* [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
@ 2011-10-18 16:23 Jan Kiszka
2011-10-18 16:35 ` Roedel, Joerg
2011-10-27 12:40 ` Marcelo Tosatti
0 siblings, 2 replies; 14+ messages in thread
From: Jan Kiszka @ 2011-10-18 16:23 UTC (permalink / raw)
To: Avi Kivity, Marcelo Tosatti, kvm; +Cc: Roedel, Joerg, Gleb Natapov
AMD processors apparently have a bug in the hardware task switching
support when NPT is enabled. If the task switch triggers a NPF, we can
get wrong EXITINTINFO along with that fault. On resume, spurious
exceptions may then be injected into the guest.
We were able to reproduce this bug when our guest triggered #SS and the
handler were supposed to run over a separate task with not yet touched
stack pages.
Work around the issue by continuing to emulate task switches even in
NPT mode.
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
---
arch/x86/kvm/svm.c | 1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index e7ed4b1..e32243e 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -1084,7 +1084,6 @@ static void init_vmcb(struct vcpu_svm *svm)
if (npt_enabled) {
/* Setup VMCB for Nested Paging */
control->nested_ctl = 1;
- clr_intercept(svm, INTERCEPT_TASK_SWITCH);
clr_intercept(svm, INTERCEPT_INVLPG);
clr_exception_intercept(svm, PF_VECTOR);
clr_cr_intercept(svm, INTERCEPT_CR3_READ);
--
1.7.3.4
^ permalink raw reply related [flat|nested] 14+ messages in thread* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-10-18 16:23 [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled Jan Kiszka
@ 2011-10-18 16:35 ` Roedel, Joerg
2011-10-18 17:37 ` Avi Kivity
2011-10-27 12:40 ` Marcelo Tosatti
1 sibling, 1 reply; 14+ messages in thread
From: Roedel, Joerg @ 2011-10-18 16:35 UTC (permalink / raw)
To: Jan Kiszka; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
> AMD processors apparently have a bug in the hardware task switching
> support when NPT is enabled. If the task switch triggers a NPF, we can
> get wrong EXITINTINFO along with that fault. On resume, spurious
> exceptions may then be injected into the guest.
>
> We were able to reproduce this bug when our guest triggered #SS and the
> handler were supposed to run over a separate task with not yet touched
> stack pages.
>
> Work around the issue by continuing to emulate task switches even in
> NPT mode.
>
> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Acked-by: Joerg Roedel <joerg.roedel@amd.com>
> ---
> arch/x86/kvm/svm.c | 1 -
> 1 files changed, 0 insertions(+), 1 deletions(-)
>
> diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
> index e7ed4b1..e32243e 100644
> --- a/arch/x86/kvm/svm.c
> +++ b/arch/x86/kvm/svm.c
> @@ -1084,7 +1084,6 @@ static void init_vmcb(struct vcpu_svm *svm)
> if (npt_enabled) {
> /* Setup VMCB for Nested Paging */
> control->nested_ctl = 1;
> - clr_intercept(svm, INTERCEPT_TASK_SWITCH);
> clr_intercept(svm, INTERCEPT_INVLPG);
> clr_exception_intercept(svm, PF_VECTOR);
> clr_cr_intercept(svm, INTERCEPT_CR3_READ);
> --
> 1.7.3.4
--
AMD Operating System Research Center
Advanced Micro Devices GmbH Einsteinring 24 85609 Dornach
General Managers: Alberto Bozzo, Andrew Bowd
Registration: Dornach, Landkr. Muenchen; Registerger. Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 14+ messages in thread* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-10-18 16:35 ` Roedel, Joerg
@ 2011-10-18 17:37 ` Avi Kivity
2011-10-19 14:12 ` Roedel, Joerg
2011-11-01 11:13 ` Roedel, Joerg
0 siblings, 2 replies; 14+ messages in thread
From: Avi Kivity @ 2011-10-18 17:37 UTC (permalink / raw)
To: Roedel, Joerg; +Cc: Jan Kiszka, Marcelo Tosatti, kvm, Gleb Natapov
On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
> On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
> > AMD processors apparently have a bug in the hardware task switching
> > support when NPT is enabled. If the task switch triggers a NPF, we can
> > get wrong EXITINTINFO along with that fault. On resume, spurious
> > exceptions may then be injected into the guest.
> >
> > We were able to reproduce this bug when our guest triggered #SS and the
> > handler were supposed to run over a separate task with not yet touched
> > stack pages.
> >
> > Work around the issue by continuing to emulate task switches even in
> > NPT mode.
> >
> > Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
>
> Acked-by: Joerg Roedel <joerg.roedel@amd.com>
>
Will there be an erratum published for this bug? Are all processors
affected?
I'd like to limit this to just the buggy processors, if and when fixed
processors become available.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-10-18 17:37 ` Avi Kivity
@ 2011-10-19 14:12 ` Roedel, Joerg
2011-11-01 11:13 ` Roedel, Joerg
1 sibling, 0 replies; 14+ messages in thread
From: Roedel, Joerg @ 2011-10-19 14:12 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jan Kiszka, Marcelo Tosatti, kvm, Gleb Natapov
On Tue, Oct 18, 2011 at 01:37:32PM -0400, Avi Kivity wrote:
> On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
> > On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
> > > AMD processors apparently have a bug in the hardware task switching
> > > support when NPT is enabled. If the task switch triggers a NPF, we can
> > > get wrong EXITINTINFO along with that fault. On resume, spurious
> > > exceptions may then be injected into the guest.
> > >
> > > We were able to reproduce this bug when our guest triggered #SS and the
> > > handler were supposed to run over a separate task with not yet touched
> > > stack pages.
> > >
> > > Work around the issue by continuing to emulate task switches even in
> > > NPT mode.
> > >
> > > Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
> >
> > Acked-by: Joerg Roedel <joerg.roedel@amd.com>
> >
>
> Will there be an erratum published for this bug? Are all processors
> affected?
For now this behavior should be expected on all NPT capable processors.
> I'd like to limit this to just the buggy processors, if and when fixed
> processors become available.
I don't know this yet, but I'll try to find out.
Thanks,
Joerg
--
AMD Operating System Research Center
Advanced Micro Devices GmbH Einsteinring 24 85609 Dornach
General Managers: Alberto Bozzo, Andrew Bowd
Registration: Dornach, Landkr. Muenchen; Registerger. Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-10-18 17:37 ` Avi Kivity
2011-10-19 14:12 ` Roedel, Joerg
@ 2011-11-01 11:13 ` Roedel, Joerg
2011-11-01 13:39 ` Jan Kiszka
1 sibling, 1 reply; 14+ messages in thread
From: Roedel, Joerg @ 2011-11-01 11:13 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jan Kiszka, Marcelo Tosatti, kvm, Gleb Natapov
On Tue, Oct 18, 2011 at 01:37:32PM -0400, Avi Kivity wrote:
> On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
> > On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
> > > AMD processors apparently have a bug in the hardware task switching
> > > support when NPT is enabled. If the task switch triggers a NPF, we can
> > > get wrong EXITINTINFO along with that fault. On resume, spurious
> > > exceptions may then be injected into the guest.
> > >
> > > We were able to reproduce this bug when our guest triggered #SS and the
> > > handler were supposed to run over a separate task with not yet touched
> > > stack pages.
> > >
> > > Work around the issue by continuing to emulate task switches even in
> > > NPT mode.
> > >
> > > Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
> >
> > Acked-by: Joerg Roedel <joerg.roedel@amd.com>
> >
>
> Will there be an erratum published for this bug? Are all processors
> affected?
>
> I'd like to limit this to just the buggy processors, if and when fixed
> processors become available.
Actually, this isn't a bug. Please have a look at section 15.2.6 of the
APM2:
15.2.6 Restartable Instructions
SVM is designed to safely restart, with the exception of task switches,
any intercepted instruction (either atomic or idempotent) after the
intercept.
So SVM does not guarantee that an intercept during a task-switch can be
restarted.
Joerg
--
AMD Operating System Research Center
Advanced Micro Devices GmbH Einsteinring 24 85609 Dornach
General Managers: Alberto Bozzo, Andrew Bowd
Registration: Dornach, Landkr. Muenchen; Registerger. Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-01 11:13 ` Roedel, Joerg
@ 2011-11-01 13:39 ` Jan Kiszka
2011-11-01 15:30 ` Roedel, Joerg
0 siblings, 1 reply; 14+ messages in thread
From: Jan Kiszka @ 2011-11-01 13:39 UTC (permalink / raw)
To: Roedel, Joerg; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
[-- Attachment #1: Type: text/plain, Size: 1597 bytes --]
On 2011-11-01 12:13, Roedel, Joerg wrote:
> On Tue, Oct 18, 2011 at 01:37:32PM -0400, Avi Kivity wrote:
>> On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
>>> On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
>>>> AMD processors apparently have a bug in the hardware task switching
>>>> support when NPT is enabled. If the task switch triggers a NPF, we can
>>>> get wrong EXITINTINFO along with that fault. On resume, spurious
>>>> exceptions may then be injected into the guest.
>>>>
>>>> We were able to reproduce this bug when our guest triggered #SS and the
>>>> handler were supposed to run over a separate task with not yet touched
>>>> stack pages.
>>>>
>>>> Work around the issue by continuing to emulate task switches even in
>>>> NPT mode.
>>>>
>>>> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
>>>
>>> Acked-by: Joerg Roedel <joerg.roedel@amd.com>
>>>
>>
>> Will there be an erratum published for this bug? Are all processors
>> affected?
>>
>> I'd like to limit this to just the buggy processors, if and when fixed
>> processors become available.
>
> Actually, this isn't a bug. Please have a look at section 15.2.6 of the
> APM2:
>
> 15.2.6 Restartable Instructions
>
> SVM is designed to safely restart, with the exception of task switches,
> any intercepted instruction (either atomic or idempotent) after the
> intercept.
>
> So SVM does not guarantee that an intercept during a task-switch can be
> restarted.
Not a bug but still a deficit as it makes hardware-assisted task
switching practically useless, no?
Jan
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-01 13:39 ` Jan Kiszka
@ 2011-11-01 15:30 ` Roedel, Joerg
2011-11-01 15:49 ` Jan Kiszka
0 siblings, 1 reply; 14+ messages in thread
From: Roedel, Joerg @ 2011-11-01 15:30 UTC (permalink / raw)
To: Jan Kiszka; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
> > So SVM does not guarantee that an intercept during a task-switch can be
> > restarted.
>
> Not a bug but still a deficit as it makes hardware-assisted task
> switching practically useless, no?
Not entirely. For hypervisors that can guarantee that there will be no
intercept (NPT pre-mapped, no exceptions intercepted) it will still
work.
Joerg
--
AMD Operating System Research Center
Advanced Micro Devices GmbH Einsteinring 24 85609 Dornach
General Managers: Alberto Bozzo, Andrew Bowd
Registration: Dornach, Landkr. Muenchen; Registerger. Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-01 15:30 ` Roedel, Joerg
@ 2011-11-01 15:49 ` Jan Kiszka
2011-11-01 16:15 ` Roedel, Joerg
0 siblings, 1 reply; 14+ messages in thread
From: Jan Kiszka @ 2011-11-01 15:49 UTC (permalink / raw)
To: Roedel, Joerg; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
[-- Attachment #1: Type: text/plain, Size: 568 bytes --]
On 2011-11-01 16:30, Roedel, Joerg wrote:
> On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
>>> So SVM does not guarantee that an intercept during a task-switch can be
>>> restarted.
>>
>> Not a bug but still a deficit as it makes hardware-assisted task
>> switching practically useless, no?
>
> Not entirely. For hypervisors that can guarantee that there will be no
> intercept (NPT pre-mapped, no exceptions intercepted) it will still
> work.
Yes, but that only covers the niche of simple static ones (partitioning
hypervisors).
Jan
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-01 15:49 ` Jan Kiszka
@ 2011-11-01 16:15 ` Roedel, Joerg
2011-11-01 18:22 ` Jan Kiszka
0 siblings, 1 reply; 14+ messages in thread
From: Roedel, Joerg @ 2011-11-01 16:15 UTC (permalink / raw)
To: Jan Kiszka; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
On Tue, Nov 01, 2011 at 11:49:42AM -0400, Jan Kiszka wrote:
> On 2011-11-01 16:30, Roedel, Joerg wrote:
> > On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
> >>> So SVM does not guarantee that an intercept during a task-switch can be
> >>> restarted.
> >>
> >> Not a bug but still a deficit as it makes hardware-assisted task
> >> switching practically useless, no?
> >
> > Not entirely. For hypervisors that can guarantee that there will be no
> > intercept (NPT pre-mapped, no exceptions intercepted) it will still
> > work.
>
> Yes, but that only covers the niche of simple static ones (partitioning
> hypervisors).
No, also a hypervisor that creates the nested page-page on advance falls
into this category.
Joerg
--
AMD Operating System Research Center
Advanced Micro Devices GmbH Einsteinring 24 85609 Dornach
General Managers: Alberto Bozzo, Andrew Bowd
Registration: Dornach, Landkr. Muenchen; Registerger. Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-01 16:15 ` Roedel, Joerg
@ 2011-11-01 18:22 ` Jan Kiszka
2011-11-02 9:55 ` Roedel, Joerg
0 siblings, 1 reply; 14+ messages in thread
From: Jan Kiszka @ 2011-11-01 18:22 UTC (permalink / raw)
To: Roedel, Joerg; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
[-- Attachment #1: Type: text/plain, Size: 917 bytes --]
On 2011-11-01 17:15, Roedel, Joerg wrote:
> On Tue, Nov 01, 2011 at 11:49:42AM -0400, Jan Kiszka wrote:
>> On 2011-11-01 16:30, Roedel, Joerg wrote:
>>> On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
>>>>> So SVM does not guarantee that an intercept during a task-switch can be
>>>>> restarted.
>>>>
>>>> Not a bug but still a deficit as it makes hardware-assisted task
>>>> switching practically useless, no?
>>>
>>> Not entirely. For hypervisors that can guarantee that there will be no
>>> intercept (NPT pre-mapped, no exceptions intercepted) it will still
>>> work.
>>
>> Yes, but that only covers the niche of simple static ones (partitioning
>> hypervisors).
>
> No, also a hypervisor that creates the nested page-page on advance falls
> into this category.
Doesn't this means all guest memory has to be backed with host memory?
That's what I meant with "static".
Jan
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-01 18:22 ` Jan Kiszka
@ 2011-11-02 9:55 ` Roedel, Joerg
2011-11-02 9:59 ` Jan Kiszka
2011-11-02 10:04 ` Avi Kivity
0 siblings, 2 replies; 14+ messages in thread
From: Roedel, Joerg @ 2011-11-02 9:55 UTC (permalink / raw)
To: Jan Kiszka; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
On Tue, Nov 01, 2011 at 02:22:56PM -0400, Jan Kiszka wrote:
> On 2011-11-01 17:15, Roedel, Joerg wrote:
> > No, also a hypervisor that creates the nested page-page on advance falls
> > into this category.
>
> Doesn't this means all guest memory has to be backed with host memory?
> That's what I meant with "static".
Yes, but isn't Xen working this way? I wouldn't call Xen a simple
partitioning hypervisor :)
Joerg
--
AMD Operating System Research Center
Advanced Micro Devices GmbH Einsteinring 24 85609 Dornach
General Managers: Alberto Bozzo, Andrew Bowd
Registration: Dornach, Landkr. Muenchen; Registerger. Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-02 9:55 ` Roedel, Joerg
@ 2011-11-02 9:59 ` Jan Kiszka
2011-11-02 10:04 ` Avi Kivity
1 sibling, 0 replies; 14+ messages in thread
From: Jan Kiszka @ 2011-11-02 9:59 UTC (permalink / raw)
To: Roedel, Joerg; +Cc: Avi Kivity, Marcelo Tosatti, kvm, Gleb Natapov
[-- Attachment #1: Type: text/plain, Size: 583 bytes --]
On 2011-11-02 10:55, Roedel, Joerg wrote:
> On Tue, Nov 01, 2011 at 02:22:56PM -0400, Jan Kiszka wrote:
>> On 2011-11-01 17:15, Roedel, Joerg wrote:
>>> No, also a hypervisor that creates the nested page-page on advance falls
>>> into this category.
>>
>> Doesn't this means all guest memory has to be backed with host memory?
>> That's what I meant with "static".
>
> Yes, but isn't Xen working this way? I wouldn't call Xen a simple
> partitioning hypervisor :)
Not sure if they map ahead of time or lazily, at least they intercept
task switching as well.
Jan
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-11-02 9:55 ` Roedel, Joerg
2011-11-02 9:59 ` Jan Kiszka
@ 2011-11-02 10:04 ` Avi Kivity
1 sibling, 0 replies; 14+ messages in thread
From: Avi Kivity @ 2011-11-02 10:04 UTC (permalink / raw)
To: Roedel, Joerg; +Cc: Jan Kiszka, Marcelo Tosatti, kvm, Gleb Natapov
On 11/02/2011 11:55 AM, Roedel, Joerg wrote:
> On Tue, Nov 01, 2011 at 02:22:56PM -0400, Jan Kiszka wrote:
> > On 2011-11-01 17:15, Roedel, Joerg wrote:
> > > No, also a hypervisor that creates the nested page-page on advance falls
> > > into this category.
> >
> > Doesn't this means all guest memory has to be backed with host memory?
> > That's what I meant with "static".
>
> Yes, but isn't Xen working this way? I wouldn't call Xen a simple
> partitioning hypervisor :)
Xen is lazy, and these days they even page.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled
2011-10-18 16:23 [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled Jan Kiszka
2011-10-18 16:35 ` Roedel, Joerg
@ 2011-10-27 12:40 ` Marcelo Tosatti
1 sibling, 0 replies; 14+ messages in thread
From: Marcelo Tosatti @ 2011-10-27 12:40 UTC (permalink / raw)
To: Jan Kiszka; +Cc: Avi Kivity, kvm, Roedel, Joerg, Gleb Natapov
On Tue, Oct 18, 2011 at 06:23:11PM +0200, Jan Kiszka wrote:
> AMD processors apparently have a bug in the hardware task switching
> support when NPT is enabled. If the task switch triggers a NPF, we can
> get wrong EXITINTINFO along with that fault. On resume, spurious
> exceptions may then be injected into the guest.
>
> We were able to reproduce this bug when our guest triggered #SS and the
> handler were supposed to run over a separate task with not yet touched
> stack pages.
>
> Work around the issue by continuing to emulate task switches even in
> NPT mode.
>
> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
> ---
> arch/x86/kvm/svm.c | 1 -
> 1 files changed, 0 insertions(+), 1 deletions(-)
Applied, thanks.
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2011-11-02 10:04 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2011-10-18 16:23 [PATCH] KVM: SVM: Keep intercepting task switching with NPT enabled Jan Kiszka
2011-10-18 16:35 ` Roedel, Joerg
2011-10-18 17:37 ` Avi Kivity
2011-10-19 14:12 ` Roedel, Joerg
2011-11-01 11:13 ` Roedel, Joerg
2011-11-01 13:39 ` Jan Kiszka
2011-11-01 15:30 ` Roedel, Joerg
2011-11-01 15:49 ` Jan Kiszka
2011-11-01 16:15 ` Roedel, Joerg
2011-11-01 18:22 ` Jan Kiszka
2011-11-02 9:55 ` Roedel, Joerg
2011-11-02 9:59 ` Jan Kiszka
2011-11-02 10:04 ` Avi Kivity
2011-10-27 12:40 ` Marcelo Tosatti
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).