[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 132544: regressions - FAIL



flight 132544 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/132544/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 16 
guest-localmigrate/x10 fail REGR. vs. 132422

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop            fail like 132422
 test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop            fail like 132422
 test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop             fail like 132422
 test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop             fail like 132422
 test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop            fail like 132422
 test-armhf-armhf-libvirt     14 saverestore-support-check    fail  like 132422
 test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop            fail like 132422
 test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop             fail like 132422
 test-armhf-armhf-libvirt-raw 13 saverestore-support-check    fail  like 132422
 test-amd64-i386-xl-pvshim    12 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  13 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      13 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 13 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check 
fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check 
fail never pass
 test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-xl-arndale  13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  14 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 13 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 14 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 13 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 14 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      13 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop              fail never pass
 test-armhf-armhf-libvirt-raw 12 migrate-support-check        fail   never pass
 test-amd64-i386-xl-qemuu-win10-i386 10 windows-install         fail never pass
 test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install        fail never pass
 test-amd64-amd64-xl-qemut-win10-i386 10 windows-install        fail never pass
 test-amd64-i386-xl-qemut-win10-i386 10 windows-install         fail never pass

version targeted for testing:
 xen                  f19a199281a23725beb73bef61eb8964d8e225ce
baseline version:
 xen                  08b908ba63dee8bc313983c5e412852cbcbcda85

Last test of basis   132422  2019-01-23 08:09:34 Z    6 days
Failing since        132457  2019-01-24 14:59:50 Z    5 days    4 attempts
Testing same since   132544  2019-01-28 21:22:51 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Andrii Anisov <andrii_anisov@xxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxx>
  Norbert Manthey <nmanthey@xxxxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumprun                                          pass    
 build-i386-rumprun                                           pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        fail    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumprun-amd64                               pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumprun-i386                                 pass    
 test-amd64-amd64-xl-qemut-win10-i386                         fail    
 test-amd64-i386-xl-qemut-win10-i386                          fail    
 test-amd64-amd64-xl-qemuu-win10-i386                         fail    
 test-amd64-i386-xl-qemuu-win10-i386                          fail    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit f19a199281a23725beb73bef61eb8964d8e225ce
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Jan 28 17:40:39 2019 +0100

    x86/AMD: flush TLB after ucode update
    
    The increased number of messages (spec_ctrl.c:print_details()) within a
    certain time window made me notice some slowness of boot time screen
    output. Experimentally I've narrowed the time window to be from
    immediately after the early ucode update on the BSP to the PAT write in
    cpu_init(), which upon further investigation has an effect because of
    the full TLB flush that's implied by that write.
    
    For that reason, as a workaround, flush the TLB of the mapping of the
    page that holds the blob. Note that flushing just a single page is
    sufficient: As per verify_patch_size() patch size can't exceed 4k, and
    the way xmalloc() works the blob can't be crossing a page boundary.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Brian Woods <brian.woods@xxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit fd2f602c2f85944beb715559136f752a282b3836
Author: Norbert Manthey <nmanthey@xxxxxxxxx>
Date:   Mon Jan 28 17:38:29 2019 +0100

    x86/CPUID: block speculative out-of-bound accesses
    
    During instruction emulation, the cpuid instruction is emulated with
    data that is controlled by the guest. As speculation might pass bound
    checks, we have to ensure that no out-of-bound loads are possible.
    
    To not rely on the compiler to perform value propagation, instead of
    using the array_index_nospec macro, we replace the variable with the
    constant to be propagated instead.
    
    This commit is part of the SpectreV1+L1TF mitigation patch series.
    
    Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 73e1fb1aec437b4ded7e40efeb8e0589bebdad7a
Author: Norbert Manthey <nmanthey@xxxxxxxxx>
Date:   Mon Jan 28 17:37:20 2019 +0100

    x86/hvm/hpet: block speculative out-of-bound accesses
    
    When interacting with hpet, read and write operations can be executed
    during instruction emulation, where the guest controls the data that
    is used. As it is hard to predict the number of instructions that are
    executed speculatively, we prevent out-of-bound accesses by using the
    array_index_nospec function for guest specified addresses that should
    be used for hpet operations.
    
    We introduce another macro that uses the ARRAY_SIZE macro to block
    speculative accesses. For arrays that are statically accessed, this macro
    can be used instead of the usual macro. Using this macro results in more
    readable code, and allows to modify the way this case is handled in a
    single place.
    
    This commit is part of the SpectreV1+L1TF mitigation patch series.
    
    Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 3ec62664bdd67dc0c41ff22198c406729b3c87a4
Author: George Dunlap <george.dunlap@xxxxxxxxxx>
Date:   Thu Jan 24 17:48:27 2019 +0000

    docs: Fix dm_restrict documentation
    
    Remove "chatty" and redundant information from the xl man page;
    restrict it to functional descriptions only, and point instead to
    qemu-depriv.pandoc and SUPPORT.md as locations for "canonical"
    information.
    
    Add a man page entry for device_model_user.
    
    Update qemu-deprivilege.pandoc:
    
    Changes in missing feature list:
    - Migration is functional
    - But qdisk backends are not
    
    Add a missing restriction list.
    
    The following statements from the man page are dropped:
    - Mentioning PV; PV guests never have a device model.
    - Drop the confusing statement about stdvga and cirrus vga options.
    - Re-used domain IDs are now handled.
    - Device models should no longer be able to create world-readable
      files on dom0's filesystem.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 3389a8dc8c5753a3c84744923cd0193395e3f2a9
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Fri Jan 25 09:49:50 2019 +0100

    iommu: fix order of arguments in iommu_map call at iommu_hwdom_init
    
    The order of the page_order and the flags parameters are inverted in
    the call to iommu_map made in iommu_hwdom_init.
    
    Fixes: e8afe1124cc1 ("iommu: elide flushing for higher order map/unmap 
operations")
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit ba9b5a09da01960848ae9d30a34fb9073efb4f13
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Fri Jan 25 09:48:38 2019 +0100

    amd/iommu: fix present bit checking when clearing PTE
    
    The current check for the present bit is wrong, since the present bit
    is located in the low part of the entry.
    
    Fixes: e8afe1124cc1 ("iommu: elide flushing for higher order map/unmap 
operations")
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Brian Woods <brian.woods@xxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 9e92acf1b752dfdfb294234b32d1fa9f55bfdc0f
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Thu Jul 24 11:06:39 2014 +0100

    xen/sched: Introduce domain_vcpu() helper
    
    The progression of multi-vcpu support in Xen (originally a single pointer,
    then an embedded d->vcpu[] array, then a dynamically allocated array) has
    resulted in a large quantity of ad-hoc code for looking a vcpu up by id, 
and a
    large number of ways that the toolstack can cause Xen to trip over a NULL
    pointer.  Some of this has been addressed in Xen 4.12, and work is ongoing.
    
    Another property of looking a vcpu up by id is that it is frequently done in
    unprivileged hypercall context, making it an attractive target for 
speculative
    sidechannel attacks.
    
    Introduce a helper to do the lookup correctly, and without speculative
    interference.  For performance reasons, it is useful not to have an 
smp_rmb()
    in this helper on ARM, and luckily this is safe to do, because of the
    serialisation offered by the global domlist lock.
    
    As a minor change noticed when checking the safety of this construct, sanity
    check during boot that idle->max_vcpus is a suitable upper bound for
    idle->vcpu[].
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit e3b418ac491919127211b4d3c692d431061d7c09
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri Dec 21 17:23:32 2018 +0000

    x86/pvh-dom0: Remove unnecessary function pointer call from 
modify_identity_mmio()
    
    Function pointer calls are far more expensive in a post-Spectre world, and
    this one doesn't need to be.
    
    No functional change.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit e1fe5f9c389286b16171c632b3063bcc65cec07e
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri Dec 7 13:43:27 2018 +0000

    xen/dom0: Add a dom0-iommu=none option
    
    For development purposes, it is very convenient to boot Xen as a PVH guest,
    with an XTF PV or PVH "dom0".  The edit-compile-go cycle is a matter of
    seconds, and you can reasonably insert printk() debugging in places which
    which would be completely infeasible when booting fully-fledged guests.
    
    However, the PVH dom0 path insists on having a working IOMMU, which doesn't
    exist when virtualised as a PVH guest, and isn't necessary for XTF anyway.
    
    Introduce a developer mode to skip the IOMMU requirement.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit b7e8dee07cdc9714d79a2d4eb524c17705a596e4
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Dec 31 14:06:52 2018 +0000

    xen/dom0: Deprecate iommu_hwdom_inclusive and leave it disabled by default
    
    This option is unique to x86 PV dom0's, but it is not sensible to have a
    catch-all which blindly maps all non-RAM regions into the IOMMU.
    
    The map-reserved option remains, and covers all the buggy firmware issues 
that
    I am aware of.  The two common cases are legacy USB keyboard emulation, and
    the BMC mailbox used by vendor firmware in NICs/HBAs to report information
    back to the iLO/iDRAC/etc for remote remote management purposes.
    
    A specific advantage of this change is that x86 dom0's IOMMU setup is now
    consistent between PV and PVH.
    
    This change is not expected to have any impact, due to map-reserved 
remaining.
    In the unlikely case that it does cause an issue, we should introduce other
    map-$SPECIFIC options rather than re-introducing this catch-all.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 633a4094732100c645c41b0fa9087cb432ca1e11
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Dec 10 21:29:10 2018 +0000

    docs: Improve documentation and parsing for efi=
    
    Update parse_efi_param() to use parse_boolean() for "rs", so it behaves
    like other Xen booleans.
    
    However, change "attr=uc" to not be a boolean.  "no-attr=uc" is ambiguous 
and
    shouldn't be accepted, but accept "attr=no" as an acceptable alternative.
    
    Update the command line documentation for consistency.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 30f5047b2c4e577436b505ba7627f34c3be02014
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Fri Nov 30 17:15:33 2018 +0000

    xen/arm: gic: Make sure the number of interrupt lines is valid before using 
it
    
    GICv2 and GICv3 supports up to 1020 interrupts. However, the value computed
    from GICD_TYPER.ITLinesNumber can be up to 1024. On GICv3, we will end up to
    write in reserved registers that are right after the IROUTERs one as the
    value is not capped early enough.
    
    Cap the number of interrupts as soon as we compute it so we know we can
    safely using it afterwards.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Reported-by: Jan-Peter Larsson <Jan-Peter.Larsson@xxxxxxx>
    Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
    Release-Acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 9ed527dc95dd8f1871fc5c9f6fa5a58fbd0379a1
Author: Andrii Anisov <andrii_anisov@xxxxxxxx>
Date:   Wed Jan 23 14:50:07 2019 +0200

    arm/p2m: call iommu iotlb flush if iommu exists and enabled
    
    Taking decision by `need_iommu_pt_sync()` make us never kicking
    `iommu_iotlb_flush()` for IOMMUs which do share P2M with CPU.
    So check `has_iommu_pt()` instead.
    
    Signed-off-by: Andrii Anisov <andrii_anisov@xxxxxxxx>
    Reviewed-by: Paul Durant <paul.durrant@xxxxxxxxxx>
    Release-Acked-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.