{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":30860503,"defaultBranch":"master","name":"qemu","ownerLogin":"hisilicon","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2015-02-16T08:56:43.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/5178673?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1726478230.0","currentOid":""},"activityList":{"items":[{"before":"3fb2a4f7ff4d6605972615ac1629a996637bb38d","after":"c92655935db32b50e5b9096d9d638b30d576ade1","ref":"refs/heads/linaro-work-9.12-dbg","pushedAt":"2024-09-16T09:21:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"smmuv3: Changes for fault handling\n\nSeems to work on my D06 with ACC zip dev page faults\n\nNot tested further.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"smmuv3: Changes for fault handling"}},{"before":null,"after":"3fb2a4f7ff4d6605972615ac1629a996637bb38d","ref":"refs/heads/linaro-work-9.12-dbg","pushedAt":"2024-09-16T09:17:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"Revert \"hack with cookie\"\n\nThis reverts commit 48124ef0a37fac9cc76cbd6dfdc403918d93b04f.","shortMessageHtmlLink":"Revert \"hack with cookie\""}},{"before":null,"after":"bb3081ed027271d62b7016083cf55f7da568ca95","ref":"refs/heads/iommufd_vsmmu-02292024-vsva-wip-v3-viommu-kernel","pushedAt":"2024-09-10T09:42:18.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"smmuv3: Fixes for VIOMMU branch\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"smmuv3: Fixes for VIOMMU branch"}},{"before":null,"after":"b291ccce7446529fd8b91a3ace725e05cc018ee4","ref":"refs/heads/stable-8.2-kunpeng920-initial-v2","pushedAt":"2024-08-29T07:58:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"target/arm: Ignore invariant register write errors\n\nMIDR/AIDR/REVIDR are treated as invariant registers by ARM64 KVM\nand hence not possible to write a value that differs from host CPU.\nThis will break migration if they are different.\n\nIgnore invariant register difference and keep the host value for\nKunpeng 920 for now.\n\nToDo: Find a better way to do this. Also investigate\nKVM_REG_ARM_SMCCC_ARCH_WORKAROUND_3 difference.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"target/arm: Ignore invariant register write errors"}},{"before":null,"after":"c72e216611d0404618c4f4e5b2ac30d401998530","ref":"refs/heads/stable-8.2-kunpeng920-initial","pushedAt":"2024-08-28T10:10:50.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"target/arm: Ignore invariant register write errors\n\nMIDR/AIDR/REVIDR are treated as invariant registers by ARM64 KVM\nand hence not possible to write a value that differs from host CPU.\nThis will break migration if they are different.\n\nIgnore invariant register difference and keep the host value for\nKunpeng 920 for now.\n\nToDo: Find a better way to do this. Also investigate\nKVM_REG_ARM_SMCCC_ARCH_WORKAROUND_3 difference.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"target/arm: Ignore invariant register write errors"}},{"before":null,"after":"97273884703879b7157b369f8a05ad547f429670","ref":"refs/heads/master-kunpeng-cpu-initial","pushedAt":"2024-08-21T15:05:06.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"arm: Kunpeng 920 CPU support- Initial\n\nNot tested.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"arm: Kunpeng 920 CPU support- Initial"}},{"before":null,"after":"3988b8eecfd8b2c7c6cee957f782cde2c61fc8c9","ref":"refs/heads/iommufd_vsmmu-02292024-vsva-wip-v3-wip","pushedAt":"2024-07-15T17:29:17.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"smmuv3: Add support for multiple faults in parallel\n\nJust forwards the faults to the Guests without any checking for\npending faults.\n\nToDo: Only sanity tested. Require more testing.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"smmuv3: Add support for multiple faults in parallel"}},{"before":null,"after":"207cc7059983348f90e9c875e8a9e122c11cd60b","ref":"refs/heads/master-migrn-uadk-rfc-dbg","pushedAt":"2024-05-08T09:40:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"multifd-uadk: Bug fixes\n\nTemp fixes for:\n\n-Randomn 0xe status return on compression\n-Repeated migration test failure.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"multifd-uadk: Bug fixes"}},{"before":null,"after":"ca6ee1fac0e2d22df984bd67862c2825122e3d74","ref":"refs/heads/master-migrn-uadk-rfcv1.b-wip","pushedAt":"2024-04-12T08:27:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"tests/migration-test: add uadk compression test\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"tests/migration-test: add uadk compression test"}},{"before":"c1edc372e9fb7e51df64926685e5c6a4753a5dea","after":null,"ref":"refs/heads/master-migrn-uadk-rfcv1.b-wip","pushedAt":"2024-04-12T08:01:38.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"}},{"before":null,"after":"c1edc372e9fb7e51df64926685e5c6a4753a5dea","ref":"refs/heads/master-migrn-uadk-rfcv1.b-wip","pushedAt":"2024-04-11T15:12:39.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"migration/multifd: Add UADK based compression and decompression\n\nUses UADK wd_do_comp_sync() API to (de)compress a normal page using\nhardware accelerator.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"migration/multifd: Add UADK based compression and decompression"}},{"before":"f5295a795e314856b0f4fd13cfab991bf4b953be","after":"c974a04f001c2c5223ea39e4ccd80368c93e7bd7","ref":"refs/heads/iommufd_vsmmu-02292024-vsva-wip-v2","pushedAt":"2024-03-24T00:11:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/vfo/pci: Remove the extra ret check\n\nThis is a fix to commit,\nff0230e9593b:(hw/arm/smmu-common: (Temp) Fix address_space handling for nested case)\n\nwhich may cause seg fault for non-iommufd(legacy) dev assignments.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/vfo/pci: Remove the extra ret check"}},{"before":null,"after":"f5295a795e314856b0f4fd13cfab991bf4b953be","ref":"refs/heads/iommufd_vsmmu-02292024-vsva-wip-v2","pushedAt":"2024-03-22T14:36:08.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/arm/smmuv3: Add IO page fault handling support\n\nThis enables receiving IO page fault handling by,\n -Receives IO page fault from host.\n -Propagates that into Guest.\n -Upon Guest CMD resume, send the response back to the host.\n\nCouple of things to note:\n -Uses io_uring for IO fault receiving.\n -But make use of write() for page response\n  See: https://lore.kernel.org/linux-iommu/ad4575588dd247fa8beae60963f36404@huawei.com/\n -Keeps only one pending fault req per HWPT. This requires revisit.\n -Read/Write thread destruction requires modification to handle synchronization better.\n -Patch requires further splitting\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/arm/smmuv3: Add IO page fault handling support"}},{"before":"3c02c91594e8790444034a42100b054034ff7446","after":null,"ref":"refs/heads/iommufd_vsmmu-02292024-vsva-wip-v2","pushedAt":"2024-03-22T14:34:30.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"}},{"before":null,"after":"3c02c91594e8790444034a42100b054034ff7446","ref":"refs/heads/iommufd_vsmmu-02292024-vsva-wip-v2","pushedAt":"2024-03-21T16:53:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"Revert \"accel/kvm/kvm-all: Handle register access errors\"\n\nThis reverts commit 7191f24c7fcfbc1216d09214122582f4f9d699db.","shortMessageHtmlLink":"Revert \"accel/kvm/kvm-all: Handle register access errors\""}},{"before":null,"after":"2b984fb5c692a03e6f5463d005670d2e2a2c7304","ref":"refs/heads/iommufd_vsmmu-02292024-vsva-wip","pushedAt":"2024-03-20T15:27:23.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/arm/smmuv3: Handle IO page fault\n\nThis is still a WIP.\n\nUses io_ring to read/write to fault fd.\n\nToDo: Only works if the kernel fault fd poll op is not\npresent.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/arm/smmuv3: Handle IO page fault"}},{"before":"e33733ae90d6b22a766ca86a067033df6ebee44b","after":null,"ref":"refs/heads/master-migrn-uadk-zlib-dbg","pushedAt":"2024-03-12T10:55:23.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"}},{"before":null,"after":"cb4ed1fa8831989522da9276ce79cd3ab282afa1","ref":"refs/heads/master-migrn-uadk-rfcv1","pushedAt":"2024-03-12T10:23:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"multifd: Add support for UADK compression accelerator\n\nUADK is a framework for user applications to access hardware accelerators\nin a unified secure, and efficient way. UADK is comprised of UACCE, libwd\nand algorithm libraries for different applications. Here we make use of\nthe Zlib wrapper interfaces provided by UADK to improve migration\nperformance.\n\nOn HiSilicon platforms that has ACC hardware support, UADK Zlib wrapper\ninterface makes use of ACC Zip accelerator for compression using\nSVA(Shared Virtual Address) mode.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"multifd: Add support for UADK compression accelerator"}},{"before":null,"after":"e33733ae90d6b22a766ca86a067033df6ebee44b","ref":"refs/heads/master-migrn-uadk-zlib-dbg","pushedAt":"2024-03-08T17:19:46.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"multifd: Add support for UADK Zlib compression accel\n\nThis is still a work in progress.\n\nThe wd_zlibwrapper interface is not working.\n\nToDO: Debug.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"multifd: Add support for UADK Zlib compression accel"}},{"before":"f3f5e94cdd1d125453e18f1e56e017581a035eaa","after":"ca82dd2b5567fc16681e410ac71aee210f10bd8b","ref":"refs/heads/iommufd_nesting-12072023-rfcv1-vsva-wip","pushedAt":"2024-01-25T15:24:21.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/arm/smmuv3: Fix for io_uring write submit\n\nAdded wait for io_uring write submit completion and marking the cqe.\nAlso some finor fixes and error warnings added.\n\nThis fixes the issue reported by liuliyan:\n\n./uadk_tool benchmark --alg=zlib --mode=sva --opt=0 --sync --pktlen 8192 --seconds 5 --thread 1 --multi 1\nstart UADK benchmark test\n....\n[   59.061972] hisi_zip 0000:00:02.0: iopf (pasid 3) without domain attached or handler installed\n[   59.062963] arm-smmu-v3 arm-smmu-v3.0.auto: event 0x10 received:\n[   59.063588] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000001000003810\n[   59.064191] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000000680000000\n[   59.064794] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000000000000000\n[   59.065454] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000000000000000\n\nAs a bonus, also fixes the large number of iou threads noticed in\nthe initial io_uring implementation.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/arm/smmuv3: Fix for io_uring write submit"}},{"before":"d30f293b451bc15565e343fb1ce68ace1b7a736e","after":"f3f5e94cdd1d125453e18f1e56e017581a035eaa","ref":"refs/heads/iommufd_nesting-12072023-rfcv1-vsva-wip","pushedAt":"2024-01-23T10:40:36.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/arm/smmuv3: Handle stream ID based invalidation separately\n\nAt present all invalidations are sent to all the nested devices\nand hence to the associated physical SMMUv3's in the system. This\ncreates a problem for stream ID based invalidations like CMD_CFGI_CD\nas the stream ID may not be associated with a SMMUv3 and fails like\nbelow,\n\nqemu-system-aarch64-nic-pgfault-io-uring: IOMMU_HWPT_INVALIDATE failed: No such device\nqemu-system-aarch64-nic-pgfault-io-uring: smmuv3_invalidate_cache failed: ret=-19, ntlbi=1, done=1, error=0x0\n\nFor now treat them separately and sent to the specific sdev->hwpt\ndomain. This fix might change the order in which the invalidations\nare sent to the SMMUv3. Anyway, this raises another question, do we\nreally need to send the stage 1 TLB invalidations to all the SMMUv3s\nin the system? If not, we need to identify the associated SMMUv3 for\nthese TLBIs.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/arm/smmuv3: Handle stream ID based invalidation separately"}},{"before":"e58aa653953ff2c8e8fe46979ddd6e347afd4c7d","after":"d30f293b451bc15565e343fb1ce68ace1b7a736e","ref":"refs/heads/iommufd_nesting-12072023-rfcv1-vsva-wip","pushedAt":"2024-01-17T15:11:00.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/arm/smmu-common: Fix address_space handling for nested case\n\ncommit: 592dc80c1073c40(\"hw/arm/smmu-common: Use sysmem for\nget_address_space until !!s2_hwpti\") mandates that for pass-through\ndevices we return sysmem address space until s2_hwpt is attached.\n\nBut this only works if there is only one pass-through device.\n\nWith multiple pass-through devices we get,\n\nqemu-system-aarch64: -device vfio-pci,host=0000:75:00.1,iommufd=iommufd0: vfio 0000:75:00.1: memory listener initialization failed:\nRegion smmuv3-iommu-memory-region-16-1: device 00.02.0 requires iommu MAP notifier which is not currently supported\n\nThis also breaks for non-vfio pci devices, eg: virtio-pci.\n\nFix that by identifying the vfio pass-through devices early on and\nhandle the address space accordingly.\n\nNot sure this covers all the use cases and is the perfect way to fix\nthis, but can boot with multiple devices now.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/arm/smmu-common: Fix address_space handling for nested case"}},{"before":"8c3b75ffc3694c0df921fdb66333f014fac95139","after":"e58aa653953ff2c8e8fe46979ddd6e347afd4c7d","ref":"refs/heads/iommufd_nesting-12072023-rfcv1-vsva-wip","pushedAt":"2024-01-11T13:52:00.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/arm/smmuv3: Handle page fault and send response back\n   \nThis is a quick and dirty implementation to test vSVA on ARM64.\nThis has a dependency on liburing, please install from here,\nhttps://github.com/axboe/liburing\n\nBasic sanity test with uadk_tool works.\n   \n[root@localhost uadk_tool]# ./uadk_tool benchmark --alg=zlib --mode=sva --opt=0 --sync --pktlen 8192 --seconds 60 --thread 1 --multi 1\nstart UADK benchmark test.\n [--algname]: zlib\n    [--mode]:    1\n    [--optype]:  0\n    [--syncmode]:0\n    [--pktlen]:  8192\n    [--seconds]: 60\n    [--thread]:  1\n    [--multi]:   1\n    [--ctxnum]:  1\n    [--algclass]:zlib\n    [--acctype]: 2\n    [--prefetch]:0\n    [--engine]:  \n    [--latency]: 0\n    [--init2]:   0\nalgname: length: perf: iops: CPU_rate:\nzlib    8192Bytes 2290244.8KB/s 286.3Kops 99.93%\ncompress data rate: 50.8%!\nTRNG not support sva mode..\n[root@localhost uadk_tool]#\n   \nThis adds:\n  -Qemu thread to retrieve and process page faults related to hwpt\n  -basic io_uring support\n  -send page response back to host\n  \n ToDo:\n   -Add POLL support to avoid the read loop on io_uring CQE\n   -io_uring usage seems to be not correct as a large number of\n    iou-wrk-xxxx threads get spawned with the current implementation.\n    Fix that.\n   -More testing.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/arm/smmuv3: Handle page fault and send response back"}},{"before":null,"after":"8c3b75ffc3694c0df921fdb66333f014fac95139","ref":"refs/heads/iommufd_nesting-12072023-rfcv1-vsva-wip","pushedAt":"2023-12-12T13:31:59.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"hw/arm/smmu-common: Add support for IO page fault deliver\n\nThis enables IO page fault delivery to userspace and retrieves\nthe fault_fd from kernel.\n\nToDo:\n -a provision to read/write the fault_fd(io_uring ?)\n -Inject the page fault to Guest\n -Send the page response to kernel\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"hw/arm/smmu-common: Add support for IO page fault deliver"}},{"before":null,"after":"73d2683246f0c1c77a2ac26b6c45de660c2f3259","ref":"refs/heads/iommufd_cdev_v4-dbm-arm","pushedAt":"2023-11-23T16:41:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"iommufd: Enable IOMMU dirty tracking always\n\nHack to test iommu dirty tracking.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"iommufd: Enable IOMMU dirty tracking always"}},{"before":null,"after":"b30d7d4e54b896bb151230e06096ae5f2f53ef0e","ref":"refs/heads/iommufd-v2-dbm-vsva","pushedAt":"2023-05-29T17:28:47.656Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"smmuv3: Temp support for HTTU\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"smmuv3: Temp support for HTTU"}},{"before":"2cdd3abf445b69ecab09e292b644e2a510ddfbae","after":"56ccadaa8861033b7e07233db7e9a7c459945d9a","ref":"refs/heads/stable-8.0-acc-migrn","pushedAt":"2023-05-18T13:01:13.582Z","pushType":"push","commitsCount":2,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"vfio/migration: Allow migration of multiple devices if P2P flag is not set\n\nThis is a temp hack for HiSilicon ACC devices and allows migration with\nmultiple devices if there are no devices with VFIO_MIGRATION_P2P\nflag set. But ideally we should introduce a new flag for this in the kernel\nand make sure P2P mappings are blocked for such devices.\n\nPlease see the discussion here,\n https://lore.kernel.org/all/e333783cc59647ed93d944b05f12fe68@huawei.com/\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"vfio/migration: Allow migration of multiple devices if P2P flag is no…"}},{"before":null,"after":"2cdd3abf445b69ecab09e292b644e2a510ddfbae","ref":"refs/heads/stable-8.0-acc-migrn","pushedAt":"2023-05-17T09:52:34.080Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"vfio/migration: Allow migration of multiple devices if P2P flag is not set\n\nThis is a temp hack for HiSilicon ACC devices and allows migration with\nmultiple devices if there are no devices with VFIO_MIGRATION_P2P\nflag set. But ideally we should introduce a new flag for this in the kernel\nand make sure P2P mappings are blocked for such devices.\n\nPlease see the discussion here,\n https://lore.kernel.org/all/e333783cc59647ed93d944b05f12fe68@huawei.com/\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"vfio/migration: Allow migration of multiple devices if P2P flag is no…"}},{"before":null,"after":"c3539abbb55ab7731d9e2a37dcdd057291085534","ref":"refs/heads/private-v7.2.0-iommufd-nesting-arm","pushedAt":"2023-03-30T09:43:15.400Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"kvm: Translate MSI doorbell address only if it is valid\n\nGuest might have already set the MSI doorbell address to invalid\nand if we try to translate the address again, Guest reports,\n\n[ 26.784082] arm-smmu-v3 arm-smmu-v3.0.auto: event 0x10 received:\n[ 26.784088] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000001000000010\n[ 26.784090] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000000000000000\n[ 26.784092] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000000000000000\n[ 26.784094] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000000000000000\n[ 26.788082] arm-smmu-v3 arm-smmu-v3.0.auto: event 0x10 received:\n[ 26.788085] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000001000000010\n[ 26.788087] arm-smmu-v3 arm-smmu-v3.0.auto: 0x0000000000000000\n....\n\neg: rmmod hisi_zip.ko. The sequence seems to be,\n\n - Write 0 to MSI Message Address register\n - Disable MSI\n\nHence check for address validity before we try to do the translation.\n\nNote: The fix is placed in generic code and hopefully is not a problem\nfor other architectures.\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"kvm: Translate MSI doorbell address only if it is valid"}},{"before":null,"after":"4213e3c3eaa87986c8a1fc89ba474f6a870b94b1","ref":"refs/heads/private-v7.2.0-iommufd-nesting","pushedAt":"2023-03-14T10:59:22.588Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"shamiali2008","name":null,"path":"/shamiali2008","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4730066?s=80&v=4"},"commit":{"message":"iommufd: Free the default HWPT\n\nThe default HWPT allocated was not removed when device got\ndetached.\n\nFixes the below on device hot removal:\n\"qemu-system-aarch64: Failed to free id: 1 Device or resource busy\"\n\nSigned-off-by: Shameer Kolothum ","shortMessageHtmlLink":"iommufd: Free the default HWPT"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xNlQwOToyMTowOS4wMDAwMDBazwAAAAS3OfJS","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xNlQwOToyMTowOS4wMDAwMDBazwAAAAS3OfJS","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wMy0xNFQxMDo1OToyMi41ODg3ODRazwAAAAMDAqyc"}},"title":"Activity · hisilicon/qemu"}