On Wed, 2014-11-12 at 11:41 -0700, Xing Lin wrote:
[ 9448.347994] [ cut here ]
[ 9448.348004] WARNING: CPU: 1 PID: 19902 at
/build/buildd/linux-3.13.0/mm/mmap.c:2736 exit_mmap+0x16b/0x170()
more message ignored
The most interesting bits of the message are
On 13.11.14 at 06:31, liang.z...@intel.com wrote:
Apart from the subject being kind of wrong (you're not turning it on
by default, but only expose it if the hardware supports it), ...
--- a/tools/libxc/xc_cpuid_x86.c
+++ b/tools/libxc/xc_cpuid_x86.c
@@ -192,6 +192,7 @@ static void
On Wed, 2014-11-12 at 17:31 +, George Dunlap wrote:
@@ -6444,6 +6445,7 @@ int main_blockdetach(int argc, char **argv)
rc = libxl_device_disk_remove(ctx, domid, disk, 0);
if (rc) {
fprintf(stderr, libxl_device_disk_remove failed.\n);
+return 1;
}
On 13.11.14 at 03:32, robert...@intel.com wrote:
Hi,
This is a separated report for bug
http://bugzilla-archived.xenproject.org/bugzilla/show_bug.cgi?id=1897
Environment:
Service Arch (ia32/ia32e/IA64): ia32e
Guest Arch (ia32/ia32e/IA64):
Guest OS Type (Linux/Windows):
On 13.11.14 at 00:52, am...@gatech.edu wrote:
Hello,
I am trying to set up a shared page between the hypervisor and a Linux guest
kernel. In Xen I am doing:
void *ptr = alloc_xenheap_page();
share_xen_page_with_guest(virt_to_page(ptr), current-domain,
XENSHARE_writable);
unsigned int
El 12/11/14 a les 18.41, Stefano Stabellini ha escrit:
On Wed, 12 Nov 2014, Roger Pau Monne wrote:
This patch fixes two issues with persistent grants and the disk PV backend
(Qdisk):
- Don't use batch mappings when using persistent grants, doing so prevents
unmapping single grants (the
All,
while the 3 month period since the previous stable releases would
expire at the beginning of December, looking at the number of
changes in the stable trees I don't think starting preparations right
now would make much sense. Unless I hear severe objections to
this plan, and unless 4.5 gets
On 13/11/14 10:25, Jan Beulich wrote:
On 12.11.14 at 16:25, david.vra...@citrix.com wrote:
--- a/arch/x86/include/asm/device.h
+++ b/arch/x86/include/asm/device.h
@@ -13,4 +13,6 @@ struct dev_archdata {
struct pdev_archdata {
};
+#define ARCH_HAS_DMA_GET_REQUIRED_MASK
Is there a
On 13.11.14 at 11:25, jbeul...@suse.com wrote:
On 12.11.14 at 16:25, david.vra...@citrix.com wrote:
--- a/arch/x86/include/asm/device.h
+++ b/arch/x86/include/asm/device.h
@@ -13,4 +13,6 @@ struct dev_archdata {
struct pdev_archdata {
};
+#define ARCH_HAS_DMA_GET_REQUIRED_MASK
Is
Am 12.11.2014 um 18:41 hat Stefano Stabellini geschrieben:
On Wed, 12 Nov 2014, Roger Pau Monne wrote:
This patch fixes two issues with persistent grants and the disk PV backend
(Qdisk):
- Don't use batch mappings when using persistent grants, doing so prevents
unmapping single
Ian Jackson writes (Re: [rumpuserxen test] 31509: regressions - FAIL):
...
This is weird.
Actually, I think, the problem is that the rumpkernel now exits
successfully rather than crashing, and my domain config file says only
`on_crash=preserve' and not `on_shutdown=preserve'.
So this is a bug
flight 31517 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31517/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 9 guest-start fail REGR. vs. 30603
flight 31520 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31520/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Regressions which are
Hi all,
I am back on my virtual machine once again and have run into a bit of
a problem (once again). So I am coming to you cap in hand...
I am having 2 major problems at the moment.
1.- Access to the PCI device from the PV will fail the second time I
create it UNLESS I call xl
Hi,
While attempting to test Konrads new interrupt injection logic, I got
blocked behind yet another Pygrub bug caused by c/s d1b93ea
This is the first time I have looked into the issue, but a cursory
inspection of the first hunk shows that it cannot possibly be correct as
self._default is
On 13.11.14 at 17:03, t...@xen.org wrote:
Being a feature that has only been used by ia64 and/or ppc it
doesn't seem like we need to keep it any longer in the tree.
So remove it.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Signed-off-by: Tim Deegan t...@xen.org
Acked-by:
On 27 October 2014 10:34, Ian Campbell ian.campb...@citrix.com wrote:
On Sun, 2014-10-26 at 09:51 +, Thomas Leonard wrote:
On 21 October 2014 11:50, Ian Campbell ian.campb...@citrix.com wrote:
On Fri, 2014-10-03 at 10:20 +0100, Thomas Leonard wrote:
Based on an initial patch by Karim
On Wed, Nov 12, 2014 at 4:58 PM, Andrew Cooper andrew.coop...@citrix.com
wrote:
On 12/11/14 15:31, Tamas K Lengyel wrote:
diff --git a/xen/include/public/mem_event.h
b/xen/include/public/mem_event.h
index 599f9e8..c0e9394 100644
--- a/xen/include/public/mem_event.h
+++
po...@iki.fi said:
Actually, hmm, there's already an image for /etc available. I
understood from irc discussion that you needed slight modifications to
passwd for mathopd. In case your changes don't conflict with what's
already up there, you could just update the existing downloadable
On 13/11/14 17:07, Martin Lucina wrote:
po...@iki.fi said:
Actually, hmm, there's already an image for /etc available. I
understood from irc discussion that you needed slight modifications to
passwd for mathopd. In case your changes don't conflict with what's
already up there, you could just
Since a message to XenStore have a lenght of type UINT32, have
XenStore.c deal only with UINT32 instead of a mixmatch with UINTN.
This patch replaces the type of Len in WRITE_REQUEST and the type of the
argument Len of XenStoreWriteStore and XenStoreReadStore.
This patch should avoid to have
Hi Petr,
On Thu, Nov 13, 2014 at 04:51:48PM +0100, Petr Tesarik wrote:
Hi all,
this thread got somehow forgotten because of vacations...
Anyway, read below.
On Tue, 24 Jul 2012 15:54:10 +0200
Daniel Kiper daniel.ki...@oracle.com wrote:
On Tue, Jul 24, 2012 at 10:18:34AM +0200, Petr
George Dunlap writes (Re: [Xen-devel] Security policy ambiguities - XSA-108
process post-mortem):
On Mon, Nov 10, 2014 at 6:01 PM, Ian Jackson
ijack...@chiark.greenend.org.uk wrote:
III. Information-sharing
...
List members are allowed to share fixes to
Hello Jan,
Yes, the first thing I do in the driver is set the PCI configuration
access bits to 7 that should enable IO space, Memory Space and Master
BUS access.
As a test I disabled this and all reads to the PCI device return -1,
even the first one.
I implied your earlier
This patch fixes two issues with persistent grants and the disk PV backend
(Qdisk):
- Keep track of memory regions where persistent grants have been mapped
since we need to unmap them as a whole. It is not possible to unmap a
single grant if it has been batch-mapped. A new check has also
On Thu, 13 Nov 2014 18:22:17 +0100
Daniel Kiper daniel.ki...@oracle.com wrote:
Hi Petr,
On Thu, Nov 13, 2014 at 04:51:48PM +0100, Petr Tesarik wrote:
Hi all,
this thread got somehow forgotten because of vacations...
Anyway, read below.
On Tue, 24 Jul 2012 15:54:10 +0200
Daniel
On Thu, Nov 13, 2014 at 04:02:47PM +, Andrew Cooper wrote:
Hi,
While attempting to test Konrads new interrupt injection logic, I got
blocked behind yet another Pygrub bug caused by c/s d1b93ea
This is the first time I have looked into the issue, but a cursory
inspection of the first
On Thu, Nov 13, 2014 at 04:18:58PM +, Jan Beulich wrote:
On 13.11.14 at 17:03, t...@xen.org wrote:
Being a feature that has only been used by ia64 and/or ppc it
doesn't seem like we need to keep it any longer in the tree.
So remove it.
Signed-off-by: Boris Ostrovsky
-Original Message-
From: Fabio Fantoni [mailto:fabio.fant...@m2r.biz]
Sent: Wednesday, November 12, 2014 5:59 PM
To: Hu, Robert; xen-devel@lists.xen.org
Cc: jbeul...@suse.com
Subject: Re: [Xen-devel] [TestDay] VMX test report for Xen 4.5.0-rc1
Il 12/11/2014 07:58, Hu, Robert ha
29 matches
Mail list logo