On 2/25/2013 12:00 PM, Roger Pau Monné wrote:
On 25/02/13 17:49, Konrad Rzeszutek Wilk wrote:
On Fri, Feb 15, 2013 at 08:12:52PM +0100, Roger Pau Monné wrote:
On 15/02/13 19:56, Konrad Rzeszutek Wilk wrote:
Should be backported to 3.8 stable.
Lets do one thing at a time.
The patch I have in
On 9/6/2013 11:09 AM, Stefano Stabellini wrote:
On Fri, 6 Sep 2013, Boris Ostrovsky wrote:
m2p_remove_override() calls get_balloon_scratch_page() in
MULTI_update_va_mapping() even though it already has pointer to this page from
the earlier call (in scratch_page). This second call doesn't have a
On 6/11/2013 5:00 AM, George Dunlap wrote:
On 06/11/2013 08:29 AM, Jan Beulich wrote:
On 10.06.13 at 23:06, Konrad Rzeszutek Wilk
wrote:
There are two tool-stack that can instruct the Xen PCI frontend
and backend to change states: 'xm' (Python code with a daemon),
and 'xl' (C library - does n
On 6/11/2013 3:42 AM, Jan Beulich wrote:
On 10.06.13 at 18:43, Konrad Rzeszutek Wilk wrote:
On Mon, Jun 10, 2013 at 04:52:35PM +0100, Jan Beulich wrote:
On 07.06.13 at 22:11, Konrad Rzeszutek Wilk wrote:
On Tue, Jun 04, 2013 at 03:57:06PM -0400, Konrad Rzeszutek Wilk wrote:
+ /* N.B.
On 6/11/2013 11:36 AM, George Dunlap wrote:
On 06/10/2013 10:06 PM, Konrad Rzeszutek Wilk wrote:
There are two tool-stack that can instruct the Xen PCI frontend
and backend to change states: 'xm' (Python code with a daemon),
and 'xl' (C library - does not keep state changes).
With the 'xm', th
On 6/11/2013 12:17 PM, George Dunlap wrote:
On 06/11/2013 05:08 PM, konrad wilk wrote:
On 6/11/2013 11:36 AM, George Dunlap wrote:
On 06/10/2013 10:06 PM, Konrad Rzeszutek Wilk wrote:
There are two tool-stack that can instruct the Xen PCI frontend
and backend to change states: 'xm
On 6/27/2013 9:28 AM, Stefano Stabellini wrote:
xen_hvm_post_suspend, xen_pre_suspend, xen_post_suspend are only used if
CONFIG_HIBERNATE_CALLBACKS is defined, resulting in:
drivers/xen/manage.c:46:13: warning: ‘xen_hvm_post_suspend’ defined but not
used [-Wunused-function]
drivers/xen/manage.
> David Vrabel (1): xen/events: avoid race with raising an event in
unmask_evtchn()
Unless I am looking in the wrong place, this patch is still the same one
that breaks PV on HVM and Xen ARM guests, see:
http://marc.info/?l=xen-devel&m=136377731913034
David is aware of the issue and I think is
On 8/21/2013 9:48 AM, David Vrabel wrote:
All,
179ef71c (mm: save soft-dirty bits on swapped pages) introduces a new
PTE bit on x86 _PTE_SWP_SOFT_DIRTY which has the same value as _PTE_PSE
and _PTE_PAT.
With a Xen PV guest, the use of the _PTE_PAT will result in the page
having unexpected cach
On 7/25/2013 10:51 PM, Zheng, Lv wrote:
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: Thursday, July 25, 2013 8:04 PM
CC-ing some of the tboot maintainers.
As what I've said, it's up to the others to determine if the patch is OK.
I just need to make my concerns visible in t
- ying...@kernel.org wrote:
> Prepare to put page table on local nodes.
>
> Move calling of init_mem_mapping to early_initmem_init.
>
> Rework alloc_low_pages to alloc page table in following order:
> BRK, local node, low range
>
> Still only load_cr3 one time, otherwise we would bre
Sorry about top-posting, using an webemail client.
This looks like you are using PV PCI passthrough? If so, did you
remember to use 'iommu=soft' to enable the Xen-SWIOTLB in your guest?
And are you booting with more than 4GB? Or is less than 3GB (so that you have
a nice gap in E820).
- Origin
On 1/17/2013 8:05 AM, Jan Beulich wrote:
On 17.01.13 at 13:22, Matt Wilson wrote:
On Wed, Jan 16, 2013 at 04:22:49PM -0500, Konrad Rzeszutek Wilk wrote:
We have the framework to use v2, but there are no backends that
actually use it. The end result is that on PV we use v2 grants
and on PVHVM
On 10/3/2014 12:06 PM, Akinobu Mita wrote:
2014-10-03 23:27 GMT+09:00 Peter Hurley :
On 10/02/2014 07:08 PM, Akinobu Mita wrote:
2014-10-03 7:03 GMT+09:00 Peter Hurley :
On 10/02/2014 12:41 PM, Konrad Rzeszutek Wilk wrote:
On Tue, Sep 30, 2014 at 09:49:54PM -0400, Peter Hurley wrote:
On 09/3
14 matches
Mail list logo