All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
@ 2015-02-27 11:33 Roger Pau Monne
  2015-03-04 16:53 ` David Vrabel
                   ` (3 more replies)
  0 siblings, 4 replies; 10+ messages in thread
From: Roger Pau Monne @ 2015-02-27 11:33 UTC (permalink / raw)
  To: xen-devel
  Cc: Kevin Tian, Suravee Suthikulpanit, Aravind Gopalakrishnan,
	Jan Beulich, Yang Zhang, Roger Pau Monne

iommu_share_p2m_table should not prevent PVH guests from using a shared page
table between the IOMMU and EPT. Clean the code by removing the asserts in
the vendor specific implementations (amd_iommu_share_p2m, iommu_set_pgd),
and moving the hap_enabled assert to the caller (iommu_share_p2m_table).

Also fix another incorrect usage of is_hvm_domain usage in
arch_iommu_populate_page_table. This has not given problems so far because
all the pages in PVH guests are of type PGT_writable_page.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Cc: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
Cc: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@amd.com>
Cc: Jan Beulich <jbeulich@suse.com>
Cc: Yang Zhang <yang.z.zhang@intel.com>
Cc: Kevin Tian <kevin.tian@intel.com>
---
Changes since v1:
 - Reword commit message.
 - Move the hap_enabled assert from vendor implementation to the generic
   code.
 - Remove the has_hvm_container_domain condition from iommu_share_p2m_table,
   hap_enabled is more restrictive.
---
 xen/drivers/passthrough/amd/iommu_map.c | 2 --
 xen/drivers/passthrough/iommu.c         | 3 ++-
 xen/drivers/passthrough/vtd/iommu.c     | 2 --
 xen/drivers/passthrough/x86/iommu.c     | 2 +-
 4 files changed, 3 insertions(+), 6 deletions(-)

diff --git a/xen/drivers/passthrough/amd/iommu_map.c b/xen/drivers/passthrough/amd/iommu_map.c
index a8c60ec..31dc05d 100644
--- a/xen/drivers/passthrough/amd/iommu_map.c
+++ b/xen/drivers/passthrough/amd/iommu_map.c
@@ -785,8 +785,6 @@ void amd_iommu_share_p2m(struct domain *d)
     struct page_info *p2m_table;
     mfn_t pgd_mfn;
 
-    ASSERT( is_hvm_domain(d) && d->arch.hvm_domain.hap_enabled );
-
     if ( !iommu_use_hap_pt(d) )
         return;
 
diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
index cc12735..7fcbbb1 100644
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct domain* d)
 {
     const struct iommu_ops *ops = iommu_get_ops();
 
-    if ( iommu_enabled && is_hvm_domain(d) )
+    ASSERT( hap_enabled(d) );
+    if ( iommu_enabled )
         ops->share_p2m(d);
 }
 
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 2e113d7..ff542cb 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -1788,8 +1788,6 @@ static void iommu_set_pgd(struct domain *d)
     struct hvm_iommu *hd  = domain_hvm_iommu(d);
     mfn_t pgd_mfn;
 
-    ASSERT( is_hvm_domain(d) && d->arch.hvm_domain.hap_enabled );
-
     if ( !iommu_use_hap_pt(d) )
         return;
 
diff --git a/xen/drivers/passthrough/x86/iommu.c b/xen/drivers/passthrough/x86/iommu.c
index 52d8948..9eb8d33 100644
--- a/xen/drivers/passthrough/x86/iommu.c
+++ b/xen/drivers/passthrough/x86/iommu.c
@@ -56,7 +56,7 @@ int arch_iommu_populate_page_table(struct domain *d)
 
     while ( !rc && (page = page_list_remove_head(&d->page_list)) )
     {
-        if ( is_hvm_domain(d) ||
+        if ( has_hvm_container_domain(d) ||
             (page->u.inuse.type_info & PGT_type_mask) == PGT_writable_page )
         {
             BUG_ON(SHARED_M2P(mfn_to_gmfn(d, page_to_mfn(page))));
-- 
1.9.3 (Apple Git-50)


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-02-27 11:33 [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests Roger Pau Monne
@ 2015-03-04 16:53 ` David Vrabel
  2015-03-05  9:49 ` Tim Deegan
                   ` (2 subsequent siblings)
  3 siblings, 0 replies; 10+ messages in thread
From: David Vrabel @ 2015-03-04 16:53 UTC (permalink / raw)
  To: Roger Pau Monne, xen-devel
  Cc: Yang Zhang, Kevin Tian, Aravind Gopalakrishnan, Jan Beulich,
	Suravee Suthikulpanit

On 27/02/15 11:33, Roger Pau Monne wrote:
> iommu_share_p2m_table should not prevent PVH guests from using a shared page
> table between the IOMMU and EPT. Clean the code by removing the asserts in
> the vendor specific implementations (amd_iommu_share_p2m, iommu_set_pgd),
> and moving the hap_enabled assert to the caller (iommu_share_p2m_table).
> 
> Also fix another incorrect usage of is_hvm_domain usage in
> arch_iommu_populate_page_table. This has not given problems so far because
> all the pages in PVH guests are of type PGT_writable_page.

dom0 PVH failed to boot on my test system without this patch so:

Tested-by: David Vrabel <david.vrabel@citrix.com>

Thanks.

David

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-02-27 11:33 [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests Roger Pau Monne
  2015-03-04 16:53 ` David Vrabel
@ 2015-03-05  9:49 ` Tim Deegan
  2015-03-09  3:30 ` Tian, Kevin
  2015-03-10 12:51 ` Julien Grall
  3 siblings, 0 replies; 10+ messages in thread
From: Tim Deegan @ 2015-03-05  9:49 UTC (permalink / raw)
  To: Roger Pau Monne
  Cc: Kevin Tian, Suravee Suthikulpanit, Aravind Gopalakrishnan,
	Jan Beulich, Yang Zhang, xen-devel

At 12:33 +0100 on 27 Feb (1425036812), Roger Pau Monne wrote:
> iommu_share_p2m_table should not prevent PVH guests from using a shared page
> table between the IOMMU and EPT. Clean the code by removing the asserts in
> the vendor specific implementations (amd_iommu_share_p2m, iommu_set_pgd),
> and moving the hap_enabled assert to the caller (iommu_share_p2m_table).
> 
> Also fix another incorrect usage of is_hvm_domain usage in
> arch_iommu_populate_page_table. This has not given problems so far because
> all the pages in PVH guests are of type PGT_writable_page.
> 
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>

Reviewed-by: Tim Deegan <tim@xen.org>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-02-27 11:33 [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests Roger Pau Monne
  2015-03-04 16:53 ` David Vrabel
  2015-03-05  9:49 ` Tim Deegan
@ 2015-03-09  3:30 ` Tian, Kevin
  2015-03-09  9:02   ` Roger Pau Monné
  2015-03-10 12:51 ` Julien Grall
  3 siblings, 1 reply; 10+ messages in thread
From: Tian, Kevin @ 2015-03-09  3:30 UTC (permalink / raw)
  To: Roger Pau Monne, xen-devel
  Cc: Zhang, Yang Z, Aravind Gopalakrishnan, Jan Beulich,
	Suravee Suthikulpanit

> From: Roger Pau Monne [mailto:roger.pau@citrix.com]
> Sent: Friday, February 27, 2015 7:34 PM
> 
> iommu_share_p2m_table should not prevent PVH guests from using a shared
> page
> table between the IOMMU and EPT. Clean the code by removing the asserts in
> the vendor specific implementations (amd_iommu_share_p2m,
> iommu_set_pgd),
> and moving the hap_enabled assert to the caller (iommu_share_p2m_table).
> 
> Also fix another incorrect usage of is_hvm_domain usage in
> arch_iommu_populate_page_table. This has not given problems so far
> because
> all the pages in PVH guests are of type PGT_writable_page.
> 
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> Cc: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
> Cc: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@amd.com>
> Cc: Jan Beulich <jbeulich@suse.com>
> Cc: Yang Zhang <yang.z.zhang@intel.com>
> Cc: Kevin Tian <kevin.tian@intel.com>

Acked-by: Kevin Tian <kevin.tian@intel.com>

btw, does this patch fix your earlier iommu faults with PVH Dom0?

Thanks
Kevin

> ---
> Changes since v1:
>  - Reword commit message.
>  - Move the hap_enabled assert from vendor implementation to the generic
>    code.
>  - Remove the has_hvm_container_domain condition from
> iommu_share_p2m_table,
>    hap_enabled is more restrictive.
> ---
>  xen/drivers/passthrough/amd/iommu_map.c | 2 --
>  xen/drivers/passthrough/iommu.c         | 3 ++-
>  xen/drivers/passthrough/vtd/iommu.c     | 2 --
>  xen/drivers/passthrough/x86/iommu.c     | 2 +-
>  4 files changed, 3 insertions(+), 6 deletions(-)
> 
> diff --git a/xen/drivers/passthrough/amd/iommu_map.c
> b/xen/drivers/passthrough/amd/iommu_map.c
> index a8c60ec..31dc05d 100644
> --- a/xen/drivers/passthrough/amd/iommu_map.c
> +++ b/xen/drivers/passthrough/amd/iommu_map.c
> @@ -785,8 +785,6 @@ void amd_iommu_share_p2m(struct domain *d)
>      struct page_info *p2m_table;
>      mfn_t pgd_mfn;
> 
> -    ASSERT( is_hvm_domain(d) && d->arch.hvm_domain.hap_enabled );
> -
>      if ( !iommu_use_hap_pt(d) )
>          return;
> 
> diff --git a/xen/drivers/passthrough/iommu.c
> b/xen/drivers/passthrough/iommu.c
> index cc12735..7fcbbb1 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct domain* d)
>  {
>      const struct iommu_ops *ops = iommu_get_ops();
> 
> -    if ( iommu_enabled && is_hvm_domain(d) )
> +    ASSERT( hap_enabled(d) );
> +    if ( iommu_enabled )
>          ops->share_p2m(d);
>  }
> 
> diff --git a/xen/drivers/passthrough/vtd/iommu.c
> b/xen/drivers/passthrough/vtd/iommu.c
> index 2e113d7..ff542cb 100644
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -1788,8 +1788,6 @@ static void iommu_set_pgd(struct domain *d)
>      struct hvm_iommu *hd  = domain_hvm_iommu(d);
>      mfn_t pgd_mfn;
> 
> -    ASSERT( is_hvm_domain(d) && d->arch.hvm_domain.hap_enabled );
> -
>      if ( !iommu_use_hap_pt(d) )
>          return;
> 
> diff --git a/xen/drivers/passthrough/x86/iommu.c
> b/xen/drivers/passthrough/x86/iommu.c
> index 52d8948..9eb8d33 100644
> --- a/xen/drivers/passthrough/x86/iommu.c
> +++ b/xen/drivers/passthrough/x86/iommu.c
> @@ -56,7 +56,7 @@ int arch_iommu_populate_page_table(struct domain *d)
> 
>      while ( !rc && (page = page_list_remove_head(&d->page_list)) )
>      {
> -        if ( is_hvm_domain(d) ||
> +        if ( has_hvm_container_domain(d) ||
>              (page->u.inuse.type_info & PGT_type_mask) ==
> PGT_writable_page )
>          {
>              BUG_ON(SHARED_M2P(mfn_to_gmfn(d,
> page_to_mfn(page))));
> --
> 1.9.3 (Apple Git-50)

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-03-09  3:30 ` Tian, Kevin
@ 2015-03-09  9:02   ` Roger Pau Monné
  0 siblings, 0 replies; 10+ messages in thread
From: Roger Pau Monné @ 2015-03-09  9:02 UTC (permalink / raw)
  To: Tian, Kevin, xen-devel
  Cc: Zhang, Yang Z, Aravind Gopalakrishnan, Jan Beulich,
	Suravee Suthikulpanit

El 09/03/15 a les 4.30, Tian, Kevin ha escrit:
>> From: Roger Pau Monne [mailto:roger.pau@citrix.com]
>> Sent: Friday, February 27, 2015 7:34 PM
>>
>> iommu_share_p2m_table should not prevent PVH guests from using a shared
>> page
>> table between the IOMMU and EPT. Clean the code by removing the asserts in
>> the vendor specific implementations (amd_iommu_share_p2m,
>> iommu_set_pgd),
>> and moving the hap_enabled assert to the caller (iommu_share_p2m_table).
>>
>> Also fix another incorrect usage of is_hvm_domain usage in
>> arch_iommu_populate_page_table. This has not given problems so far
>> because
>> all the pages in PVH guests are of type PGT_writable_page.
>>
>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
>> Cc: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
>> Cc: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@amd.com>
>> Cc: Jan Beulich <jbeulich@suse.com>
>> Cc: Yang Zhang <yang.z.zhang@intel.com>
>> Cc: Kevin Tian <kevin.tian@intel.com>
> 
> Acked-by: Kevin Tian <kevin.tian@intel.com>
> 
> btw, does this patch fix your earlier iommu faults with PVH Dom0?

Yes, it fixes booting a PVH Dom0 on hosts that share the page tables
between EPT and the IOMMU(s).

Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-02-27 11:33 [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests Roger Pau Monne
                   ` (2 preceding siblings ...)
  2015-03-09  3:30 ` Tian, Kevin
@ 2015-03-10 12:51 ` Julien Grall
  2015-03-10 13:06   ` Jan Beulich
  3 siblings, 1 reply; 10+ messages in thread
From: Julien Grall @ 2015-03-10 12:51 UTC (permalink / raw)
  To: Roger Pau Monne, xen-devel
  Cc: Yang Zhang, Kevin Tian, Aravind Gopalakrishnan, Jan Beulich,
	Suravee Suthikulpanit

Hi,

On 27/02/15 11:33, Roger Pau Monne wrote:
> diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> index cc12735..7fcbbb1 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct domain* d)
>  {
>      const struct iommu_ops *ops = iommu_get_ops();
>  
> -    if ( iommu_enabled && is_hvm_domain(d) )
> +    ASSERT( hap_enabled(d) );

This line is breaking compilation on ARM.

Shouldn't it be replaced by iommu_use_hap_pt?

> +    if ( iommu_enabled )


Regards,

-- 
Julien Grall

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-03-10 12:51 ` Julien Grall
@ 2015-03-10 13:06   ` Jan Beulich
  2015-03-10 13:18     ` Julien Grall
  0 siblings, 1 reply; 10+ messages in thread
From: Jan Beulich @ 2015-03-10 13:06 UTC (permalink / raw)
  To: Julien Grall
  Cc: Kevin Tian, Aravind Gopalakrishnan, Suravee Suthikulpanit,
	Yang Zhang, xen-devel, Roger Pau Monne

>>> On 10.03.15 at 13:51, <julien.grall@linaro.org> wrote:
> Hi,
> 
> On 27/02/15 11:33, Roger Pau Monne wrote:
>> diff --git a/xen/drivers/passthrough/iommu.c 
> b/xen/drivers/passthrough/iommu.c
>> index cc12735..7fcbbb1 100644
>> --- a/xen/drivers/passthrough/iommu.c
>> +++ b/xen/drivers/passthrough/iommu.c
>> @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct domain* d)
>>  {
>>      const struct iommu_ops *ops = iommu_get_ops();
>>  
>> -    if ( iommu_enabled && is_hvm_domain(d) )
>> +    ASSERT( hap_enabled(d) );
> 
> This line is breaking compilation on ARM.
> 
> Shouldn't it be replaced by iommu_use_hap_pt?

No, that's a different thing. But shouldn't ARM have a stub
hap_enabled() evaluating to constant true?

Jan

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-03-10 13:06   ` Jan Beulich
@ 2015-03-10 13:18     ` Julien Grall
  2015-03-10 13:35       ` Jan Beulich
  0 siblings, 1 reply; 10+ messages in thread
From: Julien Grall @ 2015-03-10 13:18 UTC (permalink / raw)
  To: Jan Beulich
  Cc: Kevin Tian, Aravind Gopalakrishnan, Suravee Suthikulpanit,
	Yang Zhang, xen-devel, Roger Pau Monne

On 10/03/15 13:06, Jan Beulich wrote:
>>>> On 10.03.15 at 13:51, <julien.grall@linaro.org> wrote:
>> Hi,
>>
>> On 27/02/15 11:33, Roger Pau Monne wrote:
>>> diff --git a/xen/drivers/passthrough/iommu.c 
>> b/xen/drivers/passthrough/iommu.c
>>> index cc12735..7fcbbb1 100644
>>> --- a/xen/drivers/passthrough/iommu.c
>>> +++ b/xen/drivers/passthrough/iommu.c
>>> @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct domain* d)
>>>  {
>>>      const struct iommu_ops *ops = iommu_get_ops();
>>>  
>>> -    if ( iommu_enabled && is_hvm_domain(d) )
>>> +    ASSERT( hap_enabled(d) );
>>
>> This line is breaking compilation on ARM.
>>
>> Shouldn't it be replaced by iommu_use_hap_pt?
> 
> No, that's a different thing. But shouldn't ARM have a stub
> hap_enabled() evaluating to constant true?

I'm not sure if we should introduce hap_enabled. It's not something that
we should used in general.

What are we trying to catch with this ASSERT? I guess wrong caller?

If so, every share_p2m callbacks have a check "if iommu_use_hap_pt()"
which contains a check to hap_enabled on x86.

So I don't think this check is worthwhile in the common iommu code.

Regards,

-- 
Julien Grall

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-03-10 13:18     ` Julien Grall
@ 2015-03-10 13:35       ` Jan Beulich
  2015-03-11 10:52         ` Julien Grall
  0 siblings, 1 reply; 10+ messages in thread
From: Jan Beulich @ 2015-03-10 13:35 UTC (permalink / raw)
  To: Roger Pau Monne, Julien Grall
  Cc: Yang Zhang, xen-devel, Kevin Tian, Aravind Gopalakrishnan,
	Suravee Suthikulpanit

>>> On 10.03.15 at 14:18, <julien.grall@linaro.org> wrote:
> On 10/03/15 13:06, Jan Beulich wrote:
>>>>> On 10.03.15 at 13:51, <julien.grall@linaro.org> wrote:
>>> Hi,
>>>
>>> On 27/02/15 11:33, Roger Pau Monne wrote:
>>>> diff --git a/xen/drivers/passthrough/iommu.c 
>>> b/xen/drivers/passthrough/iommu.c
>>>> index cc12735..7fcbbb1 100644
>>>> --- a/xen/drivers/passthrough/iommu.c
>>>> +++ b/xen/drivers/passthrough/iommu.c
>>>> @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct domain* d)
>>>>  {
>>>>      const struct iommu_ops *ops = iommu_get_ops();
>>>>  
>>>> -    if ( iommu_enabled && is_hvm_domain(d) )
>>>> +    ASSERT( hap_enabled(d) );
>>>
>>> This line is breaking compilation on ARM.
>>>
>>> Shouldn't it be replaced by iommu_use_hap_pt?
>> 
>> No, that's a different thing. But shouldn't ARM have a stub
>> hap_enabled() evaluating to constant true?
> 
> I'm not sure if we should introduce hap_enabled. It's not something that
> we should used in general.
> 
> What are we trying to catch with this ASSERT? I guess wrong caller?
> 
> If so, every share_p2m callbacks have a check "if iommu_use_hap_pt()"
> which contains a check to hap_enabled on x86.

Ah, right, I mixed this up with iommu_hap_pt_share. Roger - looks
like this could indeed be replaced by

     if ( iommu_enabled && iommu_use_hap_pt(d) )
         ops->share_p2m(d);

and the corresponding check in VT-d and AMD Vi code could then
also be dropped.

Jan

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests
  2015-03-10 13:35       ` Jan Beulich
@ 2015-03-11 10:52         ` Julien Grall
  0 siblings, 0 replies; 10+ messages in thread
From: Julien Grall @ 2015-03-11 10:52 UTC (permalink / raw)
  To: Jan Beulich, Roger Pau Monne
  Cc: Yang Zhang, xen-devel, Kevin Tian, Aravind Gopalakrishnan,
	Suravee Suthikulpanit

Hi Jan,

On 10/03/2015 13:35, Jan Beulich wrote:
> Ah, right, I mixed this up with iommu_hap_pt_share. Roger - looks
> like this could indeed be replaced by
>
>       if ( iommu_enabled && iommu_use_hap_pt(d) )
>           ops->share_p2m(d);
>
> and the corresponding check in VT-d and AMD Vi code could then
> also be dropped.

Royger seems to be away. As it break ARM support I will send a patch today.

Regards,

-- 
Julien Grall

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2015-03-11 10:52 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-02-27 11:33 [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests Roger Pau Monne
2015-03-04 16:53 ` David Vrabel
2015-03-05  9:49 ` Tim Deegan
2015-03-09  3:30 ` Tian, Kevin
2015-03-09  9:02   ` Roger Pau Monné
2015-03-10 12:51 ` Julien Grall
2015-03-10 13:06   ` Jan Beulich
2015-03-10 13:18     ` Julien Grall
2015-03-10 13:35       ` Jan Beulich
2015-03-11 10:52         ` Julien Grall

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.