From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marcelo Tosatti Subject: Re: [PATCH V2] KVM: x86: disable stealtime on reboot to avoid mem corruption Date: Wed, 15 Aug 2012 15:31:42 -0300 Message-ID: <20120815183142.GC21271@amt.cnet> References: <1345039240-29959-1-git-send-email-fw@strlen.de> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, glommer@redhat.com To: Florian Westphal Return-path: Content-Disposition: inline In-Reply-To: <1345039240-29959-1-git-send-email-fw@strlen.de> Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org On Wed, Aug 15, 2012 at 04:00:40PM +0200, Florian Westphal wrote: > else, host continues to update stealtime after reboot, > which can corrupt e.g. initramfs area. > found when tracking down initramfs unpack error on initial reboot > (with qemu-kvm -smp 2, no problem with single-core). > > Signed-off-by: Florian Westphal Applied, thanks.