Re: [PATCH v1 2/4] KVM: PPC: Book3S HV: track shared GFNs of secure VMs

2020-06-05 Thread Ram Pai
> >diff --git a/arch/powerpc/kvm/book3s_64_mmu_radix.c > >b/arch/powerpc/kvm/book3s_64_mmu_radix.c > >index 803940d..3448459 100644 > >--- a/arch/powerpc/kvm/book3s_64_mmu_radix.c > >+++ b/arch/powerpc/kvm/book3s_64_mmu_radix.c > >@@ -1100,7 +1100,7 @@ void kvmppc_radix_flush_memslot(struct kvm *k

Re: [PATCH v1 2/4] KVM: PPC: Book3S HV: track shared GFNs of secure VMs

2020-06-05 Thread Laurent Dufour
Le 31/05/2020 à 04:27, Ram Pai a écrit : During the life of SVM, its GFNs can transition from secure to shared state and vice-versa. Since the kernel does not track GFNs that are shared, it is not possible to disambiguate a shared GFN from a GFN whose PFN has not yet been migrated to a device-PFN

Re: [PATCH v1 2/4] KVM: PPC: Book3S HV: track shared GFNs of secure VMs

2020-05-31 Thread kbuild test robot
Hi Ram, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on powerpc/next] [also build test WARNING on v5.7 next-20200529] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system. BTW, we also suggest to use '--base' option t

[PATCH v1 2/4] KVM: PPC: Book3S HV: track shared GFNs of secure VMs

2020-05-30 Thread Ram Pai
During the life of SVM, its GFNs can transition from secure to shared state and vice-versa. Since the kernel does not track GFNs that are shared, it is not possible to disambiguate a shared GFN from a GFN whose PFN has not yet been migrated to a device-PFN. The ability to identify a shared GFN is