Displaying 20 results from an estimated 40000 matches similar to: "Stuck at "Hardware Assisted Paging Enabled" with xen-unstable"
2007 Sep 13
3
Hardware Assisted Paging Param and Message
This patch changes hap parameter from boolean to integer. So users can
disable and enable hap using "hap=0" and "hap=1". It also prints out
nested paging message under SVM.
Signed-off-by: Wei Huang <wei.huang2@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Aug 23
0
[Xen-devel] ANNOUNCE: Xen 3.3.0 released!
----- Forwarded message from Keir Fraser <keir.fraser at eu.citrix.com> -----
From: Keir Fraser <keir.fraser at eu.citrix.com>
To: "xen-devel at lists.xensource.com" <xen-devel at lists.xensource.com>
Date: Fri, 22 Aug 2008 12:53:35 +0100
Subject: [Xen-devel] ANNOUNCE: Xen 3.3.0 released!
Folks,
We're pleased to announce the official release of Xen 3.3.0!
This
2008 Aug 09
3
Cannot assign device in Xen-unstable [VT-d]
Hello,
I FINALLY got Xen working with VT-d. I compiled Xen-unstable (3.3) from
Mercurial on CentOS 5.2, but compiled my own kernel-xen from the latest
CentOS SRPM. (Made sure pciback was built-in and not a module, as the stock
kernel-xen has it as a module.) I''m probably going to write a how-to soon,
so stay tuned!
I have a JMicron SATA/PATA PCI Express controller with a DQ35JO
2008 Aug 09
3
Cannot assign device in Xen-unstable [VT-d]
Hello,
I FINALLY got Xen working with VT-d. I compiled Xen-unstable (3.3) from
Mercurial on CentOS 5.2, but compiled my own kernel-xen from the latest
CentOS SRPM. (Made sure pciback was built-in and not a module, as the stock
kernel-xen has it as a module.) I''m probably going to write a how-to soon,
so stay tuned!
I have a JMicron SATA/PATA PCI Express controller with a DQ35JO
2006 May 30
2
Testing status of fully virtualized guests (Intel VT) on 64bit XEN unstable
Summary:
Changeset 10173
- 64bit UP and SMP guests boot cleanly
- 32bit UP guests boot clean and 32bit SMP guests still fail to boot
(see failure.7)
- 32bit UP guests lockup under load with "ata1: command 0x25 timeout"
(see failure.4)
- 64bit SMP 2 CPU guests lockup under load with "ata1: command 0x25
timeout" (see failure.2)
- 32bit UP guest crashed on user load test
2007 Feb 05
0
Xen Unstable Seed Repository Tarball
The Xen Mercurial cheatsheet (
http://www.cl.cam.ac.uk/research/srg/netos/xen/readmes/hg-cheatsheet.txt
) says:
<<<<<<<<<<<<<
You can point a browser and this and use Hg''s web interface to view
revision history, or use it as the nominated source when issuing
"hg init" or "hg pull" commands.
However, to avoid taxing the Mercurial
2013 Jan 25
1
[PATCH] HAP: Add global enable/disable command line option
Also, correct a copy&paste error in the documentation.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
This patch has been in the XenServer patch queue for a long time. It is more
for debugging purposes than anything else, but is still proving to be valuable
for tracking down bugs with HVM paging operations.
diff -r 5af4f2ab06f3 -r e6ec5b2b717f
2011 Nov 03
2
xen-unstable fails to boot on a system with Ivy Bridge stepping C0 cpu
Hi,
I need a help with tracking down following issue:
When trying to boot Xen on a system with Ivy Bridge stepping C0 CPU, it is stuck on CPU initialization.
I''ve added some tracing to apic writes/reads and traced it so far to sending INIT IPI.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging detected.
(XEN) Setting warm reset code and vector.
(XEN) apic_wrmsr (0x280,0x0)
2012 Sep 17
1
[Xen-devel] [ANNOUNCE] Xen 4.2 released!
----- Forwarded message from Keir Fraser <keir at xen.org> -----
From: Keir Fraser <keir at xen.org>
To: xen-devel at lists.xen.org
Date: Mon, 17 Sep 2012 12:34:00 +0100
Subject: [Xen-devel] [ANNOUNCE] Xen 4.2 released!
The Xen team is pleased to announce the release of Xen 4.2.
The result of *18 months* of development, new features include:
* Paging/sharing improvements for
2011 Dec 24
0
question about xen memory management when shadow paging is enabled in Dom0!
what is the relationship between virtual gdt in xen, and shadow page
table of vm in xen? I want to determine the type of a page (is it data,
or code) from xen. For this I have vtx, and shadow paging enabled in
Dom0. I don''t have any domU running.
--
Best Regards,
Mohamad Rezaei
2005 Feb 18
1
Update on Xen on my hardware with nForce SATA
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello,
I complained some time ago that a the dom0-kernel (2.6.9-based) inside
Xen would wait forever when trying to detect the hard disks connected
via the S-ATA controller, which is provided by the nForce 250Gb chipset.
The problem guessed by Keir (IIRC) was that the interrupt routing didn''t
work because Xen didn''t use ACPI to do
2008 Jul 07
1
Xen 3.3 unstable on OpenSUSE 10.3 - initrd problem
Folks,
Mercurial is selectable as an installation in
OpenSUSE 10.3 YAST.
I have done the following:
hg clone http://xenbits.xensource.com/xen-unstable.hg
hg clone http://xenbits.xensource.com/linux-2.6.18-xen.hg
make dist
sh ./install.sh
I tried running the following to create the initrd but it failed:
Depending on your config, you may need to use ''mkinitrd'' to
2011 Apr 06
1
Xen page sharing
Hi sahil:
I think the reason why you cannot get page shared is due to the gref you got.
Gref is responsible for a page allocated from domU, in my understanding it should not be
0, that is a gref 0 can not be shared, that''s why I skip gref 0 to be nominated.
The gref is nominated to Xen and later used to find a corrspond MFN, so it shall not always be the same.
2013 Apr 20
4
debian xen 4.1 and 3.8.x kernel (from experimental)
I''m trying to get ceph working with decent performance (currently getting kb/second write performance!) and it seems that maybe the Debian wheezy kernel is just a bit too ancient.
The 3.8 kernel from experimental works on bare metal, but when booting as dom0 under the xen hypervisor it crashes.
I just figured out how to redirect xen output to my IPMI/BMC serial port and I see this:
2016 Aug 18
4
BUG: soft lockup - CPU#0 stuck for 36s! [swapper/0:0]
This bug is reported only on the VM's with CentOS 7 running on on VMware
ESXi 5.1.
The vSphere performance graph shows high CPU consume and disk activity only
on VM's with CentOS 7. Sometimes I can not connect remotely with ssh
(timeout error).
The details of last issues was reported to retrace.fedoraproject.org.
?Do you have a hint?
[root at vmguest ~]# abrt-cli list
id
2011 Oct 05
2
MMIO emulation failed & successful reboot
Hello list,
Did an update to the latest AMD drivers
(11-9_vista64_win7_64_dd_ccc_ocl) and was pleasantly surprised to find
that I can reboot my passthrough domU!
Firstly, the reboot was triggered involuntarily shortly (20
seconds) AFTER the SUCCESSFUL driver update. The only thing logged was
this:
(XEN) io.c:194:d5 MMIO emulation failed @
0010:fffff800036c7d00: 0f 28 04 10 0f 28
2017 Aug 08
0
BUG: soft lockup - CPU#0 stuck for 36s! [swapper/0:0]
Never saw this email....Did anyone get it?? anyone know how to fix this?thanks again.
From: KM <info4km at yahoo.com>
To: CentOS mailing list <centos at centos.org>
Sent: Monday, August 7, 2017 11:26 AM
Subject: Re: [CentOS] BUG: soft lockup - CPU#0 stuck for 36s! [swapper/0:0]
All,This happens on all of our CentOS 7 VMs.? but as stated in the email trail, the file
2012 Dec 18
2
[ANNOUNCE] Xen 4.1.4 released
Folks,
I am pleased to announce the release of Xen 4.1.4. This is
available immediately from its mercurial repository:
http://xenbits.xen.org/xen-4.1-testing.hg (tag RELEASE-4.1.4)
This fixes the following critical vulnerabilities:
* CVE-2012-3494 / XSA-12:
hypercall set_debugreg vulnerability
* CVE-2012-3495 / XSA-13:
hypercall physdev_get_free_pirq vulnerability
* CVE-2012-3496 /
2012 Aug 10
0
[ANNOUNCE] Xen 4.1.3 and 4.0.4 released
Folks,
I am pleased to announce the release of Xen 4.0.4 and 4.1.3. These are
available immediately from their respective mercurial repositories:
http://xenbits.xen.org/xen-4.0-testing.hg (tag RELEASE-4.0.4)
http://xenbits.xen.org/xen-4.1-testing.hg (tag RELEASE-4.1.3)
These fix the following critical vulnerabilities:
* CVE-2012-0217 / XSA-7:
PV guest privilege escalation vulnerability
*
2007 Feb 13
2
EFI guest firmware for xen-ia64: where to put the sources ?
Hi,
until recently, the hvm guest firmware for xen-ia64 was a private binary
file owned and delivered by Intel.
I have written an open-source implementation based on tianocore.org.
The ia64 firmware is roughly speaking EFI. I have also ported tianocore to
Qemu/x86. It shouldn''t be hard to port it to x86.
Because the sources are big (at least 40MB) and the buildery is not easy
(build