similar to: [PATCH-cc-fixed] vhost: add missing architectures

Displaying 20 results from an estimated 2000 matches similar to: "[PATCH-cc-fixed] vhost: add missing architectures"

2009 Dec 17
0
[PATCH] vhost: add missing architectures
vhost is completely portable, but Kconfig include was missing for all architectures besides x86, so it did not appear in the menu. Add the relevant Kconfig includes to all architectures that support virtualization. Signed-off-by: Michael S. Tsirkin <mst at redhat.com> --- Hi Rusty, please apply the following trivial fixup patch for 2.6.33. Thanks! arch/ia64/kvm/Kconfig | 1 +
2009 Dec 17
0
[PATCH] vhost: add missing architectures
vhost is completely portable, but Kconfig include was missing for all architectures besides x86, so it did not appear in the menu. Add the relevant Kconfig includes to all architectures that support virtualization. Signed-off-by: Michael S. Tsirkin <mst at redhat.com> --- Hi Rusty, please apply the following trivial fixup patch for 2.6.33. Thanks! arch/ia64/kvm/Kconfig | 1 +
2009 Dec 20
0
[PATCH 3/3] vhost: make default mapping empty by default
vhost now validates each region with access_ok in calling process context before access. Since this fails on a full 64 bit 1:1 mapping that vhost had by default, we can't support such a mapping: users will have to set up a table with real addresses that actually matches their address space. Make the default mapping empty. Signed-off-by: Michael S. Tsirkin <mst at redhat.com> ---
2009 Dec 20
0
[PATCH 3/3] vhost: make default mapping empty by default
vhost now validates each region with access_ok in calling process context before access. Since this fails on a full 64 bit 1:1 mapping that vhost had by default, we can't support such a mapping: users will have to set up a table with real addresses that actually matches their address space. Make the default mapping empty. Signed-off-by: Michael S. Tsirkin <mst at redhat.com> ---
2009 Dec 20
0
[PATCH 1/3] vhost: prevent modification of an active ring
We don't support changing ring size or log base while ring is running. If user violates these rules, he might get his memory silently corrupted. It's better to be explicit, and fail such modification attempts with an error. To make these "vq running" checks in ioctl context robust, this patch also moves all vq flushes to under device mutex. Signed-off-by: Michael S. Tsirkin
2009 Dec 20
0
[PATCH 1/3] vhost: prevent modification of an active ring
We don't support changing ring size or log base while ring is running. If user violates these rules, he might get his memory silently corrupted. It's better to be explicit, and fail such modification attempts with an error. To make these "vq running" checks in ioctl context robust, this patch also moves all vq flushes to under device mutex. Signed-off-by: Michael S. Tsirkin
2009 Dec 24
1
[PATCH] vhost: access check thinko fixes
This fixes two issues with recent access checking patch: 1. if (&d->vqs[i].private_data) -> if (d->vqs[i].private_data) 2. we can't forbid log base changes while ring is running, because host needs to resize log in rare cases (e.g. when memory is added with a baloon) and in that case it needs to increase log size with realloc, which might move the log address.
2009 Dec 24
1
[PATCH] vhost: access check thinko fixes
This fixes two issues with recent access checking patch: 1. if (&d->vqs[i].private_data) -> if (d->vqs[i].private_data) 2. we can't forbid log base changes while ring is running, because host needs to resize log in rare cases (e.g. when memory is added with a baloon) and in that case it needs to increase log size with realloc, which might move the log address.
2009 Dec 20
0
[PATCH 2/3] vhost: add access_ok checks
On biarch kernels, it is not safe to do copy from/to user, even with use_mm, unless we checked the address range with access_ok previously. Implement these checks to enforce safe memory accesses. Reported-by: Al Viro <viro at zeniv.linux.org.uk> Signed-off-by: Michael S. Tsirkin <mst at redhat.com> --- drivers/vhost/net.c | 17 ++++++- drivers/vhost/vhost.c | 111
2009 Dec 20
0
[PATCH 2/3] vhost: add access_ok checks
On biarch kernels, it is not safe to do copy from/to user, even with use_mm, unless we checked the address range with access_ok previously. Implement these checks to enforce safe memory accesses. Reported-by: Al Viro <viro at zeniv.linux.org.uk> Signed-off-by: Michael S. Tsirkin <mst at redhat.com> --- drivers/vhost/net.c | 17 ++++++- drivers/vhost/vhost.c | 111
2011 Jul 05
1
[RFC] virtio: expose for non-virtualization users too
virtio has been so far used only in the context of virtualization, and the virtio Kconfig was sourced directly by the relevant arch Kconfigs when VIRTUALIZATION was selected. Now that we start using virtio for inter-processor communications, we need to source the virtio Kconfig outside of the virtualization scope too. Moreover, some architectures might use virtio for both virtualization and
2011 Jul 05
1
[RFC] virtio: expose for non-virtualization users too
virtio has been so far used only in the context of virtualization, and the virtio Kconfig was sourced directly by the relevant arch Kconfigs when VIRTUALIZATION was selected. Now that we start using virtio for inter-processor communications, we need to source the virtio Kconfig outside of the virtualization scope too. Moreover, some architectures might use virtio for both virtualization and
2012 Apr 14
1
[xapian] a bug fixed in brass_database.cc
Hi all, I fixed a bug in brass_database.cc. The bug is: *FIXME: this should be done by checking memory usage, not the number of* *changes. We could also look at the amount of data the inverter object* *currently holds.* I also modified the simpleindex.cc so that it now supports batch files indexing. -- Weixian Zhou Department of Computer Science and Engineering University at Buffalo, SUNY
2018 Aug 21
0
[ANNOUNCE] libX11 1.6.6
Alan Coopersmith (6): Make Xkb{Get,Set}NamedIndicator spec & manpages match code Clarify state parameter to XkbSetNamedDeviceIndicator Improve table formatting in XkbChangeControls & XkbKeyNumGroups man pages If XGetImage fails to create image, don't dereference it to bounds check Use size_t for buffer sizes in SetHints.c Change fall through comment
2020 Jun 10
0
CentOS-announce Digest, Vol 184, Issue 3
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2020 Jun 09
0
CESA-2020:2414 Important CentOS 7 unbound Security Update
CentOS Errata and Security Advisory 2020:2414 Important Upstream details at : https://access.redhat.com/errata/RHSA-2020:2414 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: d7c7de939c7a3dbec81adf688ae2557ca2fc3f18498eb9c09b8896d3b73dd071 unbound-1.6.6-4.el7_8.x86_64.rpm
2020 Jun 23
0
CESA-2020:2642 Important CentOS 7 unbound Security Update
CentOS Errata and Security Advisory 2020:2642 Important Upstream details at : https://access.redhat.com/errata/RHSA-2020:2642 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 1664066f33b5ffb6a1fd8099211332a04ca7a4e431db14135e8e98690fc582ef unbound-1.6.6-5.el7_8.x86_64.rpm
2008 May 20
3
IRC bot for cc.rb?
Hi all, Don''t suppose there''s an IRC bot I can use (or repurpose) for cc.rb notifications? Will.
1998 Feb 10
0
gcc, not cc!
A non-text attachment was scrubbed... Name: not available Type: text Size: 2371 bytes Desc: not available Url : http://lists.samba.org/archive/samba/attachments/19980209/7519d6a7/attachment.bat
2006 Oct 02
1
Omindex.cc BSD bug
Hi guys: I was trying to index a large set of PDF documents using omindex and the system started to run out of forks (sh: fork temporarily unavailable) making the system unusable and probably skipping documents. I'm using MAC Osx Server 10.4.3 (Darwin/BSD) and GCC 4.0. The problem: On function stdout_to_string a popen is called, but is not closed properly (according the popen