On 21/09/2015 23:51, Stefano Stabellini wrote:
+/*
+ * Need to free pages after output_size here because they won't be
+ * freed by discard_initial_modules
+ */
+i = (output_size + PAGE_SIZE - 1) >> PAGE_SHIFT;
+for ( ; i < (1 << kernel_order_out); i++ )
+free_do
On Tue, 2015-09-22 at 00:23 +, osstest service owner wrote:
> flight 62156 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/62156/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-amd64-xl-
Hi Stefano,
On 22/09/2015 02:35, Stefano Stabellini wrote:
You may want to use vmap here which is a wrapper to __vmap and will setup the
granularity, align, and flags automatically for you.
The arguments are different.
Yes, sorry I inverted nr with granularity.
I meant to say that it makes
>>> On 22.09.15 at 09:19, wrote:
> However, I do find some issues with my proposal above, see below:
>
> 1. Set _VPF_blocked
> 2. ret = arch_block()
> 3. if ( ret || local_events_need_delivery() )
> clear_bit(_VPF_blocked, &v->pause_flags);
>
> After step #2, if ret == false, that means, w
Hi Vladimir & grub-devel,
Do you have any thoughts on this issue with i386 pv-grub2?
Thanks, Ian.
On Mon, 2015-09-21 at 22:03 +0200, Andreas Sundstrom wrote:
> This is using Debian Jessie and grub 2.02~beta2-22 (with Debian patches
> applied) and Xen 4.4.1
>
> I originally posted a bug report w
On Tue, 2015-09-22 at 08:22 +0100, Andrew Cooper wrote:
>
> The segment registers indicate that the domU is executing in ring1 which
> makes it a 32bit guest (also why 32bit words are used for the stack
> dump), but r10 through r14 have 64bit values in.
r10..r14 are not visible to 32-bit guests b
On Mon, 2015-09-21 at 18:30 +0100, Andrew Cooper wrote:
> On 21/09/15 18:13, Ian Jackson wrote:
> > Andrew Cooper writes ("Re: [Xen-devel] [PATCH RFC tools 1/6] tools:
> > Refactor "xentoollog" into its own library"):
> > > On 21/09/15 17:17, Ian Jackson wrote:
> > > > Do you mean that statement ex
>>> On 17.09.15 at 18:37, wrote:
> On 15/09/15 08:34, Jan Beulich wrote:
>> @@ -2044,22 +2078,45 @@ int map_mmio_regions(struct domain *d,
>> {
>> int ret = 0;
>> unsigned long i;
>> +unsigned int iter, order;
>>
>> if ( !paging_mode_translate(d) )
>> return 0;
>>
On 21/09/2015 19:43, Andy Lutomirski wrote:
> And maybe the KVM user return notifier.
No, not really. If anything, the place in KVM where it makes a
difference is vmx_save_host_state, which is also only using
always-present MSRs. But don't care about KVM.
First clean it up, then we can add ba
On Mon, Sep 21, 2015 at 7:17 PM, Julien Grall wrote:
> Hi Vijay,
>
> On 18/09/15 14:08, vijay.kil...@gmail.com wrote:
>> From: Vijaya Kumar K
>>
>> Add APIs to add devices to RB-tree, assign and remove
>> devices to domain.
>>
[...]
>> +
>> +static void its_free_device(struct its_device *dev)
>>
On 21/09/2015 21:03, Andreas Sundstrom wrote:
> This is using Debian Jessie and grub 2.02~beta2-22 (with Debian patches
> applied) and Xen 4.4.1
>
> I originally posted a bug report with Debian but got the suggestion to
> file bugs with upstream as well.
> Debian bug report:
> https://bugs.debian.o
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Monday, September 21, 2015 10:25 PM
> To: Wu, Feng; George Dunlap; George Dunlap
> Cc: Jan Beulich; Tian, Kevin; Keir Fraser; Andrew Cooper;
> xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] [PATCH v
On 22/09/2015 08:04, Jan Beulich wrote:
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
Some of these are overly Intel-specific, but while AMD has no
implementation, this isn't much of a problem.
___
Xen-devel mailing list
Xen-devel@lists.xen
* Linus Torvalds wrote:
> On Mon, Sep 21, 2015 at 1:46 AM, Ingo Molnar wrote:
> >
> > Linus, what's your preference?
>
> So quite frankly, is there any reason we don't just implement
> native_read_msr() as just
>
>unsigned long long native_read_msr(unsigned int msr)
>{
> int err
Signed-off-by: Jan Beulich
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -31,13 +31,19 @@ static void iommu_dump_p2m_table(unsigne
*
* off|no|false|disable Disable IOMMU (default)
* force|required Don't boot unless IOMMU is enabled
+ *
201 - 215 of 215 matches
Mail list logo