On Fri, 2008-12-12 at 10:22 +0900, Isaku Yamahata wrote:
> Thank you for testing. I'll commit my patches with some clean up.
Testing update; I've had 2 PV domains, 2 HVM domains, and dom0 all
running the test program for over 10 hours. Everything looks good.
Thanks,
Alex
--
Al
On Thu, 2008-12-11 at 09:04 -0700, Alex Williamson wrote:
> On Thu, 2008-12-11 at 11:05 +0900, Isaku Yamahata wrote:
> >
> > Just to make sure. Is fpswa.efi installed in hvm domain?
> > You can also confirm it by dh command in efi shell.
>
> Argh, that was it. I l
have it in the right location for
elilo to pick it up automatically. Running "load fpswa.efi" makes it
work, and copying fpswa.efi to \efi\intel firmware\fpswa.efi also works.
I'll add your panic fix and let it run for a while, seems like it's
running well now.
On Tue, 2008-12-09 at 21:23 -0700, Alex Williamson wrote:
> On Wed, 2008-12-10 at 10:51 +0800, Zhang, Xiantao wrote:
> > > I've been testing this for a few hours today (over 25k iterations)
> > and
> > > it seems to fix the problem for me. Thanks!
> >
>
s just testing in dom0.
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
day (over 25k iterations) and
it seems to fix the problem for me. Thanks!
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
running in dom0, it takes about 3.1s
(1.6GHz Montecito). Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
: 32
> model : 0
> revision : 7
> archrev: 0
> features : branchlong, 16-byte atomic ops
> cpu number : 0
> cpu regs : 4
> cpu MHz: 1594.000895
> itc MHz: 399.86
> BogoMIPS : 3006.46
> siblings : 1
>
> processor : 1
Here's another trivial patch. We're printing out the ACPI table
signature after we overwrite it with "OEMx". Let's print it out before
so we know that the table was. Also limit print to 4 chars so we don't
get garbage output.
Signed-off-by: Alex Williamson &
I've never been sure why we have such a big scary warning around this,
when I have yet to see any system that does provide opcode decoding.
Let's remove it.
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r eff5fcfa69bc xen/arch/ia64/vmx/vmx_init.c
--- a/xen/arch/ia6
se, we can
update the checksum after each step and avoid the warnings.
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r eff5fcfa69bc xen/arch/ia64/xen/dom_fw_dom0.c
--- a/xen/arch/ia64/xen/dom_fw_dom0.c Wed Aug 06 15:19:13 2008 +0100
+++ b/xen/arch/ia64/xen/dom_fw_dom0.c Thu
We have boxes that report EFI version 2.00 now, so adopt upstream linux
patch to only warn on versions less that 1.00. Based on linux-2.6.git
873ec746158403af82c57ce26780166aafc159e1.
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r eff5fcfa69bc xen/arch/ia64/linux-xen/efi.c
_present"
variable to test whether the extra requirements are necessary.
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r eff5fcfa69bc tools/python/xen/xend/server/pciif.py
--- a/tools/python/xen/xend/server/pciif.py Wed Aug 06 15:19:13 2008 +0100
+++ b/tools/pytho
NOSYS
here :(
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r eff5fcfa69bc xen/arch/ia64/xen/dom0_ops.c
--- a/xen/arch/ia64/xen/dom0_ops.c Wed Aug 06 15:19:13 2008 +0100
+++ b/xen/arch/ia64/xen/dom0_ops.c Thu Aug 07 13:50:26 2008 -0600
@@ -388,6 +388,10 @@ long arch_do_domctl(
This adds xencomm support for several PHYSDEVOP calls (manage_pci_add,
manage_pci_remove, map_pirq, and unmap_pirq) as well
as XEN_DOMCTL_assign_device.
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r 2866e6af503e arch/ia64/xen/xcom_hcall.c
--- a/arch/ia64/xen/xcom_h
their own. The last patch is rather ugly, so I'm
posting it as an RFC to see if anyone has better ideas. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-i
scii:
http://xenbits.xensource.com/ext/ia64/linux-2.6.18-xen.hg?raw-rev/c4b12c90de0e
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Add support for IA64_TIMER_VECTOR as a paravirtualized IPI target
Necessary for the latest upstream Linux implementation of
check_sal_cache_flush() 3463a93def55c309f3c0d0a8aaf216be3be42d64
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r 8a3dc4fdb478 arch/ia64/kernel/irq_ia64.c
-
so memory might be vague...
Hi Isaku,
Good, thanks for tracking down the mystery of why it got fixed. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-dev
Alex
[1] http://marc.info/?t=12111893401
[2] http://marc.info/?t=12112784858
[IA64] zero pad emulated I/O instructions
Fixes issue seen on KVM with more recent upstream changes to the VGA
console structure.
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
--
diff -r f04ce41dab84 xen
new_page = NULL; /* prevent domain_put_page() */
> -goto out;
> +goto out_nomsg;
These could really just be 'return GNTST_general_error;' since there's
no other cleanup, then you could avoid a goto.
o commit. I hope that I didn't do
> anything wrong. If you find anything bad, please let me know.
Hi Isaku,
Looks good to me. Thanks!
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia6
ations and best of luck Isaku, thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
ea that maybe an HVM guest
got to it somehow.
FWIW, I tried to reproduce these same conditions using the current
ia64/xen-unstable.hg tree and ran through a few times w/o hitting any
problems. I'll see if I can better characterize the issue, but you
might try something similar. Thanks,
ocator() and construct_dom0(). Perhaps Kayvan could add
some printks in this area to let us know when it stops. It's
interesting that gsi 45 is specified for the console interrupt and the
console interrupt can be enabled in that gap. Has the console interrupt
always been specified there? What happ
6k alignment difference.
> This patch fix this issue by scaning memory descriptors twice
> in the first scan, setup dom0 identity mapping
> in the seconde scan, setup dom0 memory mapping.
Applied. Thanks,
Alex
--
Alex Williamson HP Op
That is generally the values
> that were most recently pinned by ia64_new_rr7.
>
> ia64_new_rr7_efi can probably be merged with ia64_new_rr7,
> as they are quite similar, but for testing purposes it seems
> easier to keep them separate.
>
> Cc: Isaku Yamahata <[EMAIL PROTEC
ich might break your builds.
> It's unlikely, but I'd like to be on the safe side.
These appear to build on ia64, but I'd like to see if Intel and
Fujitsu could run them through their regression testing. Thanks,
Alex
--
Alex Williamson
d unnecessarily SWIOTLB bounce buffering
x86 improved range_straddles_page_boundary() by the c/s 501:5486a234923d.
The same discussion applies to ia64. This patch is ia64 counter part of it.
[ported from mainline version]
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
linux
a234923d.
>
> x86 improved range_straddles_page_boundary() by the c/s 501:5486a234923d.
> The same discussin applies to ia64. This patch is ia64 counter part of it.
Applied. Thanks,
Alex
--
Alex Williamson
, and various other fixes, cleanups and
enhancements. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com
On Mon, 2008-03-31 at 18:27 +0900, Kouya Shimura wrote:
> Alex Williamson writes:
> >It seems like a good time to remove some of these old krufty comments
> > and previous implementations too (subset below). Could you resubmit
> > with these scrubbed out? Than
On Sun, 2008-03-30 at 06:35 +0200, Tristan Gingold wrote:
> On Fri, Mar 28, 2008 at 03:14:58PM -0600, Alex Williamson wrote:
> >
> >I'm not a fan of adding these ia64 headers directly into common code.
> > Couldn't we at least put these in xenctrl.h, or mayb
On Sat, 2008-03-29 at 16:15 +0800, Xu, Anthony wrote:
> Other Intel IPF platforms use COM1
Applied. Hopefully this will eventually be described via HCDP.
Thanks,
Alex
--
Alex Williamson HP Open Source & Li
vmx_vps_resume_handler;
> + u64 addr;
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
On Mon, 2008-03-31 at 17:21 +0100, Keir Fraser wrote:
> On 31/3/08 16:49, "Alex Williamson" <[EMAIL PROTECTED]> wrote:
>
> > It seems pretty clear that in nesting __extension__ attributes in this
> > manner, the struct is actually ignored and the compiler is tr
On Fri, 2008-03-28 at 21:47 +, Keir Fraser wrote:
> On 28/3/08 21:04, "Alex Williamson" <[EMAIL PROTECTED]> wrote:
>
> >My previous fix allowed this to build on ia64, but it turns out
> > there's still a boot issue that I don't understand. As
d case: 1
> =
Thanks for the test report.
> [FAIL] Unmodified_HVM_save_restore
This isn't expected to work in 3.1.x. Can we modify the test to skip
this? Thanks,
Alex
--
Alex Williamson
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
On Fri, 2008-03-28 at 22:37 +, Keir Fraser wrote:
> On 28/3/08 21:04, "Alex Williamson" <[EMAIL PROTECTED]> wrote:
>
> > @@ -609,7 +609,7 @@ struct xen_ia64_opt_feature {
> > unsigned long cmd; /* Which feature */
> > unsigned char on; /* Switch
On Thu, 2008-03-27 at 14:38 +0900, Akio Takebe wrote:
> Hi,
>
> show_registers() already has show_stack(NULL,NULL),
> So we get two same Calltraces. This patch eliminate it.
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source
On Wed, 2008-03-26 at 17:40 +0900, Kouya Shimura wrote:
> Add a new static inline function for readability.
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel maili
*pval = val;
> + return IA64_NO_FAULT;
> +}
> +
> +static inline IA64FAULT vcpu_get_ifs(VCPU * vcpu, u64 * pval)
> +{
> + //PSCB(vcpu,ifs) = PSCB(vcpu)->regs.cr_ifs;
> + //*pval = PSCB(vcpu,regs).cr_ifs;
> + *pval = PSCB(vcpu, i
t;
> #include "exec-all.h"
> +
> +#if defined(CONFIG_DM) && defined (__ia64__)
> +#include "xen/arch-ia64/hvm/memmap.h"
> +#endif
>
> #define DEFAULT_NETWORK_SCRIPT "/etc/xen/qemu-ifup"
> #ifdef _BSD
--
Alex Williamson
s cset and gets us booting again. FWIW, I'm
using gcc-4.1.2. Thanks,
Alex
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
---
diff -r 6736c28a0d35 xen/include/public/arch-ia64.h
--- a/xen/include/public/arch-ia64.hFri Mar 28 17:58:36 2008 +
+++ b/xen/include/public/
cense behind
it[1]. This is part of the reason why Linux doesn't use it. I would be
a little nervous about adding this to the code base. Thanks,
Alex
[1] http://www.microsoft.com/whdc/system/platform/server/spcr.mspx
--
Alex Williamson HP Ope
On Tue, 2008-03-25 at 10:08 +0900, Akio Takebe wrote:
> Ah, It's redundant. I remove the ifdef.
> PSR_DEFAULT_BITS is always defined.
> And even if PSR_DEFAULT_BITS == 0, sum 0x0 is harmless.
Applied. Thanks,
Alex
--
Alex Williamson
t;
> Move the VTi memory map to arch-ia64/hvm/memmap.h
ioemu fails to build with this from a clean tree. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel ma
XenU
> > VTI_Windows_PV Windows VTI PV
> If my patch(17292) is revert, can you boot Windows guest?
> http://xenbits.xensource.com/ext/xen-ia64-unstable.hg?rev/dba5f548b894
>
I booted a Win2k3 guest is my testing, so I'm curious about this too.
How did it f
On Mon, 2008-03-24 at 16:18 +0900, Akio Takebe wrote:
> Hi,
>
> I update it.
I did a little further refinement, please check the tree and make
sure I didn't break it. Applied. Thanks,
Alex
--
Alex Williamson HP Open Sour
On Mon, 2008-03-24 at 08:04 +0100, [EMAIL PROTECTED] wrote:
> Hi,
>
> this simple patch fixes gcc warnings.
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-
re's not a better arch specific place to
stash this (and if not, I'm not sure CONFIG_XEN is appropriate/necessary
in this file). Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia
an't
get to this code w/o PSR_DEFAULT_BITS set, so it seems unnecessary to
test for it. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
x27;t think we need to worry about sioemu
backwards compatibility just yet. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
> Our quick fix was to simply increase the reservation
> guestimate by 128M.
This does still seem to be relevant, I can make my system unbootable
by specifying max_addr=1G dom0_mem=1G. With the patch, it boots up and
I can even still create a 256M domU. Applied. Thanks,
On Mon, 2008-03-17 at 20:30 +0900, Kouya Shimura wrote:
> The emulation of physical mode will be more precise with this patch.
> (The previous patch implies a bug. Windows 2003 can't boot.)
Applied. Thanks,
Alex
--
Alex Williamson HP Open Sou
EFAULT_BITS
> + sum PSR_DEFAULT_BITS
> +#endif
How would we ever get here w/o PSR_DEFAULT_BITS defined? Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel
PV
support and we're not just trying to dump a bunch of Xen-only code into
the tree.
We don't need to be constantly concerned with RH's config, we need to
look at the bigger picture for what's right in Linux. We can make sure
RH's config has everything we want for a sin
On Tue, 2008-03-18 at 22:19 +0800, Dong, Eddie wrote:
> Yes, but running_on_xen is already there.
Will it be there if we only have a kernel compiled with PV KVM
support? Are we going to stub out any *_xen_* function/macro in that
case?
Alex
> Alex Williamson wrote:
> >
sal_retval isrv;
> -#ifdef CONFIG_XEN
> +#ifdef CONFIG_PARAVIRT
> if (is_running_on_xen()) {
> ia64_mca_xencomm_t *entry;
> struct xencomm_handle *desc = NULL;
> ___
> Xen-ia64-devel mailing list
> Xen-ia64-devel@lists.xensource.com
> http://lists.xen
On Tue, 2008-03-18 at 21:31 +0800, Dong, Eddie wrote:
> Alex Williamson wrote:
> > On Tue, 2008-03-18 at 11:36 +0800, Dong, Eddie wrote:
> >>>
> >>>I think CONFIG_XEN might become something like
> >>> CONFIG_PARAVIRT_XEN, which will be dependent o
's
safe to drop this for domU-only support. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
>
> Then a single image won't be able to run on both lguest/Xen/KVM. This is
> worse than running_on_xen dynamic condition check.
Huh? I never said you couldn't enable more than one
CONFIG_PARAVIRT_FOO flavor in the same binary.
Alex
--
Alex Williamson
calls, but
> I think that these are all safe as the appropriate fault handlers
> are in place. In any case, I will poke around a bit more.
Great. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
de asm/xen/hypervisor.h so we can just include
one file and get both is_paravirt_guest() and is_running_on_xen().
Thanks,
Alex
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
---
time.c | 58 +++---
1 file changed, 7 insertions(
Hi Isaku,
I believe this MCA/xencomm code is for dom0, not domU, so we can
remove it for now. Thanks,
Alex
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
---
arch/ia64/kernel/mca.c | 22 --
arch/ia64/kernel/salinfo.c
Hi Isaku,
This removes some obvious unused code in the
xen-ia64-domu-minimal-2008mar06 branch. I'm afraid this kind of stuff
will only get in the way for people reviewing domU-only changes.
Thanks,
Alex
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
---
arch/ia64/xe
dynamically via IA64_GENERIC. I suppose when we add dom0 support, you
could have IA64_DIG and XEN, but until then, this seems sufficient. Let
me know if you agree this is how it should work. Thanks,
Alex
Signed-off-by: Alex Williamson <[EMAIL PROTECTED]>
---
diff --git a/arch/ia6
should indeed be dropped or fixed, but I'm not
seeing the hang after freeing init mem issue it supposedly fixes.
Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
ll need to make sure distributions set these the way we
want and maybe add it to the defconfig once the code is stabilized. The
Xen machine vector will need to be included in CONFIG_IA64_GENERIC, but
it will also depend on CONFIG_PARAVIRT_XEN. Does that sound reasonable?
Thanks,
Alex
--
On Fri, 2008-03-14 at 11:33 +0900, Kouya Shimura wrote:
> An unimplemented data fault or an unimplemented instruction trap
> should be raised with unimplemented physical address.
> Also some cleanups.
Applied. Thanks,
Alex
--
Alex Williamson
On Wed, 2008-03-12 at 19:05 +0900, Akio Takebe wrote:
> Hi,
>
> This patch cleanup vcpu_set_psr_l().
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mai
On Thu, 2008-03-13 at 17:27 +0800, Xu, Anthony wrote:
> vmx_init_env must be called on every processor
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing l
On Thu, 2008-03-13 at 05:30 +0100, [EMAIL PROTECTED] wrote:
> Hi,
>
> this patch removes the commented lines in order to make the code clearer.
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source &a
On Thu, 2008-03-13 at 21:03 -0600, Alex Williamson wrote:
> On Fri, 2008-03-14 at 10:51 +0900, Simon Horman wrote:
> > On an HP rx2600 this eliminates the problem where the SAL rendezvous address
> > can't be registered and subsequently the boot fails. I suspect it
> &g
who requested it) as we put the pieces
together. We need to keep that integration in mind, but we're a long
way from that point. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
X
pport upstream. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
> Actually, its rather amazing that the HP rx2620 and Tiger2 that
> I have been using work without this fix.
Wow, that is rather surprising. Congratulations on tracking this
down. I'll try to verify if this also solves the problem on superdome
tomorrow. Thanks,
please ignore
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi Eddie,
On Tue, 2008-03-11 at 06:43 +0800, Dong, Eddie wrote:
> Alex Williamson wrote:
> >In your slide set, you mention removing running_on_xen since it
> > conflicts with pv_ops. I think this is a really good goal, but I
> have
> > doubts about whether it's
ubts about whether it's achievable. We're not likely to make a pv_ops
to fit every corner case, and we may have to resort to an ugly direct
test for xen. Let's try to avoid them, but we already have a few cases
of checking machine vector names for this type of thing in other parts
tion. I
haven't done much testing using Server 2003 though. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
On Mon, 2008-03-10 at 15:45 +0800, Xu, Anthony wrote:
> initialize guest register to valid value
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
X
On Mon, 2008-03-10 at 14:35 +0800, Xu, Anthony wrote:
> replace pal_vp_save/restore with vps_save/restore.
> the later have better performance.
Applied. Any measurements as to the performance difference? Thanks,
Alex
--
Alex Williamson HP Open
On Sun, 2008-03-09 at 08:02 +0100, [EMAIL PROTECTED] wrote:
> Hi,
>
> __gpfn_is_io macro hides a call to lookup_domain_mpa. This patch avoids
> multiple call to lookup_domain_mpa during io emulation.
Applied. Thanks,
Alex
--
Alex Williamson
t).
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
On Sat, 2008-03-08 at 03:28 +0100, [EMAIL PROTECTED] wrote:
> Hi,
>
> same as previous patch but indentation updated.
>
> (can boot linux with 2 vcpus).
Is a new firmware image required for this? I applied it, but I can
no longer boot my sioemu domain. Thanks,
On Fri, 2008-03-07 at 19:53 +0900, Kouya Shimura wrote:
> I/O access from the inside of UC physical address causes a panic on HVM.
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
On Fri, 2008-03-07 at 17:57 +0900, Kouya Shimura wrote:
> This patch slightly optimizes hyperprivop emulation
> especially hyper_rfi.
> It shows about 2% faster in fstat system call on dom0.
Nice. Applied. Thanks,
Alex
--
Alex Williamson HP Op
On Fri, 2008-03-07 at 05:42 +0100, [EMAIL PROTECTED] wrote:
> Hi,
>
> this patch removes GPFN_INV_MASK. VTi code now uses INVALID_MFN like pv.
> This slightly simplify code and free a pte bit (more to come here).
Applied. Thanks,
Alex
--
Ale
On Fri, 2008-03-07 at 05:16 +0100, [EMAIL PROTECTED] wrote:
> Hi,
>
> this patch remove duplicated code and create a vlsapic function to
> inject any interruption.
>
> It also removes useless irq_save/restore around atomic updates.
Applied. Thanks,
Alex
-
chain
> after one is found since guest TLB can't
> have any overlap.
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia
is one is based off a private copy. I updated in tree
version to 4 space indenting, inferred from the Mode like at the top of
the file. The patch uses 2 space indenting. We already have enough
formatting conflicts in the xen tree w/o introducing yet another.
Thanks,
Alex
loc_bitmap exceed the default xenheap size on it's own. This leads to
a failure trying to allocate a ridiculously huge block of memory later
on. This patch adds in a test to make sure we don't hit this case and
automatically increases xenheap_size to account for it. Thanks,
Alex
[4721]
>
> Lastly, with the superdome problem. I'm not sure that there is
> much problem tackling that while the SAL problem exists.
> I suspect the two are related.
Hopefully so since the superdome is a shared system and it's more
difficult to setup r
(0xf0003f..). The
chipset error log shows that we apparently tried to do a physical access
to that address in r16.
The good news is that newer boxes like an rx6600 and rx3600 booted
fine, except for the patch 13 issue. Where do we go from here? Thanks,
Alex
--
Alex Williams
would also request that anyone making low
level changes that might affect other architectures, consider adding
this to your testing. It's quite trivial to setup an HVM domain with a
cross compiler and build environment given the instructions above.
Thanks,
Alex
--
, some kexec cleanups and various other fixes. This should
also contain the final fix necessary to enable cross compiling the
entire ia64 code base on x86. I'll send a follow-up once this is merged
with pointers to make that work. Thanks,
Alex
--
Alex Willi
; has proved to be both fragile and incomplete.
Applied. Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensou
On Fri, 2008-02-29 at 13:16 +0900, Horms wrote:
> In the case where kexec is being run for a xen dom0 or hypervisor,
> this code, present in dom0, will be called from the hypervisor
> after ia64_machine_kexec and before going into purgatory.
Applied. Thanks,
Alex
1 - 100 of 1947 matches
Mail list logo