Hi,
Isaku Yamahata wrote
On Tue, Apr 21, 2009 at 11:43:59AM +0900, Akio Takebe wrote:
I think we should not call tasklet_schedule() before softirq_init() at
least on x86.
So how about the attached patch?
I don't get why. Could you please elaborate?
Please ignore this.
I thought the early
(notify_dom0_con_ring_tasklet);
+ else
+send_guest_global_virq(dom0, VIRQ_CON_RING);
}
}
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi,
Thank you for comments.
Isaku Yamahata wrote:
On Tue, Apr 21, 2009 at 10:27:02AM +0900, Akio Takebe wrote:
Hi,
The following changeset broke booting xen-ia64 on some kinds of ia64 boxes.
http://xenbits.xensource.com/ext/ia64/xen-unstable.hg/rev/3fd8f9b34941
The tasklet_schedule call
Hi, Isaku
Isaku Yamahata wrote:
On Tue, Apr 21, 2009 at 11:49:55AM +0900, Isaku Yamahata wrote:
On Tue, Apr 21, 2009 at 11:19:06AM +0900, Isaku Yamahata wrote:
On Tue, Apr 21, 2009 at 10:27:02AM +0900, Akio Takebe wrote:
Hi,
The following changeset broke booting xen-ia64 on some kinds
Hi,
This patch fixes unwind info of fast_hypercall.
fast_hypercall uses r32-r35 without alloc instruction.
In the case of this, the unwind info move over a little.
With my patch, I confirmed the stack trace worked fine.
Signed-off-by: Akio Takebe takebe_a...@jp.fujitsu.com
Best Regards,
Akio
Hi,
Fix typo. (PALL - PAL)
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
typo_pal.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Zhang, Jingke wrote:
Akio Takebe wrote:
Zhang, Jingke wrote:
Tristan Gingold wrote:
On Tue, Sep 02, 2008 at 11:43:58AM +0800, Zhang, Jingke wrote:
Hi Tristan,
We found VTI guest with 3073M (memory is a little more than 3G)
can not be booted up. After some investigation, our engineer
' ?
Tristan.
Hi Tristan,
We found some code pages are polluted by an EFI driver (currently, we did
not locate which driver), and leads to the issue. Thanks!
I guess the same problem.
http://lists.xensource.com/archives/html/xen-ia64-devel/2008-07/msg00200.html
Best Regards,
Akio Takebe
Hi,
Good idea. I added.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
On Mon, Aug 04, 2008 at 09:29:19AM +0900, Akio Takebe wrote:
Content-Description: Mail message body
Hi,
I agree with you. I check the hypercall time at creating.
The time was different because
Hi,
When I create a guest having large memory,
Some guests could not get network response for several seconds.
The issue is caused by xencomm_privcmd_memory_reservation_op().
To improve the response time, the attached patch reduces
MEMORYOP_MAX_EXTENTS.
Signed-off-by: Akio Takebe [EMAIL
;
+
+ if (vaddr == 0)
+ return 0;
+
It should be return 0UL;
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi, Isaku
I have a trivial comment.
+enum ipi_vector {
+ XEN_RESCHEDULE_VECTOR,
+ XEN_IPI_VECTOR,
+ XEN_CMCP_VECTOR,
+ XEN_CPEP_VECTOR,
+
+ XEN_NR_IPIS,
+};
+
Don't need empty line.
Best Regards,
Akio Takebe
___
Xen-ia64
add it to length of __netdev_alloc_skb().
The below is my patch being relative to this.
http://xenbits.xensource.com/xen-unstable.hg?cs=797430d25f1b
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
Hi,
Thank you for your patch!
I think the following way is better.
#define EFI_RUNTIME_SERVICES_SIGNATURE 0x5652453544e5552ULL
Best Regards,
Akio Takebe
minios: fix EFI_RUNTIME_SERVICES_SIGNATURE value
Signed-off-by: Samuel Thibault [EMAIL PROTECTED]
diff -r 23568ca9a778 extras/mini-os
Hi,
This patch is for safe leaving hypervisor.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
safe_leave_hypervisor.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
Hi,
we need to be psr.i==0 at enter/exit PALL.
But do_block() turns on psr.i.
So we need to be it off at exit PAL_HALT_LIGHT.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
disable_psr_i.patch
Description: Binary data
___
Xen
into other(xensource wiki
or xen-ia64 tree)?
Best Regards,
Akio Takebe
---
Recipe for getting/building/running Xen/ia64 with pv_ops
This recipe discribes how to get xen-ia64 source and build it,
and run domU with pv_ops
Hi, Isaku
On Wed, May 21, 2008 at 01:14:08PM +0900, Akio Takebe wrote:
xen_domu_wip_defconfig seems to be a little old.
We need some choice while make oldconfig.
I'll update it at the next update.
I could build pv_ops kernel with it.
But I could not boot it...
As paravirtualized domU?
I
Hi, Alex
You have been a great meintainer.
While you are maintainer, Xen-ia64 has progressed amagingly.
Thank you for your work.
Best Regards,
Akio Takebe
Hi all,
The Xen/ia64 project has come a long way in the past few years, and it's
with some satisfaction and excitement that I announce
Hi, Isaku
On Thu, Apr 24, 2008 at 04:31:15PM +0900, Akio Takebe wrote:
Let me look into it.
Your stack trace didn't say about what grant table operation.
It should GNTTABOP_unmap_grant_ref or GNTTABOP_unmap_and_replace.
Do you know which it is?
Thank you for you investigating.
Both of them
Hi, Isaku
On Wed, Apr 23, 2008 at 01:54:29PM +0900, Akio Takebe wrote:
Content-Description: Mail message body
Hi,
Hi Akio.
This log show that domain_put_page is called 2 times for the same mfn.
But the mfn has different mpaddrs.
I guess the follwing case is occured:
1. at 1st time
Hi,
(XEN) Xen command line: BOOT_IMAGE=scsi0:EFI\redhat\xen-3.3.gz root=/dev/
VolGroup00/LogVol00 com1=38400,8n1,0x2f8,45 dom0_mem=2048M
You should check elilo.conf.
The boot parameter should be in dom0 parameter.
Best Regards,
AKio Takebe
___
Xen
=38400,8n1,0x2f8,45
dom0_mem=2048M.
The log show xen's parmeters = root=/dev/VolGroup00/LogVol00 com1=38400,8n1,
0x2f8,45 dom0_mem=2048M.
If this is correct, we need to investigate the parameters is passed properly.
And Using loglvl=all guest_loglvl=all in xen's parameters may be helpful.
Best Regards,
Akio
of INVALID_M2P_ENTRY.
After the patch was applied, I didn't get this issue.
But I'm not sure yet that the patch is the correct way to fix this issue.
I'll debug more, but if you have any comments, please tell me.
Best Regards,
Akio Takebe
avoid_to_domain_put_page_INVALID_M2P_ENTRY.patch
Description: Binary
Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
inline_asm_barrier.3.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi,
Some priv_op need memory attribulte in inline asm.
If the attribute is not in it, compilers optimize them.
So we may meet some curious bugs though I don't get them.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
inline_asm_barrier.patch
Description: Binary data
Hi, Aron
Hi Akio,
Akio Takebe wrote: [Fri Apr 04 2008, 05:44:10AM EDT]
@@ -251,7 +251,7 @@ extern void xen_set_eflag(unsigned long)
#define xen_ia64_intrin_local_irq_restore(x
/time.c
arch/ia64/xen/time.h
arch/ia64/xen/util.c
arch/ia64/xen/xcom_hcall.c
arch/ia64/xen/irq_xen.c[NG--OK]
arch/ia64/xen/xencomm.c
arch/ia64/xen/xenivt.S
arch/ia64/xen/xensetup.S
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
Hi,
Sorry for my previous post, Isaku.
I made another cleanup patch.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
The below is OK/NG list of checkpatch.pl under arch/ia64/xen.
[NG]
hypervisor.c
machvec.c[ I give up this file because I think it is not necessary. ]
[OK}
Kconfig
Makefile
Hi,
This patch is x86 side.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
implement_dump_execution_state.x86.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
Hi,
This patch is ia64 side.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
implement_dump_execution_state.ia64.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
arch/ia64/xen/xcom_hcall.c [NG--OK]
arch/ia64/xen/xencomm.c
arch/ia64/xen/xenivt.S
arch/ia64/xen/xensetup.S
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
cleanup_xcom_hcall.patch
Description: Binary data
___
Xen-ia64-devel
Hi, Keir
On 27/3/08 13:05, Akio Takebe [EMAIL PROTECTED] wrote:
This patch can show Calltraces at BUG_ON() on ia64.
And this supports xm debug-key d on ia64.
This patch needs to modify some common codes for supporting them.
Can you carefully explain why the interface changes are required
Hi,
On 27/3/08 16:56, Akio Takebe [EMAIL PROTECTED] wrote:
Can you carefully explain why the interface changes are required?
IA64 needs unwind infomation to show the Calltrace.
To make the unwind infomation, we needs switch stack and pt_regs.
So if possible, I want to use pt_regs at geting
should I use?
I'd like to start from cleanup the pv_ops codes and README of pv_ops.
Best Reards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Dir(s)
I don't know HPUX, but does the media start automatically
because the media has startup.nsh?
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
-xen-ia64-pv-ops/mainline.git
or
http://git.gitorious.org/linux-2-6-xen-ia64-pv-ops/mainline.git
Thank you for your help.
It looks fine. I could get git clone started. :)
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel
it.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi,
show_registers() already has show_stack(NULL,NULL),
So we get two same Calltraces. This patch eliminate it.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
eliminate_dup_stacktrace.patch
Description: Binary data
guest?
http://xenbits.xensource.com/ext/xen-ia64-unstable.hg?rev/dba5f548b894
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
download your git tree with
git clone git://repo.or.cz/pv_ops_mirror.git
We may be not able to use http protocol of git...
Thank you for always helping us.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
Hi,
I update it.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Reagrds,
Akio Takebe
Hi, Tristan
Quoting Akio Takebe [EMAIL PROTECTED]:
Hi,
I updated it.
Haven't you changed the behaviour of dfh:
From
- if (newpsr.dfh) {
- ipsr-dfh = 1;
- PSCB(vcpu
Hi, Alex
On Wed, 2008-03-19 at 22:46 +0900, Akio Takebe wrote:
Hi,
This patch fixes a different behavior from the original code.
We need to set psr.ac.
diff -r ba72914de93a arch/ia64/xen/xenivt.S
--- a/arch/ia64/xen/xenivt.SWed Mar 05 17:29:05 2008 +
+++ b/arch/ia64/xen
Hi, Tristan
Quoting Akio Takebe [EMAIL PROTECTED]:
Hi,
we should not set psr.ic at setting psr.i.
I think it was not wrong. You can't set psr.i without setting psr.ic. So
at least, this was harmless.
If so, should we check the psr.ic, and return something like Illegal
Operation
Hi,
On Mon, 2008-03-24 at 16:18 +0900, Akio Takebe wrote:
Hi,
I update it.
I did a little further refinement, please check the tree and make
sure I didn't break it. Applied. Thanks,
Alex
Thank you.
It's good and easier to read than mine.
Best Regards,
Akio Takebe
Hi, Alex
On Mon, 2008-03-24 at 18:49 +0900, Akio Takebe wrote:
On Wed, 2008-03-19 at 22:46 +0900, Akio Takebe wrote:
;;
+#ifdef PSR_DEFAULT_BITS
+ sum PSR_DEFAULT_BITS
+#endif
How would we ever get here w/o PSR_DEFAULT_BITS defined? Thanks,
I have tested
; \
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
://people.valinux.co.jp/~yamahata/xen-ia64/linux-2.6-xen-ia6
4.git
Initialized empty Git repository in /root/pv_ops/linux-2.6-xen-ia64/.git/
Cannot get remote repository information.
Perhaps git-update-server-info needs to be run there?
Best Regards,
Akio Takebe
___
Xen
://people.valinux.co.jp/~yamahata/xen-ia64/linux-2.6-xen-ia64.git;
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi, Eddie
Actually p0 is default pred for all(default) instruction, so post
compile code is same.
Thanks, I didn't know the above.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
Hi,
move_to_psr need to unset the bits.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_vcpu_set_psr_l.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
Hi,
we should not set psr.ic at setting psr.i.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_vcpu_set_psr_i.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
Hi, Tristan
Quoting Akio Takebe [EMAIL PROTECTED]:
Hi,
we should not set psr.ic at setting psr.i.
I think it was not wrong. You can't set psr.i without setting psr.ic. So
at least, this was harmless.
If so, should we check the psr.ic, and return something like Illegal Operation
Hi, Tristan
Quoting Akio Takebe [EMAIL PROTECTED]:
Hi,
move_to_psr need to unset the bits.
Why not ispr-xxx = newpsr-xxx ? Seems simpler.
It's a good idea. I'll update it.
Best Regards,
Aki Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel
Hi,
I updated it.
I tested boot+shutdown dom0/domU.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
Hi, Tristan
Quoting Akio Takebe [EMAIL PROTECTED]:
Hi,
move_to_psr need to unset the bits.
Why not ispr-xxx = newpsr-xxx ? Seems simpler.
It's a good idea. I'll
Hi,
This patch fixes a different behavior from the original code.
We need to set psr.ac.
I tested boot+shutdown dom0/domU.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_set_psr_ac.patch
Description: Binary data
___
Xen
Hi, Tristan
Quoting Akio Takebe [EMAIL PROTECTED]:
Hi,
I updated it.
Haven't you changed the behaviour of dfh:
From
- if (newpsr.dfh) {
- ipsr-dfh = 1;
- PSCB(vcpu, vpsr_dfh) = 1;
- } else {
- ipsr-dfh = PSCB(vcpu, hpsr_dfh
Hi,
This patch cleanup vcpu_set_psr_l().
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
cleanup_set_psr_l.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http
000..cdaf910
--- /dev/null
+++ b/arch/ia64/xen/xenminstate.h
@@ -0,0 +1,148 @@
+#include asm/cache.h
+
+#ifdef CONFIG_XEN
+#include ../kernel/entry.h
+#else
+#include entry.h
+#endif
+
we don't have arch/ia64/xen/entry.h,
so the above ifdef is not necessary.
Best Regards,
Akio Takebe
;/* M */
\
+ COVER; /* B;; (or nothing) */
\
We may mis-read the above COVER as COVER in arch/ia64/xen/inst_xen.h.
Why don't chage the name?
Best Regards,
Akio Takebe
Hi, Xiantao and all
Akio Takebe wrote:
Hi, Eddie and Kaz
I did a quick grep and find MINSTATE_PHYS is never defined in
xenlinux. Xen mca code did. Anything missed?
The minstate.h is a little old, it seems to be around linux-2.6.9.
Current linux-xen is 2.6.18, so the code may
,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
I want to avoid the needless route for kexec/kdump.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi, Keir
On 30/1/08 08:48, Akio Takebe [EMAIL PROTECTED] wrote:
This doesn't need to be fixed on x86 -- the int3 handler will return
silently if the debugger is not configured. It would be nice if the ia64
handler would do the same. If that is not possible then change only ia64
code
Hi,
This patch avoid debugger_trap at not attached by a debugger.
kexec_crash() is called after debugger_trap_immediate().
Because we want to use the safe path at kexecing,
we should avoid the debugger path.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
Hi,
Sorry, this patch is wrong,
I'll send a new patch.
Best Regards,
Akio Takebe
Hi,
This patch avoid debugger_trap at not attached by a debugger.
kexec_crash() is called after debugger_trap_immediate().
Because we want to use the safe path at kexecing,
we should avoid the debugger path
Hi,
This patch avoid debugger_trap when we don't setup a debugger.
kexec_crash() is called after debugger_trap_immediate().
Because we want to use the safe path at kexecing,
we should avoid the debugger path.
And the trap is a needless work.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best
types for 'memcpy'
/root/mini/xen-unstable.hg.16919/extras/mini-os/include/ia64/hypercall-ia64.h:
142: error: previous implicit declaration of 'memcpy' was here
make: *** [lib/math.o] Error 1
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_minios_ia64_1.patch
Description
also confirmed the memory is not clear at booting EFI.
The memory was cleared by linux kernel
because the region set conventional memory.
Can you apply also the new patch?
The define is not used.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
cleanup_acpi2_0.patch
Hi, Tristan
I cannot make dsdt.c in edk2-sparse/EdkXenPkg/Dxe/XenAcpi.
The patch fix it.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_make_dsdt_C.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64
Hi, Tristan
Quoting Akio Takebe [EMAIL PROTECTED]:
Hi, Tristan
I cannot make dsdt.c in edk2-sparse/EdkXenPkg/Dxe/XenAcpi.
The patch fix it.
Well, I am not a big fan of this approach. I'd really prefer each developer
installs its own version of iasl. Maybe the documentation should
of /proc/acpi/dsdt.
I'm not sure why the 0x7ff5 is collect...
What do you think about it?
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
enbale_dsdt.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64
) || defined(XEN)? Seems cleaner than enabling
CONFIG_KEXEC. Thanks,
Thanks, I also think so.
I updated the patch.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
cleanup_efi_C.v2.patch
Description: Binary data
___
Xen-ia64-devel
Hi,
Happy New Year!
This patch is for post xen-3.2.
This patch cleanup the duplicate code of kdump_find_rsvd_region()
in linux-xen/efi.c. The define of CONFIG_KEXEC may be dirty hack.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
cleanup_efi_C.patch
Description
: None
(XEN) SAL: AP wakeup using external interrupt vector 0xf0
hangup
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi,
xen_ssm_i() has barrier() after xen_set_virtual_psr_i().
I think xen_rsm_i() also need barrier().
Is this correct?
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
diff -r b865b15fb54b include/asm-ia64/xen/privop.h
--- a/include/asm-ia64/xen/privop.h Mon Dec 10
() to stop other cpus by smp_send_stop().
I think it should work fine for kexec.
machine_halt() is only spinloop for leaving the panic CallTrace.
What do you think about it, Horms and Alex?
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
stop_all_cpu_at_halt.patch
Hi, Alex
On Tue, 2007-12-04 at 23:48 +0900, Akio Takebe wrote:
Hi,
Current panic() of hypervisor doesn't stop all cpus.
So domains can work after hypervisor panic.
(but this issue happens at only using noreboot option)
If dom0 works after Hypervisor panic,
the system may get a serious
Hi,
Current panic() of hypervisor doesn't stop all cpus.
So domains can work after hypervisor panic.
(but this issue happens at only using noreboot option)
If dom0 works after Hypervisor panic,
the system may get a serious problem.
This patch fix the issue.
Signed-off-by: Akio Takebe [EMAIL
upstream.
3. only disable irqbalance.
I think 2 is better than others.
Best Regards,
Akio Takebe
I believe this particular BUG is due to irqbalanced running on an
upstream kernel. The easy solution is to chkconfig irqbalanced off, but
we probably need to figure out if this should work
unsigned long PA(unsigned long addr)
{
return addr - PAGE_OFFSET;
}
I make the patch to fix this issue.
How about this?
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
---
--- kexec-tools-testing-20071030.orig/purgatory/arch/ia64/purgatory-ia64.c
2007-10-17 12
Hi, Simon
I could work kdump with the attached patch on HVM domain.
If you look like good, I want to post it to kexec ML.
Anyway, thank you for your advice!
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
On Wed, 2007-11-07 at 21:12 +0900, Akio Takebe wrote:
Hi
Hi,
http://lists.xensource.com/archives/html/xen-ia64-devel/2007-10/msg00047.html
I'm sorry for my delay response.
I remade the patch.
This patch is for kexec on HVM domain.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_ia64_eoi_of_null_vector.patch
Description
? In the past we've held an informal BOF to talk about
issues, progress, and just get to know each other better. Would you
like to do that again?
Yoshi, Matsumoto, Ezaki, Kama and Akio will be there.
I also hope the BOF.
Best Regards,
Akio Takebe
___
Xen
that
can be continued at the summit. Thanks,
We may need HVM balloon driver.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi, Horms
On Tue, Oct 16, 2007 at 10:29:53AM +0900, Akio Takebe wrote:
Hi, Alex, Horms
Sorry for my late responce.
What do you think about it?
The panic does seem a bit much, but shouldn't we return rather than
continue on with a NULL_VECTOR? Thanks,
Yes, I also thik so.
I'll post
183 ;;
184 br.call.sptk.many b0=b6;;
BTW, xenitp is very useful.
Thanks, Tristan.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi,
I fix the help of xenitp.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_xenitp_help.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen
Hi, Keir
Applied. However xenitp is ia64-specific and hence patches for it can go to
xen-ia64-devel and into the ia64 branch.
OK. I'll post patches for xenitp to xen-ia64-devel from next.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen
,
Xen call panic_domain. I made the following patch,
but I have never successed kexec/kdump yet.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
remove_panic_domain.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen
Hi, Isaku
After applying your patch, mm_teardown() return integer,
but I didn't find a patch for mm_teardown().
Is the following patch right?
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
diff -r 3b50a7e52ff2 xen/arch/ia64/xen/mm.c
--- a/xen/arch/ia64/xen/mm.cFri Aug 31 17:00:11 2007 +0100
allocate anymore.
How about calc_dom0_size()?
This isn't essential. very minor issue. Just for my preference.
I agree.
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64
uglier than the handful of
casts they remove (imho). Thanks,
In fact Akio tested it. I heard it worked with 100GB.
Akio, did you try more memory?
No, I didn't. I tested with memory=102400 and 20480.
I can test with new one again, but my box has only 128GB memory...
Best Regards,
Akio Takebe
fix this issue.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
fix_dom0_pal_halt.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
/archives/html/xen-ia64-devel/2007-07/msg00220.html
Changelog:
- Move generate_acpi_checksum() from ia64 code to common
- Move add acpi_table_disable() from ia64 code to common
Best Regards,
Akio Takebe
___
Xen-ia64-devel mailing list
Xen-ia64-devel
Hi,
This patch move generate_acpi_checksum() from ia64 code to common.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
move_generate_acpi_checksum.v2.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64
Hi,
Add acpi_table_disable() into xen/drivers/acpi/tables.c
This function can disable a ACPI table by updating the table header.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
add_acpi_table_disable.v2.patch
Description: Binary data
-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
dom0_disable_srat_slit.v2.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel
Hi,
I'm sorry. I sent the old patch.
Please ignore the previous one.
This patch is new one.
Best Regards,
Akio Takebe
Hi,
This patch move generate_acpi_checksum() from ia64 code to common.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
Hi,
I'm sorry. I sent the old patch.
Please ignore the previous one.
This patch is new one.
Best Regards,
Akio Takebe
Hi,
Add acpi_table_disable() into xen/drivers/acpi/tables.c
This function can disable a ACPI table by updating the table header.
Signed-off-by: Akio Takebe [EMAIL PROTECTED
1 - 100 of 335 matches
Mail list logo