1. 22 6月, 2021 1 次提交
  2. 17 4月, 2021 4 次提交
  3. 07 4月, 2021 4 次提交
  4. 25 3月, 2021 1 次提交
  5. 19 3月, 2021 4 次提交
  6. 18 3月, 2021 3 次提交
  7. 09 2月, 2021 1 次提交
    • V
      KVM: Raise the maximum number of user memslots · 4fc096a9
      Vitaly Kuznetsov 提交于
      Current KVM_USER_MEM_SLOTS limits are arch specific (512 on Power, 509 on x86,
      32 on s390, 16 on MIPS) but they don't really need to be. Memory slots are
      allocated dynamically in KVM when added so the only real limitation is
      'id_to_index' array which is 'short'. We don't have any other
      KVM_MEM_SLOTS_NUM/KVM_USER_MEM_SLOTS-sized statically defined structures.
      
      Low KVM_USER_MEM_SLOTS can be a limiting factor for some configurations.
      In particular, when QEMU tries to start a Windows guest with Hyper-V SynIC
      enabled and e.g. 256 vCPUs the limit is hit as SynIC requires two pages per
      vCPU and the guest is free to pick any GFN for each of them, this fragments
      memslots as QEMU wants to have a separate memslot for each of these pages
      (which are supposed to act as 'overlay' pages).
      Signed-off-by: NVitaly Kuznetsov <vkuznets@redhat.com>
      Message-Id: <20210127175731.2020089-3-vkuznets@redhat.com>
      Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
      4fc096a9
  8. 26 1月, 2021 1 次提交
  9. 22 12月, 2020 3 次提交
  10. 04 12月, 2020 2 次提交
  11. 01 12月, 2020 1 次提交
    • M
      KVM: arm64: Advertise ID_AA64PFR0_EL1.CSV3=1 if the CPUs are Meltdown-safe · 4f1df628
      Marc Zyngier 提交于
      Cores that predate the introduction of ID_AA64PFR0_EL1.CSV3 to
      the ARMv8 architecture have this field set to 0, even of some of
      them are not affected by the vulnerability.
      
      The kernel maintains a list of unaffected cores (A53, A55 and a few
      others) so that it doesn't impose an expensive mitigation uncessarily.
      
      As we do for CSV2, let's expose the CSV3 property to guests that run
      on HW that is effectively not vulnerable. This can be reset to zero
      by writing to the ID register from userspace, ensuring that VMs can
      be migrated despite the new property being set.
      Reported-by: NWill Deacon <will@kernel.org>
      Signed-off-by: NMarc Zyngier <maz@kernel.org>
      4f1df628
  12. 28 11月, 2020 3 次提交
  13. 27 11月, 2020 1 次提交
  14. 13 11月, 2020 1 次提交
  15. 10 11月, 2020 8 次提交
  16. 30 10月, 2020 1 次提交
  17. 30 9月, 2020 1 次提交