Re: [Devel] [PATCH 0/6] backporting async_pf injection functionality

2017-09-20 Thread Roman Kagan
On Wed, Sep 20, 2017 at 05:30:59PM +0300, Denis Plotnikov wrote: > the patch set is for > 1. Replace Roman's patch avoiding async_pf injection while in the guest mode > with >the similar patch from the mainstream for kernel code consistency > 2. Force a nested vmexit if the injected #PF is

[Devel] [PATCH 6/6] KVM: async_pf: Let guest support delivery of async_pf from guest mode

2017-09-20 Thread Denis Plotnikov
From: Wanpeng Li Adds another flag bit (bit 2) to MSR_KVM_ASYNC_PF_EN. If bit 2 is 1, async page faults are delivered to L1 as #PF vmexits; if bit 2 is 0, kvm_can_do_async_pf returns 0 if in guest mode. This is similar to what svm.c wanted to do all along, but it is only

[Devel] [PATCH 5/6] KVM: async_pf: avoid async pf injection when in guest mode

2017-09-20 Thread Denis Plotnikov
From: Wanpeng Li INFO: task gnome-terminal-:1734 blocked for more than 120 seconds. Not tainted 4.12.0-rc4+ #8 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. gnome-terminal- D0 1734 1015 0x Call Trace:

[Devel] [PATCH 3/6] KVM: async_pf: Force a nested vmexit if the injected #PF is async_pf

2017-09-20 Thread Denis Plotnikov
From: Wanpeng Li Add an nested_apf field to vcpu->arch.exception to identify an async page fault, and constructs the expected vm-exit information fields. Force a nested VM exit from nested_vmx_check_exception() if the injected #PF is async page fault. Cc: Paolo Bonzini

[Devel] [PATCH 0/6] backporting async_pf injection functionality

2017-09-20 Thread Denis Plotnikov
the patch set is for 1. Replace Roman's patch avoiding async_pf injection while in the guest mode with the similar patch from the mainstream for kernel code consistency 2. Force a nested vmexit if the injected #PF is async_pf 3. Let guest support delivery of async_pf from guest mode Denis

[Devel] [PATCH 2/6] KVM: async_pf: Add L1 guest async_pf #PF vmexit handler

2017-09-20 Thread Denis Plotnikov
From: Wanpeng Li This patch adds the L1 guest async page fault #PF vmexit handler, such by L1 similar to ordinary async page fault. Cc: Paolo Bonzini Cc: Radim Krčmář Signed-off-by: Wanpeng Li [Passed

[Devel] [PATCH 4/6] Revert "kvm/x86: skip async_pf when in guest mode"

2017-09-20 Thread Denis Plotnikov
This reverts commit 5173f45a28cdf3d5808e236eab882273a760a363. The commit will be replaced with the mainstream commit which does the same: 9bc1f09f6f KVM: async_pf: avoid async pf injection when in guest mode This is done to make vzkernel look similar to the mainstream kernel with all the

[Devel] [PATCH 1/6] KVM: nVMX: Fix exception injection

2017-09-20 Thread Denis Plotnikov
From: Wanpeng Li WARNING: CPU: 3 PID: 2840 at arch/x86/kvm/vmx.c:10966 nested_vmx_vmexit+0xdcd/0xde0 [kvm_intel] CPU: 3 PID: 2840 Comm: qemu-system-x86 Tainted: G OE 4.12.0-rc3+ #23 RIP: 0010:nested_vmx_vmexit+0xdcd/0xde0 [kvm_intel] Call Trace: ?

[Devel] [PATCH] connector: bump skb->users before callback invocation

2017-09-20 Thread Stanislav Kinsburskiy
From: Florian Westphal Backport of commit 55285bf09427c5abf43ee1d54e892f352092b1f1. Dmitry reports memleak with syskaller program. Problem is that connector bumps skb usecount but might not invoke callback. So move skb_get to where we invoke the callback.