Displaying 20 results from an estimated 2000 matches similar to: "[PATCH-cc-fixed] vhost: add missing architectures"
2009 Dec 17
0
[PATCH] vhost: add missing architectures
vhost is completely portable, but Kconfig include was missing for all
architectures besides x86, so it did not appear in the menu. Add the
relevant Kconfig includes to all architectures that support
virtualization.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
Hi Rusty,
please apply the following trivial fixup patch for 2.6.33.
Thanks!
arch/ia64/kvm/Kconfig | 1 +
2009 Dec 17
0
[PATCH] vhost: add missing architectures
vhost is completely portable, but Kconfig include was missing for all
architectures besides x86, so it did not appear in the menu. Add the
relevant Kconfig includes to all architectures that support
virtualization.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
Hi Rusty,
please apply the following trivial fixup patch for 2.6.33.
Thanks!
arch/ia64/kvm/Kconfig | 1 +
2009 Dec 20
0
[PATCH 3/3] vhost: make default mapping empty by default
vhost now validates each region with access_ok in calling process
context before access. Since this fails on a full 64 bit 1:1 mapping
that vhost had by default, we can't support such a mapping: users will
have to set up a table with real addresses that actually matches their
address space.
Make the default mapping empty.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
2009 Dec 20
0
[PATCH 3/3] vhost: make default mapping empty by default
vhost now validates each region with access_ok in calling process
context before access. Since this fails on a full 64 bit 1:1 mapping
that vhost had by default, we can't support such a mapping: users will
have to set up a table with real addresses that actually matches their
address space.
Make the default mapping empty.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
2009 Dec 20
0
[PATCH 1/3] vhost: prevent modification of an active ring
We don't support changing ring size or log base while ring is running.
If user violates these rules, he might get his memory silently
corrupted. It's better to be explicit, and fail such modification
attempts with an error.
To make these "vq running" checks in ioctl context robust, this patch
also moves all vq flushes to under device mutex.
Signed-off-by: Michael S. Tsirkin
2009 Dec 20
0
[PATCH 1/3] vhost: prevent modification of an active ring
We don't support changing ring size or log base while ring is running.
If user violates these rules, he might get his memory silently
corrupted. It's better to be explicit, and fail such modification
attempts with an error.
To make these "vq running" checks in ioctl context robust, this patch
also moves all vq flushes to under device mutex.
Signed-off-by: Michael S. Tsirkin
2009 Dec 24
1
[PATCH] vhost: access check thinko fixes
This fixes two issues with recent access checking patch:
1. if (&d->vqs[i].private_data) -> if (d->vqs[i].private_data)
2. we can't forbid log base changes while ring is running,
because host needs to resize log in rare cases
(e.g. when memory is added with a baloon)
and in that case it needs to increase log size with realloc,
which might move the log address.
2009 Dec 24
1
[PATCH] vhost: access check thinko fixes
This fixes two issues with recent access checking patch:
1. if (&d->vqs[i].private_data) -> if (d->vqs[i].private_data)
2. we can't forbid log base changes while ring is running,
because host needs to resize log in rare cases
(e.g. when memory is added with a baloon)
and in that case it needs to increase log size with realloc,
which might move the log address.
2009 Dec 20
0
[PATCH 2/3] vhost: add access_ok checks
On biarch kernels, it is not safe to do copy from/to user, even with use_mm,
unless we checked the address range with access_ok previously. Implement these
checks to enforce safe memory accesses.
Reported-by: Al Viro <viro at zeniv.linux.org.uk>
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
drivers/vhost/net.c | 17 ++++++-
drivers/vhost/vhost.c | 111
2009 Dec 20
0
[PATCH 2/3] vhost: add access_ok checks
On biarch kernels, it is not safe to do copy from/to user, even with use_mm,
unless we checked the address range with access_ok previously. Implement these
checks to enforce safe memory accesses.
Reported-by: Al Viro <viro at zeniv.linux.org.uk>
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
drivers/vhost/net.c | 17 ++++++-
drivers/vhost/vhost.c | 111
2011 Jul 05
1
[RFC] virtio: expose for non-virtualization users too
virtio has been so far used only in the context of virtualization,
and the virtio Kconfig was sourced directly by the relevant arch
Kconfigs when VIRTUALIZATION was selected.
Now that we start using virtio for inter-processor communications,
we need to source the virtio Kconfig outside of the virtualization
scope too.
Moreover, some architectures might use virtio for both virtualization
and
2011 Jul 05
1
[RFC] virtio: expose for non-virtualization users too
virtio has been so far used only in the context of virtualization,
and the virtio Kconfig was sourced directly by the relevant arch
Kconfigs when VIRTUALIZATION was selected.
Now that we start using virtio for inter-processor communications,
we need to source the virtio Kconfig outside of the virtualization
scope too.
Moreover, some architectures might use virtio for both virtualization
and
2012 Apr 14
1
[xapian] a bug fixed in brass_database.cc
Hi all,
I fixed a bug in brass_database.cc.
The bug is:
*FIXME: this should be done by checking memory usage, not the number of*
*changes. We could also look at the amount of data the inverter object*
*currently holds.*
I also modified the simpleindex.cc so that it now supports batch files
indexing.
--
Weixian Zhou
Department of Computer Science and Engineering
University at Buffalo, SUNY
2018 Aug 21
0
[ANNOUNCE] libX11 1.6.6
Alan Coopersmith (6):
Make Xkb{Get,Set}NamedIndicator spec & manpages match code
Clarify state parameter to XkbSetNamedDeviceIndicator
Improve table formatting in XkbChangeControls & XkbKeyNumGroups man pages
If XGetImage fails to create image, don't dereference it to bounds check
Use size_t for buffer sizes in SetHints.c
Change fall through comment
2020 Jun 10
0
CentOS-announce Digest, Vol 184, Issue 3
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2020 Jun 09
0
CESA-2020:2414 Important CentOS 7 unbound Security Update
CentOS Errata and Security Advisory 2020:2414 Important
Upstream details at : https://access.redhat.com/errata/RHSA-2020:2414
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
d7c7de939c7a3dbec81adf688ae2557ca2fc3f18498eb9c09b8896d3b73dd071 unbound-1.6.6-4.el7_8.x86_64.rpm
2020 Jun 23
0
CESA-2020:2642 Important CentOS 7 unbound Security Update
CentOS Errata and Security Advisory 2020:2642 Important
Upstream details at : https://access.redhat.com/errata/RHSA-2020:2642
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
1664066f33b5ffb6a1fd8099211332a04ca7a4e431db14135e8e98690fc582ef unbound-1.6.6-5.el7_8.x86_64.rpm
2008 May 20
3
IRC bot for cc.rb?
Hi all,
Don''t suppose there''s an IRC bot I can use (or repurpose) for cc.rb
notifications?
Will.
1998 Feb 10
0
gcc, not cc!
A non-text attachment was scrubbed...
Name: not available
Type: text
Size: 2371 bytes
Desc: not available
Url : http://lists.samba.org/archive/samba/attachments/19980209/7519d6a7/attachment.bat
2006 Oct 02
1
Omindex.cc BSD bug
Hi guys:
I was trying to index a large set of PDF documents using omindex
and the system started to run out of forks (sh: fork temporarily
unavailable) making the system unusable and probably skipping documents.
I'm using MAC Osx Server 10.4.3 (Darwin/BSD) and GCC 4.0.
The problem: On function stdout_to_string a popen is called, but is not
closed properly (according the popen