signed-off-by: Rusty Russell > > Signed-off-by: Cornelia

Re: [PATCH RFC 00/11] qemu: towards virtio-1 host support

2014-10-22 Thread Jan Kiszka
On 2014-10-22 10:44, Michael S. Tsirkin wrote: > On Wed, Oct 08, 2014 at 11:04:28AM +0200, Cornelia Huck wrote: >> On Tue, 07 Oct 2014 18:24:22 -0700 >> Andy Lutomirski wrote: >> >>> On 10/07/2014 07:39 AM, Cornelia Huck wrote: This patchset aims to get us some way to implement virtio-1 compl

Re: [PATCH v3 0/4] mm: new function to forbid zeropage mappings for a process

2014-10-22 Thread Paolo Bonzini
On 10/22/2014 01:09 PM, Dominik Dingel wrote: > s390 has the special notion of storage keys which are some sort of page flags > associated with physical pages and live outside of direct addressable memory. > These storage keys can be queried and changed with a special set of > instructions. > Th

Re: [PATCH 2/4] mm: introduce mm_forbids_zeropage function

2014-10-22 Thread Paolo Bonzini
Reviewed-by: Paolo Bonzini On 10/22/2014 01:09 PM, Dominik Dingel wrote: > Add a new function stub to allow architectures to disable for > an mm_structthe backing of non-present, anonymous pages with > read-only empty zero pages. > > Signed-off-by: Dominik Dingel > --- > include/linux/mm.h | 4

Re: [PATCH 3/4] s390/mm: prevent and break zero page mappings in case of storage keys

2014-10-22 Thread Paolo Bonzini
Reviewed-by: Paolo Bonzini On 10/22/2014 01:09 PM, Dominik Dingel wrote: > As soon as storage keys are enabled we need to stop working on zero page > mappings to prevent inconsistencies between storage keys and pgste. > > Otherwise following data corruption could happen: > 1) guest enables stora

Re: [PATCH 4/4] s390/mm: disable KSM for storage key enabled pages

2014-10-22 Thread Paolo Bonzini
Reviewed-by: Paolo Bonzini (missing R-b on patch 1 is _not_ a mistake :)) Paolo On 10/22/2014 01:09 PM, Dominik Dingel wrote: > When storage keys are enabled unmerge already merged pages and prevent > new pages from being merged. > > Signed-off-by: Dominik Dingel > Acked-by: Christian Borntra

Re: [PATCH RFC 04/11] virtio_ring: implement endian reversal based on VERSION_1 feature.

2014-10-22 Thread Michael S. Tsirkin
On Tue, Oct 07, 2014 at 04:39:45PM +0200, Cornelia Huck wrote: > From: Rusty Russell > > [Cornelia Huck: we don't need the vq->vring.num -> vq->ring_mask change] > Signed-off-by: Rusty Russell > Signed-off-by: Cornelia Huck > --- > drivers/virtio/virtio_ring.c | 195 > +++

Re: [PATCH v8 14/18] vfio: move eventfd support code for VFIO_PCI to a separate file

2014-10-22 Thread Antonios Motakis
On Tue, Oct 21, 2014 at 7:55 PM, Alex Williamson wrote: > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote: >> The virqfd functionality that is used by VFIO_PCI to implement interrupt >> masking and unmasking via an eventfd, is generic enough and can be reused >> by another driver. Move i

Re: [PATCH v8 09/18] vfio/platform: support MMAP of MMIO regions

2014-10-22 Thread Antonios Motakis
On Tue, Oct 21, 2014 at 6:51 PM, Alex Williamson wrote: > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote: >> Allow to memory map the MMIO regions of the device so userspace can >> directly access them. PIO regions are not being handled at this point. >> >> Signed-off-by: Antonios Motaki

Re: [PATCH v8 07/18] vfio/platform: return info for device memory mapped IO regions

2014-10-22 Thread Antonios Motakis
On Tue, Oct 21, 2014 at 6:34 PM, Alex Williamson wrote: > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote: >> This patch enables the IOCTLs VFIO_DEVICE_GET_REGION_INFO ioctl call, >> which allows the user to learn about the available MMIO resources of >> a device. >> >> Signed-off-by: An

Re: [PATCH v8 13/18] vfio/platform: support for maskable and automasked interrupts

2014-10-22 Thread Antonios Motakis
On Tue, Oct 21, 2014 at 7:47 PM, Alex Williamson wrote: > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote: >> Adds support to mask interrupts, and also for automasked interrupts. >> Level sensitive interrupts are exposed as automasked interrupts and >> are masked and disabled automatical

[PATCH v3 0/4] mm: new function to forbid zeropage mappings for a process

2014-10-22 Thread Dominik Dingel
s390 has the special notion of storage keys which are some sort of page flags associated with physical pages and live outside of direct addressable memory. These storage keys can be queried and changed with a special set of instructions. The mentioned instructions behave quite nicely under virtual

[PATCH 3/4] s390/mm: prevent and break zero page mappings in case of storage keys

2014-10-22 Thread Dominik Dingel
As soon as storage keys are enabled we need to stop working on zero page mappings to prevent inconsistencies between storage keys and pgste. Otherwise following data corruption could happen: 1) guest enables storage key 2) guest sets storage key for not mapped page X -> change goes to PGSTE 3)

[PATCH 1/4] s390/mm: recfactor global pgste updates

2014-10-22 Thread Dominik Dingel
Replace the s390 specific page table walker for the pgste updates with a call to the common code walk_page_range function. There are now two pte modification functions, one for the reset of the CMMA state and another one for the initialization of the storage keys. Signed-off-by: Dominik Dingel --

[PATCH 4/4] s390/mm: disable KSM for storage key enabled pages

2014-10-22 Thread Dominik Dingel
When storage keys are enabled unmerge already merged pages and prevent new pages from being merged. Signed-off-by: Dominik Dingel Acked-by: Christian Borntraeger --- arch/s390/include/asm/pgtable.h | 2 +- arch/s390/kvm/priv.c| 17 - arch/s390/mm/pgtable.c

[PATCH 2/4] mm: introduce mm_forbids_zeropage function

2014-10-22 Thread Dominik Dingel
Add a new function stub to allow architectures to disable for an mm_structthe backing of non-present, anonymous pages with read-only empty zero pages. Signed-off-by: Dominik Dingel --- include/linux/mm.h | 4 mm/huge_memory.c | 2 +- mm/memory.c| 2 +- 3 files changed, 6 insertion

Re: [PATCH 3/4] s390/mm: prevent and break zero page mappings in case of storage keys

2014-10-22 Thread Dominik Dingel
On Wed, 22 Oct 2014 12:09:31 +0200 Paolo Bonzini wrote: > On 10/22/2014 10:30 AM, Dominik Dingel wrote: > > As use_skey is already the condition on which we call s390_enable_skey > > we need to introduce a new flag for the mm->context on which we decide > > if zero page mapping is allowed. > > C

Re: [PATCH] KVM: x86: Enable Intel AVX-512 for guest

2014-10-22 Thread Paolo Bonzini
On 10/22/2014 11:35 AM, Chao Peng wrote: > Expose Intel AVX-512 feature bits to guest. Also add checks for > xcr0 AVX512 related bits according to spec: > http://download-software.intel.com/sites/default/files/managed/71/2e/319433-017.pdf > > Signed-off-by: Chao Peng The patch looks good, but yo

Re: [PATCH 3/4] s390/mm: prevent and break zero page mappings in case of storage keys

2014-10-22 Thread Paolo Bonzini
On 10/22/2014 10:30 AM, Dominik Dingel wrote: > As use_skey is already the condition on which we call s390_enable_skey > we need to introduce a new flag for the mm->context on which we decide > if zero page mapping is allowed. Can you explain better why "mm->context.use_skey = 1" cannot be done be

Re: [PATCH 3/4] s390/mm: prevent and break zero page mappings in case of storage keys

2014-10-22 Thread Paolo Bonzini
On 10/22/2014 10:30 AM, Dominik Dingel wrote: > As use_skey is already the condition on which we call s390_enable_skey > we need to introduce a new flag for the mm->context on which we decide > if zero page mapping is allowed. Can you explain better why "mm->context.use_skey = 1" cannot be done be

[PATCH] KVM: x86: Enable Intel AVX-512 for guest

2014-10-22 Thread Chao Peng
Expose Intel AVX-512 feature bits to guest. Also add checks for xcr0 AVX512 related bits according to spec: http://download-software.intel.com/sites/default/files/managed/71/2e/319433-017.pdf Signed-off-by: Chao Peng --- arch/x86/include/asm/xsave.h |1 + arch/x86/kvm/cpuid.c |3

Re: [Qemu-devel] [PATCH RFC 03/11] virtio: endianess conversion helpers

2014-10-22 Thread Michael S. Tsirkin
On Tue, Oct 07, 2014 at 04:39:44PM +0200, Cornelia Huck wrote: > Provide helper functions that convert from/to LE for virtio devices that > are not operating in legacy mode. We check for the VERSION_1 feature bit > to determine that. > > Based on original patches by Rusty Russell and Thomas Huth.

Re: [PATCH RFC 00/11] qemu: towards virtio-1 host support

2014-10-22 Thread Michael S. Tsirkin
On Wed, Oct 08, 2014 at 11:04:28AM +0200, Cornelia Huck wrote: > On Tue, 07 Oct 2014 18:24:22 -0700 > Andy Lutomirski wrote: > > > On 10/07/2014 07:39 AM, Cornelia Huck wrote: > > > This patchset aims to get us some way to implement virtio-1 compliant > > > and transitional devices in qemu. Branc

Re: [PATCH RFC] virtio 1.0 vring endian-ness

2014-10-22 Thread Michael S. Tsirkin
On Wed, Oct 22, 2014 at 10:24:17AM +0200, Cornelia Huck wrote: > On Wed, 22 Oct 2014 01:09:40 +0300 > "Michael S. Tsirkin" wrote: > > > This adds wrappers to switch between native endian-ness > > (virtio 0.9) and virtio endian-ness (virtio 1.0). > > Add new typedefs as well, so that we can check

[PATCH 2/4] mm: introduce mm_forbids_zeropage function

2014-10-22 Thread Dominik Dingel
Add a new function stub to allow architectures to disable for an mm_structthe backing of non-present, anonymous pages with read-only empty zero pages. Signed-off-by: Dominik Dingel --- include/linux/mm.h | 4 mm/huge_memory.c | 2 +- mm/memory.c| 2 +- 3 files changed, 6 insertion

[PATCH 3/4] s390/mm: prevent and break zero page mappings in case of storage keys

2014-10-22 Thread Dominik Dingel
As soon as storage keys are enabled we need to stop working on zero page mappings to prevent inconsistencies between storage keys and pgste. Otherwise following data corruption could happen: 1) guest enables storage key 2) guest sets storage key for not mapped page X -> change goes to PGSTE 3)

[PATCH 4/4] s390/mm: disable KSM for storage key enabled pages

2014-10-22 Thread Dominik Dingel
When storage keys are enabled unmerge already merged pages and prevent new pages from being merged. Signed-off-by: Dominik Dingel Acked-by: Christian Borntraeger --- arch/s390/include/asm/pgtable.h | 2 +- arch/s390/kvm/priv.c| 17 - arch/s390/mm/pgtable.c

[PATCH v2 0/4] mm: new function to forbid zeropage mappings for a process

2014-10-22 Thread Dominik Dingel
s390 has the special notion of storage keys which are some sort of page flags associated with physical pages and live outside of direct addressable memory. These storage keys can be queried and changed with a special set of instructions. The mentioned instructions behave quite nicely under virtual

[PATCH 1/4] s390/mm: recfactor global pgste updates

2014-10-22 Thread Dominik Dingel
Replace the s390 specific page table walker for the pgste updates with a call to the common code walk_page_range function. There are now two pte modification functions, one for the reset of the CMMA state and another one for the initialization of the storage keys. Signed-off-by: Dominik Dingel --

Re: [PATCH RFC] virtio 1.0 vring endian-ness

2014-10-22 Thread Cornelia Huck
On Wed, 22 Oct 2014 01:09:40 +0300 "Michael S. Tsirkin" wrote: > This adds wrappers to switch between native endian-ness > (virtio 0.9) and virtio endian-ness (virtio 1.0). > Add new typedefs as well, so that we can check > statically that we didn't miss any accesses. > All callers simply pass in