On 01/05/2013 06:44 AM, Marcelo Tosatti wrote:
>> index b0a3678..44c6992 100644
>> --- a/arch/x86/kvm/x86.c
>> +++ b/arch/x86/kvm/x86.c
>> @@ -4756,15 +4756,8 @@ static int handle_emulation_failure(struct kvm_vcpu
>> *vcpu)
>> static bool reexecute_instruction(struct kvm_vcpu *vcpu, unsigned lon
Hi Borislav
On Thu, Dec 27, 2012 at 12:43 PM, Borislav Petkov wrote:
> On Wed, Dec 26, 2012 at 08:18:13PM +0800, Hillf Danton wrote:
>> Can you please test with 5a505085f0 and 4fc3f1d66b reverted?
>
> sure can do, but am travelling ATM so I'll run it with the reverted
> commits when I get back ne
On Sat, Jan 05, 2013 at 08:00:19PM +0800, Hillf Danton wrote:
> Jiri posted similar locking issue at
> https://lkml.org/lkml/2013/1/4/380
>
> Take a look?
Yeah, it looks like the same issue. I'll try his patch on Monday.
Thanks for letting me know.
--
Regards/Gruss,
Boris.
--
To unsubs
This drops the cmd completion list spin lock and makes the cmd
completion queue lock-less.
Signed-off-by: Asias He
---
drivers/vhost/tcm_vhost.c | 46 +-
drivers/vhost/tcm_vhost.h | 2 +-
2 files changed, 14 insertions(+), 34 deletions(-)
diff --git
Polling errors were ignored by vhost/vhost_net, this may lead to crash when
trying to remove vhost from waitqueue when after the polling is failed. Solve
this problem by:
- checking the poll->wqh before trying to remove from waitqueue
- report an error when poll() returns a POLLERR in vhost_start_
This is an update version of last version to fix the handling of polling errors
in vhost/vhost_net.
Currently, vhost and vhost_net ignore polling errors which can lead kernel
crashing when it tries to remove itself from waitqueue after the polling
failure. Fix this by checking the poll->wqh before
Currently, when vhost_init_used() fails the sock refcnt and ubufs were
leaked. Correct this by calling vhost_init_used() before assign ubufs and
restore the oldsock when it fails.
Signed-off-by: Jason Wang
---
drivers/vhost/net.c | 16 +++-
1 files changed, 11 insertions(+), 5 dele