similar to: Bug#665882: xen-utils-common: Xen console for guest not working, hangs

Displaying 20 results from an estimated 200 matches similar to: "Bug#665882: xen-utils-common: Xen console for guest not working, hangs"

2006 Jan 04
2
Error: Device 2049 (vbd) could not be connected. Backend device not found.
Hi, i have seen a post with the same title, but didn''t help a lot -it mentioned, that the image was for LVM, which i don''t think is my case. I downloaded the debian31 image from http://jailtime.org. Initially, i had some problems and changed the configuration file a little. Here it is now: ----------- kernel = "/boot/vmlinuz-2.6-xenU" memory = 256 name =
2008 Nov 18
0
Permission denied of usershares statfile in Samba 3.0.28a-1ubuntu4.7
Hello, I have migrate my running Samba-PDC Setup with LDAP from Debian Etch to Ubuntu Hardy Server 8.04. LDAP ist running correct. Samba Setup ist working right, but acces to Users Home has a poor performance. Access to a "PUBLIC" Folder is much faster! Bug Report: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/299306 The Usershare Folder: drwxrwx--T 2 root sambashare 4096 Nov
2008 Nov 26
0
Re: [Bug 299306] [NEW] Permission denied of usershares statfile in Samba 3.0.28a-1ubuntu4.7
This bug report can be closed.... The Problem was an error in mapping user and group ID to the LDAP UID/GID! I have set the right UID/GID in the smb.conf with uid map = 10000-20000 gid map = 500-600 -> no errors in config!! Meslo wrote: > Public bug reported: > > Hello, > > I have migrate my running Samba-PDC Setup with LDAP from Debian Etch to > Ubuntu Hardy Server 8.04.
2009 Jan 08
0
SIP message routed back to mysql
Hello! * Version: 1.6.0.3-rc1 Scenario: * -> Proxy -> routed back to myself (The only thing changing is the Request URI) (And the Record-Route, Via that are added, of course). Outgoing Context is faxserver-out, incoming context is faxserver (at least should be). Outgoing context is straight forward: [faxserver-out] exten => _X.,1,NoOP(FAXOUT -- Connecting ${CALLERID(all)} ->
2007 Dec 13
0
Re: [Xen-changelog] [linux-2.6.18-xen] xen: make gntdev code configurable
Hi, Looks like this patch broke automated builds due to a lack of a matching line in the defconfigs. Below is a patch that makes this a module for xen and xen0, unconfigured for xenU. That might not be the best thing here however. Thanks kurt Signed-off-by: Kurt Hackel <kurt.hackel@oracle.com> ===================================================== diff -r cd744c5ec950
2007 Dec 11
0
[PATCH] linux: make gntdev code configurable
As usual, written and tested on 2.6.24-rc4 and made apply to the 2.6.18 tree without further testing. Signed-off-by: Jan Beulich <jbeulich@novell.com> Index: head-2007-12-11/drivers/xen/Kconfig =================================================================== --- head-2007-12-11.orig/drivers/xen/Kconfig 2007-10-18 16:15:28.000000000 +0200 +++ head-2007-12-11/drivers/xen/Kconfig
2019 Oct 30
0
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
On 10/28/19 4:10 PM, Jason Gunthorpe wrote: > From: Jason Gunthorpe <jgg at mellanox.com> > > gntdev simply wants to monitor a specific VMA for any notifier events, > this can be done straightforwardly using mmu_range_notifier_insert() over > the VMA's VA range. > > The notifier should be attached until the original VMA is destroyed. > > It is unclear if any of
2012 Apr 03
0
[PATCH v2] xen/gntdev: do not set VM_PFNMAP
Since we are using the m2p_override we do have struct pages corresponding to the user vma mmap''ed by gntdev. Removing the VM_PFNMAP flag makes get_user_pages work on that vma. An example test case would be using a Xen userspace block backend (QDISK) on a file on NFS using O_DIRECT. The patch should be backported back to 2.6.38. Signed-off-by: Stefano Stabellini
2019 Oct 28
1
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
From: Jason Gunthorpe <jgg at mellanox.com> gntdev simply wants to monitor a specific VMA for any notifier events, this can be done straightforwardly using mmu_range_notifier_insert() over the VMA's VA range. The notifier should be attached until the original VMA is destroyed. It is unclear if any of this is even sane, but at least a lot of duplicate code is removed. Cc: Oleksandr
2019 Nov 01
0
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
On 11/1/19 1:48 PM, Jason Gunthorpe wrote: > On Wed, Oct 30, 2019 at 12:55:37PM -0400, Boris Ostrovsky wrote: >> On 10/28/19 4:10 PM, Jason Gunthorpe wrote: >>> From: Jason Gunthorpe <jgg at mellanox.com> >>> >>> gntdev simply wants to monitor a specific VMA for any notifier events, >>> this can be done straightforwardly using
2012 Apr 03
2
[PATCH] xen/gntdev: do not set VM_PFNMAP
Since when we are using the m2p_override it is not true anymore that the mmap''ed area doesn''t have corresponsing struct pages. Removing the VM_PFNMAP flag makes get_user_pages work on the mmap''ed user vma. An example test case would be using a Xen userspace block backend (QDISK) on a file on NFS using O_DIRECT. The patch should be backported back to 2.6.38.
2019 Nov 01
0
[PATCH v2 00/15] Consolidate the mmu notifier interval_tree and locking
On 10/28/19 1:10 PM, Jason Gunthorpe wrote: > From: Jason Gunthorpe <jgg at mellanox.com> > > 8 of the mmu_notifier using drivers (i915_gem, radeon_mn, umem_odp, hfi1, > scif_dma, vhost, gntdev, hmm) drivers are using a common pattern where > they only use invalidate_range_start/end and immediately check the > invalidating range against some driver data structure to tell
2013 Jan 06
0
Re: Xen-users Digest, Vol 95, Issue 8
I''m just a newb at xen, but here''s what I can tell you from my own experience getting xend going: The appropriate features for evtchn and gntdev must be turned on in the kernel. Check /boot/config-`uname -r` to see if CONFIG_XEN_GNTDEV=y and CONFIG_XEN_DEV_EVTCHN=m (maybe y is okay? I''m not sure). Just do it to verify that the precompiled kernel has the options you
2011 Mar 19
1
[patch 1/2] xen-gntdev: return -EFAULT on copy_to_user failure
copy_to_user() returns the amount of data remaining to be copied. We want to return a negative error code here. The upper layers just call WARN_ON() if we return non-zero so this doesn't change the behavior. But returning -EFAULT is still cleaner. Signed-off-by: Dan Carpenter <error27 at gmail.com> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 017ce60..b0f9e8f
2011 Mar 19
1
[patch 1/2] xen-gntdev: return -EFAULT on copy_to_user failure
copy_to_user() returns the amount of data remaining to be copied. We want to return a negative error code here. The upper layers just call WARN_ON() if we return non-zero so this doesn't change the behavior. But returning -EFAULT is still cleaner. Signed-off-by: Dan Carpenter <error27 at gmail.com> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 017ce60..b0f9e8f
2011 Mar 19
1
[patch 1/2] xen-gntdev: return -EFAULT on copy_to_user failure
copy_to_user() returns the amount of data remaining to be copied. We want to return a negative error code here. The upper layers just call WARN_ON() if we return non-zero so this doesn't change the behavior. But returning -EFAULT is still cleaner. Signed-off-by: Dan Carpenter <error27 at gmail.com> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 017ce60..b0f9e8f
2011 Mar 19
1
[patch 2/2] xen-gntdev: unlock on error path in gntdev_mmap()
We should unlock here and also decrement the number of &map->users. Signed-off-by: Dan Carpenter <error27 at gmail.com> --- I'm not very familiar with this code. Please review carefully. diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 017ce60..b0f9e8f 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -662,7 +662,7 @@ static int gntdev_mmap(struct
2011 Mar 19
1
[patch 2/2] xen-gntdev: unlock on error path in gntdev_mmap()
We should unlock here and also decrement the number of &map->users. Signed-off-by: Dan Carpenter <error27 at gmail.com> --- I'm not very familiar with this code. Please review carefully. diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 017ce60..b0f9e8f 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -662,7 +662,7 @@ static int gntdev_mmap(struct
2011 Mar 19
1
[patch 2/2] xen-gntdev: unlock on error path in gntdev_mmap()
We should unlock here and also decrement the number of &map->users. Signed-off-by: Dan Carpenter <error27 at gmail.com> --- I'm not very familiar with this code. Please review carefully. diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 017ce60..b0f9e8f 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -662,7 +662,7 @@ static int gntdev_mmap(struct
2011 Sep 08
1
[PATCH v4 1/2] xen: add an "highmem" parameter to alloc_xenballooned_pages
Add an highmem parameter to alloc_xenballooned_pages, to allow callers to request lowmem or highmem pages. Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> --- drivers/xen/balloon.c | 12 ++++++++---- drivers/xen/gntdev.c | 2 +- include/xen/balloon.h | 3 ++- 3 files changed, 11 insertions(+), 6 deletions(-) diff --git a/drivers/xen/balloon.c