On Wed, Sep 20, 2017 at 05:30:59PM +0300, Denis Plotnikov wrote:
> the patch set is for
> 1. Replace Roman's patch avoiding async_pf injection while in the guest mode
> with
>the similar patch from the mainstream for kernel code consistency
> 2. Force a nested vmexit if the injected #PF is
From: Wanpeng Li
Adds another flag bit (bit 2) to MSR_KVM_ASYNC_PF_EN. If bit 2 is 1,
async page faults are delivered to L1 as #PF vmexits; if bit 2 is 0,
kvm_can_do_async_pf returns 0 if in guest mode.
This is similar to what svm.c wanted to do all along, but it is only
From: Wanpeng Li
INFO: task gnome-terminal-:1734 blocked for more than 120 seconds.
Not tainted 4.12.0-rc4+ #8
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
gnome-terminal- D0 1734 1015 0x
Call Trace:
From: Wanpeng Li
Add an nested_apf field to vcpu->arch.exception to identify an async page
fault, and constructs the expected vm-exit information fields. Force a
nested VM exit from nested_vmx_check_exception() if the injected #PF is
async page fault.
Cc: Paolo Bonzini
the patch set is for
1. Replace Roman's patch avoiding async_pf injection while in the guest mode
with
the similar patch from the mainstream for kernel code consistency
2. Force a nested vmexit if the injected #PF is async_pf
3. Let guest support delivery of async_pf from guest mode
Denis
From: Wanpeng Li
This patch adds the L1 guest async page fault #PF vmexit handler, such
by L1 similar to ordinary async page fault.
Cc: Paolo Bonzini
Cc: Radim Krčmář
Signed-off-by: Wanpeng Li
[Passed
This reverts commit 5173f45a28cdf3d5808e236eab882273a760a363.
The commit will be replaced with the mainstream commit which does
the same:
9bc1f09f6f KVM: async_pf: avoid async pf injection when in guest mode
This is done to make vzkernel look similar to the mainstream kernel with
all the
From: Wanpeng Li
WARNING: CPU: 3 PID: 2840 at arch/x86/kvm/vmx.c:10966
nested_vmx_vmexit+0xdcd/0xde0 [kvm_intel]
CPU: 3 PID: 2840 Comm: qemu-system-x86 Tainted: G OE 4.12.0-rc3+
#23
RIP: 0010:nested_vmx_vmexit+0xdcd/0xde0 [kvm_intel]
Call Trace:
?
From: Florian Westphal
Backport of commit 55285bf09427c5abf43ee1d54e892f352092b1f1.
Dmitry reports memleak with syskaller program.
Problem is that connector bumps skb usecount but might not invoke callback.
So move skb_get to where we invoke the callback.