+Hongbo from Intel GPU virtualization team
On 08/02/17 09:41 +, Asharaf Perinchikkal wrote:
> Is possible to achieve GPU virtualization in Intel® Atom using para
> virtualization?
>
> From: Roger Pau Monné [roger@citrix.com]
> Sent: Wednesday, Augu
On Wed, 2017-08-02 at 11:34 +0100, Joao Martins wrote:
> On 08/01/2017 07:34 PM, Andrew Cooper wrote:
> > > On Wed, Jul 05, 2017 at 02:22:00PM +0100, Joao Martins wrote:
> > > >
> > > > There could be other uses too on passing this info to Xen, say
> > > > e.g. the
> > > > scheduler knowing the gu
On Wed, Aug 2, 2017 at 1:49 PM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> This series of patches enable the toolstack to
>> set and get per-VCPU work-conserving flag.
>> With the toolstack, system administrators can decide
>> which VCPUs will be made work-conserv
On Wed, Aug 2, 2017 at 1:46 PM, Dario Faggioli
wrote:
> Hey, Meng!
>
> It's really cool to see progress on this... There was quite a bit of
> interest in scheduling in general at the Summit in Budapest, and one
> important thing for making sure RTDS will be really useful, is for it
> to have a wor
This patch implements the CPU init flow for CDP. The flow is almost
same as L3 CAT.
Signed-off-by: Yi Sun
---
v15:
- refine process in 'psr_cpu_init' to remove the 'goto'.
(suggested by Jan Beulich)
v14:
- remove the 'Notes' in commit message because a stub function is
impleme
When more than one idle VCPUs that have the same PCPU as their
previous running core invoke runq_tickle(), they will tickle the same
PCPU. The tickled PCPU will only pick at most one VCPU, i.e., the
highest-priority one, to execute. The other VCPUs will not be
scheduled for a period, even when ther
On 08/02/2017 08:01 AM, Juergen Gross wrote:
> On 01/08/17 16:28, PGNet Dev wrote:
>> On 7/28/17 9:02 AM, PGNet Dev wrote:
>>> On 7/27/17 11:23 PM, Juergen Gross wrote:
Can you please post the domain's config file used to create the domain
and the kernel config?
>>> Sure.
>>>
>>>https
On 08/02/2017 01:46 PM, Arvind Yadav wrote:
> pci_device_id are not supposed to change at runtime. All functions
> working with pci_device_id provided by work with
> const pci_device_id. So mark the non-const structs as const.
>
> Signed-off-by: Arvind Yadav
Reviewed-by: Boris Ostrovsky
On Wed, Jul 12, 2017 at 3:15 AM, Wei Liu wrote:
>
> On Thu, Jul 13, 2017 at 10:03:39AM +0800, Xiong Zhang wrote:
> > When valid mmio_hole is set in hvm.cfg, segment fault happens at accessing
> > localents pointer.
> >
> > Because the size of localents pointer isn't enough to store appended
> > mm
On Wed, Aug 02, 2017 at 07:10:25PM +0100, Julien Grall wrote:
> Hi,
>
> On 01/08/17 00:53, Stefano Stabellini wrote:
> >On Mon, 31 Jul 2017, Edgar E. Iglesias wrote:
> > @role Can only be 'master' or 'slave', it defaults to
> > 'slave'.
> >
> > @prot
On Tue, 1 Aug 2017, Julien Grall wrote:
> Hi Edgar,
>
> On 01/08/2017 22:22, Edgar E. Iglesias wrote:
> > On Tue, Aug 01, 2017 at 10:02:45PM +0100, Julien Grall wrote:
> > > Hi,
> > >
> > > On 01/08/2017 21:40, Stefano Stabellini wrote:
> > > > On Tue, 1 Aug 2017, Edgar E. Iglesias wrote:
> > > >
Hi everybody,
the Xen based suspend notification interface is implemented in Linux by
drivers/xen/manage.c. The guest monitors a node on xenstore named
"control/shutdown", one of the possible commands is "suspend".
See the corresponding libxl__domain_pvcontrol_* functions and their
callers under
Hi,
On 01/08/17 00:53, Stefano Stabellini wrote:
On Mon, 31 Jul 2017, Edgar E. Iglesias wrote:
@role Can only be 'master' or 'slave', it defaults to 'slave'.
@prot When @role = master, this means the largest set of
stage-2 permission
On Wed, Aug 2, 2017 at 9:56 AM, Kees Cook wrote:
> On Wed, Aug 2, 2017 at 9:42 AM, Thomas Garnier wrote:
>> I noticed that not only we have the problem of gs:0x40 not being
>> accessible. The compiler will default to the fs register if
>> mcmodel=kernel is not set.
>>
>> On the next patch set, I
pci_device_id are not supposed to change at runtime. All functions
working with pci_device_id provided by work with
const pci_device_id. So mark the non-const structs as const.
Signed-off-by: Arvind Yadav
---
drivers/xen/platform-pci.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> This series of patches enable the toolstack to
> set and get per-VCPU work-conserving flag.
> With the toolstack, system administrators can decide
> which VCPUs will be made work-conserving.
>
Thanks for this series as well, Meng. I'll look at it
Hi, Kevin
On Wed, Aug 2, 2017 at 9:12 AM, Tian, Kevin wrote:
>> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com]
>> Sent: Tuesday, August 1, 2017 7:08 PM
>>
>> Hi, Kevin
>>
>> On Tue, Aug 1, 2017 at 6:06 AM, Tian, Kevin wrote:
>> >> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com]
Hey, Meng!
It's really cool to see progress on this... There was quite a bit of
interest in scheduling in general at the Summit in Budapest, and one
important thing for making sure RTDS will be really useful, is for it
to have a work conserving mode! :-)
On Tue, 2017-08-01 at 14:13 -0400, Meng Xu
Hi,
Thanks for the invite, please find the presentation here:
https://docs.google.com/presentation/d/1PhK9bdLyY_DSr8RbSs7LDdLWADbSW7YGwwnkpMLWeQg/edit#slide=id.g24c05965d7_0_15
Regards,
Mirela
On Tue, Aug 1, 2017 at 7:43 PM, Stefano Stabellini
wrote:
> On Tue, 1 Aug 2017, Julien Grall wrote:
>
On Wed, Aug 2, 2017 at 9:42 AM, Thomas Garnier wrote:
> I noticed that not only we have the problem of gs:0x40 not being
> accessible. The compiler will default to the fs register if
> mcmodel=kernel is not set.
>
> On the next patch set, I am going to add support for
> -mstack-protector-guard=glo
On Thu, Jul 20, 2017 at 7:26 AM, Thomas Garnier wrote:
> On Wed, Jul 19, 2017 at 4:33 PM, H. Peter Anvin wrote:
>> On 07/19/17 11:26, Thomas Garnier wrote:
>>> On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst wrote:
On Tue, Jul 18, 2017 at 6:33 PM, Thomas Garnier
wrote:
> Perpcu uses
On Tue, 2017-08-01 at 15:24 -0400, Meng Xu wrote:
> The initial discussion of this patch can be found at
> https://lists.xenproject.org/archives/html/xen-devel/2017-02/msg02857
> .html
>
> Changes in v4:
> 1) Take Dario's suggestions:
> Search the new->cpu first for the cpu to tickle.
> This
Just a reminder that we are going to use the following conf bridge:
Join the call: https://www.uberconference.com/stefano-stabellini
US dial-in number: 669-999-0613
No PIN needed
For the international numbers, go to
https://www.uberconference.com/stefano-stabellini and choose "Join by
Phone", a l
On Wed, 2017-08-02 at 09:16 -0600, Jan Beulich wrote:
>
> Well, I've seen breakage in all sorts of places I wouldn't have expected
> anyone to fine a need to fiddle with.
This is the nature of 'value subtract', I suppose.
How about something like this? Somewhat complicated by the fact that
COFF
Hi,
I've just pushed QEMU v2.9.0 to our qemu-xen tree.
Regards,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 08/02/2017 05:24 AM, Jan Beulich wrote:
Boris Ostrovsky 07/31/17 6:03 PM >>>
> On 07/31/2017 10:45 AM, Jan Beulich wrote:
> Boris Ostrovsky 07/23/17 4:01 AM >>>
>>> On 06/27/2017 01:06 PM, Jan Beulich wrote:
>>> Boris Ostrovsky 06/22/17 8:55 PM >>>
>> --- a/xen/include/asm-x8
>>> Yi Sun 08/02/17 5:12 PM >>>
>On 17-08-02 06:35:46, Jan Beulich wrote:
>> >>> Yi Sun 08/01/17 11:04 AM >>>
>> >@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void)
>> >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s);
>> >if ( regs.b & PSR_RESOURCE_TYPE_L3 )
>> >{
>> >+bool do_l3_cat_ini
>>> David Woodhouse 08/02/17 4:45 PM >>>
>On Wed, 2017-08-02 at 07:58 -0600, Jan Beulich wrote:
>> > > > David Woodhouse 08/02/17 2:11 PM >>>
>> > This change is sufficient (we believe) to make EFI builds of Xen
>> > actually boot again on current EDK2, is it not?
>>
>> It is safe / sufficient on
On 17-08-02 06:35:46, Jan Beulich wrote:
> >>> Yi Sun 08/01/17 11:04 AM >>>
> >@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void)
> >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s);
> >if ( regs.b & PSR_RESOURCE_TYPE_L3 )
> >{
> >+bool do_l3_cat_init = true;
> >+
> >cpuid_count_leaf(PSR_C
>>> Roger Pau Monne 06/30/17 5:01 PM >>>
>Note that accesses to the Table Offset, Table BIR, PBA Offset and PBA
>BIR are not trapped by Xen at the moment.
They're mandated r/o by the spec anyway.
>@@ -113,6 +148,35 @@ static int vpci_modify_bar(struct domain *d, const struct
>vpci_bar *bar,
>if
On Wed, 2017-08-02 at 07:58 -0600, Jan Beulich wrote:
> > > > David Woodhouse 08/02/17 2:11 PM >>>
> > This change is sufficient (we believe) to make EFI builds of Xen
> > actually boot again on current EDK2, is it not?
>
> It is safe / sufficient only with the specific behavior you've observed, i
>>> Roger Pau Monne 06/30/17 5:02 PM >>>
>--- a/xen/drivers/vpci/header.c
>+++ b/xen/drivers/vpci/header.c
>@@ -459,7 +459,7 @@ static int vpci_init_bars(struct pci_dev *pdev)
>return 0;
>}
>
>-REGISTER_VPCI_INIT(vpci_init_bars);
>+REGISTER_VPCI_INIT(vpci_init_bars, VPCI_PRIORITY_LOW);
Why "LOW
>>> David Woodhouse 08/02/17 2:11 PM >>>
>On Wed, 2017-08-02 at 05:56 -0600, Jan Beulich wrote:
>> > > > David Woodhouse 08/02/17 1:30 PM >>>
>> > --- a/xen/arch/x86/efi/efi-boot.h
>> > +++ b/xen/arch/x86/efi/efi-boot.h
>> > @@ -87,7 +87,8 @@ static void __init efi_arch_relocate_image(unsigned lo
On 02.08.17 15:58, Edgar E. Iglesias wrote:
Today it's an SMMUv2.
You would need to implement additional ops like [1].
I don't necessarily think so. The context-switch would involve saving and
restoring accelerator state aswell as re-programming the PL.
With allocate/release, we only need to
During creating of a HVM domU meminit_hvm() tries to map superpages.
After save/restore or migration this mapping is lost, everything is
allocated in single pages. This causes a performance degradition after
migration.
Add neccessary code to preallocate a superpage for the chunk of pfns
that is re
>>> Roger Pau Monne 06/30/17 5:01 PM >>>
>Add handlers for the MSI control, address, data and mask fields in
>order to detect accesses to them and setup the interrupts as requested
>by the guest.
>
>Note that the pending register is not trapped, and the guest can
>freely read/write to it.
>
>Wheth
Hi Florian,
Sorry for the late answer.
On 26/07/17 14:12, Florian Jakobsmeier wrote:
Hello,
i was just testing the single step implementation and realized that the
before mentioned solution is not fully working. I'm still trying to
enable SS for a VM on Xen.
Would you mind sharing the latest
On 01.08.2017 19:07, Tamas K Lengyel wrote:
On Tue, Aug 1, 2017 at 4:30 AM, Andrew Cooper wrote:
On 01/08/17 10:46, Alexandru Isaila wrote:
Allow guest userspace code to request that a vm_event be sent out
via VMCALL. This functionality seems to be handy for a number of
Xen developers, as st
On Wed, Aug 02, 2017 at 02:07:17PM +0300, Andrii Anisov wrote:
> Hello Edgar,
Hi Andrii,
>
>
> On 01.08.17 20:13, Edgar E. Iglesias wrote:
> >>Are master ports behind IOMMU?
> >Yes, they are.
> What IOMMU IP is used?
Today it's an SMMUv2.
>
> >>>It's possible to reprogram the configuration
>>> Yi Sun 08/01/17 11:04 AM >>>
>@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void)
>cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s);
>if ( regs.b & PSR_RESOURCE_TYPE_L3 )
>{
>+bool do_l3_cat_init = true;
>+
>cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 1, ®s);
>
>feat = feat_l3;
>feat_l3 = NU
On Wed, 2017-08-02 at 05:56 -0600, Jan Beulich wrote:
> >
> > >
> > > >
> > > > David Woodhouse 08/02/17 1:30 PM >>>
> > --- a/xen/arch/x86/efi/efi-boot.h
> > +++ b/xen/arch/x86/efi/efi-boot.h
> > @@ -87,7 +87,8 @@ static void __init efi_arch_relocate_image(unsigned long
> > delta)
> > case PE
On 01/08/17 16:28, PGNet Dev wrote:
> On 7/28/17 9:02 AM, PGNet Dev wrote:
>> On 7/27/17 11:23 PM, Juergen Gross wrote:
>>> Can you please post the domain's config file used to create the domain
>>> and the kernel config?
>>
>> Sure.
>>
>>https://pastebin.com/M6cr2pX7
>>
>
> Any add'l info nee
>>> David Woodhouse 08/02/17 1:30 PM >>>
>--- a/xen/arch/x86/efi/efi-boot.h
>+++ b/xen/arch/x86/efi/efi-boot.h
>@@ -87,7 +87,8 @@ static void __init efi_arch_relocate_image(unsigned long
>delta)
>case PE_BASE_RELOC_DIR64:
>if ( in_page_tables(addr) )
>blexit(L"Unexpected relocation type");
>-
Hook the memdisk parameter detection and the saving of the host
properties into the examine jobs.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Do not pass a host ident to ts-examine-hostprops-save.
- Use .- for ts-memdisk-try-append so that the rest of the job will
run even if this
This is needed in order to figure out which memdisk options should be
used to boot the images on each specific box.
Note that when passed the --recordappend argument upon success the
script stores the tentative host property in the runvars.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
-
Hello,
This is the remaining memdisk examine series (ie: starting with the
first non-acked patch) and it's rebased on top of the previous FreeBSD
host install series.
The series expands the examine flight in order to test which memdisk
options should be used for each host. Hopefully all of this w
This script turns the properties stored in the runvars using the
format hostprop/$ident/$prop=$val into host properties stored in the
database.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Call selecthost based on the idents passed in the putative
hostprops runvar.
- Fix commit mes
So that it can also be used by make-hosts-flight. No functional change
intended.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
---
make-freebsd-flight | 31 ---
mfi-common | 31 +++
2 files changed, 31 insertions(+), 31 del
This is used to store tentative host properties in the runvars of a
job, with the expectation that at some point (ie: at the end of the
job) they will be turned into real properties stored in the database.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
---
Changes since v2:
- Use the foll
This is needed in order to run the memdisk test.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
---
make-hosts-flight | 3 +++
1 file changed, 3 insertions(+)
diff --git a/make-hosts-flight b/make-hosts-flight
index 0152dfe1..d5670857 100755
--- a/make-hosts-flight
+++ b/make-hosts-fligh
And provide a helper in TestSupport to use it. This allows osstest to
set host properties from test script themselves (instead of using
the mg-hosts clu).
Note that the setting of host properties is limited to flights with
intended blessing real, and it will fail for any other blessing.
Signed-of
The intended usage is to run this script against every host in order
to record the possible needed memdisk flags.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
---
Changes since v1:
- Get the arch of the job and exit with 0 if it's not supported.
- Pass the --recordappend argument to ts
On Wed, 2017-08-02 at 03:17 -0600, Jan Beulich wrote:
>
> >... but then again, if the whole function is really doing nothing at
> >all when invoked with delta==0 then perhaps it would just be easier to
> >remove the first pass altogether. I feel sure I'm missing something,
>
> The reason is even
On Tue, Aug 1, 2017 at 4:00 PM, Wei Liu wrote:
> On Tue, Aug 01, 2017 at 02:58:19PM +0300, Oleksandr Grytsov wrote:
>> On Mon, Jul 31, 2017 at 5:36 PM, Wei Liu wrote:
>> > On Sun, Jul 30, 2017 at 09:42:09PM +0300, Oleksandr Grytsov wrote:
>> >> On Fri, Jul 28, 2017 at 7:23 PM, Wei Liu wrote:
>>
The function is invoked with delta=0 before ExitBootServices() is called,
as a dummy run purely to validate that all the relocations can be handled.
This allows us to exit gracefully with an error message.
However, we have relocations in read-only sections such as .rodata and
.init.te(xt). Recent
On 31/07/17 13:22, Wei Liu wrote:
> A document for the release manager.
>
> Signed-off-by: Wei Liu
With two minor corrections (see below):
Reviewed-by: Juergen Gross
> ---
> docs/process/xen-release-management.pandoc | 594
> +
> 1 file changed, 594 insertions(+)
>>> Razvan Cojocaru 08/01/17 9:22 PM >>>
>Since this seems to be blocked as-is, I propose transforming this patch
>into a series, with one patch adding a new return code specifically for
>unsupported instructions (X86_EMUL_UNIMPLEMENTED or
>X86_EMUL_UNSUPPORTED?), and this patch sending the vm_eve
On 01/08/17 21:45, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 3:39 AM, Juergen Gross wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>> Instead of having a paravirt op being called for e
Hello Edgar,
On 01.08.17 20:13, Edgar E. Iglesias wrote:
Are master ports behind IOMMU?
Yes, they are.
What IOMMU IP is used?
It's possible to reprogram the configuration of the PL and swap accelerators in
and out on the fly. It's probably going to be too slow for trying to
context switch b
On 08/01/2017 07:34 PM, Andrew Cooper wrote:
> On 31/07/2017 20:49, Konrad Rzeszutek Wilk wrote:
>> On Wed, Jul 05, 2017 at 02:22:00PM +0100, Joao Martins wrote:
>>> On 07/05/2017 12:16 PM, Andrew Cooper wrote:
On 05/07/17 10:46, Joao Martins wrote:
> Hey Andrew,
>
> On 07/04/2017
On 02/08/17 12:12, Waseem, Amna wrote:
> Hello All,
>
> Can anyone tell me how xenstore filesystem gets populated about information
> about Dom0.
see tools/helpers/xen-init-dom0.c
> Which function or script creates node for local domain?
see tools/libxl/ (various source files)
> I want to sta
Hi,
On 01/08/17 20:07, Stefano Stabellini wrote:
On Tue, 1 Aug 2017, Oleksandr Andrushchenko wrote:
Hi, Stefano!
On 07/31/2017 11:28 PM, Stefano Stabellini wrote:
On Mon, 31 Jul 2017, Oleksandr Andrushchenko wrote:
3 Sharing with page exchange (XENMEM_exchange)
==
Hey, apologies in advance, for the very long email! :-O
On Tue, 2017-08-01 at 12:13 -0700, Stefano Stabellini wrote:
> Given the description below, it's possible that the new timer has to
> fire several times before the callback can be finally invoked, right?
>
> I would make some measurements to
Hello All,
Can anyone tell me how xenstore filesystem gets populated about information
about Dom0. Which function or script creates node for local domain?
I want to statically configure the xenstore about guest parameters. I want to
statically create nodes before bringing up xenstored daemon.
This series introduces support for direct mapping of guest resources.
Mapping is currently limited to grant tables but support for other resources
will be added by subsequent patches.
Paul Durrant (5):
arch/[x86|arm]: remove code duplication
x86/mm: allow a privileged PV domain to map guest mf
In the case where a PV domain is mapping guest resources then it needs make
the HYPERVISOR_mmu_update call using DOMID_SELF, rather than the guest
domid, so that the passed in gmfn values are correctly treated as mfns
rather than gfns present in the guest p2m.
This patch removes a check which curr
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest
resources for direct priv-mapping.
This patch adds new functionality into libxenforeignmemory to make use
of a new privcmd ioctl [1] that uses the new memory op to make such
resources available via mmap(2).
[1]
http://xenbit
A previous patch added support for priv-mapping guest resources directly
(rather than having to foreign-map, which requires P2M modification for
HVM guests).
This patch makes use of the new API to seed the guest grant table unless
the underlying infrastructure (i.e. privcmd) doesn't support it, in
There is a substantial amount of code duplicated between the x86 and arm
implementations of mm.c:xenmem_add_to_physmap_one() for
XENMAPSPACE_grant_table. Also, the code in question looks like it really
should be in common/grant_table.c
This patch introduces a new function in common/grant_table.c t
Certain memory resources associated with a guest are not necessarily
present in the guest P2M and so are not necessarily available to be
foreign-mapped by a tools domain unless they are inserted, which risks
shattering a super-page mapping.
This patch adds a new memory op to allow such resourced t
Is possible to achieve GPU virtualization in Intel® Atom using para
virtualization?
From: Roger Pau Monné [roger@citrix.com]
Sent: Wednesday, August 02, 2017 1:04 PM
To: Asharaf Perinchikkal
Cc: xen-devel@lists.xen.org; Anoop Babu
Subject: Re: [Xen-deve
>>> Boris Ostrovsky 07/31/17 6:16 PM >>>
>On 07/31/2017 11:20 AM, Jan Beulich wrote:
> Boris Ostrovsky 07/23/17 4:14 AM >>>
> @@ -1050,17 +1120,42 @@ static void scrub_free_pages(unsigned int node)
> -if ( node_need_scrub[node] == 0 )
> -return;
On Mon, Jun 26, 2017 at 3:37 PM, Andrew Cooper
wrote:
> On 26/06/17 14:00, Andrew Cooper wrote:
>> On 26/06/17 13:55, Olaf Hering wrote:
>>> If the default compiler silently defaults to to -fPIC/-fPIE building
>>> rombios fails:
>>>
>>> ld -melf_i386 -s -r 32bitbios.o tcgbios/tcgbiosext.o util.o
>>> Boris Ostrovsky 07/31/17 6:03 PM >>>
On 07/31/2017 10:45 AM, Jan Beulich wrote:
Boris Ostrovsky 07/23/17 4:01 AM >>>
>> On 06/27/2017 01:06 PM, Jan Beulich wrote:
>> Boris Ostrovsky 06/22/17 8:55 PM >>>
> --- a/xen/include/asm-x86/mm.h
> +++ b/xen/include/asm-x86/mm.h
>
>>> Konrad Rzeszutek Wilk 07/31/17 6:04 PM >>>
>On Mon, Jul 31, 2017 at 07:55:34AM -0600, Jan Beulich wrote:
>> >>> Konrad Rzeszutek Wilk 07/26/17 9:50 PM >>>
>> >--- a/docs/misc/livepatch.markdown
>> >+++ b/docs/misc/livepatch.markdown
>> >@@ -279,6 +279,10 @@ It may also have some architecture-
>>> David Woodhouse 07/31/17 5:57 PM >>>
>There is a first call to efi_arch_relocate_image(0) before the
>ExitBootServices() call. However I'm missing something because I can't
>see how that call achieves anything *other* than to trigger the fault
>we're concerned about.
>
>There are three types o
>>> Boris Ostrovsky 07/23/17 4:28 AM >>>
>On 06/27/2017 03:28 PM, Jan Beulich wrote:
> Boris Ostrovsky 06/22/17 8:56 PM >>>
>>> +static void check_and_stop_scrub(struct page_info *head)
>>> +{
>>> +if ( head->u.free.scrub_state == BUDDY_SCRUBBING )
>>> +{
>>> +struct page_info
flight 71930 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71930/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64-pvops 2 hosts-allocate broken like 71702
build-arm64
On Tue, Aug 01, 2017 at 10:01:01AM +, Asharaf Perinchikkal wrote:
> Hi All,
>
>
> In Intel® Atom™ E3845(MinnowBoard Turbot Quad-Core board) has only support
> for Virtualization Technology (VT-x).
>
> No support for Intel® Virtualization Technology for Directed I/O (VT-d).
> [https://ark.
79 matches
Mail list logo