Alexander Graf writes:
> On 08.11.23 12:17, Nicolas Saenz Julienne wrote:
>> Prepare infrastructure to be able to return data through the XMM
>> registers when Hyper-V hypercalls are issues in fast mode. The XMM
>> registers are exposed to user-space through KVM_EXIT_HYPERV_HCALL and
>> restored
Nicolas Saenz Julienne writes:
> Hi Sean,
>
> On Sun Jun 9, 2024 at 3:49 PM UTC, Nicolas Saenz Julienne wrote:
>> This series introduces core KVM functionality necessary to emulate Hyper-V's
>> Virtual Secure Mode in a Virtual Machine Monitor (VMM).
>
> Just wanted to make sure the series is in y
Nicolas Saenz Julienne writes:
> Prepare infrastructure to be able to return data through the XMM
> registers when Hyper-V hypercalls are issues in fast mode. The XMM
> registers are exposed to user-space through KVM_EXIT_HYPERV_HCALL and
> restored on successful hypercall completion.
>
> Signed-
Nicolas Saenz Julienne writes:
> Hi Vitaly,
> Thanks for having a look at this.
>
> On Mon Jul 8, 2024 at 2:59 PM UTC, Vitaly Kuznetsov wrote:
>> Nicolas Saenz Julienne writes:
>>
>> > Prepare infrastructure to be able to return data through the XMM
>>
lantianyu1...@gmail.com writes:
> From: Tianyu Lan
>
> The struct hv_vp_assist_page was defined incorrectly.
> The "vtl_control" should be u64[3], "nested_enlightenments_control"
> should be a u64 and there is 7 reserved bytes following "enlighten_vmentry".
> This patch is to fix it.
>
> Signed-o
lantianyu1...@gmail.com writes:
> From: Tianyu Lan
>
> This patch adds new KVM cap KVM_CAP_HYPERV_DIRECT_TLBFLUSH and let
> user space to enable direct tlb flush function when only Hyper-V
> hypervsior capability is exposed to VM. This patch also adds
> enable_direct_tlbflush callback in the stru
lantianyu1...@gmail.com writes:
> From: Tianyu Lan
>
> This patchset is to add Hyper-V direct tlb support in KVM. Hyper-V
> in L0 can delegate L1 hypervisor to handle tlb flush request from
> L2 guest when direct tlb flush is enabled in L1.
>
> Patch 2 introduces new cap KVM_CAP_HYPERV_DIRECT_TLB
Tianyu Lan writes:
> On Tue, Aug 27, 2019 at 2:41 PM Vitaly Kuznetsov wrote:
>>
>> lantianyu1...@gmail.com writes:
>>
>> > From: Tianyu Lan
>> >
>> > This patchset is to add Hyper-V direct tlb support in KVM. Hyper-V
>> > in L0 ca
Tianyu Lan writes:
> On Tue, Aug 27, 2019 at 8:38 PM Vitaly Kuznetsov wrote:
>>
>> Tianyu Lan writes:
>>
>> > On Tue, Aug 27, 2019 at 2:41 PM Vitaly Kuznetsov
>> > wrote:
>> >>
>> >> lantianyu1...@gmail.com writes:
>> >&
KVM_CAP_HYPERV_DIRECT_TLBFLUSH.
>>
>> Tianyu Lan (2):
>> x86/Hyper-V: Fix definition of struct hv_vp_assist_page
>> KVM/Hyper-V: Add new KVM capability KVM_CAP_HYPERV_DIRECT_TLBFLUSH
>>
>> Vitaly Kuznetsov (1):
>> KVM/Hyper-V/VMX: Add direct tlb flush support
>>
CONFIG_MEMORY_HOTPLUG_DEFAULT_ONLINE specifies the default value for the
memory hotplug onlining policy. Add a command line parameter to make it
possible to override the default. It may come handy for debug and testing
purposes.
Signed-off-by: Vitaly Kuznetsov
---
Documentation/kernel
make memory hotplug work.
Signed-off-by: Vitaly Kuznetsov
---
Documentation/memory-hotplug.txt | 9 +
mm/Kconfig | 16
mm/memory_hotplug.c | 4
3 files changed, 25 insertions(+), 4 deletions(-)
diff --git a/Documentation/memory
This patchset continues the work I started with:
commit 31bc3858ea3ebcc3157b3f5f0e624c5962f5a7a6
Author: Vitaly Kuznetsov
Date: Tue Mar 15 14:56:48 2016 -0700
memory-hotplug: add automatic onlining policy for the newly added memory
Initially I was going to stop there and bring the policy
Andrew Morton writes:
> On Wed, 6 Apr 2016 15:45:10 +0200 Vitaly Kuznetsov
> wrote:
>
>> This patchset continues the work I started with:
>>
>> commit 31bc3858ea3ebcc3157b3f5f0e624c5962f5a7a6
>> Author: Vitaly Kuznetsov
>> Date: Tue Mar 15 14:56:
David Rientjes writes:
> On Wed, 6 Apr 2016, Andrew Morton wrote:
>
>> > This patchset continues the work I started with:
>> >
>> > commit 31bc3858ea3ebcc3157b3f5f0e624c5962f5a7a6
>> > Author: Vitaly Kuznetsov
>> > Date: Tue Mar 15 14:
David Rientjes writes:
> On Thu, 7 Apr 2016, Vitaly Kuznetsov wrote:
>
>> >> > This patchset continues the work I started with:
>> >> >
>> >> > commit 31bc3858ea3ebcc3157b3f5f0e624c5962f5a7a6
>> >> > Author
David Rientjes writes:
> On Tue, 19 Apr 2016, Vitaly Kuznetsov wrote:
>
>> > I'd personally disagree that we need more and more config options to take
>> > care of something that an initscript can easily do and most distros
>> > already have their own ini
tool I'm not sure about
other tools which might be doing the same.
I suggest we remember the "we don't break userspace" rule and revert for
4.7 while it's not too late.
This is a partial revert, useful hunks in drivers which do
page_ref_{sub,add,inc} instead of open coded
Christoph Hellwig writes:
> On Thu, Jun 16, 2016 at 11:22:46AM +0200, Vitaly Kuznetsov wrote:
>> _count -> _refcount rename in commit 0139aa7b7fa12 ("mm: rename _count,
>> field of the struct page, to _refcount") broke kdump. makedumpfile(8) does
>> stuff li
Michal Hocko writes:
> On Thu 16-06-16 12:30:16, Vitaly Kuznetsov wrote:
>> Christoph Hellwig writes:
>>
>> > On Thu, Jun 16, 2016 at 11:22:46AM +0200, Vitaly Kuznetsov wrote:
>> >> _count -> _refcount rename in commit 0139aa7b7fa12 ("mm: renam
Nikolas Wipper writes:
> On 10.10.24 10:57, Vitaly Kuznetsov wrote:
...
>>> int kvm_hv_vcpu_flush_tlb(struct kvm_vcpu *vcpu);
>>> +
>>> +static inline bool kvm_hv_vcpu_suspended(struct kvm_vcpu *vcpu)
>>> +{
>>> + return vcpu->a
Nikolas Wipper writes:
> Add API documentation for the new KVM_HYPERV_SET_TLB_FLUSH_INHIBIT ioctl.
>
> Signed-off-by: Nikolas Wipper
> ---
> Documentation/virt/kvm/api.rst | 41 ++
> 1 file changed, 41 insertions(+)
>
> diff --git a/Documentation/virt/kvm/api.rst
Nikolas Wipper writes:
> Introduce a new ioctl to control whether remote flushing via Hyper-V
> hyper-calls should be allowed on a vCPU. When the tlb_flush_inhibit bit is
> set, vCPUs attempting to flush the TLB of the inhibitied vCPU will be
> suspended until the bit is clearded.
>
> Signed-off-
Nikolas Wipper writes:
> Implement KVM_HYPERV_SET_TLB_FLUSH_INHIBIT for x86. Apart from setting/
> clearing the internal TLB flush inhibit flag this ioctl also wakes up
> vCPUs suspended and waiting on this vCPU.
>
> When the flag is set, a vCPU trying to flush the inhibited vCPUs TLB with
> a Hy
Nikolas Wipper writes:
> Introduce a suspension state for Hyper-V enlightened vCPUs. Microsoft's
> "Hypervisor Top Level Functional Specification" (TLFS) introduces this
> state as a "vCPU that is stopped on a instruction guest boundary, either
> explicitly or implicitly due to an intercept". The
y trusts '.platform' for kexec (see commit 278311e417be
("kexec, KEYS: Make use of platform keyring for signature verify"))
and dm-verity (see commit 6fce1f40e951 ("dm verity: add support for
signature verification with platform keyring")) so maybe changing the
default o
x27;. This may
come handy when the user has control over it, e.g. in a virtualized or a
cloud environment.
Suggested-by: Robert Holmes
Signed-off-by: Vitaly Kuznetsov
---
Documentation/admin-guide/module-signing.rst | 6 ++
kernel/module/Kconfig| 11 ++
Eric Snowberg writes:
>> On Jun 5, 2025, at 1:54 AM, Vitaly Kuznetsov wrote:
>>
>> 'certwrapper' offers _a_ solution which is great. It may, however, not
>> be very convenient to use when a user wants to re-use the same OS image
>> (e.g. provided by the
James Bottomley writes:
> On Thu, 2025-06-05 at 09:54 +0200, Vitaly Kuznetsov wrote:
>> One additional consideration is the fact that we already trust 'db'
>> for dm-verity (since 6fce1f40e951) and kexec (since 278311e417be) and
>> especially the later gives som
James Bottomley writes:
> On Tue, 2025-06-03 at 10:52 +0200, Vitaly Kuznetsov wrote:
>> James Bottomley writes:
> [...]
>> > Also, are you sure a config option is the right thing? Presumably
>> > Red Hat wants to limit its number of kernels and the design of
James Bottomley writes:
> On Mon, 2025-06-02 at 15:25 +0200, Vitaly Kuznetsov wrote:
>> This patch complements commit 278311e417be ("kexec, KEYS: Make use of
>> platform keyring for signature verify") and commit 6fce1f40e951
>> ("dm verity: add support for
James Bottomley writes:
> On Wed, 2025-06-04 at 17:01 +, Eric Snowberg wrote:
>> > On Jun 2, 2025, at 7:25 AM, Vitaly Kuznetsov
>> > The use-case: virtualized and cloud infrastructure generally
>> > provide an ability to customize SecureBoot variables, in
>
James Bottomley writes:
> On Thu, 2025-06-05 at 15:43 +0200, Vitaly Kuznetsov wrote:
>> James Bottomley writes:
>>
>> > On Thu, 2025-06-05 at 09:54 +0200, Vitaly Kuznetsov wrote:
>>
>> So far, I got two 'runtime' ideas:
>> - Observe MokLi
33 matches
Mail list logo