Searched hist:a2e164e7f45ab21742b2e32c0195b699ae2ebfc0 (Results 1 – 3 of 3) sorted by relevance
/openbmc/linux/arch/x86/kvm/ |
H A D | hyperv.c | diff a2e164e7f45ab21742b2e32c0195b699ae2ebfc0 Thu Mar 01 08:15:12 CST 2018 Vitaly Kuznetsov <vkuznets@redhat.com> x86/kvm/hyper-v: add reenlightenment MSRs support
Nested Hyper-V/Windows guest running on top of KVM will use TSC page clocksource in two cases: - L0 exposes invariant TSC (CPUID.80000007H:EDX[8]). - L0 provides Hyper-V Reenlightenment support (CPUID.40000003H:EAX[13]).
Exposing invariant TSC effectively blocks migration to hosts with different TSC frequencies, providing reenlightenment support will be needed when we start migrating nested workloads.
Implement rudimentary support for reenlightenment MSRs. For now, these are just read/write MSRs with no effect.
Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Reviewed-by: Roman Kagan <rkagan@virtuozzo.com> Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
|
H A D | x86.c | diff a2e164e7f45ab21742b2e32c0195b699ae2ebfc0 Thu Mar 01 08:15:12 CST 2018 Vitaly Kuznetsov <vkuznets@redhat.com> x86/kvm/hyper-v: add reenlightenment MSRs support
Nested Hyper-V/Windows guest running on top of KVM will use TSC page clocksource in two cases: - L0 exposes invariant TSC (CPUID.80000007H:EDX[8]). - L0 provides Hyper-V Reenlightenment support (CPUID.40000003H:EAX[13]).
Exposing invariant TSC effectively blocks migration to hosts with different TSC frequencies, providing reenlightenment support will be needed when we start migrating nested workloads.
Implement rudimentary support for reenlightenment MSRs. For now, these are just read/write MSRs with no effect.
Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Reviewed-by: Roman Kagan <rkagan@virtuozzo.com> Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | kvm_host.h | diff a2e164e7f45ab21742b2e32c0195b699ae2ebfc0 Thu Mar 01 08:15:12 CST 2018 Vitaly Kuznetsov <vkuznets@redhat.com> x86/kvm/hyper-v: add reenlightenment MSRs support
Nested Hyper-V/Windows guest running on top of KVM will use TSC page clocksource in two cases: - L0 exposes invariant TSC (CPUID.80000007H:EDX[8]). - L0 provides Hyper-V Reenlightenment support (CPUID.40000003H:EAX[13]).
Exposing invariant TSC effectively blocks migration to hosts with different TSC frequencies, providing reenlightenment support will be needed when we start migrating nested workloads.
Implement rudimentary support for reenlightenment MSRs. For now, these are just read/write MSRs with no effect.
Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Reviewed-by: Roman Kagan <rkagan@virtuozzo.com> Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
|