On Wed, Dec 12, 2007 at 12:27:01PM +0100, Enrico Weigelt wrote:
No I'd like to request an feature for catching the console.
IMHO, it's enough to have an option to vzctl start, which tells
it to not to detach and bring the VE's console to the current tty.
Unfortunately this is much trickier
hyperv_vmbus.h | 92 +
> include/linux/hyperv.h | 1 +
> include/linux/kvm_host.h | 29 ++
> include/uapi/linux/kvm.h | 24 ++
> kernel/sched/cputime.c | 2 +
> virt/kvm/eventfd.c | 42 +-
> virt/kvm/irq
gt; Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
> Signed-off-by: Pavel Butsykin <pbutsy...@virtuozzo.com>
Reviewed-by: Roman Kagan <rka...@virtuozzo.com>
___
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel
de/uapi/asm/hyperv.h | 4 ++-
> arch/x86/kvm/hyperv.c | 50
> +++---
> arch/x86/kvm/svm.c | 3 +--
> arch/x86/kvm/vmx.c | 2 +-
> drivers/hv/hyperv_vmbus.h | 6 -
> include/uapi/linux/kvm.h
A couple of mainstream backports to fix debug register updates on vcpu
transitions to/from guest.
Supposed to fix, in particular, occasional misses of hardware
breakpoints (https://jira.sw.ru/browse/PSBM-50488).
Nadav Amit (1):
KVM: x86: DR0-DR3 are not clear on reset
Paolo Bonzini (1):
ons.
Signed-off-by: Nadav Amit <na...@cs.technion.ac.il>
Message-Id: <1427933438-12782-4-git-send-email-na...@cs.technion.ac.il>
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry picked from commit ae561edeb421fbc24f97df7af8607c14009c16b2)
Signed-off-by: Roman Kagan <rka...
te_dr*
functions.
Cc: sta...@vger.kernel.org # 4.1+
Fixes: 172b2386ed16a9143d9a456aae5ec87275c61489
Reviewed-by: Xiao Guangrong <guangrong.x...@linux.intel.com>
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry picked from commit 70e4da7a8ff62f2775337b705f45c804bb450454)
Sig
https://jira.sw.ru/browse/PSBM-58415
>
> Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Reviewed-by: Roman Kagan <rka...@virtuozzo.com>
___
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel
gt;
(cherry-picked from commit ad721883e9c5f46cc5fa9496bc12c097c6238b4a)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.h | 1 +
arch/x86/kvm/svm.c | 27 +
e9c0fe7c61)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.h | 1 -
arch/x86/kvm/svm.c | 8
arch/x86/kvm/vmx.c | 6 --
arch/x86/kvm/x86.c
is fixes KVM_GET_CLOCK/KVM_SET_CLOCK
which, after commit 108b249c453d ("KVM: x86: introduce get_kvmclock_ns",
2016-09-01) called read_l1_tsc while the VMCS was not loaded.
It thus returned bogus values on Intel CPUs.
Fixes: 108b249c453dd7132599ab6dc7e435a7036c193f
Reported-by: Roman Kagan <rka..
intel.com>
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry-picked from commit 4ba76538dd52dd9b18b464e509cb8f3ed4ed993f)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.
cessed in the common code.
Signed-off-by: Haozhong Zhang <haozhong.zh...@intel.com>
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry-picked from commit bc9b961b357ea8129d75613b7af4fdf57ced9b9f)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-
;
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry-picked from commit 07c1419a32bbba08cf1efb6d1ecaf24f174fa4c3)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.h | 1 -
arch/x
at.com>
(cherry-picked from commit 64903d6195cbfb051ce339d30848cc64babdba12)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/vmx.h | 4 +++-
arch/x86/kvm/vmx.c | 17 -
2 file
nzini <pbonz...@redhat.com>
(cherry-picked from commit 27cca94e032c1749825fdd9b6b379e4235cd52e1)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/x86.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
dif
picked from commit 8cfe9866960581303f244780945c5d12ecc4e5bc)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/vmx.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 9f3c26a..a03e7d9 100644
cherry-picked from commit a545ab6a0085e6df9c7b6e9734b40ba4d2aca8c9)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.h | 1 +
arch/x86/kvm/x86.c | 10 --
2 files changed
_u64_u64_shr. Remove
BUG_ON. - Paolo]
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry-picked from commit 35181e86df97e4223f4a28fb33e2bcf3b73de141)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x
cherry-picked from commit be7b263ea925324e54e48c3558d4719be5374053)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/vmx.c | 9 +
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/arch/x86/
uozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.h | 13 +
arch/x86/kvm/svm.c | 10 ++
arch/x86/kvm/vmx.c | 4 ++--
arch/x86/kvm/x86.c | 16 +++-
4 files changed, 20 insert
intel.com>
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry-picked from commit ff2c3a1803775cc72dc6f624b59554956396b0ee)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/vmx.c | 6 ++
1 file
tnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.h | 2 --
arch/x86/kvm/x86.c | 14 +++---
2 files changed, 7 insertions(+), 9 deletions(-)
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/i
nzini <pbonz...@redhat.com>
(cherry-picked from commit 381d585c80e34988269bd7901ad910981e900be1)
Signed-off-by: Denis Plotnikov <dplotni...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/asm/kvm_host.h | 1 -
arch/x
From: Denis Plotnikov
The set of patches:
1. adds tsc_scaling functionality for VMX
2. generalizes a number of functions responsible for tsc writing and
reading
3. fix VM pause/resume issue #PSBM-54338 by switching to using
of cached tsc_offset
Haozhong Zhang
n of continuous
> big skbs fails there.
>
> Restore the default behaviour to fix the problem.
>
> https://jira.sw.ru/browse/PSBM-52390
>
> Reported-by: Roman Kagan <rka...@virtuozzo.com>
> Signed-off-by: Kirill Tkhai <ktk...@virtuozzo.com&
The commit 108b249c453dd7132599ab6dc7e435a7036c193f introducing
get_kvmclock_ns was ported with a few omissions; this patch completes
the process.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/x86.c | 4 ++--
arch/x86/kvm/x86.h | 9 -
2 files changed, 2 inse
These two patches address #PSBM-54338, by making VMCS access only from
vCPU context.
Roman Kagan (2):
KVM:x86: remnants of get_kvmclock_ns port
KVM:x86: avoid VMCS access from non-vCPU context
---
NOTE: the bug is present in the mainline kernel. The patch has been
posted; please don't
Cc: Paolo Bonzini <pbonz...@redhat.com>
Upstream-Message-ID: <1477933936-3681-1-git-send-email-rka...@virtuozzo.com>
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/hyperv.c | 16 +++-
arch/x86/kvm/x86.c| 21 -
arch/x86/k
-by: Roman Kagan <rka...@virtuozzo.com>
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit 80e2a7bb8d7050d2ea6d8961c526a65d30d5eb08)
Fixes: PSBM-54491
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
The patch has been merged into kvm/queue but not
On Sat, Dec 03, 2016 at 11:22:26AM +0300, Dmitry Monakhov wrote:
>
> Pavel Tikhomirov writes:
>
> > https://jira.sw.ru/browse/PSBM-55105
> >
> > In bug we crashed in zero_fill_bio when trying to zero memset bio_vec:
> >
> > struct bio_vec {
> > bv_page =
on the SynIC message page and went to sleep, to never be
woken up again.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/irq_comm.c | 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/irq_comm.c b/arch/x86/kvm/irq_comm.c
index c2d61d8..2
is
resumed so the timer will be started then.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/hyperv.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c
index c8efdce3e702..ab9501c2f32c 100644
--- a/ar
d once (if) it's merged.
Roman.
>
> --
> Best regards,
>
> Konstantin Khorenko,
> Virtuozzo Linux Kernel Team
>
> On 07/19/2017 08:31 PM, Roman Kagan wrote:
> > If the SynIC timer message delivery fails due to SINT message slot being
> > busy, there's no point
, the
processing will be restarted upon notification from the guest that the
slot is released.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit f1ff89ec4447c4e39d275a1ca3de43eed2a92745)
---
v1 -> v2:
- act
ertions(+), 59 deletions(-)
Briefly skimmed through the series, and it looks OK to me.
Reviewed-by: Roman Kagan <rka...@virtuozzo.com>
___
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel
This reverts commit d385b9f5e7a4c225b1463655484daeebb1ca79dd.
It will be replaced by a backported mainstream commit with different
behavior.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/hyperv.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
, to avoid spamming error logs.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit d3457c877b14aaee8c52923eedf05a3b78af0476)
---
Documentation/virtual/kvm/api.txt | 9 +++
arch/x86/include/asm/kvm_host.h
ull in an intermediate upstream patch to minimize conflicts
Roman Kagan (3):
Revert "kvm/x86: clear hyperv synic pages only when guest modifies
MSRs"
kvm: x86: hyperv: add KVM_CAP_HYPERV_SYNIC2
kvm: x86: hyperv: make VP_INDEX managed by userspace
Wanpeng Li (1):
KVM: x86: f
t.ibm.com>
Signed-off-by: Christian Borntraeger <borntrae...@de.ibm.com>
[split patch from refactoring patch]
(cherry picked from commit db27a7a37aa0b1f8b373f8b0fb72a2ccaafb85b7)
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
include/linux/kvm_host.h | 11 +++
1 file changed, 11
ing a memory area for each vcpu.
Signed-off-by: Christoffer Dall <cd...@linaro.org>
Reviewed-by: Eric Auger <eric.au...@redhat.com>
(cherry picked from commit 497d72d80a789501501cccabdad6b145f9e31371)
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
include/linux/kvm_h
v code in QEMU to work properly.
v1 -> v2:
- replace incremental patch with a revert and a fresh backport
- pull in an intermediate upstream patch to minimize conflicts
Roman Kagan (3):
Revert "kvm/x86: clear hyperv synic pages only when guest modifies
MSRs"
kv
is fully managed by
QEMU, so zeroing them is undesirable even when writing the MSRs from the
guest side.
To support this new scheme, introduce a new capability,
KVM_CAP_HYPERV_SYNIC2, which, when enabled, makes sure that the synic
pages aren't zeroed out in KVM.
Signed-off-by: Roman Kagan <
This reverts commit d385b9f5e7a4c225b1463655484daeebb1ca79dd.
It will be replaced by a backported mainstream commit with different
behavior.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/hyperv.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
, to avoid spamming error logs.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit d3457c877b14aaee8c52923eedf05a3b78af0476)
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
Documentation/virtua
gt; v2:
- replace incremental patch with a revert and a fresh backport
- pull in an intermediate upstream patch to minimize conflicts
Christoffer Dall (1):
KVM: Add kvm_vcpu_get_idx to get vcpu index in kvm->vcpus
David Hildenbrand (1):
KVM: Provide function for VCPU lookup by id
Roman
On Thu, Oct 12, 2017 at 12:30:18PM +0300, Konstantin Khorenko wrote:
> arch/x86/kvm/hyperv.c: In function 'kvm_hv_vcpu_postcreate':
> arch/x86/kvm/hyperv.c:708:2: error: implicit declaration of function
> 'kvm_vcpu_get_idx' [-Werror=implicit-function-declaration]
> hv_vcpu->vp_index =
On Thu, Sep 07, 2017 at 04:41:11PM +0300, Konstantin Khorenko wrote:
> 1. Feature
>
> Optimization for zero-filled pages written by VMs
> https://jira.sw.ru/browse/PSBM-64658
>
> 2. Description
>
> Any page before being written to the physical swap is checked if it is filled
> by zeroes and
On Fri, Sep 29, 2017 at 12:02:37AM +0300, Denis Kirjanov wrote:
> On Thursday, September 28, 2017, Roman Kagan <rka...@virtuozzo.com> wrote:
> > On Thu, Sep 28, 2017 at 05:55:51PM +0300, Denis Kirjanov wrote:
> > > Hi, we're seeing double faults in async_page_fault.
On Fri, Sep 29, 2017 at 11:25:20AM +0300, Denis Kirjanov wrote:
> >> > > _Some_ of them related to the fact that during the faults RSP points
> >> > > to userspace and it leads to double-fault scenario.
> >> >
> >> > The postmortem you quote doesn't support that.
> >>
> >>
> >> I'll post a
, to avoid spamming error logs.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit d3457c877b14aaee8c52923eedf05a3b78af0476)
---
Documentation/virtual/kvm/api.txt | 9 +++
arch/x86/include/asm/kvm_host.h
is fully managed by
QEMU, so zeroing them is undesirable even when writing the MSRs from the
guest side.
To support this new scheme, introduce a new capability,
KVM_CAP_HYPERV_SYNIC2, which, when enabled, makes sure that the synic
pages aren't zeroed out in KVM.
Signed-off-by: Roman Kagan <
hould just be dropped, and this series be reworked as a
pure backport. Let me know if you want it this way.
The series is against branch 37.
Roman Kagan (2):
kvm: x86: hyperv: add KVM_CAP_HYPERV_SYNIC2
kvm: x86: hyperv: make VP_INDEX managed by userspace
Documentation/virtual/kvm/ap
: Paolo Bonzini <pbonz...@redhat.com>
Signed-off-by: Martin K. Petersen <martin.peter...@oracle.com>
(cherry picked from commit 44ed8089e991a60d614abe0ee4b9057a28b364e4)
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
VZ-Bug: PSBM-79523
---
drivers/virtio/virtio_ring.c | 5 +++--
1 fi
intel.com]
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit 7313c698050387a11c21afb0c6b4c61f21f7c042)
[rkagan: This is a missing part of the backport of async pagefault
machinery from mainstream; hopefully it fixes #PSBM-77171]
Signed-off-by: Roman Kagan <rka...@vi
kvm->srcu.
Reviewed-by: Roman Kagan
Signed-off-by: Paolo Bonzini
(cherry picked from commit 452a68d0ef341c4d544757e02154788227b2a08b)
Signed-off-by: Roman Kagan
---
arch/x86/kvm/hyperv.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/hyperv.c b/arch/x
oblem pertains to ESXi as well]
(cherry picked from commit d391f1207067268261add0485f0f34503539c5b0)
[rkagan: adjusted for vz7.7]
VZ-Bug: #PSBM-81462
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/vmx.c | 18 --
arch/x86/kvm/x86.c | 3 ++-
2 files changed,
On Tue, Feb 13, 2018 at 05:02:33PM +0300, Konstantin Khorenko wrote:
> Add a minimal kernel config:
> - localmodconfig done on a KVM VM
> - all options are set to "=y" where possible
What is it going to be use{d,ful} for?
Roman.
___
Devel mailing list
On Wed, Feb 14, 2018 at 01:47:42PM +0300, Konstantin Khorenko wrote:
> Makes sense to release it as a ReadyKernel patch?
I don't see any point in it: this only helps VZ nested in ESXi or
Hyper-V, which is probably used only in evaluation or demo scenarios.
I'm pretty confident we have zero
On Mon, Aug 13, 2018 at 12:57:17PM +0300, Roman Kagan wrote:
> commit 63aff65573d73eb8dda4732ad4ef222dd35e4862 upstream.
>
> VPID for the nested vcpu is allocated at vmx_create_vcpu whenever nested
> vmx is turned on with the module parameter.
>
> However, it's only freed i
.
Fixes: 5c614b3583e7b6dab0c86356fa36c2bcbb8322a0
Cc: sta...@vger.kernel.org
Signed-off-by: Roman Kagan
Signed-off-by: Paolo Bonzini
Signed-off-by: Greg Kroah-Hartman
(cherry picked from commit 020a90f653dd02dbbae389da91f510d5f33984dc)
Signed-off-by: Roman Kagan
---
arch/x86/kvm/vmx.c | 7
of supported ones.)
For details see (RHEL subscription required)
https://access.redhat.com/labs/psb/versions/kernel-3.10.0-862.el7/patches/x86-kvm-lapic-do-not-scan-IRR-when-delivering-an-interrupt?raw=true
Undo this breakage.
VZ-Bug: #PSBM-86431
Signed-off-by: Roman Kagan
---
arch/x86/kvm/lapic.c
Move kvm.arch.hyperv initialization and cleanup to separate functions.
For now only a mutex is inited in the former, and the latter is empty;
more stuff will go in there in a followup patch.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
Reviewed-by: David Hildenbrand <da...@r
r.kernel.org
Fixes: 0eb05bf290cfe8610d9680b49abef37febd1c38a
Reviewed-by: Xiao Guangrong <xiaoguangrong.e...@gmail.com>
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry picked from commit 2beb6dad2e8f95d710159d5befb390e4f62ab5cf)
Signed-off-by: Roman Kagan <rka...@virtuoz
Vitaly Kuznetsov <vkuzn...@redhat.com>
Reviewed-by: Roman Kagan <rka...@virtuozzo.com>
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit 915e6f78bd0641da692ffa7e0b766e633e12e628)
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/hyp
: hyperv: fix locking of struct kvm_hv fields
KVM: x86: cleanup the page tracking SRCU instance
Roman Kagan (2):
kvm: x86: factor out kvm.arch.hyperv (de)init
kvm: x86: hyperv: guest->host event signaling via eventfd
Vitaly Kuznetsov (2):
x86/kvm/hyper-v: remove stale entries from vec_bit
ted) IDR.
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
Reviewed-by: David Hildenbrand <da...@redhat.com>
[asm/hyperv.h changes approved by KY Srinivasan. - Radim]
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit faeb7833eee0d6afe0ecb6bdfa6042556c2c35
From: Paolo Bonzini <pbonz...@redhat.com>
Introduce a new mutex to avoid an AB-BA deadlock between kvm->lock and
vcpu->mutex. Protect accesses in kvm_hv_setup_tsc_page too, as suggested
by Roman.
Reported-by: Dmitry Vyukov <dvyu...@google.com>
Reviewed-by: Roman Kagan <
arpenter <dan.carpen...@oracle.com>
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
(cherry picked from commit d32ef547fdbbeb9c4351f9d3bc84dec998a3be8c)
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/kvm/hyperv.c | 15 +++
1 file changed, 7 insert
ed-by: Roman Kagan <rka...@virtuozzo.com>
Signed-off-by: Radim Krčmář <rkrc...@redhat.com>
(cherry picked from commit 98f65ad458441ea3a243395345811132ee850093)
Signed-off-by: Roman Kagan <rka...@virtuozzo.com>
---
arch/x86/include/uapi/asm/hyperv.h | 2 ++
arch/x86/
Rzeszutek Wilk
Reviewed-by: Wanpeng Li
Signed-off-by: Radim Krčmář
(cherry picked from commit 9b8ae63798cb97e785a667ff27e43fa6220cb734)
Signed-off-by: Roman Kagan
VZ-Bug: #PSBM-89859
---
arch/x86/include/asm/kvm_host.h | 3 ++-
arch/x86/kvm/vmx.c | 2 +-
2 files changed, 3 insert
ed-off-by: Radim Krčmář
(cherry picked from commit c4d2188206bafa177ea58e9a25b952baa0bf7712)
VZ-Bug: #PSBM-93016
Signed-off-by: Roman Kagan
---
arch/x86/kvm/x86.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 957280a6eb76..5c1a83
On Thu, Jun 06, 2019 at 03:11:10PM +0300, Denis Plotnikov wrote:
>
>
> On 06.06.2019 14:31, Roman Kagan wrote:
> > On Thu, Jun 06, 2019 at 11:36:45AM +0300, Denis Plotnikov wrote:
> >> This is done to prevent windows guest crashing while running
> >> PassMark
73 matches
Mail list logo