✓ Fi.CI.BAT: success for drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups (rev10)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Title: Project List - Patchwork
Patch Details
Series:drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups (rev10)
URL:https://patchwork.freedesktop.org/series/112196/
State:success
Details:https://intel-gfx-ci.01.org/tree/drm-tip/Patchwork_112196v10/index.html

CI Bug Log - changes from CI_DRM_13457 -> Patchwork_112196v10

Summary

SUCCESS

No regressions found.

External URL: https://intel-gfx-ci.01.org/tree/drm-tip/Patchwork_112196v10/index.html

Participating hosts (39 -> 38)

Missing (1): fi-snb-2520m

Known issues

Here are the changes found in Patchwork_112196v10 that come from known issues:

IGT changes

Issues hit

Possible fixes

Warnings

Build changes

CI-20190529: 20190529
CI_DRM_13457: 3e077570e831cc4ab9184fa015f9bfab34a8b99d @ git://anongit.freedesktop.org/gfx-ci/linux
IGT_7411: 7411
Patchwork_112196v10: 3e077570e831cc4ab9184fa015f9bfab34a8b99d @ git://anongit.freedesktop.org/gfx-ci/linux

Linux commits

ee5eed4234c5 drm/i915/gvt: Drop final dependencies on KVM internal details
c970be979ecd KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, not callers
f4cd9dd10337 KVM: x86/mmu: Drop @slot param from exported/external page-track APIs
622aa9f05836 KVM: x86/mmu: Bug the VM if write-tracking is used but not enabled
20f9479c205b KVM: x86/mmu: Assert that correct locks are held for page write-tracking
f5bc8f080210 KVM: x86/mmu: Rename page-track APIs to reflect the new reality
f1ea119e03e9 KVM: x86/mmu: Drop infrastructure for multiple page-track modes
52b962ad8a67 KVM: x86/mmu: Use page-track notifiers iff there are external users
db638a92d3e6 KVM: x86/mmu: Move KVM-only page-track declarations to internal header
db73d3175594 KVM: x86: Remove the unused page-track hook track_flush_slot()
296319696c92 drm/i915/gvt: switch from ->track_flush_slot() to ->track_remove_region()
7948234f996a KVM: x86: Add a new page-track hook to handle memslot deletion
16e9f10554aa drm/i915/gvt: Don't bother removing write-protection on to-be-deleted slot
dc30d5a606c9 KVM: x86: Reject memslot MOVE operations if KVMGT is attached
2831021e65c7 KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hook
7216d4c814cc KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEs
4b8e0a0281e0 KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
dc54becdca08 KVM: x86/mmu: Move kvm_arch_flush_shadow_{all, memslot}() to mmu.c
fb9df13904fe drm/i915/gvt: Protect gfn hash table with vgpu_lock
b84a678ef1fd drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt()
0e4e646b2844 drm/i915/gvt: Use an "unsigned long" to iterate over memslot gfns
6eb0a11cf498 drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query possible 2M GTT
a1deed2e3c9b drm/i915/gvt: Error out on an attempt to shadowing an unknown GTT entry type
880d0f0df9f6 drm/i915/gvt: Explicitly check that vGPU is attached before shadowing
fd1b2b7c512e drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn()
154270fd8c87 drm/i915/gvt: Don't try to unpin an empty page range
743161a18776 drm/i915/gvt: Verify hugepages are contiguous in physical address space
89a9b336814f drm/i915/gvt: remove interface intel_gvt_is_valid_gfn
f4445c85cc5a drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"


[Index of Archives]     [AMD Graphics]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux