From: Tianyu Lan Sent: Wednesday, September 26, 2018 8:50 PM
>
> Hyper-V provides HvFlushGuestAddressList() hypercall to flush EPT tlb
> with specified ranges. This patch is to add the hypercall support.
>
> Signed-off-by: Lan Tianyu
>
Looks good!
Reviewed-by: Michael Kelley
___
From: YueHaibing Sent: Sunday, September 23, 2018 1:20
AM
> Remove including that don't need it.
>
> Signed-off-by: YueHaibing
> ---
> arch/x86/hyperv/hv_apic.c | 1 -
> 1 file changed, 1 deletion(-)
>
Reviewed-by: Michael Kelley
___
devel mail
From: Tianyu Lan Sent: Thursday, September 20, 2018 7:30 AM
> On 9/20/2018 12:08 AM, Michael Kelley (EOSG) wrote:
> > From: Tianyu Lan Sent: Monday, September 17, 2018 8:19 PM
> >> +
> >> + if (ret &&
From: Tianyu Lan Sent: Monday, September 17, 2018 8:19 PM
>
> #include
> #include
> #include
> #include
> +#include
Hopefully asm/kvm_host.h does not need to be #included, given
the new code structure.
>
> #include
>
> +/*
> + * MAX_FLUSH_PAGES = "additional_pages" + 1. It's limite
From: Tianyu Lan Sent: Monday, September 17, 2018 8:19 PM
> +
> + if (ret && kvm_available_flush_tlb_with_range()) {
> + kvm_flush_remote_tlbs_with_address(kvm,
> + gfn_start,
> +
From: Tianyu Lan Sent: Monday, September 17, 2018 8:18 PM
>
> +static void kvm_flush_remote_tlbs_with_range(struct kvm *kvm,
> + struct kvm_tlb_range *range)
> +{
> + int ret = -ENOTSUPP;
> +
> + if (range && kvm_x86_ops->tlb_remote_flush_with_range) {
> + /*
> +
From: Dexuan Cui Sent: Tuesday, September 18, 2018 3:30 PM
>
> A Generatin-2 Linux VM on Hyper-V doesn't have the legacy PCI bus, and
> users always see the scary warning, which is actually harmless. The patch
> is made to suppress the warning.
>
> Signed-off-by: Dexuan Cui
> Cc: K. Y. Sriniva
From Sebastian Andrzej Siewior Sent: Thursday, August 30, 2018 12:55 AM
>
> On !RT the header file get_irq_regs() gets pulled in via other header files.
> On
> RT it does not and the build fails:
>
> drivers/hv/vmbus_drv.c:975 implicit declaration of function
> ‘get_irq_regs’ [-
> Werror=
From: Tianyu Lan Sent: Monday, September 10, 2018 1:39 AM
> +
> +int hyperv_flush_guest_mapping_range(u64 as, struct kvm_tlb_range *range)
I'm really concerned about defining the Hyper-V function to flush
guest mappings in terms of a KVM struct definition. Your patch puts
this function in arch/x
From: KY Srinivasan Sent: Thursday, August 30, 2018 11:51 AM
> > + /* Allocate percpu VP index */
> > + hv_vp_index = kmalloc_array(num_possible_cpus(),
> > sizeof(*hv_vp_index),
> > + GFP_KERNEL);
> > + if (!hv_vp_index)
> > + return 1;
> > +
> We sh
From: KY Srinivasan Sent: Thursday, August 30, 2018 11:23 AM
> > +/*
> > + * This file contains definitions from the Hyper-V Hypervisor Top-Level
> > + * Functional Specification (TLFS):
> > + *
> > https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/tlfs
> > +
> A lot of
From: Vitaly Kuznetsov Sent: Wednesday, August 1, 2018
2:26 AM
> > I was trying to decide if there are any arguments in favor of one
> > approach vs. the other: a per-cpu flag in memory or checking
> > the synic_control "enable" bit. Seems like a wash to me, in which
> > case I have a slight
From: Stephen Hemminger Sent: Tuesday, August 14,
2018 9:35 AM
> On Mon, 13 Aug 2018 19:30:50 +
> "Michael Kelley (EOSG)" wrote:
>
> > > +/*
> > > + * Return a matching hv_vmbus_device_id pointer.
> > > + * If there is no match, retu
From: k...@linuxonhyperv.com Sent: Friday, August 10,
2018 4:06 PM
> From: Stephen Hemminger
>
> Add support for overriding the default driver for a VMBus device
> in the same way that it can be done for PCI devices. This patch
> adds the /sys/bus/vmbus/devices/.../driver_override file
> and
From: k...@linuxonhyperv.com Sent: Friday, August 10,
2018 4:06 PM
>
> Fix a bug in the key delete code - the num_records range
> from 0 to num_records-1.
>
> Signed-off-by: K. Y. Srinivasan
> Reported-by: David Binderman
> Cc:
> ---
Reviewed-by: Michael Kelley
From: Vitaly Kuznetsov Sent: Tuesday, July 31, 2018 4:20
AM
>
> Reviewed-by: Vitaly Kuznetsov
Thanks for the review
>
> Alternatively, we can get rid of synic_initialized flag altogether:
> hv_synic_init() never fails in the first place but we can always
> implement something like:
>
> int
From: Dexuan Cui Sent: Thursday, July 12, 2018 10:53 PM
>
> Before setting channel->rescind in vmbus_rescind_cleanup(), we should make
> sure the channel callback won't run any more, otherwise a high-level
> driver like pci_hyperv, which may be infinitely waiting for the host VSP's
> response and
From: Sunil Muthuswamy Sent: Wednesday, July 11, 2018 9:59 AM
> Thanks, Michael. In which branch should I fix these now that the changes have
> been
> merged with the char-misc-next branch?
If the original code is already in char-misc-next, you should probably submit a
completely new patch for ch
>From k...@linuxonhyperv.com Sent: Saturday, July 7,
>2018 7:57 PM
>
> From: Sunil Muthuswamy
>
> In the VM mode on Hyper-V, currently, when the kernel panics, an error
> code and few register values are populated in an MSR and the Hypervisor
> notified. This information is collected on the h
From: Tianyu Lan Monday, July 9, 2018 2:03 AM
> Hyper-V supports a pv hypercall HvFlushGuestPhysicalAddressSpace to
> flush nested VM address space mapping in l1 hypervisor and it's to
> reduce overhead of flushing ept tlb among vcpus. This patch is to
> implement it.
>
> Signed-off-by: Lan Tiany
From: Vitaly Kuznetsov Monday, July 9, 2018 10:40 AM
> Commit 1268ed0c474a ("x86/hyper-v: Fix the circular dependency in IPI
> enlightenment") pre-filled hv_vp_index with VP_INVAL so it is now
> (theoretically) possible to observe hv_cpu_number_to_vp_number()
> returning VP_INVAL. We need to che
From: Vitaly Kuznetsov Monday, July 9, 2018 10:40 AM
> Commit 1268ed0c474a ("x86/hyper-v: Fix the circular dependency in IPI
> enlightenment") made cpumask_to_vpset() return '-1' when there is a CPU
> with unknown VP index in the supplied set. This needs to be checked before
> we pass 'nr_bank' to
.@canonical.com;
> jasow...@redhat.com; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Subject: RE: [PATCH 1/1] X86/Hyper-V:: Fix the circular dependency in IPI
> enlightenment.
>
> On Fri, 6 Jul 2018, Thomas Gleixner wrote:
> > On Fri, 6
; ; H. Peter Anvin ; Tianyu Lan
> ; Michael Kelley (EOSG)
>
> Subject: [PATCH 3/4] x86/hyper-v: use cheaper HVCALL_SEND_IPI hypercall when
> possible
>
> When there is no need to send an IPI to a CPU with VP number > 64
> we can do the job with fast HVCALL_SEND_
; ; H. Peter Anvin ; Tianyu Lan
> ; Michael Kelley (EOSG)
>
> Subject: [PATCH 2/4] x86/hyper-v: use 'fast' hypercall for HVCALL_SEND_IPI
>
> Current Hyper-V TLFS (v5.0b) claims that HvCallSendSyntheticClusterIpi
> hypercall can't be 'fast' (passing pa
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Vitaly Kuznetsov
> Sent: Friday, June 15, 2018 9:30 AM
> To: x...@kernel.org
> Cc: de...@linuxdriverproject.org; linux-ker...@vger.kernel.org; KY Srinivasan
> ; Haiyang Zhang ; Stephen
> Hemminger
> ; Thomas
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Tianyu Lan
> Sent: Monday, June 4, 2018 2:08 AM
> Cc: Tianyu Lan ; KY Srinivasan
> ; Haiyang
> Zhang ; Stephen Hemminger ;
> t...@linutronix.de; mi...@redhat.com; h...@zytor.com; x...@kernel.org;
> pbonz...@
> From: Dexuan Cui
> Sent: Tuesday, May 29, 2018 12:58 PM
> Subject: RE: [PATCH] PCI: hv: Do not wait forever on a device that has
> disappeared
>
> > From: Michael Kelley (EOSG)
> > Sent: Monday, May 28, 2018 17:19
> >
> > While this patch solves the im
>
> Before the guest finishes the device initialization, the device can be
> removed anytime by the host, and after that the host won't respond to
> the guest's request, so the guest should be prepared to handle this
> case.
>
> Signed-off-by: Dexuan Cui
> Cc: Stephen Hemminger
> Cc: K. Y. Srin
> > -#define hv_init_timer(timer, tick) wrmsrl(timer, tick)
> > -#define hv_init_timer_config(config, val) wrmsrl(config, val)
> > +#define hv_init_timer(timer, tick) \
> > + wrmsrl(HV_X64_MSR_STIMER0_COUNT + (2*timer), tick)
> > +#define hv_init_timer_config(timer, val) \
> > + wrmsrl(HV_X64_M
t...@linutronix.de; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Cc: KY Srinivasan
> Subject: [PATCH V2 5/5] X86: Hyper-V: Consolidate the allocation of the
> hypercall input page
>
> From: "K. Y. Srinivasan"
>
&
t...@linutronix.de; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Cc: KY Srinivasan
> Subject: [PATCH V2 4/5] X86: Hyper-V: Consolidate code for converting cpumask
> to vpset
>
> From: "K. Y. Srinivasan"
>
> Consolidat
t...@linutronix.de; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Cc: KY Srinivasan
> Subject: [PATCH V2 3/5] X86: Hyper-V: Enhanced IPI enlightenment
>
> From: "K. Y. Srinivasan"
>
> Support enhanced IPI enlightenments
t...@linutronix.de; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Cc: KY Srinivasan
> Subject: [PATCH V2 2/5] X86: Hyper-V: Enable IPI enlightenments
>
> From: "K. Y. Srinivasan"
>
> Hyper-V supports hypercalls to implem
t...@linutronix.de; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Cc: KY Srinivasan
> Subject: [PATCH V2 1/5] X86: Hyper-V: Enlighten APIC access
>
> From: "K. Y. Srinivasan"
>
> Hyper-V supports MSR based APIC access;
On Wed, 25 Apr 2018, KY Srinivasan wrote:
>
> +struct ipi_arg_ex {
> + u32 vector;
> + u32 reserved;
> + struct hv_vpset vp_set;
> +};
Again, suggest moving to hyperv-tlfs.h. And the 5.0b version
of the TLFS has:
u32 vector;
u8 targetvtl;
t; t...@linutronix.de; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Cc: KY Srinivasan
> Subject: [PATCH 2/5] X86: Hyper-V: Enable IPI enlightenments
>
> From: "K. Y. Srinivasan"
>
> Hyper-V supports hypercalls to implem
t; t...@linutronix.de; h...@zytor.com; Stephen Hemminger
> ;
> Michael Kelley (EOSG) ; vkuzn...@redhat.com
> Cc: KY Srinivasan
> Subject: [PATCH 1/5] X86: Hyper-V: Enlighten APIC access
>
> From: "K. Y. Srinivasan"
>
> Hyper-V supports MSR based APIC access;
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Long Li
> Sent: Thursday, April 19, 2018 2:54 PM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen
> Hemminger ; James E . J . Bottomley
> ;
> Martin K . Petersen ;
> de...@linuxdriverproject.org; linux-
> s
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Long Li
> Sent: Tuesday, March 27, 2018 5:49 PM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen
> Hemminger ; James E . J . Bottomley
> ;
> Martin K . Petersen ;
> de...@linuxdriverproject.org; linux-
> s.
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Long Li
> Sent: Tuesday, March 27, 2018 5:49 PM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen
> Hemminger ; James E . J . Bottomley
> ;
> Martin K . Petersen ;
> de...@linuxdriverproject.org; linux-
> s.
> -Original Message-
> From: Greg KH
> Sent: Wednesday, April 4, 2018 1:16 AM
> To: Michael Kelley (EOSG)
> Cc: linux-ker...@vger.kernel.org; de...@linuxdriverproject.org;
> o...@aepfle.de;
> a...@canonical.com; vkuzn...@redhat.com; jasow...@redhat.com;
> leann
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Long Li
> Sent: Thursday, March 22, 2018 2:47 PM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen
> Hemminger ; James E . J . Bottomley
> ;
> Martin K . Petersen ;
> de...@linuxdriverproject.org; linux-
> s
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Haiyang Zhang
> Sent: Thursday, March 22, 2018 12:01 PM
> To: da...@davemloft.net; net...@vger.kernel.org
> Cc: Haiyang Zhang ; KY Srinivasan
> ; Stephen
> Hemminger ; o...@aepfle.de; vkuzn...@redhat.com;
>
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of KY Srinivasan
> Sent: Sunday, March 18, 2018 8:02 PM
> To: Arvind Yadav ; Stephen Hemminger
> ; Haiyang Zhang
> Cc: de...@linuxdriverproject.org; linux-ker...@vger.kernel.org
> Subject: RE: [PATCH] vmbus: us
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Jia-Ju Bai
> Sent: Sunday, March 18, 2018 7:53 AM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen
> Hemminger ; bhelg...@google.com
> Cc: de...@linuxdriverproject.org; linux-...@vger.kernel.org;
> linux-ker
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Jia-Ju Bai
> Sent: Sunday, March 18, 2018 7:53 AM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen
> Hemminger ; bhelg...@google.com
> Cc: de...@linuxdriverproject.org; linux-...@vger.kernel.org;
> linux-ker
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Arvind Yadav
> Sent: Saturday, March 17, 2018 11:48 PM
> To: Stephen Hemminger ; Haiyang Zhang
>
> Cc: linux-ker...@vger.kernel.org; de...@linuxdriverproject.org
> Subject: [PATCH] vmbus: use put_device() if
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Long Li
> Sent: Thursday, March 15, 2018 4:52 PM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen
> Hemminger ; James E . J . Bottomley
> ;
> Martin K . Petersen ;
> de...@linuxdriverproject.org; linux-
> s
> -Original Message-
> From: Sridhar Pitchai
> Sent: Wednesday, March 14, 2018 11:08 AM
> To: Lorenzo Pieralisi ; Michael Kelley (EOSG)
>
> Cc: Bjorn Helgaas ; Jake Oshins ;
> Haiyang
> Zhang ; Stephen Hemminger ;
> Dexuan
> Cui ; KY Srinivasan ;
> de
kernel.org; driverdev-devel@linuxdriverproject.org;
> Haiyang Zhang
> ; vkuzn...@redhat.com; marcelo.ce...@canonical.com;
> Michael
> Kelley (EOSG) ; Dexuan Cui
> ; Jack
> Morgenstein ; sta...@vger.kernel.org
> Subject: [PATCH v3 3/6] PCI: hv: serialize the present/eject work it
kernel.org; driverdev-devel@linuxdriverproject.org;
> Haiyang Zhang
> ; vkuzn...@redhat.com; marcelo.ce...@canonical.com;
> Michael
> Kelley (EOSG) ; Dexuan Cui
> ; Jack
> Morgenstein ; sta...@vger.kernel.org
> Subject: [PATCH v3 2/6] PCI: hv: hv_eject_device_work(): remov
kernel.org; driverdev-devel@linuxdriverproject.org;
> Haiyang Zhang
> ; vkuzn...@redhat.com; marcelo.ce...@canonical.com;
> Michael
> Kelley (EOSG) ; Dexuan Cui
> ;
> sta...@vger.kernel.org; Jack Morgenstein
> Subject: [PATCH v3 6/6] PCI: hv: fix 2 hang issues in hv_compose_
kernel.org; driverdev-devel@linuxdriverproject.org;
> Haiyang Zhang
> ; vkuzn...@redhat.com; marcelo.ce...@canonical.com;
> Michael
> Kelley (EOSG) ; Dexuan Cui
> ; Jack
> Morgenstein ; sta...@vger.kernel.org
> Subject: [PATCH v3 5/6] PCI: hv: hv_pci_devices_present(): only qu
kernel.org; driverdev-devel@linuxdriverproject.org;
> Haiyang Zhang
> ; vkuzn...@redhat.com; marcelo.ce...@canonical.com;
> Michael
> Kelley (EOSG) ; Dexuan Cui
> ; Jack
> Morgenstein ; sta...@vger.kernel.org
> Subject: [PATCH v3 4/6] PCI: hv: remove hbus->enum_sem
>
>
kernel.org; driverdev-devel@linuxdriverproject.org;
> Haiyang Zhang
> ; vkuzn...@redhat.com; marcelo.ce...@canonical.com;
> Michael
> Kelley (EOSG) ; Dexuan Cui
> ; Jack
> Morgenstein ; sta...@vger.kernel.org
> Subject: [PATCH v2 5/6] PCI: hv: hv_pci_devices_present(): only queue
> -Original Message-
> From: linux-kernel-ow...@vger.kernel.org
> On Behalf
> Of Dexuan Cui
> Sent: Friday, March 2, 2018 4:21 PM
> To: bhelg...@google.com; linux-...@vger.kernel.org; KY Srinivasan
> ;
> Stephen Hemminger
> Cc: linux-ker...@vger.kernel.org; driverdev-devel@linuxdriverpr
com; vkuzn...@redhat.com; jasow...@redhat.com;
> leann.ogasaw...@canonical.com; marcelo.ce...@canonical.com; Stephen Hemminger
> ; Michael Kelley (EOSG)
>
> Subject: Re: [PATCH 08/12] Drivers: hv: vmbus: Implement Direct Mode for
> stimer0
>
> On Sun, Feb 11, 2018 at 05:33:
> -Original Message-
> From: Stephen Hemminger
> Sent: Tuesday, February 13, 2018 9:35 AM
> To: Michael Kelley
> Cc: Michael Kelley (EOSG) ;
> gre...@linuxfoundation.org;
> linux-ker...@vger.kernel.org; de...@linuxdriverproject.org; o...@aepfle.de;
> a
> -Original Message-
> From: KY Srinivasan
> Sent: Sunday, February 11, 2018 5:14 PM
--- snip ---
> > if (rbi->ring_buffer->feature_bits.feat_pending_send_sz) {
> > u32 pending_sz = READ_ONCE(rbi->ring_buffer-
> > >pending_send_sz);
> >
> > /*
> > +
> From: Long Li
> Sent: Wednesday, January 31, 2018 12:23 PM
> To: Michael Kelley (EOSG) ; KY Srinivasan
> ; Stephen Hemminger ;
> martin.peter...@oracle.com; de...@linuxdriverproject.org;
> linux-ker...@vger.kernel.org;
> linux-s...@vger.kernel.org; James E . J . Bottomley
From: Michael Kelley
The 2016 version of Hyper-V offers the option to operate the guest VM
per-vcpu stimer's in Direct Mode, which means the timer interupts on its
own vector rather than queueing a VMbus message. Direct Mode reduces
timer processing overhead in both the hypervisor and the guest,
From: Michael Kelley
The 2016 version of Hyper-V offers the option to operate the guest VM
per-vcpu stimer's in Direct Mode, which means the timer interupts on its
own vector rather than queueing a VMbus message. Direct Mode reduces
timer processing overhead in both the hypervisor and the guest,
> -Original Message-
> From: Greg KH [mailto:gre...@linuxfoundation.org]
> Sent: Thursday, January 25, 2018 2:00 AM
> To: Michael Kelley (EOSG)
> Cc: linux-ker...@vger.kernel.org; de...@linuxdriverproject.org;
> o...@aepfle.de;
> a...@canonical.com; vkuzn
Increase cmd_per_lun to allow more I/Os in progress per device,
particularly for NVMe's. The Hyper-V host side can handle the
higher count with no issues.
Signed-off-by: Michael Kelley
---
drivers/scsi/storvsc_drv.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/scs
Updated/corrected two email addresses ...
> -Original Message-
> From: Michael Kelley (EOSG)
> Sent: Wednesday, January 24, 2018 2:14 PM
> To: KY Srinivasan ; Stephen Hemminger
> ;
> martin.peter...@oracle.com; lo...@microsoft.com; jbottom...@odin.com;
> de...@l
Update the algorithm in storvsc_do_io to look for a channel
starting with the current CPU + 1 and wrap around (within the
current NUMA node). This spreads VMbus interrupts more evenly
across CPUs. Previous code always started with first CPU in
the current NUMA node, skewing the interrupt load to th
Vitaly Kuznetsov writes:
>
> > "Michael Kelley (EOSG)" writes:
> >
> >> On Fri, 19 Jan 2018, Thomas Gleixner wrote:
> >>
> >>>
> >>> You added '#include ' to mshyperv.h which is included
> >>> in
&
rg; Stephen Hemminger ; Radim Krčmář
> ; Haiyang Zhang ; linux-
> ker...@vger.kernel.org; de...@linuxdriverproject.org; Michael Kelley (EOSG)
> ; Ingo Molnar ; Roman Kagan
> ; Andy Lutomirski ; H. Peter Anvin
> ; Paolo Bonzini ; Mohammed Gamal
>
> Subject: Re: [PATCH v3 3/7]
Thomas
> Gleixner ; Ingo Molnar ; H. Peter Anvin
> ; KY Srinivasan ; Haiyang Zhang
> ; Stephen Hemminger ; Michael
> Kelley (EOSG) ; Andy Lutomirski
> ;
> Mohammed Gamal ; Cathy Avery ; linux-
> ker...@vger.kernel.org; de...@linuxdriverproject.org
> Subject: [PATCH 3/6] x86/hype
Thomas Gleixner writes:
> On Tue, 31 Oct 2017, mikel...@exchange.microsoft.com wrote:
> > diff --git a/arch/x86/include/uapi/asm/hyperv.h
> > b/arch/x86/include/uapi/asm/hyperv.h
> > index f65d125..408cf3e 100644
> > --- a/arch/x86/include/uapi/asm/hyperv.h
> > +++ b/arch/x86/include/uapi/asm/hyp
Vitaly Kuznetsov writes:
> Vitaly Kuznetsov writes:
>
> > mikel...@exchange.microsoft.com writes:
> >
> >> From: Michael Kelley
> >>
> >> The 2016 version of Hyper-V offers the option to operate the guest VM
> >> per-vcpu stimer's in Direct Mode, which means the timer interupts on
> >> its own
It's fixed.
Michael
-Original Message-
From: Thomas Gleixner [mailto:t...@linutronix.de]
Sent: Wednesday, November 1, 2017 9:20 AM
To: Michael Kelley (EOSG)
Cc: gre...@linuxfoundation.org; LKML ;
de...@linuxdriverproject.org; o...@aepfle.de; a...@canonical.com;
vkuzn...@redha
73 matches
Mail list logo