Hi Dmitry,
First of all please separate out this patch from the rest of the series,
since this is a complex separate structural change.
Am 27.05.22 um 01:50 schrieb Dmitry Osipenko:
All dma-bufs have dma-reservation lock that allows drivers to perform
exclusive operations over shared dma-bufs
On 20.05.22 09:06, zhenwei pi wrote:
> Origianlly, unpoison_memory() is only used by hwpoison-inject, and
> unpoisons a page which is poisoned by hwpoison-inject too. The kernel PTE
> entry has no change during software poison/unpoison.
>
> On a virtualization platform, it's possible to fix hardwa
On 5/30/22 13:02, HORIGUCHI NAOYA(堀口 直也) wrote:
On Fri, May 20, 2022 at 03:06:47PM +0800, zhenwei pi wrote:
Origianlly, unpoison_memory() is only used by hwpoison-inject, and
unpoisons a page which is poisoned by hwpoison-inject too. The kernel PTE
entry has no change during software poison/un
On Fri, May 27, 2022 at 6:50 PM Michael S. Tsirkin wrote:
>
> At a minimum, I don't see why it's part of the series. Host can always
> crash the guest if it wants to ...
Probably not with some recent technology. In those cases, a fault will
be generated if the hypervisor tries to access the memor
On Fri, May 27, 2022 at 6:56 PM Michael S. Tsirkin wrote:
>
> On Thu, May 26, 2022 at 12:54:32PM +, Parav Pandit wrote:
> >
> >
> > > From: Eugenio Pérez
> > > Sent: Thursday, May 26, 2022 8:44 AM
> >
> > > Implement stop operation for vdpa_sim devices, so vhost-vdpa will offer
> > >
> > > th