similar to: 3.1.1 RC4?

Displaying 20 results from an estimated 1000 matches similar to: "3.1.1 RC4?"

2008 Aug 14
11
[PATCH][TOOLS] ioemu: linking fix for *BSD
Hi, Attached patch tells the linker where to find libxenctrl.so.3.2, libxenguest.so.3.2 and libxenstore.so.3.0 when launching qemu-dm. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> -- AMD Saxony, Dresden, Germany Operating System Research Center Legal Information: AMD Saxony Limited Liability Company & Co. KG Sitz (Geschäftsanschrift): Wilschdorfer Landstr.
2008 Nov 10
5
[PATCH][IOEMU] build fix for BSD
Hi! Attached patch makes git-ioemu compile on NetBSD. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> P.S.: I''m about sending the pieces to qemu-devel. The changes in vl.c already went upstream in qemu''s svn c/s 5646. -- AMD Saxony, Dresden, Germany Operating System Research Center Legal Information: AMD Saxony Limited Liability Company & Co. KG Sitz
2008 Jun 10
3
[PATCH][TOOLS] libxc: mmap fixes for BSD
Hi! On BSD, mmap()ing files works on on-disk files but not on pseudo filesystems like kernfs or procfs. Therefore, attached patch mmap()s anonymous memory. Linux equivalents are sysfs and procfs to above BSD''s pseudo-filesystems. On Linux, mmap is implemented for sysfs but it is questionable to me how write operations work since (most) files in sysfs have static content. So this patch
2007 Aug 02
4
[PATCH][ELF] Correct space calculation for symtab when BSD_SYMTAB=yes
Hi! If there is a string table for section headers, it also gets loaded. Therefore take it into account in size calculation for kernel symtab. Also there is no need to call elf_set_verbose() a second time after elf_init() (First call happens within elf_init()). Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Keir: Can you also apply changeset 15672 and this patch to Xen
2007 May 29
24
RFC: MCA/MCE concept
Hello! The current MCA/MCE support in Xen is that it dumps the error and panics. In the following concept I propose here, there are two places where Xen has to react on. I) Xen receives a MCE from the CPU and II) Xen receives Dom0 instructions via Hypercall The term "self-healing" below is used in the sense of using the most propriate technique(s) to handle an error such as MPR
2008 Jun 30
2
c/s 17913: Breakage on *BSD
Hi! Changeset 17913 breaks build on *BSD: block-qcow.c:36:20: error: gcrypt.h: No such file or directory cc1: warnings being treated as errors block-qcow.c: In function ''gen_cksum'': block-qcow.c:160: warning: implicit declaration of function ''gcry_md_hash_buffer'' block-qcow.c:160: error: ''GCRY_MD_MD5'' undeclared (first use in this function)
2008 May 13
3
Xen HVM cpuid problem
Hi Keir, For HVM guests, all cpuid Fn''s going through domain_cpuid() iterate over the loop and then return 0 for all four registers. Guests OS''s and cpuid tools in HVM which query for cpuid Fn 0000.0000 %eax and 8000.0000 %eax, see the value 0 and think, Xen emulates oldish 386/486 CPUs. This leads to strange boot failures, "your CPU does not support long mode" or
2007 Aug 16
4
[PATCH] small mca cleanup
Hi! The MCG_CAP MSR never returns a negative count of available error-reporting banks. Thus make nr_mce_banks unsigned. While here, do some other minor cleanups. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> -- AMD Saxony, Dresden, Germany Operating System Research Center Legal Information: AMD Saxony Limited Liability Company & Co. KG Sitz (Geschäftsanschrift):
2007 May 24
2
d0 Error pfn 100
Hi! I see these messages from the xen-kernel: (XEN) /usr/src/xen-unstable.hg/xen/include/asm/mm.h:186:d0 Error pfn 100: rd=ffff8300df05c100, od=0000000000000000, caf=00000000, taf=0000000000000000 (XEN) mm.c:636:d0 Error getting mfn 100 (pfn 5555555555555555) from L1 entry 8000000000100125 for dom32753 (XEN) /usr/src/xen-unstable.hg/xen/include/asm/mm.h:186:d0 Error pfn 100:
2008 Mar 26
3
[PATCH][TOOLS] pygrub: cleanup and support for NetBSD
Hi Keir, Attached patch gets rid of the global attr variable and adds support for NetBSD. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> -- AMD Saxony, Dresden, Germany Operating System Research Center Legal Information: AMD Saxony Limited Liability Company & Co. KG Sitz (Geschäftsanschrift): Wilschdorfer Landstr. 101, 01109 Dresden, Deutschland Registergericht
2008 Feb 19
1
Machine Check Exceptions support in Xen
Hi Folks, I see that currently Xen doesn''t export the machine check exceptions to dom0. Is there any plans to export this information to Dom0 (so that it can be read by utilities like mcelog) or is there already some ongoing work on this? Thanks, Sanjay -- ---------------------- PhD Candidate, Georgia Tech http://www.cc.gatech.edu/~ksanjay/
2008 Sep 09
29
[PATCH 1/4] CPU online/offline support in Xen
This patch implements cpu offline feature. Best Regards Haitao Shan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2007 Apr 05
2
Does xentrace write into buffers by default?
Hello, I have a question about the way Xentrace takes a trace. In previous versions of Xen, I took a trace by setting the size of buffers, activating them and writing the information into a file (optional). setsize 20 tbctl 1 xentrace /tmp/xentrace.dat Now I''m using xen-unstable and I see that setsize is already integrated in xentrace command. My question is: does start/stop buffer is
2008 Oct 11
6
size_t and printk and Xen
I am adding code in Xen that printk''s a size_t and find that I can''t write code (short of ifdef''ing) that compiles on both 32-bit and 64-bit because size_t is typedef''d in Xen as an unsigned long. C.f. http://www.velocityreviews.com/forums/t438359-portable-way-to-printf-a-sizet-instance.html It appears that the %z format is understood by Xen printk. Is the
2007 Jun 24
4
It seems the "machine check exception handling" breaks HVM guest
Hi Jan Beulich, > changeset 15414: 3cf5052ba5e5 x86: machine check exception handling With the c/s, when creating HVM guest, I can only see a white Qemu window. :( Can you have a look? Thanks. PS: the serial log follows: (XEN) HVM1: pci dev 02:0 bar 14 size 00001000: f2000000 (XEN) HVM1: pci dev 03:0 bar 10 size 00000100: 0000c101 (XEN) HVM1: pci dev 03:0 bar 14 size 01000000:
2012 Aug 29
4
xen debugger (kdb/xdb/hdb) patch for c/s 25467
Hi Guys, Thanks for the interest in the xen hypervisor debugger, prev known as kdb. Btw. I''m gonna rename it to xdb for xen-debugger or hdb for hypervisor debugger. KDB is confusing people with linux kdb debugger and I often get emails where people think they need to apply linux kdb patch also... Anyways, attaching patch that is cleaned up of my debug code that I accidentally left in
2008 Jun 05
2
[PATCH 1/2] Migrate tsc values during migration
Migrate the last TSC values for more accurate timekeeping during live migration Signed-off-by: Dave Winchell <dwinchell@virtualiron.com> Signed-off-by: Ben Guthro <bguthro@virtualiron.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2012 May 30
10
[xen-unstable test] 12988: regressions - FAIL
flight 12988 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/12988/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-oldkern 4 xen-build fail REGR. vs. 12979 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 12
2007 Aug 27
3
[PATCH] Limit MCG Cap
Intercept guest reads of MSR_IA32_MCG_CAP and limit the number of memory banks reported to one. This prevents us from trying to read status of non-existent banks when migrated to a machine with fewer banks. Signed-off-by: Ben Guthro Signed-off-by: David Lively <dlively@virtualiron.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2007 Sep 11
1
[PATCH] Page scrubbing
Hi! Make scrub_heap_pages() print from where to where it scrubs pages. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> This patch uncovers a strange behaviour on 32bit. On 64bit I get this: (XEN) Scrubbing Free RAM 0xffff830000100000 -> 0xffff83003fff0000: ....done. On 32bit I get this: (XEN) Scrubbing Free RAM 0xffc00000 -> 0xdefb0000: