Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1130322ybb; Fri, 20 Mar 2020 14:00:14 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsU8XqaA180OcUQo/YWkaVE+3IyZszOe3nWFTjDYhhaTWoJ+q4BfwXWtJI7KAY4HpvJ5J0D X-Received: by 2002:aca:aa81:: with SMTP id t123mr8441721oie.117.1584738014864; Fri, 20 Mar 2020 14:00:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584738014; cv=none; d=google.com; s=arc-20160816; b=baTV1afdlDcdakGL7X+7QrNsHSgUyRB/6U7XwTF1TLU0oSBUoXpUks20i7kQuB5TIf a7qs426zHuc6kOnd/iZeuDoKwvpKx4wKjUtqOPTDU6KTFoyOric5c1ttFrIDygK0fNiX vBJETpDW0rhuqG5BRJRRrf/z4GB1DBCd4lha/LoajG1qTrShPbZQ35UVlQ6x8i/I0s40 VrL8wsJwgKNI6aZpRp7QKaNc2bKogiujZlcpAsMaVlLfcTj+GChSOUd7gTYXVUIoG6lE u6h5cu2Zw0Spe/U8H2GPfOlt90dfCljaQ/GtX/KI0sWRKzVckkfhfWDatVLasruSva6i Dmog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=8iI8IWPehZ1KW+x62OpAlz0HlN2gIEWJg2Hn2mzEzMA=; b=zkORzhSsmpBY8pi+IkysGyp5aV0Zm4G9Cc9oFUbtc/R0mjT9MWrwFhV1QnXVoLpumm hZcmm7RYyIuu2MM7OZzwnr2pksKfSpLJmmFoBQtzjpO+Iq72zFHFxFTKpAefj07wnut7 0PoA22cRNNuUfGFtA9DwyoffkgU6sSfHaBH51SRKMZJvCo0K158qWw1ZBlga33QglCDL ZhM8wXMDOubfxEeZrPmOYC+yjgpeXy1i5rXxKv8IS75UixDhlvp9ZP+UNhXw/XVpE6SE qwC0XMCLe1lw8+yx6mX60sHqw66yoLeAe8bquL9zVDaxt/4gHTMhGjvcKsEz8p3bS3Hx YIqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=jRZ4w7iR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e15si3202660oie.5.2020.03.20.14.00.01; Fri, 20 Mar 2020 14:00:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=jRZ4w7iR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726986AbgCTU70 (ORCPT + 99 others); Fri, 20 Mar 2020 16:59:26 -0400 Received: from mail.skyhub.de ([5.9.137.197]:37872 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726951AbgCTU7Z (ORCPT ); Fri, 20 Mar 2020 16:59:25 -0400 Received: from zn.tnic (p200300EC2F0A5A0095ADC0D452E3E28B.dip0.t-ipconnect.de [IPv6:2003:ec:2f0a:5a00:95ad:c0d4:52e3:e28b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 1043D1EC0570; Fri, 20 Mar 2020 21:59:22 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1584737962; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=8iI8IWPehZ1KW+x62OpAlz0HlN2gIEWJg2Hn2mzEzMA=; b=jRZ4w7iRJ1EiRXuIFuvaqqn9IbV3+wN+Q1T2vSEeDASwPUcW7/HiNd7GqP/3xfZa37ol+a kzD/Mi/5tK1eAWsYKFVeIu5C44Cp8X/ZtfqbmOWUX4chL2kEJHfSR0oq+Fgiw9+ENQ8DJC JyFt3DzmdDeh6DuYrhferPDmppBdrwA= Date: Fri, 20 Mar 2020 21:59:29 +0100 From: Borislav Petkov To: Alexey Makhalov Cc: linux-x86_64@vger.kernel.org, linux-kernel@vger.kernel.org, Jonathan Corbet , Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" , Mauro Carvalho Chehab , Josh Poimboeuf , Greg Kroah-Hartman , Pawan Gupta , Juergen Gross Subject: Re: [PATCH 0/5] x86/vmware: Steal time accounting support Message-ID: <20200320205929.GH23532@zn.tnic> References: <20200320203443.27742-1-amakhalov@vmware.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200320203443.27742-1-amakhalov@vmware.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 20, 2020 at 08:34:38PM +0000, Alexey Makhalov wrote: > Hello, > > This patchset introduces steal time accounting support for > the VMware guest. The idea and implementation of guest > steal time support is similar to KVM ones and it is based > on steal clock. The steal clock is a per CPU structure in > a shared memory between hypervisor and guest, initialized > by each CPU through hypercall. Steal clock is got updated > by the hypervisor and read by the guest. ... > Documentation/admin-guide/kernel-parameters.txt | 2 +- > arch/x86/kernel/cpu/vmware.c | 227 +++++++++++++++++++++++- > 2 files changed, 220 insertions(+), 9 deletions(-) Did you not see my reply to you the last time? https://marc.info/?l=linux-virtualization&m=158410546921328 -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette