Hi,
As you pointed out, I also think that the reflection in the case of
nested_dtlb_miss is not necessary. So I removed that part and attach
the patch.
Signed-off-by: Tetsu Yamamoto [EMAIL PROTECTED]
Regards,
Tetsu Yamamoto
Tristan Gingold wrote:
Le Vendredi 28 Avril 2006 12:16, Tetsu
Le Mercredi 10 Mai 2006 07:39, Tian, Kevin a écrit :
From: Tristan Gingold
Sent: 2006年5月9日 21:23
Hi,
this patch tries to make vtlb/vhpt management interface cleaner. No
new
features added.
It also allow to flush region 7 (which fixes a bug).
We really have to think on
Le Mercredi 10 Mai 2006 10:30, Tian, Kevin a écrit :
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 15:29
At least one simple enhancement
we can do is to change syntax of domain_dirty_cpumask. We can
change it to indicate processors that domain is ever running on. Then
Le Mardi 09 Mai 2006 17:59, Magenheimer, Dan (HP Labs Fort Collins) a écrit :
Good cleanup. No specific problems noted however something
this basic should probably get more thorough testing. Since
rr7 changes only on domain switch, booting a few domains
simultaneously and actively
4 / 5
# HG changeset patch
# User [EMAIL PROTECTED]
# Node ID 5369cee86e468c49b7fd75ce0954da9e39b7f32d
# Parent 18a7bc2d0f2e7bf1b5fca956322e9b8e7edb0022
add maddr_t definition to compile netback and netfront.
PATCHNAME:netback_netfront_to_compile_linux
Signed-off-by: Isaku Yamahata [EMAIL
1 / 5
# HG changeset patch
# User [EMAIL PROTECTED]
# Node ID 2dce18258c3d533016b666230eb199940d336c2b
# Parent 318db79dbab017835bc428a39fd1b1312dd0f4aa
changes of kconfig for dom0 vp model.
PATCHNAME: arch_ia64_kconfig_linux
Signed-off-by: Isaku Yamahata [EMAIL PROTECTED]
diff -r
The following patches are the P2M/VP step 3.
These patches are only for preparetion patches.
I don't expect that these patches affect on stability.
Subject: [PATCH 1/5] [P2M/VP step 3] linux: ia64 Kconfig
Subject: [PATCH 3/5] [P2M/VP step 3] linux: ia64 coreMakefile clean up
Subject: [PATCH 2/5]
5 / 5
# HG changeset patch
# User [EMAIL PROTECTED]
# Node ID 9446c5f455d8c3ad2b3b333af0f2ecfcf492f563
# Parent 5369cee86e468c49b7fd75ce0954da9e39b7f32d
add trivial definitions, MULTI_UVMFLAGS_INDEX and MULTI_update_va_mapping()
to compile netback and netfront
PATCHNAME:
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 15:29
At least one simple enhancement
we can do is to change syntax of domain_dirty_cpumask. We can
change it to indicate processors that domain is ever running on. Then
update point only happens at creation/destroy/migration, or
Le Mercredi 10 Mai 2006 09:23, Tian, Kevin a écrit :
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 15:05
Le Mercredi 10 Mai 2006 04:57, Tian, Kevin a écrit :
From:Tristan Gingold
Sent: 2006年5月9日 23:22
Hi,
currently evtchn_vector is a field of vcpu_info. I
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 15:31
Yes, that vector is domain-wise. However do you really need put it
into shared_info? Guest doesn't access this field directly, and how
about moving it into arch_domain?
Guest access it, to initialize it!
Tristan.
Le Mercredi 10 Mai 2006 11:14, Tian, Kevin a écrit :
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 16:53
At least one simple enhancement
we can do is to change syntax of domain_dirty_cpumask. We can
change it to indicate processors that domain is ever running on.
Hi,
just to say that with current changeset, SMP-g is broken. I am looking why.
Also, at least xen/xenivt.S (the linux file) is drifting from kernel/ivt.S
Tristan.
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 18:47
I see your concern about flush efficiency. However we still need set
necessary mask bits for correctness, right?
Not yet, because pages are not transfered.
It's not specific to page flipping. Simple page sharing also has
Le Mercredi 10 Mai 2006 13:38, Tian, Kevin a écrit :
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 18:47
I see your concern about flush efficiency. However we still need set
necessary mask bits for correctness, right?
Not yet, because pages are not transfered.
It's
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 19:57
Le Mercredi 10 Mai 2006 13:38, Tian, Kevin a écrit :
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 18:47
I see your concern about flush efficiency. However we still need set
necessary mask bits for
On Wed, May 10, 2006 at 07:38:12PM +0800, Tian, Kevin wrote:
From: Tristan Gingold [mailto:[EMAIL PROTECTED]
Sent: 2006年5月10日 18:47
I see your concern about flush efficiency. However we still need set
necessary mask bits for correctness, right?
Not yet, because pages are not transfered.
On Wed, 2006-05-10 at 15:46 +0900, Isaku Yamahata wrote:
The following patches are the P2M/VP step 3.
These patches are only for preparetion patches.
I don't expect that these patches affect on stability.
Subject: [PATCH 1/5] [P2M/VP step 3] linux: ia64 Kconfig
Subject: [PATCH 3/5] [P2M/VP
From: Isaku Yamahata [mailto:[EMAIL PROTECTED]
Sent: 2006年5月11日 0:01
The key point is to pass in the gva address (host_addr) which is
previously mapped to granted frame. It's guest's responsibility to
record
those mapped address and then passed in at unmap request. For
example, xen/x86 use
On Wed, May 10, 2006 at 05:04:12PM -0600, Alex Williamson wrote:
On Wed, 2006-05-10 at 15:46 +0900, Isaku Yamahata wrote:
The following patches are the P2M/VP step 3.
These patches are only for preparetion patches.
I don't expect that these patches affect on stability.
Subject: [PATCH
From: Alex Williamson
Sent: 2006年5月11日 0:23
- Does xen reboot after the above messages or just be silent?
It seems that something occurs somewhere in acpi_boot_init() of
linux/arch/ia64/kernel/acpi.c.
Could you track it down more?
It MCAs at this point. The error record indicates a
From: Isaku Yamahata [mailto:[EMAIL PROTECTED]
Sent: 2006年5月11日 10:04
I agree with you that a simple and certain way should be adopted
as a first step and that complex and uncertain thing should be
examined later.
In this case it is that xen should be given virtual addresses to
flush trusting
Hi,
This patch removed warning messages from process.c.
I tested compilation only.
Signed-off-by: Masaki Kanno [EMAIL PROTECTED]
Best regards,
Kan
remove.warning.patch
Description: Binary data
___
Xen-ia64-devel mailing list
On Thu, May 11, 2006 at 10:11:24AM +0800, Tian, Kevin wrote:
Yes, same page now. On this point, we have to trust. Hey, para-domain
is para-virtualized so it should be cooperative. Cooperative here means
para-domain needs to conform with para-interfaces defined by Xen. One
of Xen's
Hi All
I have a question about Domain time update in IA64.
(update_vcpu_system_time)
In x86, this function is working.
But in ia64, the function is null at this moment.
Is there any plan to change the function specification ?
Atsushi Sakai
___
From: Atsushi SAKAI
Sent: 2006年5月11日 10:45
Hi All
I have a question about Domain time update in IA64.
(update_vcpu_system_time)
In x86, this function is working.
But in ia64, the function is null at this moment.
Is there any plan to change the function specification ?
Atsushi Sakai
Now
On Thu, 2006-05-11 at 10:52 +0800, Tian, Kevin wrote:
Have to say it's bad news. When I turned on
xen_ia64_dom0_virtual_physical in xen, it halts even before starting
dom0. Based on tip (Rev 9992). Maybe we should try this feature later
when all patch sets are checked in. :-(
Hi Kevin,
Hi,
I have the following error with default config.
Does everyone have the same?
cset #9992.
SAL 0.1: Xen/ia64 Xen/ia64 version 0.0
SAL: AP wakeup using external interrupt vector 0xf3
xen_pal_emulator: UNIMPLEMENTED PAL CALL 42
(XEN) No logical to physical processor mapping available
28 matches
Mail list logo