Displaying 20 results from an estimated 200 matches similar to: "Bug#665882: xen-utils-common: Xen console for guest not working, hangs"
2006 Jan 04
2
Error: Device 2049 (vbd) could not be connected. Backend device not found.
Hi,
i have seen a post with the same title, but didn''t
help a lot -it mentioned, that the image was for LVM,
which i don''t think is my case.
I downloaded the debian31 image from
http://jailtime.org. Initially, i had some problems
and changed the configuration file a little. Here it
is now:
-----------
kernel = "/boot/vmlinuz-2.6-xenU"
memory = 256
name =
2008 Nov 18
0
Permission denied of usershares statfile in Samba 3.0.28a-1ubuntu4.7
Hello,
I have migrate my running Samba-PDC Setup with LDAP from Debian Etch to
Ubuntu Hardy Server 8.04.
LDAP ist running correct. Samba Setup ist working right, but acces to
Users Home has a poor performance. Access to a "PUBLIC" Folder is much
faster!
Bug Report:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/299306
The Usershare Folder:
drwxrwx--T 2 root sambashare 4096 Nov
2008 Nov 26
0
Re: [Bug 299306] [NEW] Permission denied of usershares statfile in Samba 3.0.28a-1ubuntu4.7
This bug report can be closed....
The Problem was an error in mapping user and group ID to the LDAP UID/GID!
I have set the right UID/GID in the smb.conf with
uid map = 10000-20000
gid map = 500-600
-> no errors in config!!
Meslo wrote:
> Public bug reported:
>
> Hello,
>
> I have migrate my running Samba-PDC Setup with LDAP from Debian Etch to
> Ubuntu Hardy Server 8.04.
2009 Jan 08
0
SIP message routed back to mysql
Hello!
* Version: 1.6.0.3-rc1
Scenario: * -> Proxy -> routed back to myself (The only thing changing
is the Request URI)
(And the Record-Route, Via that are added, of course).
Outgoing Context is faxserver-out, incoming context is faxserver (at
least should be).
Outgoing context is straight forward:
[faxserver-out]
exten => _X.,1,NoOP(FAXOUT -- Connecting ${CALLERID(all)} ->
2007 Dec 13
0
Re: [Xen-changelog] [linux-2.6.18-xen] xen: make gntdev code configurable
Hi,
Looks like this patch broke automated builds due to a lack of a matching
line in the defconfigs. Below is a patch that makes this a module for
xen and xen0, unconfigured for xenU. That might not be the best thing
here however.
Thanks
kurt
Signed-off-by: Kurt Hackel <kurt.hackel@oracle.com>
=====================================================
diff -r cd744c5ec950
2007 Dec 11
0
[PATCH] linux: make gntdev code configurable
As usual, written and tested on 2.6.24-rc4 and made apply to the 2.6.18
tree without further testing.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: head-2007-12-11/drivers/xen/Kconfig
===================================================================
--- head-2007-12-11.orig/drivers/xen/Kconfig 2007-10-18 16:15:28.000000000 +0200
+++ head-2007-12-11/drivers/xen/Kconfig
2019 Oct 30
0
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
On 10/28/19 4:10 PM, Jason Gunthorpe wrote:
> From: Jason Gunthorpe <jgg at mellanox.com>
>
> gntdev simply wants to monitor a specific VMA for any notifier events,
> this can be done straightforwardly using mmu_range_notifier_insert() over
> the VMA's VA range.
>
> The notifier should be attached until the original VMA is destroyed.
>
> It is unclear if any of
2012 Apr 03
0
[PATCH v2] xen/gntdev: do not set VM_PFNMAP
Since we are using the m2p_override we do have struct pages
corresponding to the user vma mmap''ed by gntdev.
Removing the VM_PFNMAP flag makes get_user_pages work on that vma.
An example test case would be using a Xen userspace block backend
(QDISK) on a file on NFS using O_DIRECT.
The patch should be backported back to 2.6.38.
Signed-off-by: Stefano Stabellini
2019 Oct 28
1
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
From: Jason Gunthorpe <jgg at mellanox.com>
gntdev simply wants to monitor a specific VMA for any notifier events,
this can be done straightforwardly using mmu_range_notifier_insert() over
the VMA's VA range.
The notifier should be attached until the original VMA is destroyed.
It is unclear if any of this is even sane, but at least a lot of duplicate
code is removed.
Cc: Oleksandr
2019 Nov 01
0
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
On 11/1/19 1:48 PM, Jason Gunthorpe wrote:
> On Wed, Oct 30, 2019 at 12:55:37PM -0400, Boris Ostrovsky wrote:
>> On 10/28/19 4:10 PM, Jason Gunthorpe wrote:
>>> From: Jason Gunthorpe <jgg at mellanox.com>
>>>
>>> gntdev simply wants to monitor a specific VMA for any notifier events,
>>> this can be done straightforwardly using
2012 Apr 03
2
[PATCH] xen/gntdev: do not set VM_PFNMAP
Since when we are using the m2p_override it is not true anymore that the
mmap''ed area doesn''t have corresponsing struct pages.
Removing the VM_PFNMAP flag makes get_user_pages work on the mmap''ed user vma.
An example test case would be using a Xen userspace block backend
(QDISK) on a file on NFS using O_DIRECT.
The patch should be backported back to 2.6.38.
2019 Nov 01
0
[PATCH v2 00/15] Consolidate the mmu notifier interval_tree and locking
On 10/28/19 1:10 PM, Jason Gunthorpe wrote:
> From: Jason Gunthorpe <jgg at mellanox.com>
>
> 8 of the mmu_notifier using drivers (i915_gem, radeon_mn, umem_odp, hfi1,
> scif_dma, vhost, gntdev, hmm) drivers are using a common pattern where
> they only use invalidate_range_start/end and immediately check the
> invalidating range against some driver data structure to tell
2013 Jan 06
0
Re: Xen-users Digest, Vol 95, Issue 8
I''m just a newb at xen, but here''s what I can tell you from my own
experience getting xend going:
The appropriate features for evtchn and gntdev must be turned on in
the kernel. Check
/boot/config-`uname -r` to see if CONFIG_XEN_GNTDEV=y and
CONFIG_XEN_DEV_EVTCHN=m (maybe y is okay? I''m not sure). Just do it
to verify that the precompiled kernel has the options you
2011 Mar 19
1
[patch 1/2] xen-gntdev: return -EFAULT on copy_to_user failure
copy_to_user() returns the amount of data remaining to be copied. We
want to return a negative error code here. The upper layers just
call WARN_ON() if we return non-zero so this doesn't change the
behavior. But returning -EFAULT is still cleaner.
Signed-off-by: Dan Carpenter <error27 at gmail.com>
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 017ce60..b0f9e8f
2011 Mar 19
1
[patch 1/2] xen-gntdev: return -EFAULT on copy_to_user failure
copy_to_user() returns the amount of data remaining to be copied. We
want to return a negative error code here. The upper layers just
call WARN_ON() if we return non-zero so this doesn't change the
behavior. But returning -EFAULT is still cleaner.
Signed-off-by: Dan Carpenter <error27 at gmail.com>
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 017ce60..b0f9e8f
2011 Mar 19
1
[patch 1/2] xen-gntdev: return -EFAULT on copy_to_user failure
copy_to_user() returns the amount of data remaining to be copied. We
want to return a negative error code here. The upper layers just
call WARN_ON() if we return non-zero so this doesn't change the
behavior. But returning -EFAULT is still cleaner.
Signed-off-by: Dan Carpenter <error27 at gmail.com>
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 017ce60..b0f9e8f
2011 Mar 19
1
[patch 2/2] xen-gntdev: unlock on error path in gntdev_mmap()
We should unlock here and also decrement the number of &map->users.
Signed-off-by: Dan Carpenter <error27 at gmail.com>
---
I'm not very familiar with this code. Please review carefully.
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 017ce60..b0f9e8f 100644
--- a/drivers/xen/gntdev.c
+++ b/drivers/xen/gntdev.c
@@ -662,7 +662,7 @@ static int gntdev_mmap(struct
2011 Mar 19
1
[patch 2/2] xen-gntdev: unlock on error path in gntdev_mmap()
We should unlock here and also decrement the number of &map->users.
Signed-off-by: Dan Carpenter <error27 at gmail.com>
---
I'm not very familiar with this code. Please review carefully.
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 017ce60..b0f9e8f 100644
--- a/drivers/xen/gntdev.c
+++ b/drivers/xen/gntdev.c
@@ -662,7 +662,7 @@ static int gntdev_mmap(struct
2011 Mar 19
1
[patch 2/2] xen-gntdev: unlock on error path in gntdev_mmap()
We should unlock here and also decrement the number of &map->users.
Signed-off-by: Dan Carpenter <error27 at gmail.com>
---
I'm not very familiar with this code. Please review carefully.
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 017ce60..b0f9e8f 100644
--- a/drivers/xen/gntdev.c
+++ b/drivers/xen/gntdev.c
@@ -662,7 +662,7 @@ static int gntdev_mmap(struct
2011 Sep 08
1
[PATCH v4 1/2] xen: add an "highmem" parameter to alloc_xenballooned_pages
Add an highmem parameter to alloc_xenballooned_pages, to allow callers to
request lowmem or highmem pages.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
---
drivers/xen/balloon.c | 12 ++++++++----
drivers/xen/gntdev.c | 2 +-
include/xen/balloon.h | 3 ++-
3 files changed, 11 insertions(+), 6 deletions(-)
diff --git a/drivers/xen/balloon.c