lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1a6a7948-37a1-e416-17df-346ebcfee95b@redhat.com>
Date:   Tue, 12 Nov 2019 11:05:06 +0100
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     Like Xu <like.xu@...ux.intel.com>
Cc:     Peter Zijlstra <peterz@...radead.org>,
        linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: Re: [PATCH v4 0/6] KVM: x86/vPMU: Efficiency optimization by reusing
 last created perf_event

On 12/11/19 07:08, Like Xu wrote:
> Hi Paolo,
> 
> On 2019/10/29 0:43, Peter Zijlstra wrote:
>> On Sun, Oct 27, 2019 at 06:52:37PM +0800, Like Xu wrote:
>>> For perf subsystem, please help review first two patches.
>>
>>> Like Xu (6):
>>>    perf/core: Provide a kernel-internal interface to recalibrate event
>>>      period
>>>    perf/core: Provide a kernel-internal interface to pause perf_event
>>
>> Acked-by: Peter Zijlstra (Intel) <peterz@...radead.org>
>>
> 
> Would you mind to revisit the following patches for upstream ?
> 
>>    KVM: x86/vPMU: Rename pmu_ops callbacks from msr_idx to rdpmc_ecx
>>    KVM: x86/vPMU: Introduce a new kvm_pmu_ops->msr_idx_to_pmc callback
>>    KVM: x86/vPMU: Reuse perf_event to avoid unnecessary
>>      pmc_reprogram_counter
>>    KVM: x86/vPMU: Add lazy mechanism to release perf_event per vPMC

Queued, thanks.

Paolo

> For vPMU, please review two more patches as well:
> +
> https://lore.kernel.org/kvm/20191030164418.2957-1-like.xu@linux.intel.com/
> (kvm)
> +
> https://lore.kernel.org/lkml/20191105140955.22504-1-like.xu@linux.intel.com/
> (perf)
> 
> Thanks,
> Like Xu
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ