> -Original Message-
> From: Steven Haigh
> Sent: 02 September 2019 09:09
> To: Paul Durrant
> Cc: Andreas Kinzler ; Andrew Cooper
> ; xen-
> de...@lists.xenproject.org
> Subject: Re: Windows HVM no longer boots with AMD Ryzen 3700X (and 3900X)
>
> On 2019-09-02 18:04, Paul Durrant
By default the sve bits are not set.
This patch adds the option of setting the sve bits upon creating a new
altp2m view.
Signed-off-by: Alexandru Isaila
---
tools/libxc/include/xenctrl.h | 3 +++
tools/libxc/xc_altp2m.c | 28
xen/arch/x86/hvm/hvm.c
On 2019-09-02 18:04, Paul Durrant wrote:
-Original Message-
Further to the above, I did some experimentation. The following is a
list of attempted boot configurations and their outcomes:
viridian=1
vcpus=4
STOPCODE: HAL MEMORY ALLOCATION
viridian=0
vcpus=4
STOPCODE:
On 30.08.2019 22:09, Lars Kurth wrote:
> Specifically:
> * Move check until after the MAINTAINERS file has been read
> * Add get_xen_maintainers_file_version() for check
> * Remove top_of_tree as not needed any more
> * Faiul with extended error message when used out of tree
>
> Signed-off-by:
On 30.08.2019 22:09, Lars Kurth wrote:
> This change provides sufficient information to allow get_maintainer.pl /
> add_maintainers.pl scripts to be run on xen sister repositories such as
> mini-os.git, osstest.git, etc
>
> A suggested template for sister repositories of Xen is
>
>
> -Original Message-
>
> Further to the above, I did some experimentation. The following is a
> list of attempted boot configurations and their outcomes:
>
> viridian=1
> vcpus=4
> STOPCODE: HAL MEMORY ALLOCATION
>
> viridian=0
> vcpus=4
> STOPCODE:
flight 140915 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/140915/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-47 xen-boot fail REGR. vs. 139876
On 01.09.2019 08:58, Adam Zerella wrote:
> This resolves a type conversion from 'char *' to 'unsigned short'.
Could you explain this? There's no ...
> --- a/arch/x86/xen/efi.c
> +++ b/arch/x86/xen/efi.c
> @@ -118,8 +118,8 @@ static enum efi_secureboot_mode
> xen_efi_get_secureboot(void)
>
On 30.08.2019 18:25, David Woodhouse wrote:
> On Fri, 2019-08-30 at 17:43 +0200, Jan Beulich wrote:
>> On 21.08.2019 18:35, David Woodhouse wrote:
>>> @@ -762,6 +773,11 @@ trampoline_setup:
>>> mov $((boot_trampoline_end - boot_trampoline_start) / 4),%ecx
>>> rep movsl
On 30.08.2019 18:12, David Woodhouse wrote:
> On Fri, 2019-08-30 at 17:10 +0200, Jan Beulich wrote:
>> On 21.08.2019 18:35, David Woodhouse wrote:
>>> --- a/xen/arch/x86/boot/trampoline.S
>>> +++ b/xen/arch/x86/boot/trampoline.S
>>> @@ -16,21 +16,62 @@
>>> * not guaranteed to persist.
>>> */
On 01.09.19 21:28, Souptick Joarder wrote:
Rather than using static int max_dma_bits, this
can be coverted to use as macro.
Signed-off-by: Souptick Joarder
s/zen/xen/ in the patch title, other than that:
Reviewed-by: Juergen Gross
Juergen
___
Hi Oleksandr-san,
> From: Oleksandr, Sent: Thursday, August 29, 2019 7:56 PM
> > About this hardware handling, this patch seems good to me. But, since
> > I'm not familiar about Xen passthrough framework, I think I cannot
> > add my Reviewed-by tag into this patch. What do you think?
>
> I am
flight 140920 linux-4.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/140920/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 6 xen-buildfail REGR. vs. 139698
build-amd64-xsm
101 - 113 of 113 matches
Mail list logo