From: Eduardo Habkost ehabk...@redhat.com
This allows the script to work on older systems, where 'mktemp --tmpdir' is not
available.
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm/scripts/make-release
From: Max Asbock masb...@linux.vnet.ibm.com
Add command p2v to translate guest physical address to host virtual
address.
The p2v command provides one step in a chain of translations from
guest virtual to guest physical to host virtual to host physical. Host
physical is then used to inject a
From: Eduardo Habkost ehabk...@redhat.com
Those options are not available on older systems.
Instead of --transform, just create the file inside the expected directory.
Instead of --mtime, use 'touch' to set file mtime before running tar.
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
From: Avi Kivity a...@redhat.com
Now that we allow the bios to write protect option roms, we need to allow
the tpr patching code to write to this write protected memory. This means
using cpu_physical_memory_write_rom() instead of the usual APIs.
Fixes Windows XP without flexpriority.
From: Avi Kivity a...@redhat.com
This reverts commit c3fe515c911b9828d6e3e659ac794cb7dc76cd66; needs to go
through qemu.git.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/monitor.c b/monitor.c
index df0cb33..9072c06 100644
--- a/monitor.c
+++ b/monitor.c
@@ -2301,18 +2301,6 @@ static
From: Sheng Yang sh...@linux.intel.com
Eliminate:
arch/x86/kvm/emulate.c:801: warning: ‘sv’ may be used uninitialized in this
function
on gcc 4.1.2
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/emulate.c
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
The value of 'vcpu-arch.mmu.pae_root' is not modified, so we can update
'root_hpa' out of the loop.
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/mmu.c
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Set access bit while setup up direct page table if it's nonpaing or npt enabled,
it's good for CPU's speculate access
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Small cleanup for set page fault error code
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index 2bdd843..a83ff37 100644
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
After nested nested paging, it may using long mode to shadow 32/PAE paging
guest, so this patch fix it
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/mmu_audit.c
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
fix:
Call Trace:
[a01e46ba] ? kvm_mmu_pte_write+0x229/0x911 [kvm]
[a01c6ba9] ? gfn_to_memslot+0x39/0xa0 [kvm]
[a01c6c26] ? mark_page_dirty+0x16/0x2e [kvm]
[a01c6d6f] ? kvm_write_guest_page+0x67/0x7f [kvm]
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Introduce audit_printk, and record audit point instead audit name
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/mmu_audit.c b/arch/x86/kvm/mmu_audit.c
index
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index ba7e764..dc1b4fb 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -2374,7 +2374,7 @@ static int mmu_check_root(struct kvm_vcpu *vcpu, gfn_t
root_gfn)
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
After root synced, all unsync sps are synced, this patch add a check to make
sure it's no unsync sps in VCPU's page table
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Move access code parsing from caller site to FNAME(walk_addr) function
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
From: Avi Kivity a...@redhat.com
get_kernel_ns() wants preemption disabled. It doesn't make a lot of sense
during the get/set ioctls (no way to make them non-racy) but the callee wants
it.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index
05.10.2010 09:36, Thomas Løcke wrote:
Hey all,
The other day I upgraded the kernel on one of my KVM hosts. I went
from 2.6.34.1 to 2.6.35.7, and immediately I noticed that my Windows
XP guests was now using significantly more CPU while idle, compared to
the 2.6.34.1 kernel. All the Windows
On 10/05/2010 01:59 AM, Marcelo Tosatti wrote:
Yep, the drawback is the unnecessary write fault. What i have here is:
--- kvm.orig/virt/kvm/kvm_main.c
+++ kvm/virt/kvm/kvm_main.c
@@ -827,7 +827,7 @@ unsigned long gfn_to_hva(struct kvm *kvm
}
EXPORT_SYMBOL_GPL(gfn_to_hva);
-pfn_t
In Todo list i find TCP_CRR UDP_RR test case failures.
2) netperf
17:35:11 DEBUG| Execute netperf client
test: /root/autotest/client/tests/netperf2/netperf-2.4.5/src/netperf -t
TCP_CRR -H 10.16.74.142 -l 60 -- -m 1 17:35:45 ERROR| Fail to execute
netperf test, protocol:TCP_CRR 17:35:45 DEBUG|
Michael S. Tsirkin m...@redhat.com wrote on 09/19/2010 06:14:43 PM:
Could you document how exactly do you measure multistream bandwidth:
netperf flags, etc?
All results were without any netperf flags or system tuning:
for i in $list
do
netperf -c -C -l 60 -H 192.168.122.1
Hi,
W.r.t:
Note that this is a tradeoff. If an idle core is available and the
scheduler places the iothread on that core, then the heavyweight exit is
replaced by a lightweight exit + IPI. If the iothread is co-located with
the vcpu, then we'll take a heavyweight exit in any case.
Q: Does
On 10/05/2010 01:00 PM, rukhsana ansari wrote:
Hi,
W.r.t:
Note that this is a tradeoff. If an idle core is available and the
scheduler places the iothread on that core, then the heavyweight exit is
replaced by a lightweight exit + IPI. If the iothread is co-located with
the vcpu,
This should probably exit as MMIO instead of custom exit code, for IO_MEM_ROM
slots. But then, unsure if IO_MEM_ROM areas should be mprotected (meaning QEMU
has to handle SIGBUS for its own accesses), or the attribute set in a slots
flag.
--
To unsubscribe from this list: send the line
The EPT present/writable bits use the same position as normal
pagetable bits.
Since direct_map passes ACC_ALL to mmu_set_spte, thus always setting
the writable bit on sptes, use the generic PT_PRESENT shadow_base_pte.
Also pass present/writable error code information from EPT violation
to
Instantiate read-only spte if host pte is read-only, and exit to
userspace if guest attempts to write.
With this in place userspace can mprotect(PROT_READ) guest memory
and handle write attempts.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
gfn_to_pfn requires a writable host pte, failing otherwise.
Change it to fallback to read-only acquision', informing the callers.
Hopefully the ptes are cache-hot so the overhead is minimal.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/ia64/kvm/kvm-ia64.c
On Tue, Oct 05, 2010 at 09:36:59AM +0200, Avi Kivity wrote:
On 10/05/2010 01:59 AM, Marcelo Tosatti wrote:
Yep, the drawback is the unnecessary write fault. What i have here is:
--- kvm.orig/virt/kvm/kvm_main.c
+++ kvm/virt/kvm/kvm_main.c
@@ -827,7 +827,7 @@ unsigned long gfn_to_hva(struct
On Mon, Sep 27, 2010 at 06:43:57PM -0400, Lucas Meneghel Rodrigues wrote:
From: Amos Kong ak...@redhat.com
Use 'ping' to test send/recive multicat packets. Flood ping test is also
added.
Limit guest network as 'bridge' mode, because multicast packets could not be
transmitted to guest when
On Tue, 2010-10-05 at 20:21 +0800, Amos Kong wrote:
On Mon, Sep 27, 2010 at 06:43:57PM -0400, Lucas Meneghel Rodrigues wrote:
From: Amos Kong ak...@redhat.com
+# make sure guest replies to broadcasts
+cmd_broadcast = echo 0 /proc/sys/net/ipv4/icmp_echo_ignore
Hello pradeep,
Balloon could cause guest memory oom killing and panic.
Add oom notify to leak some memory and retry fill balloon after 5 minutes.
At the same time add a mutex to protect balloon operations
because we need leak balloon in oom notifier and give back freed value.
Thanks Anthony Liguori for his
On Thu, Sep 30, 2010 at 12:29:40PM +0530, pradeep wrote:
On Mon, 27 Sep 2010 18:44:02 -0400
Lucas Meneghel Rodrigues l...@redhat.com wrote:
From: Amos Kong ak...@redhat.com
This is an enhancement of existed vlan test. Rename the vlan_tag.py
to vlan.py, it is more reasonable.
. Setup
On 10/04/2010 01:54 PM, Marcelo Tosatti wrote:
To be used by next patches.
Signed-off-by: Marcelo Tosattimtosa...@redhat.com
Index: qemu/cpu-common.h
===
--- qemu.orig/cpu-common.h
+++ qemu/cpu-common.h
@@ -47,6 +47,7 @@ void
On Tue, Oct 05, 2010 at 02:30:18PM +0530, pradeep wrote:
In Todo list i find TCP_CRR UDP_RR test case failures.
2) netperf
17:35:11 DEBUG| Execute netperf client
test: /root/autotest/client/tests/netperf2/netperf-2.4.5/src/netperf -t
TCP_CRR -H 10.16.74.142 -l 60 -- -m 1 17:35:45
Now that we allow the bios to write protect option roms, we need to allow
the tpr patching code to write to this write protected memory. This means
using cpu_physical_memory_write_rom() instead of the usual APIs.
Fixes Windows XP without flexpriority.
Signed-off-by: Avi Kivity a...@redhat.com
get_kernel_ns() wants preemption disabled. It doesn't make a lot of sense
during the get/set ioctls (no way to make them non-racy) but the callee wants
it.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git
Add tracepoint for userspace exit.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/include/trace/events/kvm.h b/include/trace/events/kvm.h
index 6dd3a51..fb44da0 100644
--- a/include/trace/events/kvm.h
+++ b/include/trace/events/kvm.h
@@ -6,6 +6,31 @@
#undef TRACE_SYSTEM
#define
From: Amos Kong ak...@redhat.com
Use 'ping' to test send/recive multicat packets. Flood ping test is also added.
Limit guest network as 'bridge' mode, because multicast packets could not be
transmitted to guest when using 'user' network.
Add join_mcast.py for joining machine into multicast
On Tue, Oct 05, 2010 at 08:55:00AM -0300, Marcelo Tosatti wrote:
gfn_to_pfn requires a writable host pte, failing otherwise.
Change it to fallback to read-only acquision', informing the callers.
Hopefully the ptes are cache-hot so the overhead is minimal.
Signed-off-by: Marcelo Tosatti
* Chris Wright (chr...@redhat.com) wrote:
Please send in any agenda items you are interested in covering.
No agenda, call cancelled.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On Tue, Oct 05, 2010 at 06:22:17AM -0300, Marcelo Tosatti wrote:
It'll not be so advantageous for ksm because there should be read-faults
very rarely on that case.
It'll also make all clean swapcache dirty for no good.
Will post.
If we've to walk pagetables twice, why don't you do this:
On 10/05/2010 04:15 PM, Andrea Arcangeli wrote:
On Tue, Oct 05, 2010 at 06:22:17AM -0300, Marcelo Tosatti wrote:
It'll not be so advantageous for ksm because there should be read-faults
very rarely on that case.
It'll also make all clean swapcache dirty for no good.
Will post.
If we've
On Tue, Oct 05, 2010 at 04:25:05PM +0200, Avi Kivity wrote:
On 10/05/2010 04:15 PM, Andrea Arcangeli wrote:
On Tue, Oct 05, 2010 at 06:22:17AM -0300, Marcelo Tosatti wrote:
It'll not be so advantageous for ksm because there should be read-faults
very rarely on that case.
It'll
On 10/05/2010 04:32 PM, Andrea Arcangeli wrote:
On Tue, Oct 05, 2010 at 04:25:05PM +0200, Avi Kivity wrote:
On 10/05/2010 04:15 PM, Andrea Arcangeli wrote:
On Tue, Oct 05, 2010 at 06:22:17AM -0300, Marcelo Tosatti wrote:
It'll not be so advantageous for ksm because there should
Hello list:
I'm working on a project that calls for the creation of a firewall in
KVM.
While adding a 20-interface trunk of virtio adapters to bring in a dual
10GB bond, I've discovered an 8 NIC limit in QEMU.
I found the following thread in the list archives detailing a similar
problem:
Hi,
i have trying to play with KVM on gentoo and stumbled upon a guest reseting
incoming connection. (looks like qemu cheating the guest by sending
fake tcp-reset).
below i send typical ssh session:
tcpdump: WARNING: eth0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or
On Tue, Oct 5, 2010 at 7:48 AM, linux_...@proinbox.com wrote:
Hello list:
I'm working on a project that calls for the creation of a firewall in
KVM.
While adding a 20-interface trunk of virtio adapters to bring in a dual
10GB bond, I've discovered an 8 NIC limit in QEMU.
I found the
linux_...@proinbox.com writes:
Hello list:
I'm working on a project that calls for the creation of a firewall in
KVM.
While adding a 20-interface trunk of virtio adapters to bring in a dual
10GB bond, I've discovered an 8 NIC limit in QEMU.
Have you tried creating NICs with -device? The
* Alex Williamson (alex.william...@redhat.com) wrote:
Allow it to be referenced outside of hw/pci.c so we can register
option ROM BARs using the default mapping routine.
Signed-off-by: Alex Williamson alex.william...@redhat.com
Acked-by: Chris Wright chr...@redhat.com
--
To unsubscribe from
Forgot to cc list, forwarding.
In this case, I think you're going to want to send your patch to the
qemu-devel (on CC) mailing list (perhaps in addition to sending it
here, to the kvm list).
Will do, thanks for the pointer.
Before I do so, I'd like to bring up one thing that comes to mind.
Have you tried creating NICs with -device?
I'm not sure what that is, will look into it, thanks.
I'm using ProxmoxVE, and currently add them via a web interface.
Someone happens to host a screenshot of that part here:
http://c-nergy.be/blog/wp-content/uploads/Proxmox_Net2.png
On Tue, 05 Oct
Marcelo,
Am 04.10.2010 um 20:54 schrieb Marcelo Tosatti:
I assume something went wrong with your cover letter here. It would've
been nice to see MCE spelled out or summarized for those of us that
don't speak x86.
Cheers,
Andreas
--
To unsubscribe from this list: send the line
On 10/5/2010 9:48 AM, linux_...@proinbox.com wrote:
Hello list:
I'm working on a project that calls for the creation of a firewall in
KVM.
While adding a 20-interface trunk of virtio adapters to bring in a dual
10GB bond, I've discovered an 8 NIC limit in QEMU.
I found the following thread in
subscribe
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Can kvm boot a guest OS in an LVM on a USB hard disk.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi,
can some one point me to correct link.
I want to go through malloc implementation in kvm.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tue, Oct 05, 2010 at 03:43:01PM +0200, Gleb Natapov wrote:
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@ -2273,6 +2273,7 @@ static int nonpaging_map(struct kvm_vcpu
{
int r;
int level;
+ int writable;
pfn_t pfn;
unsigned long mmu_seq;
On Mon, Oct 04, 2010 at 05:56:24PM +0200, Gleb Natapov wrote:
If a guest accesses swapped out memory do not swap it in from vcpu thread
context. Schedule work to do swapping and put vcpu into halted state
instead.
Interrupts will still be delivered to the guest and if interrupt will
cause
On Mon, Oct 04, 2010 at 05:56:25PM +0200, Gleb Natapov wrote:
When page is swapped in it is mapped into guest memory only after guest
tries to access it again and generate another fault. To save this fault
we can map it immediately since we know that guest is going to access
the page. Do it
On Mon, Oct 04, 2010 at 05:56:26PM +0200, Gleb Natapov wrote:
Keep track of memslots changes by keeping generation number in memslots
structure. Provide kvm_write_guest_cached() function that skips
gfn_to_hva() translation if memslots was not changed since previous
invocation.
On Tue, Oct 05, 2010 at 04:10:00PM +0530, Krishna Kumar2 wrote:
Michael S. Tsirkin m...@redhat.com wrote on 09/19/2010 06:14:43 PM:
Could you document how exactly do you measure multistream bandwidth:
netperf flags, etc?
All results were without any netperf flags or system tuning:
It looks like it was a quiet cycle for vhost-net:
probably because most of energy was spent on bugfixes
that went in for 2.6.36.
People are working on multiqueue, tracing but I'm not
sure it'll get done in time for 2.6.37 - so here's
a tree with a single patch that helps windows guests
which we
* linux_...@proinbox.com (linux_...@proinbox.com) wrote:
I don't know how to make the determination, but it makes sense to me for
the limit defined here to be indicitive of an actual limitation, rather
than what seems an arbitrary best-guess as to the most someone might
need.
The actual
* Andreas Färber (andreas.faer...@web.de) wrote:
Am 04.10.2010 um 20:54 schrieb Marcelo Tosatti:
I assume something went wrong with your cover letter here. It
would've been nice to see MCE spelled out or summarized for those of
us that don't speak x86.
It would help. The acronym is Machine
Hi
I get a failure when I try to reboot a DomU:
# virsh reboot fc13_1
error: Failed to reboot domain fc13_1
error: this function is not supported by the connection driver: virDomainReboot
I haven't tried this command before.
Does it have any relation to
On Mon, Oct 04, 2010 at 05:56:29PM +0200, Gleb Natapov wrote:
Enable async PF in a guest if async PF capability is discovered.
Signed-off-by: Gleb Natapov g...@redhat.com
---
Documentation/kernel-parameters.txt |3 +
arch/x86/include/asm/kvm_para.h |5 ++
arch/x86/kernel/kvm.c
On Mon, Oct 04, 2010 at 05:56:31PM +0200, Gleb Natapov wrote:
Send async page fault to a PV guest if it accesses swapped out memory.
Guest will choose another task to run upon receiving the fault.
Allow async page fault injection only when guest is in user mode since
otherwise guest may be
On Mon, Oct 04, 2010 at 05:56:32PM +0200, Gleb Natapov wrote:
If async page fault is received by idle task or when preemp_count is
not zero guest cannot reschedule, so do sti; hlt and wait for page to be
ready. vcpu can still process interrupts while it waits for the page to
be ready.
On Tue, Oct 05, 2010 at 07:57:14AM -0500, Anthony Liguori wrote:
On 10/04/2010 01:54 PM, Marcelo Tosatti wrote:
To be used by next patches.
Signed-off-by: Marcelo Tosattimtosa...@redhat.com
Index: qemu/cpu-common.h
===
---
On Tue, Oct 05, 2010 at 11:58:13AM -0700, Chris Wright wrote:
* Andreas Färber (andreas.faer...@web.de) wrote:
Am 04.10.2010 um 20:54 schrieb Marcelo Tosatti:
I assume something went wrong with your cover letter here. It
would've been nice to see MCE spelled out or summarized for those
On 10/05/2010 03:13 PM, Marcelo Tosatti wrote:
On Tue, Oct 05, 2010 at 07:57:14AM -0500, Anthony Liguori wrote:
On 10/04/2010 01:54 PM, Marcelo Tosatti wrote:
To be used by next patches.
Signed-off-by: Marcelo Tosattimtosa...@redhat.com
Index: qemu/cpu-common.h
Use the autotest step engine to conveniently install a host
kernel, be it an rpm kernel or a git build. Even though this
is standard autotest functionality for quite a while, we
haven't integrated it properly so far. Now people testing
KVM will have a clean, programatic way to test host kernels.
I'm running two separate KVM hosts that are showing the same network
performance issue - KVM-guest is 35% slower than non-KVM (or ESXi for that
matter). I'm wondering if the Broadcom NetXtreme II BCM5708 interface is at
fault. I've tried all sorts of tweaks and configurations and I've only
(2010/10/05 3:54), Marcelo Tosatti wrote:
Port qemu-kvm's
commit 4b62fff1101a7ad77553147717a8bd3bf79df7ef
Author: Huang Ying ying.hu...@intel.com
Date: Mon Sep 21 10:43:25 2009 +0800
MCE: Relay UCR MCE to guest
UCR (uncorrected recovery) MCE is supported in recent Intel
* Pete Ashdown (pashd...@xmission.com) wrote:
ProxMox guest:
/usr/bin/kvm -monitor unix:/var/run/qemu-server/104.mon,server,nowait -vnc
unix:/var/run/qemu-server/104.vnc,password -pidfile
/var/run/qemu-server/104.pid -daemonize -usbdevice tablet -name UbuntuServer
-smp sockets=2,cores=2
I got some more question:
(2010/10/05 3:54), Marcelo Tosatti wrote:
Index: qemu/target-i386/cpu.h
===
--- qemu.orig/target-i386/cpu.h
+++ qemu/target-i386/cpu.h
@@ -250,16 +250,32 @@
#define PG_ERROR_RSVD_MASK 0x08
#define
Attached is a patch that allows qemu to have up to 32 NICs, without
using the qdev -device method.
max_nics.patch
Description: Binary data
On Mon, Sep 27, 2010 at 06:43:55PM -0400, Lucas Meneghel Rodrigues wrote:
Repeatedly load/unload nic driver, try to transfer file between guest and host
by threads at the same time, and check the md5sum.
Changes from v1:
- Use a new method to get nic driver name
- Use utils.hash_file() to
The VCPU uninit calls some TLB functions, and the TLB uninit function
frees the memory used by them.
Signed-off-by: Scott Wood scottw...@freescale.com
---
arch/powerpc/kvm/e500.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/powerpc/kvm/e500.c
On 05.10.2010, at 21:22, Scott Wood wrote:
The VCPU uninit calls some TLB functions, and the TLB uninit function
frees the memory used by them.
Liu, this is your code. Please sign it off if you think the change is correct.
Alex
--
To unsubscribe from this list: send the line unsubscribe
79 matches
Mail list logo