[PATCH 1/6] KVM: MMU: make spte_is_locklessly_modifiable() more clear

2013-01-30 Thread y
From: Gleb Natapov g...@redhat.com spte_is_locklessly_modifiable() checks that both SPTE_HOST_WRITEABLE and SPTE_MMU_WRITEABLE are present on spte. Make it more explicit. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/mmu.c |3 ++- 1 file changed, 2 insertions(+), 1

[PATCH 2/6] KVM: MMU: drop unneeded checks.

2013-01-30 Thread y
From: Gleb Natapov g...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/mmu.c |5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 2fa82b0..40737b3 100644 --- a/arch/x86/kvm/mmu.c +++

[PATCH 0/6] small cleanups in MMU code

2013-01-30 Thread y
From: Gleb Natapov g...@redhat.com Any of those should not change functionality. Gleb Natapov (6): KVM: MMU: make spte_is_locklessly_modifiable() more clear KVM: MMU: drop unneeded checks. KVM: MMU: set base_role.nxe during mmu initialization. KVM: MMU: drop superfluous min() call.

[PATCH 6/6] Revert KVM: MMU: split kvm_mmu_free_page

2013-01-30 Thread y
From: Gleb Natapov g...@redhat.com This reverts commit bd4c86eaa6ff10abc4e00d0f45d2a28b10b09df4. There is not user for kvm_mmu_isolate_page() any more. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/mmu.c | 21 +++-- 1 file changed, 3 insertions(+), 18

[PATCH 5/6] KVM: MMU: drop superfluous is_present_gpte() check.

2013-01-30 Thread y
From: Gleb Natapov g...@redhat.com Gust page walker puts only present ptes into ptes[] array. No need to check it again. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/paging_tmpl.h |3 --- 1 file changed, 3 deletions(-) diff --git a/arch/x86/kvm/paging_tmpl.h

[PATCH 4/6] KVM: MMU: drop superfluous min() call.

2013-01-30 Thread y
From: Gleb Natapov g...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/mmu.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 8028ac6..42ba85c 100644 --- a/arch/x86/kvm/mmu.c +++ b/arch/x86/kvm/mmu.c @@

[PATCH 3/6] KVM: MMU: set base_role.nxe during mmu initialization.

2013-01-30 Thread y
From: Gleb Natapov g...@redhat.com Move base_role.nxe initialisation to where all other roles are initialized. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/mmu.c |1 + arch/x86/kvm/x86.c |2 -- 2 files changed, 1 insertion(+), 2 deletions(-) diff --git

[PATCH] Fix SMEP issues

2011-08-09 Thread Yang, Wei Y
This patch fix kvm-unit-tests hanging and incorrect PT_ACCESSED_MASK bit set in the case of SMEP fault. Signed-off-by: Yang, Wei wei.y.y...@intel.com --- arch/x86/kvm/paging_tmpl.h | 22 +- 1 files changed, 13 insertions(+), 9 deletions(-) diff --git

RE: [PATCH kvm-unit-tests v2] access: check SMEP on prefetch pte path

2011-07-04 Thread Yang, Wei Y
-Original Message- From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of Xiao Guangrong Sent: Friday, July 01, 2011 4:06 PM To: Yang, Wei Y Cc: a...@redhat.com; kvm@vger.kernel.org Subject: Re: [PATCH kvm-unit-tests v2] access: check SMEP on prefetch pte

RE: [PATCH kvm-unit-tests] access: check SMEP on prefetch pte path

2011-06-24 Thread Yang, Wei Y
+void set_cr4_smep(int smep) +{ +unsigned long cr4 = read_cr4(); + +cr4 = ~CR4_SMEP_MASK; +if (smep) + cr4 |= CR4_SMEP_MASK; +write_cr4(cr4); +} + It can work if the box does not support SMEP? It will report unhandled exception 13 in access.out which we

[PATCH] Enable DRNG feature support for KVM

2011-06-13 Thread Yang, Wei Y
This patch exposes DRNG feature to KVM guests. The RDRAND instruction can provide software with sequences of random numbers generated from white noise. Signed-off-by: Yang, Wei wei.y.y...@intel.com --- arch/x86/kvm/x86.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git

[PATCH v8 1/4] Remove SMEP bit from CR4_RESERVED_BITS

2011-06-02 Thread Yang, Wei Y
This patch removes SMEP bit from CR4_RESERVED_BITS. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/include/asm/kvm_host.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff

[PATCH v8 3/4] Mask function7 ebx against host capability word9

2011-06-02 Thread Yang, Wei Y
This patch masks CPUID leaf 7 ebx against host capability word9. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 20 +++- 1 files changed, 19 insertions(+), 1

[PATCH v8 0/4] Enable SMEP feature support for KVM

2011-06-02 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. This patchset is based on Fenghua's SMEP patch series, as

[PATCH v8 2/4] Add SMEP support when setting CR4

2011-06-02 Thread Yang, Wei Y
This patch adds SMEP handling when setting CR4. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 15 +-- 1 files changed, 13 insertions(+), 2 deletions(-) diff

[PATCH v8 4/4] Add instruction fetch checking when walking guest page table

2011-06-02 Thread Yang, Wei Y
This patch adds instruction fetch checking when walking guest page table. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/paging_tmpl.h |9 - 1 files changed, 8

[PATCH v7 0/4] Enable SMEP feature support for KVM

2011-06-01 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. This patchset is based on Fenghua's SMEP patch series, as

[PATCH v7 1/4] Remove SMEP bit from CR4_RESERVED_BITS

2011-06-01 Thread Yang, Wei Y
This patch removes SMEP bit from CR4_RESERVED_BITS. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/include/asm/kvm_host.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff

[PATCH v7 2/4] Add SMEP support when setting CR4

2011-06-01 Thread Yang, Wei Y
This patch adds SMEP handling when setting CR4. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 15 +-- 1 files changed, 13 insertions(+), 2 deletions(-) diff

[PATCH v7 3/4] Mask function7 ebx against host capability word9

2011-06-01 Thread Yang, Wei Y
This patch masks CPUID leaf 7 ebx against host capability word9. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 21 - 1 files changed, 20 insertions(+), 1

[PATCH v7 4/4] Add instruction fetch checking when walking guest page table

2011-06-01 Thread Yang, Wei Y
This patch adds instruction fetch checking when walking guest page table. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/paging_tmpl.h |9 - 1 files changed, 8

[PATCH v7] Enable CPU SMEP feature for QEMU-KVM

2011-06-01 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in QEMU-KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. SMEP is identified by CPUID leaf 7 EBX[7], which is 0

[PATCH v6 3/4] Mask function7 ebx against host capability word9

2011-05-30 Thread Yang, Wei Y
This patch masks CPUID leaf 7 ebx against host capability word9. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 15 ++- 1 files changed, 14 insertions(+), 1

[PATCH v6 2/4] Add SMEP support when setting CR4

2011-05-30 Thread Yang, Wei Y
This patch adds SMEP handling when setting CR4. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 15 +-- 1 files changed, 13 insertions(+), 2 deletions(-) diff --git

[PATCH v6 4/4] Add instruction fetch checking when walking guest page table

2011-05-30 Thread Yang, Wei Y
This patch adds instruction fetch checking when walking guest page table. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/paging_tmpl.h |9 - 1 files changed, 8 insertions(+),

[PATCH v6] Enable CPU SMEP feature for QEMU-KVM

2011-05-30 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in QEMU-KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. SMEP is identified by CPUID leaf 7 EBX[7], which is 0

[PATCH v6 0/4] Enable SMEP feature support for KVM

2011-05-30 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. This patchset is based on Fenghua's SMEP patch series, as

[PATCH v6 1/4] Remove SMEP bit from CR4_RESERVED_BITS

2011-05-30 Thread Yang, Wei Y
This patch removes SMEP bit from CR4_RESERVED_BITS. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/include/asm/kvm_host.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff

[Patch v4 0/4] Enable SMEP feature support for kvm

2011-05-29 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. This patchset is based on Fenghua's SMEP patch series, as

[Patch v4 1/4] Add SMEP bit to CR4_RESERVED_BITS

2011-05-29 Thread Yang, Wei Y
This patch adds SMEP bit to CR4_RESERVED_BITS. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/include/asm/kvm_host.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git

[Patch v4 3/4] Mask function7 ebx against host capability word9

2011-05-29 Thread Yang, Wei Y
This patch masks CPUID leaf 7 ebx against host capability word9. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c |7 ++- 1 files changed, 6 insertions(+), 1 deletions(-)

[Patch v4 2/4] Add SMEP handling when setting CR4

2011-05-29 Thread Yang, Wei Y
This patch adds SMEP handling when setting CR4. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 15 +-- 1 files changed, 13 insertions(+), 2 deletions(-) diff

[PATCH v4] Enable CPU SMEP feature support for QEMU-KVM

2011-05-29 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in QEMU-KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. SMEP is identified by CPUID leaf 7 EBX[7], which is 0

[Patch v4 4/4] Add instruction fetch checking when walking guest page table

2011-05-29 Thread Yang, Wei Y
This patch adds instruction fetch checking when walking guest page table. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/paging_tmpl.h |9 - 1 files changed, 8 insertions(+),

[Patch v5 0/4] Enable SMEP feature support for kvm

2011-05-29 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. This patchset is based on Fenghua's SMEP patch series, as

[Patch v5 1/4] Remove SMEP bit from CR4_RESERVED_BITS

2011-05-29 Thread Yang, Wei Y
This patch removes SMEP bit from CR4_RESERVED_BITS. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/include/asm/kvm_host.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff

[Patch v5 2/4] Add SMEP handling when setting CR4

2011-05-29 Thread Yang, Wei Y
This patch adds SMEP handling when setting CR4. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c | 15 +-- 1 files changed, 13 insertions(+), 2 deletions(-) diff

[Patch v5 3/4] Mask function7 ebx against host capability word9

2011-05-29 Thread Yang, Wei Y
This patch masks CPUID leaf 7 ebx against host capability word9. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/x86.c |7 ++- 1 files changed, 6 insertions(+), 1 deletions(-)

[Patch v5 4/4] Add instruction fetch checking when walking guest page table

2011-05-29 Thread Yang, Wei Y
This patch adds instruction fetch checking when walking guest page table. Signed-off-by: Yang, Wei wei.y.y...@intel.com Signed-off-by: Shan, Haitao haitao.s...@intel.com Signed-off-by: Li, Xin xin...@intel.com --- arch/x86/kvm/paging_tmpl.h |9 - 1 files changed, 8

[PATCH v5] Enable CPU SMEP feature support for QEMU-KVM

2011-05-29 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in QEMU-KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. SMEP is identified by CPUID leaf 7 EBX[7], which is 0

[Patch v3] Enable CPU SMEP feature for KVM

2011-05-26 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. This patchset is based on Fenghua's SMEP patch series, as

[PATCH v3] Enable CPU SMEP feature support for QEMU-KVM

2011-05-26 Thread Yang, Wei Y
This patchset enables a new CPU feature SMEP (Supervisor Mode Execution Protection) in QEMU-KVM. SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published soon. SMEP is identified by CPUID leaf 7 EBX[7], which is 0

RE: [PATCH v2] Enable CPU SMEP feature for KVM

2011-05-22 Thread Yang, Wei Y
This patch matches with [PATCH v2] Enable CPU SMEP feature support for QEMU-KVM, no changes since v1. Enable newly documented SMEP (Supervisor Mode Execution Protection) CPU feature in KVM module. Intel new CPU supports SMEP (Supervisor Mode Execution Protection). SMEP prevents kernel

[PATCH v2] Enable CPU SMEP feature for KVM

2011-05-21 Thread Yang, Wei Y
This patch matches with [PATCH v2] Enable CPU SMEP feature support for QEMU-KVM, no changes since v1. Enable newly documented SMEP (Supervisor Mode Execution Protection) CPU feature in KVM module. Intel new CPU supports SMEP (Supervisor Mode Execution Protection). SMEP prevents kernel from

[PATCH] Enable CPU SMEP feature support for QEMU-KVM

2011-05-20 Thread Yang, Wei Y
Enable newly documented SMEP (Supervisor Mode Execution Protection) CPU feature for QEMU-KVM. Intel new CPU supports SMEP (Supervisor Mode Execution Protection). SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published

[PATCH] Enable CPU SMEP feature for KVM

2011-05-20 Thread Yang, Wei Y
Enable newly documented SMEP (Supervisor Mode Execution Protection) CPU feature in KVM module. Intel new CPU supports SMEP (Supervisor Mode Execution Protection). SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be published

[PATCH v2] Enable CPU SMEP feature support for QEMU-KVM

2011-05-20 Thread Yang, Wei Y
Enable newly documented SMEP (Supervisor Mode Execution Protection) CPU feature for QEMU-KVM. Intel new CPU supports SMEP (Supervisor Mode Execution Protection). SMEP prevents kernel from executing code in application. Updated Intel SDM describes this CPU feature. The document will be

[PATCH v7 09/12] Inject asynchronous page fault into a PV guest if page is swapped out.

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com Send async page fault to a PV guest if it accesses swapped out memory. Guest will choose another task to run upon receiving the fault. Allow async page fault injection only when guest is in user mode since otherwise guest may be in non-sleepable context and

[PATCH v7 11/12] Let host know whether the guest can handle async PF in non-userspace context.

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com If guest can detect that it runs in non-preemptable context it can handle async PFs at any time, so let host know that it can send async PF even if guest cpu is not in userspace. Acked-by: Rik van Riel r...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com

[PATCH v7 05/12] Move kvm_smp_prepare_boot_cpu() from kvmclock.c to kvm.c.

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com Async PF also needs to hook into smp_prepare_boot_cpu so move the hook into generic code. Acked-by: Rik van Riel r...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/include/asm/kvm_para.h |1 + arch/x86/kernel/kvm.c | 11

[PATCH v7 03/12] Retry fault before vmentry

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com When page is swapped in it is mapped into guest memory only after guest tries to access it again and generate another fault. To save this fault we can map it immediately since we know that guest is going to access the page. Do it only when tdp is enabled for

[PATCH v7 01/12] Add get_user_pages() variant that fails if major fault is required.

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com This patch add get_user_pages() variant that only succeeds if getting a reference to a page doesn't require major fault. Reviewed-by: Rik van Riel r...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com --- fs/ncpfs/mmap.c|2 ++ include/linux/mm.h

[PATCH v7 12/12] Send async PF when guest is not in userspace too.

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com If guest indicates that it can handle async pf in kernel mode too send it, but only if interrupts are enabled. Acked-by: Rik van Riel r...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/x86.c |3 ++- 1 files changed, 2

[PATCH v7 02/12] Halt vcpu if page it tries to access is swapped out.

2010-10-14 Thread y
---help--- diff --git a/arch/x86/kvm/Makefile b/arch/x86/kvm/Makefile index 31a7035..c53bf19 100644 --- a/arch/x86/kvm/Makefile +++ b/arch/x86/kvm/Makefile @@ -9,6 +9,7 @@ kvm-y += $(addprefix ../../../virt/kvm/, kvm_main.o ioapic.o

[PATCH v7 00/12] KVM: Add host swap event notifications for PV guest

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com KVM virtualizes guest memory by means of shadow pages or HW assistance like NPT/EPT. Not all memory used by a guest is mapped into the guest address space or even present in a host memory at any given time. When vcpu tries to access memory page that is not

[PATCH v7 08/12] Handle async PF in a guest.

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com When async PF capability is detected hook up special page fault handler that will handle async page fault events and bypass other page faults to regular page fault handler. Also add async PF handling to nested SVM emulation. Async PF always generates exit to L1

[PATCH v7 10/12] Handle async PF in non preemptable context

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com If async page fault is received by idle task or when preemp_count is not zero guest cannot reschedule, so do sti; hlt and wait for page to be ready. vcpu can still process interrupts while it waits for the page to be ready. Acked-by: Rik van Riel

[PATCH v7 06/12] Add PV MSR to enable asynchronous page faults delivery.

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com Guest enables async PF vcpu functionality using this MSR. Reviewed-by: Rik van Riel r...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com --- Documentation/kvm/cpuid.txt |3 +++ Documentation/kvm/msr.txt | 36

[PATCH v7 04/12] Add memory slot versioning and use it to provide fast guest write interface

2010-10-14 Thread y
From: Gleb Natapov g...@redhat.com Keep track of memslots changes by keeping generation number in memslots structure. Provide kvm_write_guest_cached() function that skips gfn_to_hva() translation if memslots was not changed since previous invocation. Acked-by: Rik van Riel r...@redhat.com

kvm guest reseting incoming connection

2010-10-05 Thread Alexander Y. Fomichev
works as expected. on the other side seems like outgoing tcp sessions aren't affected. I'm stuck. No ideia where it come from and how to debug :( any ideas? -- Best regards.        Alexander Y. Fomichev git.u...@gmail.com -- To unsubscribe from this list: send the line unsubscribe kvm in the body

Optometrists - 63,837 records 2,015 emails

2010-04-18 Thread Elaine Y Freeman
To get additional details, samples and counts for our USA contact data please email me at this address allyson.hairs...@alwaysgood. co.cc we have lots of different lists in many fields and this week is the time to buy with lowered list prices. to subtract your address from our databa#se