Re: [RFC PATCH v4 15/20] vhost: Shadow virtqueue buffers forwarding

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




在 2021/10/15 上午1:56, Eugenio Perez Martin 写道:
On Wed, Oct 13, 2021 at 6:31 AM Jason Wang <jasowang@xxxxxxxxxx> wrote:

在 2021/10/1 下午3:05, Eugenio Pérez 写道:
Initial version of shadow virtqueue that actually forward buffers. There
are no iommu support at the moment, and that will be addressed in future
patches of this series. Since all vhost-vdpa devices uses forced IOMMU,
this means that SVQ is not usable at this point of the series on any
device.

For simplicity it only supports modern devices, that expects vring
in little endian, with split ring and no event idx or indirect
descriptors. Support for them will not be added in this series.

It reuses the VirtQueue code for the device part. The driver part is
based on Linux's virtio_ring driver, but with stripped functionality
and optimizations so it's easier to review. Later commits add simpler
ones.

SVQ uses VIRTIO_CONFIG_S_DEVICE_STOPPED to pause the device and
retrieve its status (next available idx the device was going to
consume) race-free. It can later reset the device to replace vring
addresses etc. When SVQ starts qemu can resume consuming the guest's
driver ring from that state, without notice from the latter.

This status bit VIRTIO_CONFIG_S_DEVICE_STOPPED is currently discussed
in VirtIO, and is implemented in qemu VirtIO-net devices in previous
commits.

Removal of _S_DEVICE_STOPPED bit (in other words, resuming the device)
can be done in the future if an use case arises. At this moment we can
just rely on reseting the full device.

Signed-off-by: Eugenio Pérez <eperezma@xxxxxxxxxx>
---
   qapi/net.json                      |   2 +-
   hw/virtio/vhost-shadow-virtqueue.c | 237 ++++++++++++++++++++++++++++-
   hw/virtio/vhost-vdpa.c             | 109 ++++++++++++-
   3 files changed, 337 insertions(+), 11 deletions(-)

diff --git a/qapi/net.json b/qapi/net.json
index fe546b0e7c..1f4a55f2c5 100644
--- a/qapi/net.json
+++ b/qapi/net.json
@@ -86,7 +86,7 @@
   #
   # @name: the device name of the VirtIO device
   #
-# @enable: true to use the alternate shadow VQ notifications
+# @enable: true to use the alternate shadow VQ buffers fowarding path
   #
   # Returns: Error if failure, or 'no error' for success.
   #
diff --git a/hw/virtio/vhost-shadow-virtqueue.c b/hw/virtio/vhost-shadow-virtqueue.c
index 34e159d4fd..df7e6fa3ec 100644
--- a/hw/virtio/vhost-shadow-virtqueue.c
+++ b/hw/virtio/vhost-shadow-virtqueue.c
@@ -10,6 +10,7 @@
   #include "qemu/osdep.h"
   #include "hw/virtio/vhost-shadow-virtqueue.h"
   #include "hw/virtio/vhost.h"
+#include "hw/virtio/virtio-access.h"

   #include "standard-headers/linux/vhost_types.h"

@@ -44,15 +45,135 @@ typedef struct VhostShadowVirtqueue {

       /* Virtio device */
       VirtIODevice *vdev;
+
+    /* Map for returning guest's descriptors */
+    VirtQueueElement **ring_id_maps;
+
+    /* Next head to expose to device */
+    uint16_t avail_idx_shadow;
+
+    /* Next free descriptor */
+    uint16_t free_head;
+
+    /* Last seen used idx */
+    uint16_t shadow_used_idx;
+
+    /* Next head to consume from device */
+    uint16_t used_idx;

Let's use "last_used_idx" as kernel driver did.

Ok I will change it.

   } VhostShadowVirtqueue;

   /* If the device is using some of these, SVQ cannot communicate */
   bool vhost_svq_valid_device_features(uint64_t *dev_features)
   {
-    return true;
+    uint64_t b;
+    bool r = true;
+
+    for (b = VIRTIO_TRANSPORT_F_START; b <= VIRTIO_TRANSPORT_F_END; ++b) {
+        switch (b) {
+        case VIRTIO_F_NOTIFY_ON_EMPTY:
+        case VIRTIO_F_ANY_LAYOUT:
+            /* SVQ is fine with this feature */
+            continue;
+
+        case VIRTIO_F_ACCESS_PLATFORM:
+            /* SVQ needs this feature disabled. Can't continue */

So code can explain itself, need a comment to explain why.

Do you mean that it *doesn't* need a comment to explain why? In that
case I will delete them.


I meant the comment is duplicated with the code. If you wish, you can explain why ACCESS_PLATFORM needs to be disabled.



+            if (*dev_features & BIT_ULL(b)) {
+                clear_bit(b, dev_features);
+                r = false;
+            }
+            break;
+
+        case VIRTIO_F_VERSION_1:
+            /* SVQ needs this feature, so can't continue */

A comment to explain why SVQ needs this feature.

Sure I will add it.

+            if (!(*dev_features & BIT_ULL(b))) {
+                set_bit(b, dev_features);
+                r = false;
+            }
+            continue;
+
+        default:
+            /*
+             * SVQ must disable this feature, let's hope the device is fine
+             * without it.
+             */
+            if (*dev_features & BIT_ULL(b)) {
+                clear_bit(b, dev_features);
+            }
+        }
+    }
+
+    return r;
+}

Let's move this to patch 14.

I can move it down to 14/20, but then it is not really accurate, since
notifications forwarding can work with all feature sets. Not like we
are introducing a regression, but still.

I can always explain that in the patch message though, would that be ok?


I'm afraid this will break bisection. E.g for patch 14, it works for any features but for patch 15 it doesn't.



+
+static void vhost_vring_write_descs(VhostShadowVirtqueue *svq,
+                                    const struct iovec *iovec,
+                                    size_t num, bool more_descs, bool write)
+{
+    uint16_t i = svq->free_head, last = svq->free_head;
+    unsigned n;
+    uint16_t flags = write ? cpu_to_le16(VRING_DESC_F_WRITE) : 0;
+    vring_desc_t *descs = svq->vring.desc;
+
+    if (num == 0) {
+        return;
+    }
+
+    for (n = 0; n < num; n++) {
+        if (more_descs || (n + 1 < num)) {
+            descs[i].flags = flags | cpu_to_le16(VRING_DESC_F_NEXT);
+        } else {
+            descs[i].flags = flags;
+        }
+        descs[i].addr = cpu_to_le64((hwaddr)iovec[n].iov_base);
+        descs[i].len = cpu_to_le32(iovec[n].iov_len);
+
+        last = i;
+        i = cpu_to_le16(descs[i].next);
+    }
+
+    svq->free_head = le16_to_cpu(descs[last].next);
+}
+
+static unsigned vhost_svq_add_split(VhostShadowVirtqueue *svq,
+                                    VirtQueueElement *elem)
+{
+    int head;
+    unsigned avail_idx;
+    vring_avail_t *avail = svq->vring.avail;
+
+    head = svq->free_head;
+
+    /* We need some descriptors here */
+    assert(elem->out_num || elem->in_num);
+
+    vhost_vring_write_descs(svq, elem->out_sg, elem->out_num,
+                            elem->in_num > 0, false);
+    vhost_vring_write_descs(svq, elem->in_sg, elem->in_num, false, true);
+
+    /*
+     * Put entry in available array (but don't update avail->idx until they
+     * do sync).
+     */
+    avail_idx = svq->avail_idx_shadow & (svq->vring.num - 1);
+    avail->ring[avail_idx] = cpu_to_le16(head);
+    svq->avail_idx_shadow++;
+
+    /* Update avail index after the descriptor is wrote */
+    smp_wmb();
+    avail->idx = cpu_to_le16(svq->avail_idx_shadow);
+
+    return head;
+
   }

-/* Forward guest notifications */
+static void vhost_svq_add(VhostShadowVirtqueue *svq, VirtQueueElement *elem)
+{
+    unsigned qemu_head = vhost_svq_add_split(svq, elem);
+
+    svq->ring_id_maps[qemu_head] = elem;
+}
+
+/* Handle guest->device notifications */
   static void vhost_handle_guest_kick(EventNotifier *n)
   {
       VhostShadowVirtqueue *svq = container_of(n, VhostShadowVirtqueue,
@@ -62,7 +183,74 @@ static void vhost_handle_guest_kick(EventNotifier *n)
           return;
       }

-    event_notifier_set(&svq->kick_notifier);
+    /* Make available as many buffers as possible */
+    do {
+        if (virtio_queue_get_notification(svq->vq)) {
+            /* No more notifications until process all available */
+            virtio_queue_set_notification(svq->vq, false);
+        }

This can be done outside the loop.

I think it cannot. The intention of doing this way is that we check
for new available buffers *also after* enabling notifications, so we
don't miss any of them. It is more or less copied from
virtio_blk_handle_vq, which also needs to run to completion.

If we need to loop again because there are more available buffers, we
want to disable notifications again. Or am I missing something?


I think you're right.



+
+        while (true) {
+            VirtQueueElement *elem = virtqueue_pop(svq->vq, sizeof(*elem));
+            if (!elem) {
+                break;
+            }
+
+            vhost_svq_add(svq, elem);
+            event_notifier_set(&svq->kick_notifier);
+        }
+
+        virtio_queue_set_notification(svq->vq, true);

I think this can be moved to the end of this function.

(Same as previous answer)

Btw, we probably need a quota to make sure the svq is not hogging the
main event loop.

Similar issue could be found in both virtio-net TX (using timer or bh)
and TAP (a quota).

I think that virtqueue size is the natural limit to that: since we are
not making any buffers used in the loop, there is no way that it runs
more than virtqueue size times. If it does because of an evil/bogus
guest, virtqueue_pop raises the message "Virtqueue size exceeded" and
returns NULL, effectively breaking the loop.

Virtio-net tx functions mark each buffer right after making them
available and use it, so they can hog BQL. But my understanding is
that is not possible in the SVQ case.


Right.



I can add a comment in the code to make it clearer though.


Yes, please.



+    } while (!virtio_queue_empty(svq->vq));
+}
+
+static bool vhost_svq_more_used(VhostShadowVirtqueue *svq)
+{
+    if (svq->used_idx != svq->shadow_used_idx) {
+        return true;
+    }
+
+    /* Get used idx must not be reordered */
+    smp_rmb();

Interesting, we don't do this for kernel drivers. It would be helpful to
explain it more clear by "X must be done before Y".

I think this got reordered, it's supposed to be *after* get the used
idx, so it matches the one in the kernel with the comment "Only get
used array entries after they have been exposed by host.".


Right.



I will change it for the next series.


Ok.



+    svq->shadow_used_idx = cpu_to_le16(svq->vring.used->idx);
+
+    return svq->used_idx != svq->shadow_used_idx;
+}
+
+static VirtQueueElement *vhost_svq_get_buf(VhostShadowVirtqueue *svq)
+{
+    vring_desc_t *descs = svq->vring.desc;
+    const vring_used_t *used = svq->vring.used;
+    vring_used_elem_t used_elem;
+    uint16_t last_used;
+
+    if (!vhost_svq_more_used(svq)) {
+        return NULL;
+    }
+
+    last_used = svq->used_idx & (svq->vring.num - 1);
+    used_elem.id = le32_to_cpu(used->ring[last_used].id);
+    used_elem.len = le32_to_cpu(used->ring[last_used].len);
+
+    svq->used_idx++;
+    if (unlikely(used_elem.id >= svq->vring.num)) {
+        error_report("Device %s says index %u is used", svq->vdev->name,
+                     used_elem.id);
+        return NULL;
+    }
+
+    if (unlikely(!svq->ring_id_maps[used_elem.id])) {
+        error_report(
+            "Device %s says index %u is used, but it was not available",
+            svq->vdev->name, used_elem.id);
+        return NULL;
+    }
+
+    descs[used_elem.id].next = svq->free_head;
+    svq->free_head = used_elem.id;
+
+    svq->ring_id_maps[used_elem.id]->len = used_elem.len;
+    return g_steal_pointer(&svq->ring_id_maps[used_elem.id]);
   }

   /* Forward vhost notifications */
@@ -70,8 +258,26 @@ static void vhost_svq_handle_call_no_test(EventNotifier *n)
   {
       VhostShadowVirtqueue *svq = container_of(n, VhostShadowVirtqueue,
                                                call_notifier);
-
-    event_notifier_set(&svq->guest_call_notifier);
+    VirtQueue *vq = svq->vq;
+
+    /* Make as many buffers as possible used. */
+    do {
+        unsigned i = 0;
+
+        /* TODO: Use VRING_AVAIL_F_NO_INTERRUPT */
+        while (true) {
+            g_autofree VirtQueueElement *elem = vhost_svq_get_buf(svq);
+            if (!elem) {
+                break;
+            }
+
+            assert(i < svq->vring.num);

Let's return error instead of using the assert.

Actually this is a condition that we should never meet: In the case of
ring overrun, device would try to set used a descriptor that is either
vring size *or* should try to overrun some of the already used ones.
In both cases, elem should be NULL and the loop should break.

So this is a safety net protecting from both, if we have an i >
svq->vring.num means we are not processing used buffers well anymore,
and (moreover) this is happening after making used all descriptors.

Taking that into account, should we delete it?


Maybe a warning instead.



+            virtqueue_fill(vq, elem, elem->len, i++);
+        }
+
+        virtqueue_flush(vq, i);
+        event_notifier_set(&svq->guest_call_notifier);
+    } while (vhost_svq_more_used(svq));
   }

   static void vhost_svq_handle_call(EventNotifier *n)
@@ -204,12 +410,25 @@ err_set_vring_kick:
   void vhost_svq_stop(struct vhost_dev *dev, unsigned idx,
                       VhostShadowVirtqueue *svq)
   {
+    int i;
       int r = vhost_svq_restore_vdev_host_notifier(dev, idx, svq);
+
       if (unlikely(r < 0)) {
           error_report("Couldn't restore vq kick fd: %s", strerror(-r));
       }

       event_notifier_set_handler(&svq->host_notifier, NULL);
+
+    for (i = 0; i < svq->vring.num; ++i) {
+        g_autofree VirtQueueElement *elem = svq->ring_id_maps[i];
+        /*
+         * Although the doc says we must unpop in order, it's ok to unpop
+         * everything.
+         */
+        if (elem) {
+            virtqueue_unpop(svq->vq, elem, elem->len);
+        }

Will this result some of the "pending" buffers to be submitted multiple
times? If yes, should we wait for all the buffers used instead of doing
the unpop here?

Do you mean to call virtqueue_unpop with the same elem (or elem.id)
multiple times? That should never happen, because elem.id should be
the position in the ring_id_maps. Also, unpop() should just unmap the
element and never sync again.

Maybe it is way clearer to call virtqueue_detach_element here directly.


I meant basically for the buffers that were consumed by the device but not made used. In this case if we unpop here. It will be processed by the device later via vhost-vdpa again?

This is probably fine for net but I'm not sure it works for other devices. Another way is to wait until all the consumed buffer used.



+    }
   }

   /*
@@ -224,7 +443,7 @@ VhostShadowVirtqueue *vhost_svq_new(struct vhost_dev *dev, int idx)
       size_t driver_size;
       size_t device_size;
       g_autofree VhostShadowVirtqueue *svq = g_new0(VhostShadowVirtqueue, 1);
-    int r;
+    int r, i;

       r = event_notifier_init(&svq->kick_notifier, 0);
       if (r != 0) {
@@ -250,6 +469,11 @@ VhostShadowVirtqueue *vhost_svq_new(struct vhost_dev *dev, int idx)
       memset(svq->vring.desc, 0, driver_size);
       svq->vring.used = qemu_memalign(qemu_real_host_page_size, device_size);
       memset(svq->vring.used, 0, device_size);
+    for (i = 0; i < num - 1; i++) {
+        svq->vring.desc[i].next = cpu_to_le16(i + 1);
+    }
+
+    svq->ring_id_maps = g_new0(VirtQueueElement *, num);
       event_notifier_set_handler(&svq->call_notifier,
                                  vhost_svq_handle_call);
       return g_steal_pointer(&svq);
@@ -269,6 +493,7 @@ void vhost_svq_free(VhostShadowVirtqueue *vq)
       event_notifier_cleanup(&vq->kick_notifier);
       event_notifier_set_handler(&vq->call_notifier, NULL);
       event_notifier_cleanup(&vq->call_notifier);
+    g_free(vq->ring_id_maps);
       qemu_vfree(vq->vring.desc);
       qemu_vfree(vq->vring.used);
       g_free(vq);
diff --git a/hw/virtio/vhost-vdpa.c b/hw/virtio/vhost-vdpa.c
index a057e8277d..bb7010ddb5 100644
--- a/hw/virtio/vhost-vdpa.c
+++ b/hw/virtio/vhost-vdpa.c
@@ -19,6 +19,7 @@
   #include "hw/virtio/virtio-net.h"
   #include "hw/virtio/vhost-shadow-virtqueue.h"
   #include "hw/virtio/vhost-vdpa.h"
+#include "hw/virtio/vhost-shadow-virtqueue.h"
   #include "exec/address-spaces.h"
   #include "qemu/main-loop.h"
   #include "cpu.h"
@@ -475,6 +476,28 @@ static int vhost_vdpa_set_features(struct vhost_dev *dev,
       return vhost_vdpa_backend_set_features(dev, features);
   }

+/**
+ * Restore guest features to vdpa device
+ */
+static int vhost_vdpa_set_guest_features(struct vhost_dev *dev)
+{
+    struct vhost_vdpa *v = dev->opaque;
+    return vhost_vdpa_backend_set_features(dev, v->guest_features);
+}
+
+/**
+ * Set shadow virtqueue supported features
+ */
+static int vhost_vdpa_set_svq_features(struct vhost_dev *dev)
+{
+    struct vhost_vdpa *v = dev->opaque;
+    uint64_t features = v->host_features;
+    bool b = vhost_svq_valid_device_features(&features);
+    assert(b);
+
+    return vhost_vdpa_backend_set_features(dev, features);
+}
+
   static int vhost_vdpa_set_backend_cap(struct vhost_dev *dev)
   {
       uint64_t features;
@@ -730,6 +753,19 @@ static bool  vhost_vdpa_force_iommu(struct vhost_dev *dev)
       return true;
   }

+static int vhost_vdpa_vring_pause(struct vhost_dev *dev)
+{
+    int r;
+    uint8_t status;
+
+    vhost_vdpa_add_status(dev, VIRTIO_CONFIG_S_DEVICE_STOPPED);
+    do {
+        r = vhost_vdpa_call(dev, VHOST_VDPA_GET_STATUS, &status);

I guess we'd better add some sleep here.

If the final version still contains the call, I will add the sleep. At
the moment I think it's better if we stop the device by a vdpa ioctl.


Ok, so the idea is to sleep in the ioctl?



+    } while (r == 0 && !(status & VIRTIO_CONFIG_S_DEVICE_STOPPED));
+
+    return 0;
+}
+
   /*
    * Start shadow virtqueue.
    */
@@ -742,9 +778,29 @@ static bool vhost_vdpa_svq_start_vq(struct vhost_dev *dev, unsigned idx)
           .index = idx + dev->vq_index,
           .fd = event_notifier_get_fd(vhost_call_notifier),
       };
+    struct vhost_vring_addr addr = {
+        .index = idx + dev->vq_index,
+    };
+    struct vhost_vring_state num = {
+        .index = idx + dev->vq_index,
+        .num = virtio_queue_get_num(dev->vdev, idx),
+    };
       int r;
       bool b;

+    vhost_svq_get_vring_addr(svq, &addr);
+    r = vhost_vdpa_set_vring_addr(dev, &addr);
+    if (unlikely(r)) {
+        error_report("vhost_set_vring_addr for shadow vq failed");
+        return false;
+    }
+
+    r = vhost_vdpa_set_vring_num(dev, &num);
+    if (unlikely(r)) {
+        error_report("vhost_vdpa_set_vring_num for shadow vq failed");
+        return false;
+    }
+
       /* Set shadow vq -> guest notifier */
       assert(v->call_fd[idx]);
       vhost_svq_set_guest_call_notifier(svq, v->call_fd[idx]);
@@ -781,15 +837,32 @@ static unsigned vhost_vdpa_enable_svq(struct vhost_vdpa *v, bool enable)
           assert(v->shadow_vqs->len == 0);
           for (n = 0; n < hdev->nvqs; ++n) {
               VhostShadowVirtqueue *svq = vhost_svq_new(hdev, n);
-            bool ok;
-
               if (unlikely(!svq)) {
                   g_ptr_array_set_size(v->shadow_vqs, 0);
                   return 0;
               }
               g_ptr_array_add(v->shadow_vqs, svq);
+        }
+    }

-            ok = vhost_vdpa_svq_start_vq(hdev, n);
+    r = vhost_vdpa_vring_pause(hdev);
+    assert(r == 0);
+
+    if (enable) {
+        for (n = 0; n < v->shadow_vqs->len; ++n) {
+            /* Obtain Virtqueue state */
+            vhost_virtqueue_stop(hdev, hdev->vdev, &hdev->vqs[n], n);
+        }
+    }
+
+    /* Reset device so it can be configured */
+    r = vhost_vdpa_dev_start(hdev, false);
+    assert(r == 0);
+
+    if (enable) {
+        int r;
+        for (n = 0; n < v->shadow_vqs->len; ++n) {
+            bool ok = vhost_vdpa_svq_start_vq(hdev, n);
               if (unlikely(!ok)) {
                   /* Free still not started svqs */
                   g_ptr_array_set_size(v->shadow_vqs, n);
@@ -797,11 +870,19 @@ static unsigned vhost_vdpa_enable_svq(struct vhost_vdpa *v, bool enable)
                   break;
               }
           }
+
+        /* Need to ack features to set state in vp_vdpa devices */

vhost_vdpa actually?

Yes, what a mistake!

+        r = vhost_vdpa_set_svq_features(hdev);
+        if (unlikely(r)) {
+            enable = false;
+        }
       }

       v->shadow_vqs_enabled = enable;

       if (!enable) {
+        vhost_vdpa_set_guest_features(hdev);
+
           /* Disable all queues or clean up failed start */
           for (n = 0; n < v->shadow_vqs->len; ++n) {
               struct vhost_vring_file file = {
@@ -818,7 +899,12 @@ static unsigned vhost_vdpa_enable_svq(struct vhost_vdpa *v, bool enable)
               /* TODO: This can unmask or override call fd! */
               vhost_virtqueue_start(hdev, hdev->vdev, &hdev->vqs[n], vq_idx);
           }
+    }

+    r = vhost_vdpa_dev_start(hdev, true);
+    assert(r == 0);
+
+    if (!enable) {
           /* Resources cleanup */
           g_ptr_array_set_size(v->shadow_vqs, 0);
       }
@@ -831,6 +917,7 @@ void qmp_x_vhost_enable_shadow_vq(const char *name, bool enable, Error **errp)
       struct vhost_vdpa *v;
       const char *err_cause = NULL;
       bool r;
+    uint64_t svq_features;

       QLIST_FOREACH(v, &vhost_vdpa_devices, entry) {
           if (v->dev->vdev && 0 == strcmp(v->dev->vdev->name, name)) {
@@ -846,6 +933,20 @@ void qmp_x_vhost_enable_shadow_vq(const char *name, bool enable, Error **errp)
           goto err;
       }

+    svq_features = v->host_features;
+    if (!vhost_svq_valid_device_features(&svq_features)) {
+        error_setg(errp,
+            "Can't enable shadow vq on %s: Unexpected feature flags (%lx-%lx)",
+            name, v->host_features, svq_features);
+        return;
+    } else {
+        /* TODO: Check for virtio_vdpa + IOMMU & modern device */

I guess you mean "vhost_vdpa" here.
Yes, a similar mistake in less than 50 lines :).

For IOMMU, I guess you mean "vIOMMU"
actually?

This comment is out of date and inherited from the vhost version,
where only the IOMMU version was developed, so it will be deleted in
the next series. I think it makes little sense to check vIOMMU if we
stick with vDPA since it still does not support it, but we could make
the check here for sure.


Right.

Thanks



Thanks!

Thanks


+    }
+
+    if (err_cause) {
+        goto err;
+    }
+
       r = vhost_vdpa_enable_svq(v, enable);
       if (unlikely(!r)) {
           err_cause = "Error enabling (see monitor)";
@@ -853,7 +954,7 @@ void qmp_x_vhost_enable_shadow_vq(const char *name, bool enable, Error **errp)
       }

   err:
-    if (err_cause) {
+    if (errp == NULL && err_cause) {
           error_setg(errp, "Can't enable shadow vq on %s: %s", name, err_cause);
       }
   }

_______________________________________________
Virtualization mailing list
Virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linuxfoundation.org/mailman/listinfo/virtualization




[Index of Archives]     [KVM Development]     [Libvirt Development]     [Libvirt Users]     [CentOS Virtualization]     [Netdev]     [Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux