From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [patch 00/12] User controlled virtual machines Date: Thu, 01 Dec 2011 15:10:58 +0200 Message-ID: <4ED77CE2.3050109@redhat.com> References: <20111201125732.085553111@de.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: Marcelo Tossati , Christian Borntraeger , Heiko Carstens , Martin Schwidefsky , Cornelia Huck , KVM , Joachim von Buttlar , Jens Freimann , Constantin Werner To: Carsten Otte Return-path: Received: from mx1.redhat.com ([209.132.183.28]:32043 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753646Ab1LANLG (ORCPT ); Thu, 1 Dec 2011 08:11:06 -0500 In-Reply-To: <20111201125732.085553111@de.ibm.com> Sender: kvm-owner@vger.kernel.org List-ID: On 12/01/2011 02:57 PM, Carsten Otte wrote: > Hi Avi, Hi Marcelo, > > this patch series introduces an interface to allow a privileged userspace > program to control a KVM virtual machine. The interface is intended for > use by a machine simulator called CECSIM that can simulate an entire > mainframe machine with nested virtualization and I/O for the purpose > of testing and debugging its firmware prior to availability of silicon. > This patchset allows for concurrent use of the KVM device driver to drive > both regular and user controlled virtual machines at the same time. > I would kindly like to ask for review and inclusion of these patches. So, this moves the responsibility of handling intercepts from the kernel to userspace, yes? How much of the kvm code continues to be active after this? Perhaps it makes sense to have a separate interface for this. -- error compiling committee.c: too many arguments to function