[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [xen-unstable test] 11574: tolerable FAIL
Hi, At 16:00 +0000 on 24 Jan (1327420844), Ian Jackson wrote: > Ian Jackson writes ("Re: [xen-unstable test] 11574: tolerable FAIL"): > > This is a host-specific, but deterministic, failure. > > Improve handling of nested page faults > > Add checks for access type. Be less reliant on implicit semantics. > > Signed-off-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx> > Acked-by: Tim Deegan <tim@xxxxxxx> > Committed-by: Tim Deegan <tim@xxxxxxx> Hmm, Didn't have to pull on that thread too hard to find it's not tied to anything. The access_* arguments to hvm_hap_nested_page_fault() aren't plumbed in on AMD: ret = hvm_hap_nested_page_fault(gpa, 0, ~0ul, 0, 0, 0, 0); so gating behaviour on them is not going to work so well. Sorry about that - I should definitely have caught this. (But Andres, did you test this, or any of your mm work, on AMD?) The attached patch ought to fix it. Smoke-tested but I won't have good enough access to my test machines to check Windows installs before Thursday. Cheers, Tim. Attachment:
npt-access-bits _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |