flight 154121 xen-4.12-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154121/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qcow217 guest-localmigrate/x10 fail like 152525
test-amd64-i386-xl-pvshim12
Unexpectedly the environment variable which needs to be passed is
$LDSHARED and not $LD. Otherwise Python may find the build `ld` instead
of the host `ld`.
Replace $(LDFLAGS) with $(SHLIB_LDFLAGS) as Python needs shared objects
it can load at runtime, not executables.
This uses $(CC) instead of
flight 154116 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154116/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 18 guest-start/debianhvm.repeat fail
REGR. vs. 1525
On 11/09/2020 17:33, Julien Grall wrote:
> Hi all,
>
> At the moment, Xen doesn't have a formal memory model. Instead, we are
> relying on intuitions. This can lead to heated discussion on what can
> a processor/compiler do or not.
>
> We also have some helpers that nearly do the same (such as
> {r
On 11/09/2020 18:58, Wei Liu wrote:
> On Fri, Sep 11, 2020 at 03:15:28PM +0200, Juergen Gross wrote:
>> Making getBridge() static triggered a build error with some gcc versions:
>>
>> error: 'strncpy' output may be truncated copying 15 bytes from a string of
>> length 255 [-Werror=stringop-truncati
It is conceptually wrong for this information to exist in the hypervisor in
the first place. Only the toolstack is capable of correctly reasoning about
the non-migrateability of guests.
This hypercall has only ever existed to control the visibility of the
Invariant TSC flag to the guest. Now tha
flight 154104 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154104/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 7 xen-boot fail REGR. vs.
152332
test-amd64-
On Fri, Aug 28, 2020 at 06:39:45PM +, Anchal Agarwal wrote:
> On Fri, Aug 28, 2020 at 08:29:24PM +0200, Rafael J. Wysocki wrote:
> > CAUTION: This email originated from outside of the organization. Do not
> > click links or open attachments unless you can confirm the sender and know
> > the c
flight 154129 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154129/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 11/09/2020 11:01, Jan Beulich wrote:
> On 09.09.2020 11:59, Andrew Cooper wrote:
>> is_pv_32bit_domain() is an expensive predicate, but isn't used for
>> speculative
>> safety in this case. Swap to checking the Long Mode bit in the CPUID policy,
>> which is the architecturally correct behaviou
On 11/09/2020 13:28, Jürgen Groß wrote:
> On 11.09.20 14:14, Andrew Cooper wrote:
>> On 11/09/2020 06:30, Juergen Gross wrote:
>>> Today the maximum allowed data length for writing a hypfs node is
>>> tested in the generic hypfs_write() function. For custom runtime
>>> parameters this might be wron
On Fri, Sep 11, 2020 at 03:15:28PM +0200, Juergen Gross wrote:
> Making getBridge() static triggered a build error with some gcc versions:
>
> error: 'strncpy' output may be truncated copying 15 bytes from a string of
> length 255 [-Werror=stringop-truncation]
>
> Fix that by printing a sane erro
> On Sep 11, 2020, at 2:39 PM, Jürgen Groß wrote:
>
> On 11.09.20 14:40, George Dunlap wrote:
>>
>> +Conduct Team members
>> +
>> +
>> Conduct Team members are project leadership team members from any
>> sub-project. The current list of Conduct Team members is:
>> +
>> *
On Fri, Sep 11, 2020 at 08:29:51AM +0200, Jan Beulich wrote:
> On 10.09.2020 20:22, Elliott Mitchell wrote:
> > I had *thought* "./" would restrict to capturing files in the current
> > directory, but after some testing and then some reading of the
> > documentation (oh, `git check-ignore` is a thi
flight 154096 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154096/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qcow210 debian-di-installfail REGR. vs. 152631
test-amd64-i386-x
On 11/09/2020 10:49, Jan Beulich wrote:
> On 09.09.2020 11:59, Andrew Cooper wrote:
>> Save the segment selectors with explicit asm, rather than with read_sreg().
>> This permits the use of MOV's m16 encoding, which avoids indirecting the
>> selector value through a register.
> Instead of this, how
On Fri, 11 Sep 2020, George Dunlap wrote:
> The Code of Conduct has been approved [1]; now we need to find it a
> home. Since we've started using sphinx for the hypervisor documents,
> I propose doing the same for the project-wide governance documents, starting
> with the Code of Conduct.
>
> Thi
communication-practice.rst had an incorrect link; it was listed as
being in resolving-disagreements.md, but actually it was in
code-review-guide. Convert this to a normal cross-reference.
Convert titles / sections, lists, quotes, doc references and so on as
before.
Convert figure as appropriate.
Convert title / sections, list formatting, and references as appropriate.
Convert >-based blockquotes to RST-style block quotes. Apply the
following style manually:
* Each quote should be a separate block quote para
* Quotes should be italicized. Labels ("BAD:") will be bold.
For the "express
Convert headers and add necessary spaces to recognize lists.
Use the :doc: tag to cross-reference documents. NB that this will
throw warnings for the documents not yet converted.
No textual changes.
Signed-off-by: George Dunlap
---
source/code-of-conduct.rst| 4 +--
...at
The Code of Conduct has been approved [1]; now we need to find it a
home. Since we've started using sphinx for the hypervisor documents,
I propose doing the same for the project-wide governance documents, starting
with the Code of Conduct.
This series takes Lars' code of conduct tree, written as
Get rid of "change this here" comments.
Break into two sections: "Regulations", which are rules, and "Guides",
which are suggestions.
Remove unused indexes.
Signed-off-by: George Dunlap
---
source/index.rst | 26 +++---
1 file changed, 19 insertions(+), 7 deletions(-)
diff
Convert titles as approproate.
Use inter-doc references for other full docs. Convert other external
links to RST-style references, keeping the labels (3-F). One
exception to this: sphinx noticed that there were two 'D' labels;
rename one to `Shift Left`.
Convert internal link to RST-style refer
Underline section titles.
Convert links to RST-style links. NB that the Communication Guide
link won't work ATM; this will be fixed when we convert that document
to RST.
Adjust the formatting for the list so that it's converted properly.
A couple of clean-ups:
* Expand the label for communicat
---
Makefile | 20 +++
source/conf.py | 52
source/index.rst | 20 +++
3 files changed, 92 insertions(+)
create mode 100644 Makefile
create mode 100644 source/conf.py
create mode 100644 source/index.rst
---
code-of-conduct.md => source/code-of-conduct.md | 0
code-review-guide.md => source/code-review-guide.md | 0
communication-guide.md => source/communication-guide.md | 0
communication-practice.md => source/communication-practice.md | 0
source/index.rst
Hi all,
At the moment, Xen doesn't have a formal memory model. Instead, we are
relying on intuitions. This can lead to heated discussion on what can a
processor/compiler do or not.
We also have some helpers that nearly do the same (such as
{read,write}_atomic() vs ACCESS_ONCE()) with no clea
flight 154120 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154120/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 11/09/2020 06:30, Juergen Gross wrote:
> Today the maximum allowed data length for writing a hypfs node is
> tested in the generic hypfs_write() function. For custom runtime
> parameters this might be wrong, as the maximum allowed size is derived
> from the buffer holding the current setting, wh
Under certain conditions CPUs can speculate into the instruction stream
past a RET instruction. Guard against this just like 3b7dab93f240
("x86/spec-ctrl: Protect against CALL/JMP straight-line speculation")
did - by inserting an "INT $3" insn. It's merely the mechanics of how to
achieve this that
From: Julien Grall
Hi all,
This small series introduced cmpxch64() and guest_cmpxchg64(). This will be
useful when porting IOREQ server to Arm.
Cheers,
Julien Grall (2):
xen/arm: Remove cmpxchg_local() and drop _mb from the other helpers
xen: Introduce cmpxchg64() and guest_cmpxchg64()
x
From: Julien Grall
The current set of helpers are quite confusing to follow as the naming
is not very consistent.
Given that cmpxchg_local() is not used in Xen, drop it completely.
Furthermore, adopt a naming with _mb so all names are now consistent.
Signed-off-by: Julien Grall
---
Change
From: Julien Grall
The IOREQ code is using cmpxchg() with 64-bit value. At the moment, this
is x86 code, but there is plan to make it common.
To cater 32-bit arch, introduce two new helpers to deal with 64-bit
cmpxchg().
The Arm 32-bit implementation of cmpxchg64() is based on the __cmpxchg64
i
On 11/09/2020 11:34, Jan Beulich wrote:
> When a page table page gets de-validated, its type reference count drops
> to zero (and PGT_validated gets cleared), but its type remains intact.
> XEN_DOMCTL_getpageframeinfo3, therefore, so far reported prior usage for
> such pages. An intermediate write
On 11/09/2020 11:35, Jan Beulich wrote:
> One less aspect to keep an eye on for things to stay in sync.
>
> Signed-off-by: Jan Beulich
Acked-by: Andrew Cooper
> On 11 Sep 2020, at 15:25, Julien Grall wrote:
>
> Hi Bertrand,
>
> On 11/09/2020 14:56, Bertrand Marquis wrote:
>>> On 11 Sep 2020, at 14:51, Julien Grall wrote:
>>>
>>> Hi Bertrand,
>>>
>>> On 11/09/2020 14:32, Bertrand Marquis wrote:
> On 11 Sep 2020, at 14:11, Jan Beulich wrote:
On 8/21/20 6:22 PM, Anchal Agarwal wrote:
>
> Known issues:
> 1.KASLR causes intermittent hibernation failures. VM fails to resumes and
> has to be restarted. I will investigate this issue separately and shouldn't
> be a blocker for this patch series.
Is there any change in status for this? Thi
On 9/6/20 2:51 AM, Souptick Joarder wrote:
> In 2019, we introduced pin_user_pages*() and now we are converting
> get_user_pages*() to the new API as appropriate. [1] & [2] could
> be referred for more information. This is case 5 as per document [1].
>
> [1] Documentation/core-api/pin_user_pages.
This helps overcome problems observed with some UEFI implementations
which don't set the Attributes field in memery descriptors properly
Signed-off-by: Sergey Temerkhanov
---
xen/common/efi/boot.c| 27 ++-
xen/include/efi/efidef.h | 6 ++
2 files changed, 32 inse
On 9/6/20 2:51 AM, Souptick Joarder wrote:
> There seems to be a bug in the original code when gntdev_get_page()
> is called with writeable=true then the page needs to be marked dirty
> before being put.
>
> To address this, a bool writeable is added in gnt_dev_copy_batch, set
> it in gntdev_gran
On 11/09/2020 14:11, Jan Beulich wrote:
All,
the releases are about due, but will of course want to wait for the
XSA fixes going public on the 22nd. Please point out backports
you find missing from the respective staging branches, but which
you consider relevant. (Ian, Julien, Stefano: I noti
Hi Bertrand,
On 11/09/2020 14:56, Bertrand Marquis wrote:
On 11 Sep 2020, at 14:51, Julien Grall wrote:
Hi Bertrand,
On 11/09/2020 14:32, Bertrand Marquis wrote:
On 11 Sep 2020, at 14:11, Jan Beulich wrote:
All,
the releases are about due, but will of course want to wait for the
XSA fi
On 11.09.20 16:02, Andrew Cooper wrote:
On 11/09/2020 13:28, Jürgen Groß wrote:
On 11.09.20 14:14, Andrew Cooper wrote:
On 11/09/2020 06:30, Juergen Gross wrote:
Today the maximum allowed data length for writing a hypfs node is
tested in the generic hypfs_write() function. For custom runtime
p
> On 11 Sep 2020, at 14:51, Julien Grall wrote:
>
> Hi Bertrand,
>
> On 11/09/2020 14:32, Bertrand Marquis wrote:
>>> On 11 Sep 2020, at 14:11, Jan Beulich wrote:
>>>
>>> All,
>>>
>>> the releases are about due, but will of course want to wait for the
>>> XSA fixes going public on the 22nd
Hi Bertrand,
On 11/09/2020 14:32, Bertrand Marquis wrote:
On 11 Sep 2020, at 14:11, Jan Beulich wrote:
All,
the releases are about due, but will of course want to wait for the
XSA fixes going public on the 22nd. Please point out backports
you find missing from the respective staging branches,
On 11.09.2020 15:32, Bertrand Marquis wrote:
>
>
>> On 11 Sep 2020, at 14:11, Jan Beulich wrote:
>>
>> All,
>>
>> the releases are about due, but will of course want to wait for the
>> XSA fixes going public on the 22nd. Please point out backports
>> you find missing from the respective staging
On 11.09.20 14:40, George Dunlap wrote:
Underline section titles.
Convert links to RST-style links. NB that the Communication Guide
link won't work ATM; this will be fixed when we convert that document
to RST.
Adjust the formatting for the list so that it's converted properly.
A couple of cle
> On 11 Sep 2020, at 14:11, Jan Beulich wrote:
>
> All,
>
> the releases are about due, but will of course want to wait for the
> XSA fixes going public on the 22nd. Please point out backports
> you find missing from the respective staging branches, but which
> you consider relevant. (Ian, Ju
On 11.09.2020 14:53, Andrew Cooper wrote:
> On 11/09/2020 10:49, Jan Beulich wrote:
>> On 09.09.2020 11:59, Andrew Cooper wrote:
>>> Save the segment selectors with explicit asm, rather than with read_sreg().
>>> This permits the use of MOV's m16 encoding, which avoids indirecting the
>>> selector
flight 154090 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154090/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 11 guest-start fail REGR. vs. 154016
test-amd64-amd64-x
Making getBridge() static triggered a build error with some gcc versions:
error: 'strncpy' output may be truncated copying 15 bytes from a string of
length 255 [-Werror=stringop-truncation]
Fix that by printing a sane error message and bailing out in case the name of
a bridge is too long.
Fixes:
All,
the releases are about due, but will of course want to wait for the
XSA fixes going public on the 22nd. Please point out backports
you find missing from the respective staging branches, but which
you consider relevant. (Ian, Julien, Stefano: I notice there once
again haven't been any tools or
On 11.09.2020 13:55, Andrew Cooper wrote:
> On 11/09/2020 11:34, Jan Beulich wrote:
>> When a page table page gets de-validated, its type reference count drops
>> to zero (and PGT_validated gets cleared), but its type remains intact.
>> XEN_DOMCTL_getpageframeinfo3, therefore, so far reported prior
> On 11 Sep 2020, at 11:45, Jan Beulich wrote:
>
> Recent versions of gcc (at least 10.x) will not inline generic atomics
> helpers by default. Instead they will expect the software to either link
> with libatomic.so or implement the helpers, which would result in
>
> undefined reference to
Hi Jan,
On 11/09/2020 11:45, Jan Beulich wrote:
Recent versions of gcc (at least 10.x) will not inline generic atomics
helpers by default. Instead they will expect the software to either link
with libatomic.so or implement the helpers, which would result in
undefined reference to `__aarch64_lda
On 11.09.20 14:14, Andrew Cooper wrote:
On 11/09/2020 06:30, Juergen Gross wrote:
Today the maximum allowed data length for writing a hypfs node is
tested in the generic hypfs_write() function. For custom runtime
parameters this might be wrong, as the maximum allowed size is derived
from the buf
On 10.09.2020 16:41, Jan Beulich wrote:
> On 10.09.2020 15:35, Roger Pau Monne wrote:
>> arch_init_memory will treat all the gaps on the physical memory map
>> between RAM regions as MMIO and use share_xen_page_with_guest in order
>> to assign them to dom_io. This has the side effect of setting the
Recent versions of gcc (at least 10.x) will not inline generic atomics
helpers by default. Instead they will expect the software to either link
with libatomic.so or implement the helpers, which would result in
undefined reference to `__aarch64_ldadd4_acq_rel'
for us (not having any local impleme
On 24.08.2020 14:08, Jan Beulich wrote:
> Address at least the primary reason why 52bba67f8b87 ("efi/boot: Don't
> free ebmalloc area at all") was put in place: Make xen_in_range() aware
> of the freed range. This is in particular relevant for EFI-enabled
> builds not actually running on EFI, as th
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-pygrub
testid debian-di-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits
virtio-mem adds memory in memory block granularity, to be able to
remove it in the same granularity again later, and to grow slowly on
demand. This, however, results in quite a lot of resources when
adding a lot of memory. Resources are effectively stored in a list-based
tree. Having a lot of resou
Let's try to merge system ram resources we add, to minimize the number
of resources in /proc/iomem. We don't care about the boundaries of
individual chunks we added.
Reviewed-by: Wei Liu
Cc: Andrew Morton
Cc: Michal Hocko
Cc: "K. Y. Srinivasan"
Cc: Haiyang Zhang
Cc: Stephen Hemminger
Cc: Wei
We soon want to pass flags via a new type to add_memory() and friends.
That revealed that we currently don't guard some declarations by
CONFIG_MEMORY_HOTPLUG.
While some definitions could be moved to different places, let's keep it
minimal for now and use CONFIG_MEMORY_HOTPLUG for all functions on
We soon want to pass flags, e.g., to mark added System RAM resources.
mergeable. Prepare for that.
This patch is based on a similar patch by Oscar Salvador:
https://lkml.kernel.org/r/20190625075227.15193-3-osalva...@suse.de
Acked-by: Wei Liu
Reviewed-by: Juergen Gross # Xen related part
Review
Some add_memory*() users add memory in small, contiguous memory blocks.
Examples include virtio-mem, hyper-v balloon, and the XEN balloon.
This can quickly result in a lot of memory resources, whereby the actual
resource boundaries are not of interest (e.g., it might be relevant for
DIMMs, exposed
IORESOURCE_MEM_DRIVER_MANAGED currently uses an unused PnP bit, which is
always set to 0 by hardware. This is far from beautiful (and confusing),
and the bit only applies to SYSRAM. So let's move it out of the
bus-specific (PnP) defined bits.
We'll add another SYSRAM specific bit soon. If we ever
Let's try to merge system ram resources we add, to minimize the number
of resources in /proc/iomem. We don't care about the boundaries of
individual chunks we added.
Reviewed-by: Juergen Gross
Cc: Andrew Morton
Cc: Michal Hocko
Cc: Boris Ostrovsky
Cc: Juergen Gross
Cc: Stefano Stabellini
Cc:
Let's make sure splitting a resource on memory hotunplug will never fail.
This will become more relevant once we merge selected System RAM
resources - then, we'll trigger that case more often on memory hotunplug.
In general, this function is already unlikely to fail. When we remove
memory, we free
Some add_memory*() users add memory in small, contiguous memory blocks.
Examples include virtio-mem, hyper-v balloon, and the XEN balloon.
This can quickly result in a lot of memory resources, whereby the actual
resource boundaries are not of interest (e.g., it might be relevant for
DIMMs, exposed
One less aspect to keep an eye on for things to stay in sync.
Signed-off-by: Jan Beulich
---
FAOD I did consider (and even try) reducing the scope of ptwr_ctxt at
the same occasion - this results in worse code with gcc 10 at least, as
the compiler then indeed defers populating of the struct, and
When a page table page gets de-validated, its type reference count drops
to zero (and PGT_validated gets cleared), but its type remains intact.
XEN_DOMCTL_getpageframeinfo3, therefore, so far reported prior usage for
such pages. An intermediate write to such a page via e.g.
MMU_NORMAL_PT_UPDATE, ho
Hello all.
/*
diff --git a/xen/include/asm-arm/hvm/ioreq.h b/xen/include/asm-arm/hvm/ioreq.h
new file mode 100644
index 000..1c34df0
--- /dev/null
+++ b/xen/include/asm-arm/hvm/ioreq.h
@@ -0,0 +1,108 @@
+/*
+ * hvm.h: Hardware virtual machine assist interface definitions.
+ *
+ * Copyri
On 09.09.2020 11:59, Andrew Cooper wrote:
> is_pv_32bit_domain() is an expensive predicate, but isn't used for speculative
> safety in this case. Swap to checking the Long Mode bit in the CPUID policy,
> which is the architecturally correct behaviour.
>
> is_canonical_address() isn't a trivial pr
On 09.09.2020 11:59, Andrew Cooper wrote:
> Save the segment selectors with explicit asm, rather than with read_sreg().
> This permits the use of MOV's m16 encoding, which avoids indirecting the
> selector value through a register.
Instead of this, how about making read_sreg() look like
#define r
On 11.09.2020 07:30, Juergen Gross wrote:
> Today the maximum allowed data length for writing a hypfs node is
> tested in the generic hypfs_write() function. For custom runtime
> parameters this might be wrong, as the maximum allowed size is derived
> from the buffer holding the current setting, wh
From: Paul Durrant
This patch converts the VT-d code to use the new IOMMU page table allocator
function. This allows all the free-ing code to be removed (since it is now
handled by the general x86 code) which reduces TLB and cache thrashing as well
as shortening the code.
The scope of the mappin
From: Paul Durrant
This patch avoids calling iommu_iotlb_flush() for each individual GNTTABOP and
instead calls iommu_iotlb_flush_all() at the end of a batch. This should mean
non-singleton map/unmap operations perform better.
NOTE: A batch is the number of operations done before a pre-emption c
From: Paul Durrant
The VT-d and AMD IOMMU implementations both use the general x86 IOMMU page
table allocator and ARM always shares page tables with CPU. Hence there is no
need to retain the free_page_table() method or the tasklet which invokes it.
Signed-off-by: Paul Durrant
Reviewed-by: Jan B
From: Paul Durrant
Paul Durrant (8):
x86/iommu: convert VT-d code to use new page table allocator
iommu: remove unused iommu_ops method and tasklet
iommu: flush I/O TLB if iommu_map() or iommu_unmap() fail
iommu: make map and unmap take a page count, similar to flush
remove remaining us
From: Paul Durrant
It's confusing and not consistent with the terminology introduced with 'dfn_t'.
Just call them IOMMU page tables.
Also remove a pointless check of the 'acpi_drhd_units' list in
vtd_dump_page_table_level(). If the list is empty then IOMMU mappings would
not have been enabled fo
From: Paul Durrant
This patch adds a full I/O TLB flush to the error paths of iommu_map() and
iommu_unmap().
Without this change callers need constructs such as:
rc = iommu_map/unmap(...)
err = iommu_flush(...)
if ( !rc )
rc = err;
With this change, it can be simplified to:
rc = iommu_map/u
On 11.09.20 04:21, kernel test robot wrote:
> Hi David,
>
> I love your patch! Yet something to improve:
>
> [auto build test ERROR on next-20200909]
> [cannot apply to mmotm/master hnaz-linux-mm/master xen-tip/linux-next
> powerpc/next linus/master v5.9-rc4 v5.9-rc3 v5.9-rc2 v5.9-rc4]
> [If you
From: Paul Durrant
At the moment iommu_map() and iommu_unmap() take a page order rather than a
count, whereas iommu_iotlb_flush() takes a page count rather than an order.
This patch makes them consistent with each other, opting for a page count since
CPU page orders are not necessarily the same a
From: Paul Durrant
The 'legacy' functions do implicit flushing so amend the callers to do the
appropriate flushing.
Unfortunately, because of the structure of the P2M code, we cannot remove
the per-CPU 'iommu_dont_flush_iotlb' global and the optimization it
facilitates. It is now checked directl
From: Paul Durrant
Sharing of HAP tables is now VT-d specific so the operation is never defined
for AMD IOMMU any more. There's also no need to pro-actively set vtd.pgd_maddr
when using shared EPT as it is straightforward to simply define a helper
function to return the appropriate value in the s
On 11.09.20 10:59, Paul Durrant wrote:
Hi
De-htmling...
-
From: Oleksandr Tyshchenko
Sent: 10 September 2020 19:20
To: Durrant, Paul
Cc: Bertrand Marquis ; Paul Durrant ; open list:X86 ; Jan Beulich
; Andrew Cooper ; Wei Liu ; Roger Pau Monné ;
George Dunlap ; Ian Jackson ; Julien Gr
De-htmling...
-
From: Oleksandr Tyshchenko
Sent: 10 September 2020 19:20
To: Durrant, Paul
Cc: Bertrand Marquis ; Paul Durrant ;
open list:X86 ; Jan Beulich
; Andrew Cooper ; Wei Liu
; Roger Pau Monné ; George Dunlap
; Ian Jackson ; Julien
Grall ; Stefano Stabellini ; Jun
Nakajima ; K
flight 154097 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154097/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-buildfail REGR. vs. 151777
build-amd64-libvirt
flight 154078 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/154078/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 7 xen-boot fail REGR. vs.
152332
test-amd64-
89 matches
Mail list logo