From xen-users-bounces@lists.xen.org Mon Jun 01 10:57:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 10:57:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzNOA-00073m-Lr; Mon, 01 Jun 2015 10:56:14 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=5873190bc=julien.grall@citrix.com>)
	id 1YzNO8-00073X-5y; Mon, 01 Jun 2015 10:56:12 +0000
Received: from [193.109.254.147] by server-10.bemta-14.messagelabs.com id
	C6/4F-30151-B4A3C655; Mon, 01 Jun 2015 10:56:11 +0000
X-Env-Sender: prvs=5873190bc=julien.grall@citrix.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1433156169!19194257!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 18533 invoked from network); 1 Jun 2015 10:56:10 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-9.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 10:56:10 -0000
X-IronPort-AV: E=Sophos;i="5.13,532,1427760000"; d="scan'208";a="270409427"
Message-ID: <556C3A25.8020300@citrix.com>
Date: Mon, 1 Jun 2015 11:55:33 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Icedove/31.7.0
MIME-Version: 1.0
To: Gautam Malu <gautam.maloo@gmail.com>, <xen-devel@lists.xen.org>, xen-users
	<xen-users@lists.xen.org>
References: <CAA=tGw6u1GXBRKHrTU5OFR=Mi6npm=9VO7-YPyqdCveCL2Dkxw@mail.gmail.com>
In-Reply-To: <CAA=tGw6u1GXBRKHrTU5OFR=Mi6npm=9VO7-YPyqdCveCL2Dkxw@mail.gmail.com>
X-DLP: MIA2
Subject: Re: [Xen-users] [Xen-devel] Running 3.9 kernel in domU with 3.11
	kernel in dom0
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 30/05/15 14:43, Gautam Malu wrote:
> Hi,

Hello,

It's not necessary to send the same mail twice at one day of interval.
The mail will be answered as soon as we can...

The xen-arm mailing list has been archived few months ago and this
question should be asked on xen-users given it's more a configuration
issue than an hypervisor issue for now.

> I am running kernel 3.11-rc3 on arndale exynos 5250 board with xen 4.5
> stack. It works fine with domU with kernel 3.17+ with ubutnu.
> 
> I am trying to run android as domU, so I am using kernel 3.9 in domU.
> With kernel 3.9 in domU, xen doesn't even boot the kernel at all. Here
> is the strace log http://pastebin.com/JMtg9mSY

I'm afraid that strace xl can't give any useful output for your problem.
It would be more useful to get the log of Xen and xl (xl -vvv create ...).

> 
> Is this any ABI compatibility issue, as I was reading
> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions#Hypervisor_ABI_Compatibility
> 
> But both dom0 (3.11-rc3)and domU kernel(3.9)  are not patched with this
> given patch 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=380108d891acf8db5cf0d477176c7ed2b62b7928 
> . So they should be able to interpolate between themselves.
> 
> Somehow kernel from arndale-domU-3.9 branch of
> http://xenbits.xen.org/git-http/people/julieng/linux-arm.git/ boots with
> same setup.

What do you mean by same setup? Same DOM0? Same Xen? Same kernel config
file? Are you using a android kernel or upstream?

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 10:57:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 10:57:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzNOA-00073m-Lr; Mon, 01 Jun 2015 10:56:14 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=5873190bc=julien.grall@citrix.com>)
	id 1YzNO8-00073X-5y; Mon, 01 Jun 2015 10:56:12 +0000
Received: from [193.109.254.147] by server-10.bemta-14.messagelabs.com id
	C6/4F-30151-B4A3C655; Mon, 01 Jun 2015 10:56:11 +0000
X-Env-Sender: prvs=5873190bc=julien.grall@citrix.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1433156169!19194257!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 18533 invoked from network); 1 Jun 2015 10:56:10 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-9.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 10:56:10 -0000
X-IronPort-AV: E=Sophos;i="5.13,532,1427760000"; d="scan'208";a="270409427"
Message-ID: <556C3A25.8020300@citrix.com>
Date: Mon, 1 Jun 2015 11:55:33 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Icedove/31.7.0
MIME-Version: 1.0
To: Gautam Malu <gautam.maloo@gmail.com>, <xen-devel@lists.xen.org>, xen-users
	<xen-users@lists.xen.org>
References: <CAA=tGw6u1GXBRKHrTU5OFR=Mi6npm=9VO7-YPyqdCveCL2Dkxw@mail.gmail.com>
In-Reply-To: <CAA=tGw6u1GXBRKHrTU5OFR=Mi6npm=9VO7-YPyqdCveCL2Dkxw@mail.gmail.com>
X-DLP: MIA2
Subject: Re: [Xen-users] [Xen-devel] Running 3.9 kernel in domU with 3.11
	kernel in dom0
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 30/05/15 14:43, Gautam Malu wrote:
> Hi,

Hello,

It's not necessary to send the same mail twice at one day of interval.
The mail will be answered as soon as we can...

The xen-arm mailing list has been archived few months ago and this
question should be asked on xen-users given it's more a configuration
issue than an hypervisor issue for now.

> I am running kernel 3.11-rc3 on arndale exynos 5250 board with xen 4.5
> stack. It works fine with domU with kernel 3.17+ with ubutnu.
> 
> I am trying to run android as domU, so I am using kernel 3.9 in domU.
> With kernel 3.9 in domU, xen doesn't even boot the kernel at all. Here
> is the strace log http://pastebin.com/JMtg9mSY

I'm afraid that strace xl can't give any useful output for your problem.
It would be more useful to get the log of Xen and xl (xl -vvv create ...).

> 
> Is this any ABI compatibility issue, as I was reading
> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions#Hypervisor_ABI_Compatibility
> 
> But both dom0 (3.11-rc3)and domU kernel(3.9)  are not patched with this
> given patch 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=380108d891acf8db5cf0d477176c7ed2b62b7928 
> . So they should be able to interpolate between themselves.
> 
> Somehow kernel from arndale-domU-3.9 branch of
> http://xenbits.xen.org/git-http/people/julieng/linux-arm.git/ boots with
> same setup.

What do you mean by same setup? Same DOM0? Same Xen? Same kernel config
file? Are you using a android kernel or upstream?

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 11:38:16 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 11:38:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzO1n-0002dR-HE; Mon, 01 Jun 2015 11:37:11 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=587d6d056=Ian.Campbell@citrix.com>)
	id 1YzO1l-0002dM-Lr
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 11:37:09 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	EE/E2-32733-5E34C655; Mon, 01 Jun 2015 11:37:09 +0000
X-Env-Sender: prvs=587d6d056=Ian.Campbell@citrix.com
X-Msg-Ref: server-7.tower-27.messagelabs.com!1433158624!19195275!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20969 invoked from network); 1 Jun 2015 11:37:06 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-7.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 11:37:06 -0000
X-IronPort-AV: E=Sophos;i="5.13,532,1427760000"; d="scan'208";a="270421409"
Message-ID: <1433158620.15036.125.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Pie Master <0xceased@gmail.com>
Date: Mon, 1 Jun 2015 12:37:00 +0100
In-Reply-To: <CAHbsrb=pG7_E2T6fSstTMLOC_OzDKr0WLsBKRGUwUZcvqWDyNw@mail.gmail.com>
References: <CAHbsrb=pG7_E2T6fSstTMLOC_OzDKr0WLsBKRGUwUZcvqWDyNw@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Running mini-os kernel
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-05-29 at 17:49 +0300, Pie Master wrote:
> Hello,
> 
> I would like to know how am supposed to run the mini-os kernel that is
> included with the xen sources.

mini-os is not an operating system like normal, it is a very rudimentary
unikernel which is linked against specific applications to produce "stub
domains" or other utility domains.

Some examples of such are the qemu-dm stubdomain, pvgrub or the xenstore
service domains produced in the stubdom/ sub tree of xen.git.

I think there is also a dummy Hello World type app in the sources but I
don't think it is built by default.

Why are you trying to run mini-os? What is your actual goal?

> 
> There is a config file present but it just does not work.The file
> includes only three options and not being a xen nerd am not sure
> whether only these three options are enough to run the domain.
> 
> The last git logs point to sometime in 2007 - am not sure how things
> have changed since..... can someone give me a hand ?
> 
> Cheers,
> Pie Master.
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 11:38:16 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 11:38:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzO1n-0002dR-HE; Mon, 01 Jun 2015 11:37:11 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=587d6d056=Ian.Campbell@citrix.com>)
	id 1YzO1l-0002dM-Lr
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 11:37:09 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	EE/E2-32733-5E34C655; Mon, 01 Jun 2015 11:37:09 +0000
X-Env-Sender: prvs=587d6d056=Ian.Campbell@citrix.com
X-Msg-Ref: server-7.tower-27.messagelabs.com!1433158624!19195275!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20969 invoked from network); 1 Jun 2015 11:37:06 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-7.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 11:37:06 -0000
X-IronPort-AV: E=Sophos;i="5.13,532,1427760000"; d="scan'208";a="270421409"
Message-ID: <1433158620.15036.125.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Pie Master <0xceased@gmail.com>
Date: Mon, 1 Jun 2015 12:37:00 +0100
In-Reply-To: <CAHbsrb=pG7_E2T6fSstTMLOC_OzDKr0WLsBKRGUwUZcvqWDyNw@mail.gmail.com>
References: <CAHbsrb=pG7_E2T6fSstTMLOC_OzDKr0WLsBKRGUwUZcvqWDyNw@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Running mini-os kernel
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-05-29 at 17:49 +0300, Pie Master wrote:
> Hello,
> 
> I would like to know how am supposed to run the mini-os kernel that is
> included with the xen sources.

mini-os is not an operating system like normal, it is a very rudimentary
unikernel which is linked against specific applications to produce "stub
domains" or other utility domains.

Some examples of such are the qemu-dm stubdomain, pvgrub or the xenstore
service domains produced in the stubdom/ sub tree of xen.git.

I think there is also a dummy Hello World type app in the sources but I
don't think it is built by default.

Why are you trying to run mini-os? What is your actual goal?

> 
> There is a config file present but it just does not work.The file
> includes only three options and not being a xen nerd am not sure
> whether only these three options are enough to run the domain.
> 
> The last git logs point to sometime in 2007 - am not sure how things
> have changed since..... can someone give me a hand ?
> 
> Cheers,
> Pie Master.
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 13:25:56 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 13:25:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzPhw-0002Sm-N4; Mon, 01 Jun 2015 13:24:48 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=587d6d056=Ian.Campbell@citrix.com>)
	id 1YzPhv-0002SS-44
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 13:24:47 +0000
Received: from [85.158.139.211] by server-9.bemta-5.messagelabs.com id
	7A/02-21325-E1D5C655; Mon, 01 Jun 2015 13:24:46 +0000
X-Env-Sender: prvs=587d6d056=Ian.Campbell@citrix.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1433165084!7574941!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 5458 invoked from network); 1 Jun 2015 13:24:45 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 13:24:45 -0000
X-IronPort-AV: E=Sophos;i="5.13,532,1427760000"; d="scan'208";a="267785280"
Message-ID: <1433165081.15036.198.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Mike <mike+xen@willitsonline.com>
Date: Mon, 1 Jun 2015 14:24:41 +0100
In-Reply-To: <556B5C61.8090503@willitsonline.com>
References: <556B5C61.8090503@willitsonline.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] xen dom0 nfs hangs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Sun, 2015-05-31 at 12:09 -0700, Mike wrote:

I've no idea what might be going here, but:

> Hi,I get messages about 'task blocked more than 120 seconds' (from qemu-system-i386) and so forth;

The stack traces from those messages may prove informative, since they
will indicate where (and hopefully therefore why) that process has been
blocked for so long.

I don't think storing guest filesystem images on an NFS share as you are
doing is in any way uncommon.

You say you are using loopback mounts, I suppose you mean
literally /dev/loop0 etc (either explicitly via losetup or implicitly
via the toolstack)?

In the scenarios I'm aware of people tend to use either tapdisk or qdisk
(from qemu) to expose files on NFS as guest disks. Mostly they are using
vhd or qcow2 (so /dev/loop is not an option), but I wonder if switching
to e.g. qdisk would help? (Switching to tapdisk would involve several
yakk shaving exercises I suspect, not worth it IMHO)

On the other hand you mention qemu-system-i386 so perhaps you are
already using qdisk? Or are these guests HVM ones?

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 13:25:56 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 13:25:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzPhw-0002Sm-N4; Mon, 01 Jun 2015 13:24:48 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=587d6d056=Ian.Campbell@citrix.com>)
	id 1YzPhv-0002SS-44
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 13:24:47 +0000
Received: from [85.158.139.211] by server-9.bemta-5.messagelabs.com id
	7A/02-21325-E1D5C655; Mon, 01 Jun 2015 13:24:46 +0000
X-Env-Sender: prvs=587d6d056=Ian.Campbell@citrix.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1433165084!7574941!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 5458 invoked from network); 1 Jun 2015 13:24:45 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 13:24:45 -0000
X-IronPort-AV: E=Sophos;i="5.13,532,1427760000"; d="scan'208";a="267785280"
Message-ID: <1433165081.15036.198.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Mike <mike+xen@willitsonline.com>
Date: Mon, 1 Jun 2015 14:24:41 +0100
In-Reply-To: <556B5C61.8090503@willitsonline.com>
References: <556B5C61.8090503@willitsonline.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] xen dom0 nfs hangs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Sun, 2015-05-31 at 12:09 -0700, Mike wrote:

I've no idea what might be going here, but:

> Hi,I get messages about 'task blocked more than 120 seconds' (from qemu-system-i386) and so forth;

The stack traces from those messages may prove informative, since they
will indicate where (and hopefully therefore why) that process has been
blocked for so long.

I don't think storing guest filesystem images on an NFS share as you are
doing is in any way uncommon.

You say you are using loopback mounts, I suppose you mean
literally /dev/loop0 etc (either explicitly via losetup or implicitly
via the toolstack)?

In the scenarios I'm aware of people tend to use either tapdisk or qdisk
(from qemu) to expose files on NFS as guest disks. Mostly they are using
vhd or qcow2 (so /dev/loop is not an option), but I wonder if switching
to e.g. qdisk would help? (Switching to tapdisk would involve several
yakk shaving exercises I suspect, not worth it IMHO)

On the other hand you mention qemu-system-i386 so perhaps you are
already using qdisk? Or are these guests HVM ones?

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 13:56:56 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 13:56:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzQCG-00059h-0q; Mon, 01 Jun 2015 13:56:08 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <phillsusi@gmail.com>) id 1YzQCE-00059Z-SG
	for Xen-users@lists.xen.org; Mon, 01 Jun 2015 13:56:07 +0000
Received: from [85.158.137.68] by server-14.bemta-3.messagelabs.com id
	6E/85-24518-6746C655; Mon, 01 Jun 2015 13:56:06 +0000
X-Env-Sender: phillsusi@gmail.com
X-Msg-Ref: server-3.tower-31.messagelabs.com!1433166964!12053720!1
X-Originating-IP: [209.85.192.47]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21724 invoked from network); 1 Jun 2015 13:56:05 -0000
Received: from mail-qg0-f47.google.com (HELO mail-qg0-f47.google.com)
	(209.85.192.47)
	by server-3.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 13:56:05 -0000
Received: by qgfa63 with SMTP id a63so47516868qgf.0
	for <Xen-users@lists.xen.org>; Mon, 01 Jun 2015 06:56:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=sender:message-id:date:from:user-agent:mime-version:to:subject
	:content-type:content-transfer-encoding;
	bh=2LY7yvEaqHo0tdhyOJaqW1c/+vt80QvxrSZ4FLHhRx4=;
	b=WEltaRew8IP/lEmxIbg4IGgywRnUP92iK2wv49ZLCa1vUtJ3fX4hRa5WMOt2ofa4/7
	XImaZivViPM871iVn+NiXJ6UpqO04ZS4j/RduAzBHIu5pMflzkDHeLiE9d18vnUjhpmA
	xCQ8llW4zV2swiUw8QJmWR7sXWwu+zKaJexXZwmh1royaBgkSmT2om8rM/Zqm23pFE1I
	RIIxZ4nmnHBl0Vt3rEaY4apTdUlLZi55B9po0qQVlYLg6uk4O2wfWdTweIJodvrlhykI
	o8OCwNYhJpzfyKBeILPE31VZg7Y+cab1VeqP5F0uITaaQJvPyBPXQL2p8HHmIr8QGzNF
	8yYg==
X-Received: by 10.229.221.69 with SMTP id ib5mr1282925qcb.26.1433166964184;
	Mon, 01 Jun 2015 06:56:04 -0700 (PDT)
Received: from [10.1.1.233] (fl-67-77-88-12.sta.embarqhsd.net. [67.77.88.12])
	by mx.google.com with ESMTPSA id
	a30sm6206744qkh.43.2015.06.01.06.56.03 for <Xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Mon, 01 Jun 2015 06:56:03 -0700 (PDT)
Message-ID: <556C6421.5000508@ubuntu.com>
Date: Mon, 01 Jun 2015 09:54:41 -0400
From: Phil Susi <psusi@ubuntu.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Xen-users@lists.xen.org
Subject: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

I have a domU that has been running just fine for the last year with 
2048m of ram.  I changed the config to give it 4096m of ram, and now 
when I start it up, it crashes without any output to the console at all. 
  It doesn't even make it to the grub loader screen.  What could be the 
cause?  It might be worth mentioning that the host is 64 bit but the 
guest is only 32 bit.

My cfg is:

name="devserv"
memory=3000
disk = [ '/dev/hyper1/devserv,,xvda' ]
vcpus="8"
kernel = "/home/psusi/core.elf"
vif = [ '' ]
on_crash = "preserve"

And I also noticed that xl dmesg shows this:

(XEN) d4:v0: unhandled page fault (ec=0002)
(XEN) Pagetable walk from 00000000ff7f4fff:
(XEN)  L4[0x000] = 0000000067289027 00000000000ff7f5
(XEN)  L3[0x003] = 0000000067285007 00000000000ff7f9
(XEN)  L2[0x1fb] = 0000000000000000 ffffffffffffffff
(XEN) domain_crash_sync called from entry.S: fault at ffff82d08021abf0 
compat_create_bounce_frame+0xc6/0xde
(XEN) Domain 4 (vcpu#0) crashed on cpu#7:
(XEN) ----[ Xen-4.4.1  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    7
(XEN) RIP:    e019:[<0000000000006f4c>]
(XEN) RFLAGS: 0000000000000287   EM: 1   CONTEXT: pv guest
(XEN) rax: 00000000ff7f4000   rbx: 00000000fffff000   rcx: 0000000000000fff
(XEN) rdx: 000000000092b000   rsi: 00000000ff7f5000   rdi: 00000000ff7f4000
(XEN) rbp: 000000000040ae38   rsp: 000000000040ae18   r8:  ffff830827060000
(XEN) r9:  ffffffffffff8000   r10: ffff83083f110000   r11: ffff83083f110000
(XEN) r12: ffff830827078068   r13: 00000073b55351c8   r14: ffff830827078060
(XEN) r15: ffff82d0802e2620   cr0: 000000008005003b   cr4: 00000000001526f0
(XEN) cr3: 000000083f94d000   cr2: 00000000ff7f4fff
(XEN) ds: e021   es: e021   fs: e021   gs: e021   ss: e021   cs: e019
(XEN) Guest stack trace from esp=0040ae18:
(XEN)   00000002 00006f4c 0001e019 00010087 fffff000 00000000 ff7f4000 
00000000
(XEN)   0040afb8 0000113c 00000000 00000000 00000008 3f8b8007 00100000 
00000000
(XEN)   00100000 00000000 000ff7fa 00000000 00000000 00000000 0000092e 
00000000
(XEN)   00000000 00000000 000ff7f5 00000000 00000800 00000000 00000937 
00000000
(XEN)   00000000 00449000 000ff7fa 00000000 00000937 00000000 00000800 
00000000
(XEN)   00100000 000001ff 00000000 00000000 00000001 00000000 00007ff0 
00000001
(XEN)   00000000 0040c000 00000800 00000000 00000004 00000000 00000001 
00000000
(XEN)   00000000 00000002 00067289 00000000 00000005 00067289 00000000 
00000004
(XEN)   0072f68b 00000000 66a83001 00000000 0000092c 00000000 2f68d001 
00000007
(XEN)   000ffffb 00000000 66a84001 00000000 0000092d 00000000 2f68c001 
00000007
(XEN)   000ffffa 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000 
00000000
(XEN)   0040aff8 00006b10 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000 
00000000
(XEN)   00000000 00000011 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 13:56:56 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 13:56:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzQCG-00059h-0q; Mon, 01 Jun 2015 13:56:08 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <phillsusi@gmail.com>) id 1YzQCE-00059Z-SG
	for Xen-users@lists.xen.org; Mon, 01 Jun 2015 13:56:07 +0000
Received: from [85.158.137.68] by server-14.bemta-3.messagelabs.com id
	6E/85-24518-6746C655; Mon, 01 Jun 2015 13:56:06 +0000
X-Env-Sender: phillsusi@gmail.com
X-Msg-Ref: server-3.tower-31.messagelabs.com!1433166964!12053720!1
X-Originating-IP: [209.85.192.47]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21724 invoked from network); 1 Jun 2015 13:56:05 -0000
Received: from mail-qg0-f47.google.com (HELO mail-qg0-f47.google.com)
	(209.85.192.47)
	by server-3.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 13:56:05 -0000
Received: by qgfa63 with SMTP id a63so47516868qgf.0
	for <Xen-users@lists.xen.org>; Mon, 01 Jun 2015 06:56:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=sender:message-id:date:from:user-agent:mime-version:to:subject
	:content-type:content-transfer-encoding;
	bh=2LY7yvEaqHo0tdhyOJaqW1c/+vt80QvxrSZ4FLHhRx4=;
	b=WEltaRew8IP/lEmxIbg4IGgywRnUP92iK2wv49ZLCa1vUtJ3fX4hRa5WMOt2ofa4/7
	XImaZivViPM871iVn+NiXJ6UpqO04ZS4j/RduAzBHIu5pMflzkDHeLiE9d18vnUjhpmA
	xCQ8llW4zV2swiUw8QJmWR7sXWwu+zKaJexXZwmh1royaBgkSmT2om8rM/Zqm23pFE1I
	RIIxZ4nmnHBl0Vt3rEaY4apTdUlLZi55B9po0qQVlYLg6uk4O2wfWdTweIJodvrlhykI
	o8OCwNYhJpzfyKBeILPE31VZg7Y+cab1VeqP5F0uITaaQJvPyBPXQL2p8HHmIr8QGzNF
	8yYg==
X-Received: by 10.229.221.69 with SMTP id ib5mr1282925qcb.26.1433166964184;
	Mon, 01 Jun 2015 06:56:04 -0700 (PDT)
Received: from [10.1.1.233] (fl-67-77-88-12.sta.embarqhsd.net. [67.77.88.12])
	by mx.google.com with ESMTPSA id
	a30sm6206744qkh.43.2015.06.01.06.56.03 for <Xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Mon, 01 Jun 2015 06:56:03 -0700 (PDT)
Message-ID: <556C6421.5000508@ubuntu.com>
Date: Mon, 01 Jun 2015 09:54:41 -0400
From: Phil Susi <psusi@ubuntu.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Xen-users@lists.xen.org
Subject: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

I have a domU that has been running just fine for the last year with 
2048m of ram.  I changed the config to give it 4096m of ram, and now 
when I start it up, it crashes without any output to the console at all. 
  It doesn't even make it to the grub loader screen.  What could be the 
cause?  It might be worth mentioning that the host is 64 bit but the 
guest is only 32 bit.

My cfg is:

name="devserv"
memory=3000
disk = [ '/dev/hyper1/devserv,,xvda' ]
vcpus="8"
kernel = "/home/psusi/core.elf"
vif = [ '' ]
on_crash = "preserve"

And I also noticed that xl dmesg shows this:

(XEN) d4:v0: unhandled page fault (ec=0002)
(XEN) Pagetable walk from 00000000ff7f4fff:
(XEN)  L4[0x000] = 0000000067289027 00000000000ff7f5
(XEN)  L3[0x003] = 0000000067285007 00000000000ff7f9
(XEN)  L2[0x1fb] = 0000000000000000 ffffffffffffffff
(XEN) domain_crash_sync called from entry.S: fault at ffff82d08021abf0 
compat_create_bounce_frame+0xc6/0xde
(XEN) Domain 4 (vcpu#0) crashed on cpu#7:
(XEN) ----[ Xen-4.4.1  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    7
(XEN) RIP:    e019:[<0000000000006f4c>]
(XEN) RFLAGS: 0000000000000287   EM: 1   CONTEXT: pv guest
(XEN) rax: 00000000ff7f4000   rbx: 00000000fffff000   rcx: 0000000000000fff
(XEN) rdx: 000000000092b000   rsi: 00000000ff7f5000   rdi: 00000000ff7f4000
(XEN) rbp: 000000000040ae38   rsp: 000000000040ae18   r8:  ffff830827060000
(XEN) r9:  ffffffffffff8000   r10: ffff83083f110000   r11: ffff83083f110000
(XEN) r12: ffff830827078068   r13: 00000073b55351c8   r14: ffff830827078060
(XEN) r15: ffff82d0802e2620   cr0: 000000008005003b   cr4: 00000000001526f0
(XEN) cr3: 000000083f94d000   cr2: 00000000ff7f4fff
(XEN) ds: e021   es: e021   fs: e021   gs: e021   ss: e021   cs: e019
(XEN) Guest stack trace from esp=0040ae18:
(XEN)   00000002 00006f4c 0001e019 00010087 fffff000 00000000 ff7f4000 
00000000
(XEN)   0040afb8 0000113c 00000000 00000000 00000008 3f8b8007 00100000 
00000000
(XEN)   00100000 00000000 000ff7fa 00000000 00000000 00000000 0000092e 
00000000
(XEN)   00000000 00000000 000ff7f5 00000000 00000800 00000000 00000937 
00000000
(XEN)   00000000 00449000 000ff7fa 00000000 00000937 00000000 00000800 
00000000
(XEN)   00100000 000001ff 00000000 00000000 00000001 00000000 00007ff0 
00000001
(XEN)   00000000 0040c000 00000800 00000000 00000004 00000000 00000001 
00000000
(XEN)   00000000 00000002 00067289 00000000 00000005 00067289 00000000 
00000004
(XEN)   0072f68b 00000000 66a83001 00000000 0000092c 00000000 2f68d001 
00000007
(XEN)   000ffffb 00000000 66a84001 00000000 0000092d 00000000 2f68c001 
00000007
(XEN)   000ffffa 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000 
00000000
(XEN)   0040aff8 00006b10 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000 
00000000
(XEN)   00000000 00000011 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000
(XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 
00000000

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 01 14:54:49 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 14:54:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzR6N-0000ee-Ht; Mon, 01 Jun 2015 14:54:07 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <wacsamdzero@gmail.com>) id 1YzPYd-0001a2-Me
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 13:15:11 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	2C/DB-16813-EDA5C655; Mon, 01 Jun 2015 13:15:10 +0000
X-Env-Sender: wacsamdzero@gmail.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1433164508!19247346!1
X-Originating-IP: [209.85.192.171]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1737 invoked from network); 1 Jun 2015 13:15:09 -0000
Received: from mail-pd0-f171.google.com (HELO mail-pd0-f171.google.com)
	(209.85.192.171)
	by server-2.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 13:15:09 -0000
Received: by pdbnf5 with SMTP id nf5so46437191pdb.2
	for <xen-users@lists.xen.org>; Mon, 01 Jun 2015 06:15:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=2pcPwwahDkQfUp2MlJ41ieyolPoFCnTI42Kw803dTxY=;
	b=pkRQXcQliGhgfjVxesx2bMDnrtrg9BbQazLbdFcxRVUg7aEdOV3X9IDmfFmKD9GZbc
	lPxaHpKCPGHjvwL8JplIg2Jn5wEnhX5/QmBnySATRJDjLY59yCb5D/+hKJjhoqbywGde
	uaf+8oMtbQx5UtGOE/VaGImDi8D09rsFyGRD1NQVSYp0przDNmQHuF0aZnvBVlx1yz0H
	ukf6hcVTxXxKQoxTJTTibTklj8/lrfQMThcIwHIUIO3SvXXiv/3AJKVdJ2/byv6QL3RF
	CEE0z9yopzANGhg2kSPSzULafDouiNZzp22EfsvG45ZYloIE7ubFAMJ3WgvVEwwx0JRM
	eLRw==
MIME-Version: 1.0
X-Received: by 10.70.49.229 with SMTP id x5mr39854106pdn.81.1433164508082;
	Mon, 01 Jun 2015 06:15:08 -0700 (PDT)
Received: by 10.70.131.129 with HTTP; Mon, 1 Jun 2015 06:15:08 -0700 (PDT)
Date: Mon, 1 Jun 2015 21:15:08 +0800
Message-ID: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
From: =?UTF-8?B?5p2c6L+c5LmL?= <wacsamdzero@gmail.com>
To: xen-users <xen-users@lists.xen.org>
X-Mailman-Approved-At: Mon, 01 Jun 2015 14:54:05 +0000
Subject: [Xen-users] how can I get tprebuilt packages?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3845353038804182754=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============3845353038804182754==
Content-Type: multipart/alternative; boundary=089e0160cfae68c0740517749d44

--089e0160cfae68c0740517749d44
Content-Type: text/plain; charset=UTF-8

http://www.xenproject.org/help/questions-and-answers/install-xen-offline.html
Russ, Thank you.  But how can I get tprebuilt packages?  From the website
of Xen or Ubuntu?
Maybe you can tell me  the constrain of this website, I don't know why the
system alaways thinks my post is a spam

--089e0160cfae68c0740517749d44
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><a href=3D"http://www.xenproject.org/help/questions-a=
nd-answers/install-xen-offline.html">http://www.xenproject.org/help/questio=
ns-and-answers/install-xen-offline.html</a></div><div>Russ, Thank you.=C2=
=A0 But how can I get tprebuilt packages?=C2=A0 From the website of Xen or =
Ubuntu?=C2=A0</div><div>Maybe you can tell me =C2=A0the constrain of this w=
ebsite, I don&#39;t know why the system alaways thinks my post is a spam</d=
iv></div>

--089e0160cfae68c0740517749d44--


--===============3845353038804182754==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3845353038804182754==--


From xen-users-bounces@lists.xen.org Mon Jun 01 14:54:49 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 14:54:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzR6N-0000ee-Ht; Mon, 01 Jun 2015 14:54:07 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <wacsamdzero@gmail.com>) id 1YzPYd-0001a2-Me
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 13:15:11 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	2C/DB-16813-EDA5C655; Mon, 01 Jun 2015 13:15:10 +0000
X-Env-Sender: wacsamdzero@gmail.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1433164508!19247346!1
X-Originating-IP: [209.85.192.171]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1737 invoked from network); 1 Jun 2015 13:15:09 -0000
Received: from mail-pd0-f171.google.com (HELO mail-pd0-f171.google.com)
	(209.85.192.171)
	by server-2.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 13:15:09 -0000
Received: by pdbnf5 with SMTP id nf5so46437191pdb.2
	for <xen-users@lists.xen.org>; Mon, 01 Jun 2015 06:15:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=2pcPwwahDkQfUp2MlJ41ieyolPoFCnTI42Kw803dTxY=;
	b=pkRQXcQliGhgfjVxesx2bMDnrtrg9BbQazLbdFcxRVUg7aEdOV3X9IDmfFmKD9GZbc
	lPxaHpKCPGHjvwL8JplIg2Jn5wEnhX5/QmBnySATRJDjLY59yCb5D/+hKJjhoqbywGde
	uaf+8oMtbQx5UtGOE/VaGImDi8D09rsFyGRD1NQVSYp0przDNmQHuF0aZnvBVlx1yz0H
	ukf6hcVTxXxKQoxTJTTibTklj8/lrfQMThcIwHIUIO3SvXXiv/3AJKVdJ2/byv6QL3RF
	CEE0z9yopzANGhg2kSPSzULafDouiNZzp22EfsvG45ZYloIE7ubFAMJ3WgvVEwwx0JRM
	eLRw==
MIME-Version: 1.0
X-Received: by 10.70.49.229 with SMTP id x5mr39854106pdn.81.1433164508082;
	Mon, 01 Jun 2015 06:15:08 -0700 (PDT)
Received: by 10.70.131.129 with HTTP; Mon, 1 Jun 2015 06:15:08 -0700 (PDT)
Date: Mon, 1 Jun 2015 21:15:08 +0800
Message-ID: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
From: =?UTF-8?B?5p2c6L+c5LmL?= <wacsamdzero@gmail.com>
To: xen-users <xen-users@lists.xen.org>
X-Mailman-Approved-At: Mon, 01 Jun 2015 14:54:05 +0000
Subject: [Xen-users] how can I get tprebuilt packages?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3845353038804182754=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============3845353038804182754==
Content-Type: multipart/alternative; boundary=089e0160cfae68c0740517749d44

--089e0160cfae68c0740517749d44
Content-Type: text/plain; charset=UTF-8

http://www.xenproject.org/help/questions-and-answers/install-xen-offline.html
Russ, Thank you.  But how can I get tprebuilt packages?  From the website
of Xen or Ubuntu?
Maybe you can tell me  the constrain of this website, I don't know why the
system alaways thinks my post is a spam

--089e0160cfae68c0740517749d44
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><a href=3D"http://www.xenproject.org/help/questions-a=
nd-answers/install-xen-offline.html">http://www.xenproject.org/help/questio=
ns-and-answers/install-xen-offline.html</a></div><div>Russ, Thank you.=C2=
=A0 But how can I get tprebuilt packages?=C2=A0 From the website of Xen or =
Ubuntu?=C2=A0</div><div>Maybe you can tell me =C2=A0the constrain of this w=
ebsite, I don&#39;t know why the system alaways thinks my post is a spam</d=
iv></div>

--089e0160cfae68c0740517749d44--


--===============3845353038804182754==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3845353038804182754==--


From xen-users-bounces@lists.xen.org Mon Jun 01 15:34:53 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 15:34:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzRj9-0003lm-Jc; Mon, 01 Jun 2015 15:34:11 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <david.lanzendoerfer@o2s.ch>) id 1YzRj8-0003lh-Eg
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 15:34:10 +0000
Received: from [85.158.137.68] by server-13.bemta-3.messagelabs.com id
	D5/B5-11060-17B7C655; Mon, 01 Jun 2015 15:34:09 +0000
X-Env-Sender: david.lanzendoerfer@o2s.ch
X-Msg-Ref: server-10.tower-31.messagelabs.com!1433172849!12015952!1
X-Originating-IP: [77.109.136.180]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7879 invoked from network); 1 Jun 2015 15:34:09 -0000
Received: from kolab.o2s.ch (HELO kolab.o2s.ch) (77.109.136.180)
	by server-10.tower-31.messagelabs.com with SMTP;
	1 Jun 2015 15:34:09 -0000
Received: from localhost (localhost [127.0.0.1])
	by kolab.o2s.ch (Postfix) with ESMTP id 8CCA012AA58;
	Mon,  1 Jun 2015 17:39:54 +0200 (CEST)
X-Virus-Scanned: amavisd-new at example.com
Received: from kolab.o2s.ch ([127.0.0.1])
	by localhost (kolab.o2s.ch [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id G5WmDp31N0ht; Mon,  1 Jun 2015 17:39:50 +0200 (CEST)
Received: from dizzy-6.o2s.ch (unknown
	[IPv6:2001:470:26:484:6ef0:49ff:fee6:8dca])
	by kolab.o2s.ch (Postfix) with ESMTPSA id 5200212A7AE;
	Mon,  1 Jun 2015 17:39:50 +0200 (CEST)
From: David =?ISO-8859-1?Q?Lanzend=F6rfer?= <david.lanzendoerfer@o2s.ch>
To: xen-users@lists.xen.org
Date: Mon, 01 Jun 2015 17:34:03 +0200
Message-ID: <2849851.VjcsClQtD3@dizzy-6.o2s.ch>
Organization: O2S GmbH
User-Agent: KMail/4.14.6 (Linux/3.16.7-21-desktop; KDE/4.14.6; x86_64; ; )
In-Reply-To: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
References: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
MIME-Version: 1.0
Cc: =?utf-8?B?5p2c6L+c5LmL?= <wacsamdzero@gmail.com>
Subject: Re: [Xen-users] how can I get tprebuilt packages?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6334710024207444326=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--===============6334710024207444326==
Content-Type: multipart/signed; boundary="nextPart46237637.b23zTx4Cq3"; micalg="pgp-sha1"; protocol="application/pgp-signature"


--nextPart46237637.b23zTx4Cq3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

Hello
>http://www.xenproject.org/help/questions-and-answers/install-xen-offli=
ne.html
>Russ, Thank you.  But how can I get tprebuilt packages?
>From the website of Xen or Ubuntu?=20
>Maybe you can tell me  the constrain of this website,
>I don't know why the system alaways thinks my post is a spam
I was really busy the last few days.
You should just install this package on Ubuntu:
http://packages.ubuntu.com/trusty/xen-system-amd64

It installs all the depencies for the recent XEN version on Ubuntu. (_=E5=
=85=83_=E8=BD=AF=E4=BB=B6=E5=8C=85!)

Cheers
=09David
--nextPart46237637.b23zTx4Cq3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part.
Content-Transfer-Encoding: 7Bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iEYEABECAAYFAlVse2sACgkQAeZw77btGjpYLgCgoJQfEMYteEV8eIfYCOSNb0Pd
/JoAoKP1wTaPgFHwRHTP9NLNNEnGW1S6
=n9Of
-----END PGP SIGNATURE-----

--nextPart46237637.b23zTx4Cq3--



--===============6334710024207444326==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6334710024207444326==--



From xen-users-bounces@lists.xen.org Mon Jun 01 15:34:53 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 15:34:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzRj9-0003lm-Jc; Mon, 01 Jun 2015 15:34:11 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <david.lanzendoerfer@o2s.ch>) id 1YzRj8-0003lh-Eg
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 15:34:10 +0000
Received: from [85.158.137.68] by server-13.bemta-3.messagelabs.com id
	D5/B5-11060-17B7C655; Mon, 01 Jun 2015 15:34:09 +0000
X-Env-Sender: david.lanzendoerfer@o2s.ch
X-Msg-Ref: server-10.tower-31.messagelabs.com!1433172849!12015952!1
X-Originating-IP: [77.109.136.180]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7879 invoked from network); 1 Jun 2015 15:34:09 -0000
Received: from kolab.o2s.ch (HELO kolab.o2s.ch) (77.109.136.180)
	by server-10.tower-31.messagelabs.com with SMTP;
	1 Jun 2015 15:34:09 -0000
Received: from localhost (localhost [127.0.0.1])
	by kolab.o2s.ch (Postfix) with ESMTP id 8CCA012AA58;
	Mon,  1 Jun 2015 17:39:54 +0200 (CEST)
X-Virus-Scanned: amavisd-new at example.com
Received: from kolab.o2s.ch ([127.0.0.1])
	by localhost (kolab.o2s.ch [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id G5WmDp31N0ht; Mon,  1 Jun 2015 17:39:50 +0200 (CEST)
Received: from dizzy-6.o2s.ch (unknown
	[IPv6:2001:470:26:484:6ef0:49ff:fee6:8dca])
	by kolab.o2s.ch (Postfix) with ESMTPSA id 5200212A7AE;
	Mon,  1 Jun 2015 17:39:50 +0200 (CEST)
From: David =?ISO-8859-1?Q?Lanzend=F6rfer?= <david.lanzendoerfer@o2s.ch>
To: xen-users@lists.xen.org
Date: Mon, 01 Jun 2015 17:34:03 +0200
Message-ID: <2849851.VjcsClQtD3@dizzy-6.o2s.ch>
Organization: O2S GmbH
User-Agent: KMail/4.14.6 (Linux/3.16.7-21-desktop; KDE/4.14.6; x86_64; ; )
In-Reply-To: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
References: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
MIME-Version: 1.0
Cc: =?utf-8?B?5p2c6L+c5LmL?= <wacsamdzero@gmail.com>
Subject: Re: [Xen-users] how can I get tprebuilt packages?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6334710024207444326=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--===============6334710024207444326==
Content-Type: multipart/signed; boundary="nextPart46237637.b23zTx4Cq3"; micalg="pgp-sha1"; protocol="application/pgp-signature"


--nextPart46237637.b23zTx4Cq3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

Hello
>http://www.xenproject.org/help/questions-and-answers/install-xen-offli=
ne.html
>Russ, Thank you.  But how can I get tprebuilt packages?
>From the website of Xen or Ubuntu?=20
>Maybe you can tell me  the constrain of this website,
>I don't know why the system alaways thinks my post is a spam
I was really busy the last few days.
You should just install this package on Ubuntu:
http://packages.ubuntu.com/trusty/xen-system-amd64

It installs all the depencies for the recent XEN version on Ubuntu. (_=E5=
=85=83_=E8=BD=AF=E4=BB=B6=E5=8C=85!)

Cheers
=09David
--nextPart46237637.b23zTx4Cq3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part.
Content-Transfer-Encoding: 7Bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iEYEABECAAYFAlVse2sACgkQAeZw77btGjpYLgCgoJQfEMYteEV8eIfYCOSNb0Pd
/JoAoKP1wTaPgFHwRHTP9NLNNEnGW1S6
=n9Of
-----END PGP SIGNATURE-----

--nextPart46237637.b23zTx4Cq3--



--===============6334710024207444326==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6334710024207444326==--



From xen-users-bounces@lists.xen.org Mon Jun 01 15:49:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 15:49:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzRy4-0005WM-Oi; Mon, 01 Jun 2015 15:49:36 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=587d6d056=Ian.Campbell@citrix.com>)
	id 1YzRy3-0005W9-LD
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 15:49:35 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	27/2B-21074-E0F7C655; Mon, 01 Jun 2015 15:49:34 +0000
X-Env-Sender: prvs=587d6d056=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-206.messagelabs.com!1433173772!10952464!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2010 invoked from network); 1 Jun 2015 15:49:34 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 15:49:34 -0000
X-IronPort-AV: E=Sophos;i="5.13,533,1427760000"; d="scan'208";a="267844514"
Message-ID: <1433173379.15036.221.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: =?UTF-8?Q?=E6=9D=9C=E8=BF=9C=E4=B9=8B?= <wacsamdzero@gmail.com>
Date: Mon, 1 Jun 2015 16:42:59 +0100
In-Reply-To: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
References: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] how can I get tprebuilt packages?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Mon Jun 01 15:49:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2015 15:49:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzRy4-0005WM-Oi; Mon, 01 Jun 2015 15:49:36 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=587d6d056=Ian.Campbell@citrix.com>)
	id 1YzRy3-0005W9-LD
	for xen-users@lists.xen.org; Mon, 01 Jun 2015 15:49:35 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	27/2B-21074-E0F7C655; Mon, 01 Jun 2015 15:49:34 +0000
X-Env-Sender: prvs=587d6d056=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-206.messagelabs.com!1433173772!10952464!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2010 invoked from network); 1 Jun 2015 15:49:34 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	1 Jun 2015 15:49:34 -0000
X-IronPort-AV: E=Sophos;i="5.13,533,1427760000"; d="scan'208";a="267844514"
Message-ID: <1433173379.15036.221.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: =?UTF-8?Q?=E6=9D=9C=E8=BF=9C=E4=B9=8B?= <wacsamdzero@gmail.com>
Date: Mon, 1 Jun 2015 16:42:59 +0100
In-Reply-To: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
References: <CABzKK6cyDY9NUEceWq-Lc8A=d6gxi0YOZZqzfJbY=vrwe+xeZA@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] how can I get tprebuilt packages?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

T24gTW9uLCAyMDE1LTA2LTAxIGF0IDIxOjE1ICswODAwLCDmnZzov5zkuYsgd3JvdGU6Cj4gaHR0
cDovL3d3dy54ZW5wcm9qZWN0Lm9yZy9oZWxwL3F1ZXN0aW9ucy1hbmQtYW5zd2Vycy9pbnN0YWxs
LXhlbi1vZmZsaW5lLmh0bWwKCklmIHlvdSBjYW4gZG93bmxvYWQgdGhlIHJlbGV2YW50IGZpbGVz
IGZyb20KaHR0cDovL3hlbmJpdHMueGVuLm9yZy94ZW4tZXh0ZmlsZXMgYW5kIHRyYW5zZmVyIHRo
YXQgdG8gYSBsb2NhbApkaXJlY3Rvcnkgb24gdGhlIG9mZmxpbmUgYnVpbGQgc3lzdGVtIHRoZW4g
eW91IGNhbiwgSSB0aGluaywgc2V0ClhFTl9FWFRGSUxFU19VUkwgaW4gQ29uZmlnLm1rIHRvIHBv
aW50IHRvIHRoYXQgZGlyZWN0b3J5LgoKPiBSdXNzLCBUaGFuayB5b3UuICBCdXQgaG93IGNhbiBJ
IGdldCB0cHJlYnVpbHQgcGFja2FnZXM/ICBGcm9tIHRoZQo+IHdlYnNpdGUgb2YgWGVuIG9yIFVi
dW50dT8gCgpQbGVhc2UgY2hlY2sgdGhlIHdpa2ksIGl0IGhhcyAobGlua3MgdG8pIGluZm9ybWF0
aW9uIG9uIGluc3RhbGxpbmcgZnJvbQpiaW5hcmllcyBvbiBhIHZhcmlldHkgb2YgZGlzdHJpYnV0
aW9ucy4KCklhbi4KCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVuLm9yZwpodHRw
Oi8vbGlzdHMueGVuLm9yZy94ZW4tdXNlcnM=

From xen-users-bounces@lists.xen.org Tue Jun 02 05:24:05 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 05:24:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Yzef1-0001hr-E3; Tue, 02 Jun 2015 05:22:47 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <darkshvein@gmail.com>) id 1Yzef0-0001hm-9M
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 05:22:46 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	00/A8-01068-5AD3D655; Tue, 02 Jun 2015 05:22:45 +0000
X-Env-Sender: darkshvein@gmail.com
X-Msg-Ref: server-7.tower-31.messagelabs.com!1433222564!12187647!1
X-Originating-IP: [209.85.213.172]
X-SpamReason: No, hits=0.8 required=7.0 tests=BODY_RANDOM_LONG,
  RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 6958 invoked from network); 2 Jun 2015 05:22:44 -0000
Received: from mail-ig0-f172.google.com (HELO mail-ig0-f172.google.com)
	(209.85.213.172)
	by server-7.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 05:22:44 -0000
Received: by igbyr2 with SMTP id yr2so78972625igb.0
	for <Xen-users@lists.xen.org>; Mon, 01 Jun 2015 22:22:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=XoPp1RjElqooqmwoBQtyLx0VzpfRrIIYbfHGYw2gozA=;
	b=dlYHosPcHqmAKpiH51//Hj2Btm2G1T+zMxImF6MA24l26bLJvzL2HBS6xvxIiDLI34
	GvcVF+aVQs2gHOcQ/IwuxqH+O5SomDDInlBxPYejOa+RBdCh29LTlX+YYTAXmLV6qJfI
	bRFs73+vPeL4HO97LbbdZcc3nsHp2s+Sfk+HVeGKzP1/W06X3GtmO5Wn+tBglm6jP50o
	zI6oH8djP/AmD3Oz9reut7LHq69SCQhUy+tPdwn5ZK52JswgxQ2e6dBvrIQO4BhMelg0
	I415vCp3jwZMJ02E8olcs3HwuUpKn0Dvxal5RgQzK0zSQcKezwrl8VFnsGVTL19/Ccz1
	qFpw==
MIME-Version: 1.0
X-Received: by 10.107.166.203 with SMTP id p194mr19286149ioe.30.1433222563680; 
	Mon, 01 Jun 2015 22:22:43 -0700 (PDT)
Received: by 10.107.134.157 with HTTP; Mon, 1 Jun 2015 22:22:43 -0700 (PDT)
In-Reply-To: <556C6421.5000508@ubuntu.com>
References: <556C6421.5000508@ubuntu.com>
Date: Tue, 2 Jun 2015 09:22:43 +0400
Message-ID: <CAHVnM0f6MXvrFYEjk-X2JWwUXkCDSvtuScVZF9Kzw8mmpVvZ=A@mail.gmail.com>
From: darkshvein l <darkshvein@gmail.com>
To: Phil Susi <psusi@ubuntu.com>
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

MB Gigabyte? I think, it is BIOS problem.

2015-06-01 17:54 GMT+04:00, Phil Susi <psusi@ubuntu.com>:
> I have a domU that has been running just fine for the last year with
> 2048m of ram.  I changed the config to give it 4096m of ram, and now
> when I start it up, it crashes without any output to the console at all.
>   It doesn't even make it to the grub loader screen.  What could be the
> cause?  It might be worth mentioning that the host is 64 bit but the
> guest is only 32 bit.
>
> My cfg is:
>
> name="devserv"
> memory=3000
> disk = [ '/dev/hyper1/devserv,,xvda' ]
> vcpus="8"
> kernel = "/home/psusi/core.elf"
> vif = [ '' ]
> on_crash = "preserve"
>
> And I also noticed that xl dmesg shows this:
>
> (XEN) d4:v0: unhandled page fault (ec=0002)
> (XEN) Pagetable walk from 00000000ff7f4fff:
> (XEN)  L4[0x000] = 0000000067289027 00000000000ff7f5
> (XEN)  L3[0x003] = 0000000067285007 00000000000ff7f9
> (XEN)  L2[0x1fb] = 0000000000000000 ffffffffffffffff
> (XEN) domain_crash_sync called from entry.S: fault at ffff82d08021abf0
> compat_create_bounce_frame+0xc6/0xde
> (XEN) Domain 4 (vcpu#0) crashed on cpu#7:
> (XEN) ----[ Xen-4.4.1  x86_64  debug=n  Not tainted ]----
> (XEN) CPU:    7
> (XEN) RIP:    e019:[<0000000000006f4c>]
> (XEN) RFLAGS: 0000000000000287   EM: 1   CONTEXT: pv guest
> (XEN) rax: 00000000ff7f4000   rbx: 00000000fffff000   rcx: 0000000000000fff
> (XEN) rdx: 000000000092b000   rsi: 00000000ff7f5000   rdi: 00000000ff7f4000
> (XEN) rbp: 000000000040ae38   rsp: 000000000040ae18   r8:  ffff830827060000
> (XEN) r9:  ffffffffffff8000   r10: ffff83083f110000   r11: ffff83083f110000
> (XEN) r12: ffff830827078068   r13: 00000073b55351c8   r14: ffff830827078060
> (XEN) r15: ffff82d0802e2620   cr0: 000000008005003b   cr4: 00000000001526f0
> (XEN) cr3: 000000083f94d000   cr2: 00000000ff7f4fff
> (XEN) ds: e021   es: e021   fs: e021   gs: e021   ss: e021   cs: e019
> (XEN) Guest stack trace from esp=0040ae18:
> (XEN)   00000002 00006f4c 0001e019 00010087 fffff000 00000000 ff7f4000
> 00000000
> (XEN)   0040afb8 0000113c 00000000 00000000 00000008 3f8b8007 00100000
> 00000000
> (XEN)   00100000 00000000 000ff7fa 00000000 00000000 00000000 0000092e
> 00000000
> (XEN)   00000000 00000000 000ff7f5 00000000 00000800 00000000 00000937
> 00000000
> (XEN)   00000000 00449000 000ff7fa 00000000 00000937 00000000 00000800
> 00000000
> (XEN)   00100000 000001ff 00000000 00000000 00000001 00000000 00007ff0
> 00000001
> (XEN)   00000000 0040c000 00000800 00000000 00000004 00000000 00000001
> 00000000
> (XEN)   00000000 00000002 00067289 00000000 00000005 00067289 00000000
> 00000004
> (XEN)   0072f68b 00000000 66a83001 00000000 0000092c 00000000 2f68d001
> 00000007
> (XEN)   000ffffb 00000000 66a84001 00000000 0000092d 00000000 2f68c001
> 00000007
> (XEN)   000ffffa 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000
> 00000000
> (XEN)   0040aff8 00006b10 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000
> 00000000
> (XEN)   00000000 00000011 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users
>

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 05:24:05 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 05:24:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Yzef1-0001hr-E3; Tue, 02 Jun 2015 05:22:47 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <darkshvein@gmail.com>) id 1Yzef0-0001hm-9M
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 05:22:46 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	00/A8-01068-5AD3D655; Tue, 02 Jun 2015 05:22:45 +0000
X-Env-Sender: darkshvein@gmail.com
X-Msg-Ref: server-7.tower-31.messagelabs.com!1433222564!12187647!1
X-Originating-IP: [209.85.213.172]
X-SpamReason: No, hits=0.8 required=7.0 tests=BODY_RANDOM_LONG,
  RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 6958 invoked from network); 2 Jun 2015 05:22:44 -0000
Received: from mail-ig0-f172.google.com (HELO mail-ig0-f172.google.com)
	(209.85.213.172)
	by server-7.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 05:22:44 -0000
Received: by igbyr2 with SMTP id yr2so78972625igb.0
	for <Xen-users@lists.xen.org>; Mon, 01 Jun 2015 22:22:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=XoPp1RjElqooqmwoBQtyLx0VzpfRrIIYbfHGYw2gozA=;
	b=dlYHosPcHqmAKpiH51//Hj2Btm2G1T+zMxImF6MA24l26bLJvzL2HBS6xvxIiDLI34
	GvcVF+aVQs2gHOcQ/IwuxqH+O5SomDDInlBxPYejOa+RBdCh29LTlX+YYTAXmLV6qJfI
	bRFs73+vPeL4HO97LbbdZcc3nsHp2s+Sfk+HVeGKzP1/W06X3GtmO5Wn+tBglm6jP50o
	zI6oH8djP/AmD3Oz9reut7LHq69SCQhUy+tPdwn5ZK52JswgxQ2e6dBvrIQO4BhMelg0
	I415vCp3jwZMJ02E8olcs3HwuUpKn0Dvxal5RgQzK0zSQcKezwrl8VFnsGVTL19/Ccz1
	qFpw==
MIME-Version: 1.0
X-Received: by 10.107.166.203 with SMTP id p194mr19286149ioe.30.1433222563680; 
	Mon, 01 Jun 2015 22:22:43 -0700 (PDT)
Received: by 10.107.134.157 with HTTP; Mon, 1 Jun 2015 22:22:43 -0700 (PDT)
In-Reply-To: <556C6421.5000508@ubuntu.com>
References: <556C6421.5000508@ubuntu.com>
Date: Tue, 2 Jun 2015 09:22:43 +0400
Message-ID: <CAHVnM0f6MXvrFYEjk-X2JWwUXkCDSvtuScVZF9Kzw8mmpVvZ=A@mail.gmail.com>
From: darkshvein l <darkshvein@gmail.com>
To: Phil Susi <psusi@ubuntu.com>
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

MB Gigabyte? I think, it is BIOS problem.

2015-06-01 17:54 GMT+04:00, Phil Susi <psusi@ubuntu.com>:
> I have a domU that has been running just fine for the last year with
> 2048m of ram.  I changed the config to give it 4096m of ram, and now
> when I start it up, it crashes without any output to the console at all.
>   It doesn't even make it to the grub loader screen.  What could be the
> cause?  It might be worth mentioning that the host is 64 bit but the
> guest is only 32 bit.
>
> My cfg is:
>
> name="devserv"
> memory=3000
> disk = [ '/dev/hyper1/devserv,,xvda' ]
> vcpus="8"
> kernel = "/home/psusi/core.elf"
> vif = [ '' ]
> on_crash = "preserve"
>
> And I also noticed that xl dmesg shows this:
>
> (XEN) d4:v0: unhandled page fault (ec=0002)
> (XEN) Pagetable walk from 00000000ff7f4fff:
> (XEN)  L4[0x000] = 0000000067289027 00000000000ff7f5
> (XEN)  L3[0x003] = 0000000067285007 00000000000ff7f9
> (XEN)  L2[0x1fb] = 0000000000000000 ffffffffffffffff
> (XEN) domain_crash_sync called from entry.S: fault at ffff82d08021abf0
> compat_create_bounce_frame+0xc6/0xde
> (XEN) Domain 4 (vcpu#0) crashed on cpu#7:
> (XEN) ----[ Xen-4.4.1  x86_64  debug=n  Not tainted ]----
> (XEN) CPU:    7
> (XEN) RIP:    e019:[<0000000000006f4c>]
> (XEN) RFLAGS: 0000000000000287   EM: 1   CONTEXT: pv guest
> (XEN) rax: 00000000ff7f4000   rbx: 00000000fffff000   rcx: 0000000000000fff
> (XEN) rdx: 000000000092b000   rsi: 00000000ff7f5000   rdi: 00000000ff7f4000
> (XEN) rbp: 000000000040ae38   rsp: 000000000040ae18   r8:  ffff830827060000
> (XEN) r9:  ffffffffffff8000   r10: ffff83083f110000   r11: ffff83083f110000
> (XEN) r12: ffff830827078068   r13: 00000073b55351c8   r14: ffff830827078060
> (XEN) r15: ffff82d0802e2620   cr0: 000000008005003b   cr4: 00000000001526f0
> (XEN) cr3: 000000083f94d000   cr2: 00000000ff7f4fff
> (XEN) ds: e021   es: e021   fs: e021   gs: e021   ss: e021   cs: e019
> (XEN) Guest stack trace from esp=0040ae18:
> (XEN)   00000002 00006f4c 0001e019 00010087 fffff000 00000000 ff7f4000
> 00000000
> (XEN)   0040afb8 0000113c 00000000 00000000 00000008 3f8b8007 00100000
> 00000000
> (XEN)   00100000 00000000 000ff7fa 00000000 00000000 00000000 0000092e
> 00000000
> (XEN)   00000000 00000000 000ff7f5 00000000 00000800 00000000 00000937
> 00000000
> (XEN)   00000000 00449000 000ff7fa 00000000 00000937 00000000 00000800
> 00000000
> (XEN)   00100000 000001ff 00000000 00000000 00000001 00000000 00007ff0
> 00000001
> (XEN)   00000000 0040c000 00000800 00000000 00000004 00000000 00000001
> 00000000
> (XEN)   00000000 00000002 00067289 00000000 00000005 00067289 00000000
> 00000004
> (XEN)   0072f68b 00000000 66a83001 00000000 0000092c 00000000 2f68d001
> 00000007
> (XEN)   000ffffb 00000000 66a84001 00000000 0000092d 00000000 2f68c001
> 00000007
> (XEN)   000ffffa 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000
> 00000000
> (XEN)   0040aff8 00006b10 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 0092b000
> 00000000
> (XEN)   00000000 00000011 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users
>

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 08:19:11 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 08:19:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzhOd-0004vq-SM; Tue, 02 Jun 2015 08:18:03 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <linux@thehobsons.co.uk>) id 1YzhOc-0004vl-Pm
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 08:18:02 +0000
Received: from [85.158.137.68] by server-2.bemta-3.messagelabs.com id
	84/1B-00727-AB66D655; Tue, 02 Jun 2015 08:18:02 +0000
X-Env-Sender: linux@thehobsons.co.uk
X-Msg-Ref: server-15.tower-31.messagelabs.com!1433233080!12121404!1
X-Originating-IP: [81.174.135.208]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20058 invoked from network); 2 Jun 2015 08:18:01 -0000
Received: from patsy.thehobsons.co.uk (HELO patsy.thehobsons.co.uk)
	(81.174.135.208) by server-15.tower-31.messagelabs.com with SMTP;
	2 Jun 2015 08:18:01 -0000
X-Virus-Scanned: Debian amavisd-new at patsy.thehobsons.co.uk
Received: from [192.168.1.22] (intfw.furness.net [195.8.169.45])
	by patsy.thehobsons.co.uk (Postfix) with ESMTPSA id 75E321BC3E
	for <Xen-users@lists.xen.org>; Tue,  2 Jun 2015 08:17:57 +0000 (UTC)
Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
From: Simon Hobson <linux@thehobsons.co.uk>
In-Reply-To: <556C6421.5000508@ubuntu.com>
Date: Tue, 2 Jun 2015 09:17:56 +0100
Message-Id: <C8B99B71-881E-4645-AA59-826B43AAB50B@thehobsons.co.uk>
References: <556C6421.5000508@ubuntu.com>
To: "xen-users@lists.xen.org" <Xen-users@lists.xen.org>
X-Mailer: Apple Mail (2.1510)
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Phil Susi <psusi@ubuntu.com> wrote:

> I have a domU that has been running just fine for the last year with 2048m of ram.  I changed the config to give it 4096m of ram, and now when I start it up, it crashes ...

> ... the guest is only 32 bit.

A 32bit machine can't have 4G of RAM IIRC. For bare metal, the limit is around 3.2G - with the rest of the 4G space taken up with I/O stuff. I assume a similar limitation applies to a VM - in that there'll be virtualised I/O needing memory space. On a bare metal machine, I think the memory management system just "ignores" as much real memory as needed to allow for the I/O - dunno if that happens with a VM.

Have you tried 3G of RAM ? Pretty sure I have (or have had) 32bit VMs with 3G RAM - don't think I've tried 4G (never had the luxury of that much memory in the host !)


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 08:19:11 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 08:19:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzhOd-0004vq-SM; Tue, 02 Jun 2015 08:18:03 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <linux@thehobsons.co.uk>) id 1YzhOc-0004vl-Pm
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 08:18:02 +0000
Received: from [85.158.137.68] by server-2.bemta-3.messagelabs.com id
	84/1B-00727-AB66D655; Tue, 02 Jun 2015 08:18:02 +0000
X-Env-Sender: linux@thehobsons.co.uk
X-Msg-Ref: server-15.tower-31.messagelabs.com!1433233080!12121404!1
X-Originating-IP: [81.174.135.208]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20058 invoked from network); 2 Jun 2015 08:18:01 -0000
Received: from patsy.thehobsons.co.uk (HELO patsy.thehobsons.co.uk)
	(81.174.135.208) by server-15.tower-31.messagelabs.com with SMTP;
	2 Jun 2015 08:18:01 -0000
X-Virus-Scanned: Debian amavisd-new at patsy.thehobsons.co.uk
Received: from [192.168.1.22] (intfw.furness.net [195.8.169.45])
	by patsy.thehobsons.co.uk (Postfix) with ESMTPSA id 75E321BC3E
	for <Xen-users@lists.xen.org>; Tue,  2 Jun 2015 08:17:57 +0000 (UTC)
Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
From: Simon Hobson <linux@thehobsons.co.uk>
In-Reply-To: <556C6421.5000508@ubuntu.com>
Date: Tue, 2 Jun 2015 09:17:56 +0100
Message-Id: <C8B99B71-881E-4645-AA59-826B43AAB50B@thehobsons.co.uk>
References: <556C6421.5000508@ubuntu.com>
To: "xen-users@lists.xen.org" <Xen-users@lists.xen.org>
X-Mailer: Apple Mail (2.1510)
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Phil Susi <psusi@ubuntu.com> wrote:

> I have a domU that has been running just fine for the last year with 2048m of ram.  I changed the config to give it 4096m of ram, and now when I start it up, it crashes ...

> ... the guest is only 32 bit.

A 32bit machine can't have 4G of RAM IIRC. For bare metal, the limit is around 3.2G - with the rest of the 4G space taken up with I/O stuff. I assume a similar limitation applies to a VM - in that there'll be virtualised I/O needing memory space. On a bare metal machine, I think the memory management system just "ignores" as much real memory as needed to allow for the I/O - dunno if that happens with a VM.

Have you tried 3G of RAM ? Pretty sure I have (or have had) 32bit VMs with 3G RAM - don't think I've tried 4G (never had the luxury of that much memory in the host !)


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 09:27:16 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 09:27:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YziSQ-0000te-Lu; Tue, 02 Jun 2015 09:26:02 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pierre.peyronnel@gmail.com>) id 1YziSO-0000tZ-Fh
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 09:26:00 +0000
Received: from [193.109.254.147] by server-5.bemta-14.messagelabs.com id
	37/E7-29123-7A67D655; Tue, 02 Jun 2015 09:25:59 +0000
X-Env-Sender: pierre.peyronnel@gmail.com
X-Msg-Ref: server-5.tower-27.messagelabs.com!1433237158!14902180!1
X-Originating-IP: [209.85.212.171]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7948 invoked from network); 2 Jun 2015 09:25:58 -0000
Received: from mail-wi0-f171.google.com (HELO mail-wi0-f171.google.com)
	(209.85.212.171)
	by server-5.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 09:25:58 -0000
Received: by wikd7 with SMTP id d7so7348638wik.0
	for <xen-users@lists.xen.org>; Tue, 02 Jun 2015 02:25:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=VcTRsEpb/kLsIFCVWKP5ipDLPcZwRW3Xzg03Hbl1mR8=;
	b=e9zVjdHnRxBSEdivJFPp1B82uc2sSXMdvPm/AeXjdTLe6PLbMKx5taVrFAH7/7fS0f
	F+ZUAS6b0hfKL4Ey0eo99kFh23tBt8Sh3ozBGH81IOGG0eZqQD/uE7zxjLvHu1aIOLBc
	xmfEqyLvB584EMxML1CFJlyio1sEtSIQklMiRB8ehJa45X6oK7Qc4hHiYtARLv+9xhiP
	vYsQ22XGl9T80ADFLOMNtUcBnUJhGkBrWQPrZoLO7ZxosysXplrR2SJoAo3G3BGD9+pD
	olLK5Td62zEr84pw7ZzY6LC3C9Q056MlNkCggqGop2NHV0SCqRdJd9hF/xizXokklOWL
	Obwg==
MIME-Version: 1.0
X-Received: by 10.194.60.164 with SMTP id i4mr49659860wjr.133.1433237158193;
	Tue, 02 Jun 2015 02:25:58 -0700 (PDT)
Received: by 10.194.39.10 with HTTP; Tue, 2 Jun 2015 02:25:58 -0700 (PDT)
In-Reply-To: <CADGo8CVyjMFumsbN7dOP-RnCzDwObE_H1AX8PugsyCY6S7ULzg@mail.gmail.com>
References: <20150522114220.GM4327@bitfolk.com>
	<CADqA9ubvCZO9q-RH9gU7RP2=F0hCoEbj4qFfOTknVPkF2T=StA@mail.gmail.com>
	<CADGo8CVyjMFumsbN7dOP-RnCzDwObE_H1AX8PugsyCY6S7ULzg@mail.gmail.com>
Date: Tue, 2 Jun 2015 11:25:58 +0200
Message-ID: <CA+mArZXyCuzFAyz2BUqyLm3Y26zP+kUrcW58MPVSBSYjycASJA@mail.gmail.com>
From: Pierre Peyronnel <pierre.peyronnel@gmail.com>
To: Miguel Clara <miguelmclara@gmail.com>
Cc: xen-users <xen-users@lists.xen.org>,
	=?UTF-8?Q?Nuno_Magalh=C3=A3es?= <nunomagalhaes@eu.ipp.pt>
Subject: Re: [Xen-users] How do *you* go about sizing dom0 RAM?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0484397989885026678=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============0484397989885026678==
Content-Type: multipart/alternative; boundary=047d7ba97f1ab16e5a05178587be

--047d7ba97f1ab16e5a05178587be
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I use Alpine linux as dom0 with 256M of RAM
It seems like it consumes only 128M of it (from collectd graphs which are
actually running from dom0) but tuning it down to 128M prevents it from
booting, sooo that's how *I* did it :-p

On Sat, May 23, 2015 at 7:17 AM, Miguel Clara <miguelmclara@gmail.com>
wrote:

> On Fri, May 22, 2015 at 8:46 PM, Nuno Magalh=C3=A3es <nunomagalhaes@eu.ip=
p.pt>
> wrote:
> > On Fri, May 22, 2015 at 12:42 PM, Andy Smith <andy@strugglers.net>
> wrote:
> >> Hello,
> >>
> >> I'm just going through the process of a hardware refresh and I was
> >> wondering if it might be time to re-evaluate how much memory is
> >> dedicated to dom0. That got me wondering how other people approach
> >> this.
> >
> >
> > I'm no expert whatsoever, just a desktop hobbyist, but like to keep
> > dom0's RAM to a bare minimum and run a minimalist distro with few
> > services (ssh via LAN... not much else). Less to hit the fans.
> >
>
> Same here, depends on the dom0, I have a laptop run Xen (testing)
> where I assigned 2G out of 8GB, but for server as less as possible.
>
> I have a NetBSD dom0 (home server) with 128M assigned, or actually
> 256M now, cause I tend to do so testing with HVM guests and I decided
> to give it a bit more (was doing fine with 128M though, and I've seen
> reports of people using 64M, with only PV guests.).
>
> A couple linux hosts with 512M or even 1024M, but they do run more one
> or HVM guests.
>
> > _______________________________________________
> > Xen-users mailing list
> > Xen-users@lists.xen.org
> > http://lists.xen.org/xen-users
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users
>

--047d7ba97f1ab16e5a05178587be
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I use Alpine linux as dom0 with 256M of RAM<br></div>=
It seems like it consumes only 128M of it (from collectd graphs which are a=
ctually running from dom0) but tuning it down to 128M prevents it from boot=
ing, sooo that&#39;s how *I* did it :-p<br></div><div class=3D"gmail_extra"=
><br><div class=3D"gmail_quote">On Sat, May 23, 2015 at 7:17 AM, Miguel Cla=
ra <span dir=3D"ltr">&lt;<a href=3D"mailto:miguelmclara@gmail.com" target=
=3D"_blank">miguelmclara@gmail.com</a>&gt;</span> wrote:<br><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex"><span class=3D"">On Fri, May 22, 2015 at 8:46 PM, Nuno Maga=
lh=C3=A3es &lt;<a href=3D"mailto:nunomagalhaes@eu.ipp.pt">nunomagalhaes@eu.=
ipp.pt</a>&gt; wrote:<br>
&gt; On Fri, May 22, 2015 at 12:42 PM, Andy Smith &lt;<a href=3D"mailto:and=
y@strugglers.net">andy@strugglers.net</a>&gt; wrote:<br>
&gt;&gt; Hello,<br>
&gt;&gt;<br>
&gt;&gt; I&#39;m just going through the process of a hardware refresh and I=
 was<br>
&gt;&gt; wondering if it might be time to re-evaluate how much memory is<br=
>
&gt;&gt; dedicated to dom0. That got me wondering how other people approach=
<br>
&gt;&gt; this.<br>
&gt;<br>
&gt;<br>
&gt; I&#39;m no expert whatsoever, just a desktop hobbyist, but like to kee=
p<br>
&gt; dom0&#39;s RAM to a bare minimum and run a minimalist distro with few<=
br>
&gt; services (ssh via LAN... not much else). Less to hit the fans.<br>
&gt;<br>
<br>
</span>Same here, depends on the dom0, I have a laptop run Xen (testing)<br=
>
where I assigned 2G out of 8GB, but for server as less as possible.<br>
<br>
I have a NetBSD dom0 (home server) with 128M assigned, or actually<br>
256M now, cause I tend to do so testing with HVM guests and I decided<br>
to give it a bit more (was doing fine with 128M though, and I&#39;ve seen<b=
r>
reports of people using 64M, with only PV guests.).<br>
<br>
A couple linux hosts with 512M or even 1024M, but they do run more one<br>
or HVM guests.<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; _______________________________________________<br>
&gt; Xen-users mailing list<br>
&gt; <a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists.xen.org</a>=
<br>
&gt; <a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://li=
sts.xen.org/xen-users</a><br>
<br>
_______________________________________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists.xen.org</a><br>
<a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://lists.x=
en.org/xen-users</a></div></div></blockquote></div><br></div>

--047d7ba97f1ab16e5a05178587be--


--===============0484397989885026678==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============0484397989885026678==--


From xen-users-bounces@lists.xen.org Tue Jun 02 09:27:16 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 09:27:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YziSQ-0000te-Lu; Tue, 02 Jun 2015 09:26:02 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pierre.peyronnel@gmail.com>) id 1YziSO-0000tZ-Fh
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 09:26:00 +0000
Received: from [193.109.254.147] by server-5.bemta-14.messagelabs.com id
	37/E7-29123-7A67D655; Tue, 02 Jun 2015 09:25:59 +0000
X-Env-Sender: pierre.peyronnel@gmail.com
X-Msg-Ref: server-5.tower-27.messagelabs.com!1433237158!14902180!1
X-Originating-IP: [209.85.212.171]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7948 invoked from network); 2 Jun 2015 09:25:58 -0000
Received: from mail-wi0-f171.google.com (HELO mail-wi0-f171.google.com)
	(209.85.212.171)
	by server-5.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 09:25:58 -0000
Received: by wikd7 with SMTP id d7so7348638wik.0
	for <xen-users@lists.xen.org>; Tue, 02 Jun 2015 02:25:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=VcTRsEpb/kLsIFCVWKP5ipDLPcZwRW3Xzg03Hbl1mR8=;
	b=e9zVjdHnRxBSEdivJFPp1B82uc2sSXMdvPm/AeXjdTLe6PLbMKx5taVrFAH7/7fS0f
	F+ZUAS6b0hfKL4Ey0eo99kFh23tBt8Sh3ozBGH81IOGG0eZqQD/uE7zxjLvHu1aIOLBc
	xmfEqyLvB584EMxML1CFJlyio1sEtSIQklMiRB8ehJa45X6oK7Qc4hHiYtARLv+9xhiP
	vYsQ22XGl9T80ADFLOMNtUcBnUJhGkBrWQPrZoLO7ZxosysXplrR2SJoAo3G3BGD9+pD
	olLK5Td62zEr84pw7ZzY6LC3C9Q056MlNkCggqGop2NHV0SCqRdJd9hF/xizXokklOWL
	Obwg==
MIME-Version: 1.0
X-Received: by 10.194.60.164 with SMTP id i4mr49659860wjr.133.1433237158193;
	Tue, 02 Jun 2015 02:25:58 -0700 (PDT)
Received: by 10.194.39.10 with HTTP; Tue, 2 Jun 2015 02:25:58 -0700 (PDT)
In-Reply-To: <CADGo8CVyjMFumsbN7dOP-RnCzDwObE_H1AX8PugsyCY6S7ULzg@mail.gmail.com>
References: <20150522114220.GM4327@bitfolk.com>
	<CADqA9ubvCZO9q-RH9gU7RP2=F0hCoEbj4qFfOTknVPkF2T=StA@mail.gmail.com>
	<CADGo8CVyjMFumsbN7dOP-RnCzDwObE_H1AX8PugsyCY6S7ULzg@mail.gmail.com>
Date: Tue, 2 Jun 2015 11:25:58 +0200
Message-ID: <CA+mArZXyCuzFAyz2BUqyLm3Y26zP+kUrcW58MPVSBSYjycASJA@mail.gmail.com>
From: Pierre Peyronnel <pierre.peyronnel@gmail.com>
To: Miguel Clara <miguelmclara@gmail.com>
Cc: xen-users <xen-users@lists.xen.org>,
	=?UTF-8?Q?Nuno_Magalh=C3=A3es?= <nunomagalhaes@eu.ipp.pt>
Subject: Re: [Xen-users] How do *you* go about sizing dom0 RAM?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0484397989885026678=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============0484397989885026678==
Content-Type: multipart/alternative; boundary=047d7ba97f1ab16e5a05178587be

--047d7ba97f1ab16e5a05178587be
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I use Alpine linux as dom0 with 256M of RAM
It seems like it consumes only 128M of it (from collectd graphs which are
actually running from dom0) but tuning it down to 128M prevents it from
booting, sooo that's how *I* did it :-p

On Sat, May 23, 2015 at 7:17 AM, Miguel Clara <miguelmclara@gmail.com>
wrote:

> On Fri, May 22, 2015 at 8:46 PM, Nuno Magalh=C3=A3es <nunomagalhaes@eu.ip=
p.pt>
> wrote:
> > On Fri, May 22, 2015 at 12:42 PM, Andy Smith <andy@strugglers.net>
> wrote:
> >> Hello,
> >>
> >> I'm just going through the process of a hardware refresh and I was
> >> wondering if it might be time to re-evaluate how much memory is
> >> dedicated to dom0. That got me wondering how other people approach
> >> this.
> >
> >
> > I'm no expert whatsoever, just a desktop hobbyist, but like to keep
> > dom0's RAM to a bare minimum and run a minimalist distro with few
> > services (ssh via LAN... not much else). Less to hit the fans.
> >
>
> Same here, depends on the dom0, I have a laptop run Xen (testing)
> where I assigned 2G out of 8GB, but for server as less as possible.
>
> I have a NetBSD dom0 (home server) with 128M assigned, or actually
> 256M now, cause I tend to do so testing with HVM guests and I decided
> to give it a bit more (was doing fine with 128M though, and I've seen
> reports of people using 64M, with only PV guests.).
>
> A couple linux hosts with 512M or even 1024M, but they do run more one
> or HVM guests.
>
> > _______________________________________________
> > Xen-users mailing list
> > Xen-users@lists.xen.org
> > http://lists.xen.org/xen-users
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users
>

--047d7ba97f1ab16e5a05178587be
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I use Alpine linux as dom0 with 256M of RAM<br></div>=
It seems like it consumes only 128M of it (from collectd graphs which are a=
ctually running from dom0) but tuning it down to 128M prevents it from boot=
ing, sooo that&#39;s how *I* did it :-p<br></div><div class=3D"gmail_extra"=
><br><div class=3D"gmail_quote">On Sat, May 23, 2015 at 7:17 AM, Miguel Cla=
ra <span dir=3D"ltr">&lt;<a href=3D"mailto:miguelmclara@gmail.com" target=
=3D"_blank">miguelmclara@gmail.com</a>&gt;</span> wrote:<br><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex"><span class=3D"">On Fri, May 22, 2015 at 8:46 PM, Nuno Maga=
lh=C3=A3es &lt;<a href=3D"mailto:nunomagalhaes@eu.ipp.pt">nunomagalhaes@eu.=
ipp.pt</a>&gt; wrote:<br>
&gt; On Fri, May 22, 2015 at 12:42 PM, Andy Smith &lt;<a href=3D"mailto:and=
y@strugglers.net">andy@strugglers.net</a>&gt; wrote:<br>
&gt;&gt; Hello,<br>
&gt;&gt;<br>
&gt;&gt; I&#39;m just going through the process of a hardware refresh and I=
 was<br>
&gt;&gt; wondering if it might be time to re-evaluate how much memory is<br=
>
&gt;&gt; dedicated to dom0. That got me wondering how other people approach=
<br>
&gt;&gt; this.<br>
&gt;<br>
&gt;<br>
&gt; I&#39;m no expert whatsoever, just a desktop hobbyist, but like to kee=
p<br>
&gt; dom0&#39;s RAM to a bare minimum and run a minimalist distro with few<=
br>
&gt; services (ssh via LAN... not much else). Less to hit the fans.<br>
&gt;<br>
<br>
</span>Same here, depends on the dom0, I have a laptop run Xen (testing)<br=
>
where I assigned 2G out of 8GB, but for server as less as possible.<br>
<br>
I have a NetBSD dom0 (home server) with 128M assigned, or actually<br>
256M now, cause I tend to do so testing with HVM guests and I decided<br>
to give it a bit more (was doing fine with 128M though, and I&#39;ve seen<b=
r>
reports of people using 64M, with only PV guests.).<br>
<br>
A couple linux hosts with 512M or even 1024M, but they do run more one<br>
or HVM guests.<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; _______________________________________________<br>
&gt; Xen-users mailing list<br>
&gt; <a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists.xen.org</a>=
<br>
&gt; <a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://li=
sts.xen.org/xen-users</a><br>
<br>
_______________________________________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists.xen.org</a><br>
<a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://lists.x=
en.org/xen-users</a></div></div></blockquote></div><br></div>

--047d7ba97f1ab16e5a05178587be--


--===============0484397989885026678==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============0484397989885026678==--


From xen-users-bounces@lists.xen.org Tue Jun 02 12:57:01 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 12:57:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzljR-0000Mf-2l; Tue, 02 Jun 2015 12:55:49 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <phillsusi@gmail.com>) id 1YzljQ-0000MZ-7i
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 12:55:48 +0000
Received: from [85.158.137.68] by server-2.bemta-3.messagelabs.com id
	8D/26-00727-3D7AD655; Tue, 02 Jun 2015 12:55:47 +0000
X-Env-Sender: phillsusi@gmail.com
X-Msg-Ref: server-5.tower-31.messagelabs.com!1433249745!12408691!1
X-Originating-IP: [209.85.216.170]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14231 invoked from network); 2 Jun 2015 12:55:46 -0000
Received: from mail-qc0-f170.google.com (HELO mail-qc0-f170.google.com)
	(209.85.216.170)
	by server-5.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 12:55:46 -0000
Received: by qcxw10 with SMTP id w10so59043649qcx.3
	for <Xen-users@lists.xen.org>; Tue, 02 Jun 2015 05:55:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=sender:message-id:date:from:user-agent:mime-version:to:cc:subject
	:references:in-reply-to:content-type:content-transfer-encoding;
	bh=4UjY6gNd3tP6mthoPR9yYZEYzWlpUZS80/MSJu3ieRY=;
	b=0DP3BNHoLe3FRuxlofOVNt+KZU1H1K9uI2Km+pI39jKcEenND5df6FW7BFMNkbW/jD
	QZ1UOzA97Z3UOnt0/p06GJPn8kUjqnc9IRXU4CWF2WF1nScOBBWcFiof2apaLNzl9CzN
	QfDk8VrsxXR2+rwFqONO2O0IzZyUE3zS7uTWOylScAEq3L/uUNETAC57wnH11jLNIveJ
	RQ27GKpQ1zEs5MNbJnwkyVsrJqFiTLeXg/M24rbPHUS2asCCDddX37qJ0oF6DLoitf+I
	SnF+/MvMfUul3TLAaghwvAbTB8vHuG1tGvyKd9rJfwl+s5Opx25tq61YkV+wtGfln9Of
	10Xg==
X-Received: by 10.140.49.11 with SMTP id p11mr28363015qga.60.1433249744935;
	Tue, 02 Jun 2015 05:55:44 -0700 (PDT)
Received: from [10.1.1.233] (fl-67-77-88-12.sta.embarqhsd.net. [67.77.88.12])
	by mx.google.com with ESMTPSA id
	i197sm7258070qhc.36.2015.06.02.05.55.43
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 02 Jun 2015 05:55:44 -0700 (PDT)
Message-ID: <556DA796.6040509@ubuntu.com>
Date: Tue, 02 Jun 2015 08:54:46 -0400
From: Phil Susi <psusi@ubuntu.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: darkshvein l <darkshvein@gmail.com>
References: <556C6421.5000508@ubuntu.com>
	<CAHVnM0f6MXvrFYEjk-X2JWwUXkCDSvtuScVZF9Kzw8mmpVvZ=A@mail.gmail.com>
In-Reply-To: <CAHVnM0f6MXvrFYEjk-X2JWwUXkCDSvtuScVZF9Kzw8mmpVvZ=A@mail.gmail.com>
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 6/2/2015 1:22 AM, darkshvein l wrote:
> MB Gigabyte? I think, it is BIOS problem.

Nope, it's a Dell, and what would the bios have to do with anything?  It 
isn't used in the domU.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 12:57:01 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 12:57:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzljR-0000Mf-2l; Tue, 02 Jun 2015 12:55:49 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <phillsusi@gmail.com>) id 1YzljQ-0000MZ-7i
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 12:55:48 +0000
Received: from [85.158.137.68] by server-2.bemta-3.messagelabs.com id
	8D/26-00727-3D7AD655; Tue, 02 Jun 2015 12:55:47 +0000
X-Env-Sender: phillsusi@gmail.com
X-Msg-Ref: server-5.tower-31.messagelabs.com!1433249745!12408691!1
X-Originating-IP: [209.85.216.170]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14231 invoked from network); 2 Jun 2015 12:55:46 -0000
Received: from mail-qc0-f170.google.com (HELO mail-qc0-f170.google.com)
	(209.85.216.170)
	by server-5.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 12:55:46 -0000
Received: by qcxw10 with SMTP id w10so59043649qcx.3
	for <Xen-users@lists.xen.org>; Tue, 02 Jun 2015 05:55:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=sender:message-id:date:from:user-agent:mime-version:to:cc:subject
	:references:in-reply-to:content-type:content-transfer-encoding;
	bh=4UjY6gNd3tP6mthoPR9yYZEYzWlpUZS80/MSJu3ieRY=;
	b=0DP3BNHoLe3FRuxlofOVNt+KZU1H1K9uI2Km+pI39jKcEenND5df6FW7BFMNkbW/jD
	QZ1UOzA97Z3UOnt0/p06GJPn8kUjqnc9IRXU4CWF2WF1nScOBBWcFiof2apaLNzl9CzN
	QfDk8VrsxXR2+rwFqONO2O0IzZyUE3zS7uTWOylScAEq3L/uUNETAC57wnH11jLNIveJ
	RQ27GKpQ1zEs5MNbJnwkyVsrJqFiTLeXg/M24rbPHUS2asCCDddX37qJ0oF6DLoitf+I
	SnF+/MvMfUul3TLAaghwvAbTB8vHuG1tGvyKd9rJfwl+s5Opx25tq61YkV+wtGfln9Of
	10Xg==
X-Received: by 10.140.49.11 with SMTP id p11mr28363015qga.60.1433249744935;
	Tue, 02 Jun 2015 05:55:44 -0700 (PDT)
Received: from [10.1.1.233] (fl-67-77-88-12.sta.embarqhsd.net. [67.77.88.12])
	by mx.google.com with ESMTPSA id
	i197sm7258070qhc.36.2015.06.02.05.55.43
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 02 Jun 2015 05:55:44 -0700 (PDT)
Message-ID: <556DA796.6040509@ubuntu.com>
Date: Tue, 02 Jun 2015 08:54:46 -0400
From: Phil Susi <psusi@ubuntu.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: darkshvein l <darkshvein@gmail.com>
References: <556C6421.5000508@ubuntu.com>
	<CAHVnM0f6MXvrFYEjk-X2JWwUXkCDSvtuScVZF9Kzw8mmpVvZ=A@mail.gmail.com>
In-Reply-To: <CAHVnM0f6MXvrFYEjk-X2JWwUXkCDSvtuScVZF9Kzw8mmpVvZ=A@mail.gmail.com>
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 6/2/2015 1:22 AM, darkshvein l wrote:
> MB Gigabyte? I think, it is BIOS problem.

Nope, it's a Dell, and what would the bios have to do with anything?  It 
isn't used in the domU.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoI-0005QY-4O; Tue, 02 Jun 2015 14:04:54 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoF-0005Px-LX; Tue, 02 Jun 2015 14:04:51 +0000
Received: from [85.158.139.211] by server-8.bemta-5.messagelabs.com id
	06/6C-29702-208BD655; Tue, 02 Jun 2015 14:04:50 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-8.tower-206.messagelabs.com!1433253887!11229616!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1381 invoked from network); 2 Jun 2015 14:04:48 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-8.tower-206.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:04:48 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo4-0006SW-PC; Tue, 02 Jun 2015 14:04:40 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo4-0001nH-5B; Tue, 02 Jun 2015 14:04:40 +0000
Date: Tue, 02 Jun 2015 14:04:40 +0000
Message-Id: <E1Yzmo4-0001nH-5B@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 128 (CVE-2015-4103) - Potential
 unintended writes to host MSI message data field via qemu
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4103 / XSA-128
                              version 2

    Potential unintended writes to host MSI message data field via qemu

UPDATES IN VERSION 2
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

Logic is in place to avoid writes to certain host config space fields
when the guest must nevertheless be able to access their virtual
counterparts.  A bug in how this logic deals with accesses spanning
multiple fields allows the guest to write to the host MSI message data
field.

While generally the writes write back the values previously read,
their value in config space may have got changed by the host between
the qemu read and write.  In such a case host side interrupt handling
could become confused, possibly losing interrupts or allowing spurious
interrupt injection into other guests.

IMPACT
======

Certain untrusted guest administrators may be able to confuse host
side interrupt handling, leading to a Denial of Service.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

Furthermore, the vulnerability is only applicable when the
passed-through PCI devices are MSI-capable.  (Most modern devices
are.)

MITIGATION
==========

This issue can be avoided by not assigning MSI capable PCI devices to
untrusted HVM guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa128-qemuu.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa128-qemuu-4.3.patch       Xen 4.3.x
xsa128-qemut.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa128*.patch
68b85a4c7d531d343d7fac2e92dbec3677bc2e4a83de75d78d7f605a2fc8ad3f  xsa128-qemut.patch
2ec657a6f22cac922854548c9d83698656ab7a36634ad05de7f14439cc4405bc  xsa128-qemuu-4.3.patch
104cf2e2816d253cc1eca3084f6ea9b6007f7773a88bda245bab00539e08b359  xsa128-qemuu.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdOAAoJEIP+FMlX6CvZEPUIAIti0HdxCX4JNy5MKqNFxHRB
KtGibssSaoGcPmkhLDqtOQ+8BwTUe/owezKlX799Jf0Jqn1bVXejCLyh0e6cyauq
pPoyQd+zblIpTFw3ByqVzicLajmVfY5v8yGGBAnSpuvfVEd3K5qWZCvFx+rEJ4AB
JI8jQdMAn2oFGtLbYDysRUpSjg/OtqIC6o3a4yfVnPDcduPq9XFpnxcdHHVfrklS
SeY1MGLbJtrNzya+zX1GZxFh5kuZnF/qSY3o60LF+2ZpK9nyH8toX1flvW9lXa86
9r1zxgy6qE1iWOHo4E1HjlK3lUUqW0XgkB/3zj+2LtX1uTwOhPtATn5/Neje0GY=
=4I3/
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa128-qemut.patch"
Content-Disposition: attachment; filename="xsa128-qemut.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa128-qemuu-4.3.patch"
Content-Disposition: attachment; filename="xsa128-qemuu-4.3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa128-qemuu.patch"
Content-Disposition: attachment; filename="xsa128-qemuu.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoM-0005SP-UL; Tue, 02 Jun 2015 14:04:58 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoK-0005Qq-LD; Tue, 02 Jun 2015 14:04:56 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	84/78-03895-708BD655; Tue, 02 Jun 2015 14:04:55 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-6.tower-31.messagelabs.com!1433253893!7968773!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 18766 invoked from network); 2 Jun 2015 14:04:54 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-6.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:04:54 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoC-0006Sy-MY; Tue, 02 Jun 2015 14:04:48 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoC-0001pV-KC; Tue, 02 Jun 2015 14:04:48 +0000
Date: Tue, 02 Jun 2015 14:04:48 +0000
Message-Id: <E1YzmoC-0001pV-KC@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 130 (CVE-2015-4105) - Guest
 triggerable qemu MSI-X pass-through error messages
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4105 / XSA-130
                              version 2

         Guest triggerable qemu MSI-X pass-through error messages

UPDATES IN VERSION 2
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

Device model code dealing with guest PCI MSI-X interrupt management
activities logs messages on certain (supposedly) invalid guest
operations.

IMPACT
======

A buggy or malicious guest repeatedly invoking such operations may
result in the host disk to fill up, possibly leading to a Denial of
Service.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

Furthermore, the vulnerability is only applicable when the
passed-through PCI devices are MSI-X capable.  (Many modern devices
are.)

MITIGATION
==========

This issue can be avoided by not assigning MSI-X capable PCI devices to
untrusted HVM guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa130-qemuu.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa130-qemuu-4.3.patch       Xen 4.3.x
xsa130-qemut.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa130*.patch
0ed6d75b6758c43a3042994f5127cb69d03796acf5c4d305d7ec2486500753da  xsa130-qemut.patch
fd6e835e945c2eee197f9e18501aeefb6e1d33a714f6ce66c16481d5aca8fcd0  xsa130-qemuu-4.3.patch
87fb70041d1fe9c997461c4a6fdaf9157667ec2eff7c77b8db6ee8f9d730753d  xsa130-qemuu.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdWAAoJEIP+FMlX6CvZhyIH/3VkV4yhOpHsYzHEdkcikqTP
w3KzOsPqtZs2++XWN48Ewpt1Dy12vLkq65hljfvHj9AIWmB0qgWXNC51lkkIFffT
KgcNuUbuJkyy+hNk7K/OWblXbehTrSIAWkl13xKymIQYiS+UN8TYp9kM7QIFkYh2
GGJlCzTljnxeKFZY0z7uW6OKnZzBkdcGmRS5tyH+cqikfAEDSGaV7ffSC0mukd0/
LrTodM+0+8C40znDAyjUiz91YfGXyXtTTEKvmPzdhiv9Fsp3FZ6kMkSGPhcAUUUh
WJmP23QXwm1Tt0qZn9wp1w1DmgihkDoS9Jdw/as29qSCNE2UrfsXaPghGkujQTU=
=KrtH
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa130-qemut.patch"
Content-Disposition: attachment; filename="xsa130-qemut.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa130-qemuu-4.3.patch"
Content-Disposition: attachment; filename="xsa130-qemuu-4.3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa130-qemuu.patch"
Content-Disposition: attachment; filename="xsa130-qemuu.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoT-0005Uy-DJ; Tue, 02 Jun 2015 14:05:05 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoR-0005Tp-9A; Tue, 02 Jun 2015 14:05:03 +0000
Received: from [193.109.254.147] by server-4.bemta-14.messagelabs.com id
	A7/F3-27764-E08BD655; Tue, 02 Jun 2015 14:05:02 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-5.tower-27.messagelabs.com!1433253899!15017316!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4184 invoked from network); 2 Jun 2015 14:05:00 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-5.tower-27.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:05:00 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoG-0006TF-1x; Tue, 02 Jun 2015 14:04:52 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoF-0001rG-Vs; Tue, 02 Jun 2015 14:04:52 +0000
Date: Tue, 02 Jun 2015 14:04:51 +0000
Message-Id: <E1YzmoF-0001rG-Vs@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 131 (CVE-2015-4106) - Unmediated
 PCI register access in qemu
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4106 / XSA-131
                              version 3

                Unmediated PCI register access in qemu

UPDATES IN VERSION 3
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

Qemu allows guests to not only read, but also write all parts of the
PCI config space (but not extended config space) of passed through PCI
devices not explicitly dealt with for (partial) emulation purposes.

IMPACT
======

Since the effect depends on the specific purpose of the the config
space field, it's not possbile to give a general statement about the
exact impact on the host or other guests.  Privilege escalation, host
crash (Denial of Service), and leaked information all cannot be
excluded.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

MITIGATION
==========

This issue can be avoided by not assigning PCI devices to untrusted HVM
guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa131-qemuu-$n.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa131-qemuu-4.4-1.patch        Xen 4.4.x replacement for xsa131-qemuu-1.patch
xsa131-qemuu-4.3-$n.patch       Xen 4.3.x
xsa131-qemut-$n.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x
xsa131-qemut-4.2-1.patch        Xen 4.2.x replacement for xsa131-qemut-1.patch

$ sha256sum xsa131*.patch
2ff4aa092247ff0911d837adc5f4de1ffa8ed32a39eaea9b0bfc4a40b7921b06  xsa131-qemut-1.patch
dafa524374d890e517d4e2600a594064b55af645172422b9e81a64b5f4a64575  xsa131-qemut-2.patch
b37d3e22ce4410bf0db87217c60a543f0143a23ab0652f1746bd5fe17dbadd70  xsa131-qemut-3.patch
b5f0882717129142f11297a62b2ed826da94ce5ed42f6b2ea60f9101b652aed9  xsa131-qemut-4.2-1.patch
3bfc58b6288bafb4c2039265be32c6bd9e048b63a4cae279ead3ec1154af9abe  xsa131-qemut-4.patch
60c44b63d2c7bd7e12631db7fd05622d782e1a5ccd7dfa17a1671b36b5ff7bee  xsa131-qemut-5.patch
8f2a9c4333155fac670ad3a932703051ce8a47f4f6d3a067458e5ab49da7e93a  xsa131-qemut-6.patch
ed4facfa80b2ab7ecfc9b232878d3f4d54ad93214c75f4b4af71c8f07a1d04c4  xsa131-qemut-7.patch
d400d03ae792699fec9a54bbb6b08c2f5523427ef8af85b0c5ede497ba87f61c  xsa131-qemut-8.patch
7a7f294303a8bcf9a316e3e6b8a0511dac3e92dbf7e373b21c94b97835c03f2f  xsa131-qemuu-1.patch
dc72bd4993fdcea3dc98d18f314da3ac1c7e73e0b99dac325b0e59d0229f67e5  xsa131-qemuu-2.patch
61524a47fd29406ba9a2983ea9cb59e45a56d716d65d78689177d9c8e95f76e6  xsa131-qemuu-3.patch
21493c5db68115d97a6aecf1159ee05023b59545627d7f03d7fdaa238bb3bd27  xsa131-qemuu-4.3-1.patch
5828647db6f090ce6c7ea20f90331008f2a0bba18b3a3a371f2ba9054871a7cb  xsa131-qemuu-4.3-2.patch
eab05df32e8a7c729cc52affd28b109a8f75cabb8fd4027934059d303b2232fa  xsa131-qemuu-4.3-3.patch
8dc95a2a8a45d851476b938e4cab2e65d87b8dc28c721949824ce900552ba489  xsa131-qemuu-4.3-4.patch
7a358fba18ae9c0dde1134564151a97c8e6d6f5982ac74c450f81d2ed8e9d540  xsa131-qemuu-4.3-5.patch
fcb77a8d2adde1daf03f8faeb6e92788b2727f5b11563b6f770c74251b0964a4  xsa131-qemuu-4.3-6.patch
79933b2744e7b69c4eb23f3974d242e2592cb4553be115a4aec1c6e30e7564cf  xsa131-qemuu-4.3-7.patch
bb4021a36a9f36dc0082cfd42869adc737ec4afea92ac1100f0971118174b58c  xsa131-qemuu-4.3-8.patch
f70516fa38a3d2e0cf906c41e3b7dfd7cf998c9189b232dac20633c7b0d1ab8b  xsa131-qemuu-4.4-1.patch
041c82a341755bcbab18f834a0fccf9c031674d956958092cbfa5e64f05b6318  xsa131-qemuu-4.patch
91aeb9c0d3e9a251faf12840e0519a342cfb7e35af3fea429bedb452182fae47  xsa131-qemuu-5.patch
60482fe37fd405032b92de85ed5d333c210c85662b1645016dce2f0053aa6ec0  xsa131-qemuu-6.patch
05fc2e614620449e52a056ce6e5f4033970ade22fde623e3b789fc57b3e4143e  xsa131-qemuu-7.patch
358849d7c0dff29bf96f49e56d00c4d7bd4c8d0c71c122a7b3655e10f45cb53b  xsa131-qemuu-8.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of patches or migitations is NOT permitted (except on
systems used and administered only by organisations which are members
of the Xen Project Security Issues Predisclosure List).  Specifically,
deployent on public cloud systems is NOT permitted.

This is because the altered PCI config space access behavior is visible
to guests.

Deployment is permitted only AFTER the embargo ends.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdZAAoJEIP+FMlX6CvZ1yEIAKWoq6O8Nk8zewvKojXnmt0J
irQ4p9uXBDN682d9Vloq+y86PSt5NLs83ZfAHWSkWPkkgyDXy4tmnte9LGMLmVI+
Z7nZs4dsH2bixFMJfqjKWE//py37TIVmI4M37xOgkNV8HTQJ0ZHWgYur5ilNJu9x
HJ1duL3//+zkelA+zUQQSNMPvc2OUCSRGW5UVDwn95xJDAgURWe2d6c6bg8yG7T6
ufwO0x1CWTRaVsbLRSCST3NEVl7bxmYR5RBxlBaUIpgzT53aK3XHoiAezjTdK1Ul
TiZ3Hb0XVtFbNEz2cCWQBEdQPKYhJjxpUBdRi9zlsiFwHa+lG+CA3i1IcqXIXQo=
=tNVc
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-1.patch"
Content-Disposition: attachment; filename="xsa131-qemut-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-2.patch"
Content-Disposition: attachment; filename="xsa131-qemut-2.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiBjb25zb2xpZGF0ZSBQTSBjYXBhYmlsaXR5IGVtdV9tYXNrCgpU
aGVyZSdzIG5vIHBvaW50IGluIHhlbl9wdF9wbWNzcl9yZWdfe3JlYWQsd3Jp
dGV9KCkgZWFjaCBPUmluZwpQQ0lfUE1fQ1RSTF9TVEFURV9NQVNLIGFuZCBQ
Q0lfUE1fQ1RSTF9OT19TT0ZUX1JFU0VUIGludG8gYSBsb2NhbAplbXVfbWFz
ayB2YXJpYWJsZSAtIHdlIGNhbiBoYXZlIHRoZSBzYW1lIGVmZmVjdCBieSBz
ZXR0aW5nIHRoZSBmaWVsZApkZXNjcmlwdG9yJ3MgZW11X21hc2sgbWVtYmVy
IHN1aXRhYmx5IHJpZ2h0IGF3YXkuIE5vdGUgdGhhdAp4ZW5fcHRfcG1jc3Jf
cmVnX3dyaXRlKCkgaXMgYmVpbmcgcmV0YWluZWQgaW4gb3JkZXIgdG8gYWxs
b3cgbGF0ZXIKcGF0Y2hlcyB0byBiZSBsZXNzIGludHJ1c2l2ZS4KClRoaXMg
aXMgYSBwcmVwYXJhdG9yeSBwYXRjaCBmb3IgWFNBLTEzMS4KClNpZ25lZC1v
ZmYtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNvbT4KQWNrZWQt
Ynk6IFN0ZWZhbm8gU3RhYmVsbGluaSA8c3RlZmFuby5zdGFiZWxsaW5pQGV1
LmNpdHJpeC5jb20+CkFja2VkLWJ5OiBJYW4gQ2FtcGJlbGwgPGlhbi5jYW1w
YmVsbEBjaXRyaXguY29tPgoKLS0tIGEvaHcvcGFzcy10aHJvdWdoLmMKKysr
IGIvaHcvcGFzcy10aHJvdWdoLmMKQEAgLTE3OSw5ICsxNzksNiBAQCBzdGF0
aWMgaW50IHB0X2xvbmdfcmVnX3JlYWQoc3RydWN0IHB0X2RlCiBzdGF0aWMg
aW50IHB0X2Jhcl9yZWdfcmVhZChzdHJ1Y3QgcHRfZGV2ICpwdGRldiwKICAg
ICBzdHJ1Y3QgcHRfcmVnX3RibCAqY2ZnX2VudHJ5LAogICAgIHVpbnQzMl90
ICp2YWx1ZSwgdWludDMyX3QgdmFsaWRfbWFzayk7Ci1zdGF0aWMgaW50IHB0
X3BtY3NyX3JlZ19yZWFkKHN0cnVjdCBwdF9kZXYgKnB0ZGV2LAotICAgIHN0
cnVjdCBwdF9yZWdfdGJsICpjZmdfZW50cnksCi0gICAgdWludDE2X3QgKnZh
bHVlLCB1aW50MTZfdCB2YWxpZF9tYXNrKTsKIHN0YXRpYyBpbnQgcHRfYnl0
ZV9yZWdfd3JpdGUoc3RydWN0IHB0X2RldiAqcHRkZXYsCiAgICAgc3RydWN0
IHB0X3JlZ190YmwgKmNmZ19lbnRyeSwKICAgICB1aW50OF90ICp2YWx1ZSwg
dWludDhfdCBkZXZfdmFsdWUsIHVpbnQ4X3QgdmFsaWRfbWFzayk7CkBAIC00
OTQsNyArNDkxLDcgQEAgc3RhdGljIHN0cnVjdCBwdF9yZWdfaW5mb190Ymwg
cHRfZW11X3JlZwogICAgICAgICAudS53LndyaXRlICA9IHB0X3dvcmRfcmVn
X3dyaXRlLAogICAgICAgICAudS53LnJlc3RvcmUgID0gTlVMTCwKICAgICB9
LAotICAgIC8qIFBDSSBQb3dlciBNYW5hZ2VtZW50IENvbnRyb2wvU3RhdHVz
IHJlZyAqLworICAgIC8qIFBDSSBQb3dlciBNYW5hZ2VtZW50IENvbnRyb2wv
U3RhdHVzIHJlZyAoLT5wb3dlcl9tZ210IG9uKSAqLwogICAgIHsKICAgICAg
ICAgLm9mZnNldCAgICAgPSBQQ0lfUE1fQ1RSTCwKICAgICAgICAgLnNpemUg
ICAgICAgPSAyLApAQCAtNTAyLDcgKzQ5OSwxOSBAQCBzdGF0aWMgc3RydWN0
IHB0X3JlZ19pbmZvX3RibCBwdF9lbXVfcmVnCiAgICAgICAgIC5yb19tYXNr
ICAgID0gMHhFMUZDLAogICAgICAgICAuZW11X21hc2sgICA9IDB4ODEwMCwK
ICAgICAgICAgLmluaXQgICAgICAgPSBwdF9wbWNzcl9yZWdfaW5pdCwKLSAg
ICAgICAgLnUudy5yZWFkICAgPSBwdF9wbWNzcl9yZWdfcmVhZCwKKyAgICAg
ICAgLnUudy5yZWFkICAgPSBwdF93b3JkX3JlZ19yZWFkLAorICAgICAgICAu
dS53LndyaXRlICA9IHB0X3BtY3NyX3JlZ193cml0ZSwKKyAgICAgICAgLnUu
dy5yZXN0b3JlICA9IHB0X3BtY3NyX3JlZ19yZXN0b3JlLAorICAgIH0sCisg
ICAgLyogUENJIFBvd2VyIE1hbmFnZW1lbnQgQ29udHJvbC9TdGF0dXMgcmVn
ICgtPnBvd2VyX21nbXQgb2ZmKSAqLworICAgIHsKKyAgICAgICAgLm9mZnNl
dCAgICAgPSBQQ0lfUE1fQ1RSTCwKKyAgICAgICAgLnNpemUgICAgICAgPSAy
LAorICAgICAgICAuaW5pdF92YWwgICA9IDB4MDAwOCwKKyAgICAgICAgLnJv
X21hc2sgICAgPSAweEUxRkMsCisgICAgICAgIC5lbXVfbWFzayAgID0gMHg4
MTBCLAorICAgICAgICAuaW5pdCAgICAgICA9IHB0X3BtY3NyX3JlZ19pbml0
LAorICAgICAgICAudS53LnJlYWQgICA9IHB0X3dvcmRfcmVnX3JlYWQsCiAg
ICAgICAgIC51Lncud3JpdGUgID0gcHRfcG1jc3JfcmVnX3dyaXRlLAogICAg
ICAgICAudS53LnJlc3RvcmUgID0gcHRfcG1jc3JfcmVnX3Jlc3RvcmUsCiAg
ICAgfSwKQEAgLTI5MTksNiArMjkyOCw3IEBAIHN0YXRpYyB1aW50MzJfdCBw
dF9wbWNfcmVnX2luaXQoc3RydWN0IHAKICAgICByZXR1cm4gcmVnLT5pbml0
X3ZhbDsKIH0KIAorLyogdGhpcyBmdW5jdGlvbiB3aWxsIGJlIGNhbGxlZCB0
d2ljZSAoZm9yIC0+cG93ZXJfbWdtdCBvbiBhbmQgb2ZmIGNhc2VzKSAqLwog
LyogaW5pdGlhbGl6ZSBQQ0kgUG93ZXIgTWFuYWdlbWVudCBDb250cm9sL1N0
YXR1cyByZWdpc3RlciAqLwogc3RhdGljIHVpbnQzMl90IHB0X3BtY3NyX3Jl
Z19pbml0KHN0cnVjdCBwdF9kZXYgKnB0ZGV2LAogICAgICAgICBzdHJ1Y3Qg
cHRfcmVnX2luZm9fdGJsICpyZWcsIHVpbnQzMl90IHJlYWxfb2Zmc2V0KQpA
QCAtMjkyNiw4ICsyOTM2LDIzIEBAIHN0YXRpYyB1aW50MzJfdCBwdF9wbWNz
cl9yZWdfaW5pdChzdHJ1Y3QKICAgICBQQ0lEZXZpY2UgKmQgPSAmcHRkZXYt
PmRldjsKICAgICB1aW50MTZfdCBjYXBfdmVyICA9IDA7CiAKLSAgICBpZiAo
IXB0ZGV2LT5wb3dlcl9tZ210KQotICAgICAgICByZXR1cm4gcmVnLT5pbml0
X3ZhbDsKKyAgICBzd2l0Y2ggKHJlZy0+ZW11X21hc2sgJiAoUENJX1BNX0NU
UkxfU1RBVEVfTUFTSyB8CisgICAgICAgICAgICAgICAgICAgICAgICAgICAg
IFBDSV9QTV9DVFJMX05PX1NPRlRfUkVTRVQpKQorICAgIHsKKyAgICBjYXNl
IDA6CisgICAgICAgIGlmICghcHRkZXYtPnBvd2VyX21nbXQpCisgICAgICAg
ICAgICByZXR1cm4gUFRfSU5WQUxJRF9SRUc7CisgICAgICAgIGJyZWFrOwor
ICAgIGNhc2UgUENJX1BNX0NUUkxfU1RBVEVfTUFTSyB8IFBDSV9QTV9DVFJM
X05PX1NPRlRfUkVTRVQ6CisgICAgICAgIGlmICghcHRkZXYtPnBvd2VyX21n
bXQpCisgICAgICAgICAgICByZXR1cm4gcmVnLT5pbml0X3ZhbDsKKyAgICAg
ICAgcmV0dXJuIFBUX0lOVkFMSURfUkVHOworICAgIGRlZmF1bHQ6CisgICAg
ICAgIC8qIGV4aXQgSS9PIGVtdWxhdG9yICovCisgICAgICAgIFBUX0xPRygi
SW50ZXJuYWwgZXJyb3I6IEludmFsaWQgUE1DU1IgZW11bGF0aW9uIG1hc2sg
JTA0eC4iCisgICAgICAgICAgICAgICAiIEkvTyBlbXVsYXRvciBleGl0Llxu
IiwgcmVnLT5lbXVfbWFzayk7CisgICAgICAgIGV4aXQoMSk7CisgICAgfQog
CiAgICAgLyogY2hlY2sgUENJIFBvd2VyIE1hbmFnZW1lbnQgc3VwcG9ydCB2
ZXJzaW9uICovCiAgICAgY2FwX3ZlciA9IHB0ZGV2LT5wbV9zdGF0ZS0+cG1j
X2ZpZWxkICYgUENJX1BNX0NBUF9WRVJfTUFTSzsKQEAgLTM0MTcsMjQgKzM0
NDIsNiBAQCBzdGF0aWMgaW50IHB0X2Jhcl9yZWdfcmVhZChzdHJ1Y3QgcHRf
ZGV2CiB9CiAKIAotLyogcmVhZCBQb3dlciBNYW5hZ2VtZW50IENvbnRyb2wv
U3RhdHVzIHJlZ2lzdGVyICovCi1zdGF0aWMgaW50IHB0X3BtY3NyX3JlZ19y
ZWFkKHN0cnVjdCBwdF9kZXYgKnB0ZGV2LAotICAgICAgICBzdHJ1Y3QgcHRf
cmVnX3RibCAqY2ZnX2VudHJ5LAotICAgICAgICB1aW50MTZfdCAqdmFsdWUs
IHVpbnQxNl90IHZhbGlkX21hc2spCi17Ci0gICAgc3RydWN0IHB0X3JlZ19p
bmZvX3RibCAqcmVnID0gY2ZnX2VudHJ5LT5yZWc7Ci0gICAgdWludDE2X3Qg
dmFsaWRfZW11X21hc2sgPSByZWctPmVtdV9tYXNrOwotCi0gICAgaWYgKCFw
dGRldi0+cG93ZXJfbWdtdCkKLSAgICAgICAgdmFsaWRfZW11X21hc2sgfD0g
UENJX1BNX0NUUkxfU1RBVEVfTUFTSyB8IFBDSV9QTV9DVFJMX05PX1NPRlRf
UkVTRVQ7Ci0KLSAgICB2YWxpZF9lbXVfbWFzayA9IHZhbGlkX2VtdV9tYXNr
ICYgdmFsaWRfbWFzayA7Ci0gICAgKnZhbHVlID0gUFRfTUVSR0VfVkFMVUUo
KnZhbHVlLCBjZmdfZW50cnktPmRhdGEsIH52YWxpZF9lbXVfbWFzayk7Ci0K
LSAgICByZXR1cm4gMDsKLX0KLQotCiAvKiB3cml0ZSBieXRlIHNpemUgZW11
bGF0ZSByZWdpc3RlciAqLwogc3RhdGljIGludCBwdF9ieXRlX3JlZ193cml0
ZShzdHJ1Y3QgcHRfZGV2ICpwdGRldiwKICAgICAgICAgc3RydWN0IHB0X3Jl
Z190YmwgKmNmZ19lbnRyeSwKQEAgLTM3NjgsMjEgKzM3NzUsMTcgQEAgc3Rh
dGljIGludCBwdF9wbWNzcl9yZWdfd3JpdGUoc3RydWN0IHB0XwogewogICAg
IHN0cnVjdCBwdF9yZWdfaW5mb190YmwgKnJlZyA9IGNmZ19lbnRyeS0+cmVn
OwogICAgIFBDSURldmljZSAqZCA9ICZwdGRldi0+ZGV2OwotICAgIHVpbnQx
Nl90IGVtdV9tYXNrID0gcmVnLT5lbXVfbWFzazsKICAgICB1aW50MTZfdCB3
cml0YWJsZV9tYXNrID0gMDsKICAgICB1aW50MTZfdCB0aHJvdWdoYWJsZV9t
YXNrID0gMDsKICAgICBzdHJ1Y3QgcHRfcG1faW5mbyAqcG1fc3RhdGUgPSBw
dGRldi0+cG1fc3RhdGU7CiAgICAgdWludDE2X3QgcmVhZF92YWwgPSAwOwog
Ci0gICAgaWYgKCFwdGRldi0+cG93ZXJfbWdtdCkKLSAgICAgICAgZW11X21h
c2sgfD0gUENJX1BNX0NUUkxfU1RBVEVfTUFTSyB8IFBDSV9QTV9DVFJMX05P
X1NPRlRfUkVTRVQ7Ci0KICAgICAvKiBtb2RpZnkgZW11bGF0ZSByZWdpc3Rl
ciAqLwotICAgIHdyaXRhYmxlX21hc2sgPSBlbXVfbWFzayAmIH5yZWctPnJv
X21hc2sgJiB2YWxpZF9tYXNrOworICAgIHdyaXRhYmxlX21hc2sgPSByZWct
PmVtdV9tYXNrICYgfnJlZy0+cm9fbWFzayAmIHZhbGlkX21hc2s7CiAgICAg
Y2ZnX2VudHJ5LT5kYXRhID0gUFRfTUVSR0VfVkFMVUUoKnZhbHVlLCBjZmdf
ZW50cnktPmRhdGEsIHdyaXRhYmxlX21hc2spOwogCiAgICAgLyogY3JlYXRl
IHZhbHVlIGZvciB3cml0aW5nIHRvIEkvTyBkZXZpY2UgcmVnaXN0ZXIgKi8K
LSAgICB0aHJvdWdoYWJsZV9tYXNrID0gfmVtdV9tYXNrICYgdmFsaWRfbWFz
azsKKyAgICB0aHJvdWdoYWJsZV9tYXNrID0gfnJlZy0+ZW11X21hc2sgJiB2
YWxpZF9tYXNrOwogICAgICp2YWx1ZSA9IFBUX01FUkdFX1ZBTFVFKCp2YWx1
ZSwgZGV2X3ZhbHVlLCB0aHJvdWdoYWJsZV9tYXNrKTsKIAogICAgIGlmICgh
cHRkZXYtPnBvd2VyX21nbXQpCg==

--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-3.patch"
Content-Disposition: attachment; filename="xsa131-qemut-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-4.2-1.patch"
Content-Disposition: attachment; filename="xsa131-qemut-4.2-1.patch"
Content-Transfer-Encoding: base64

eGVuL01TSTogZG9uJ3Qgb3Blbi1jb2RlIHBhc3MtdGhyb3VnaCBvZiBlbmFi
bGUgYml0IG1vZGlmaWNhdGlvbnMKCldpdGhvdXQgdGhpcyB0aGUgYWN0dWFs
IFhTQS0xMzEgZml4IHdvdWxkIGNhdXNlIHRoZSBlbmFibGUgYml0IHRvIG5v
dApnZXQgc2V0IGFueW1vcmUgKGR1ZSB0byB0aGUgd3JpdGUgYmFjayBnZXR0
aW5nIHN1cHByZXNzZWQgdGhlcmUgYmFzZWQKb24gdGhlIE9SIG9mIGVtdV9t
YXNrLCByb19tYXNrLCBhbmQgcmVzX21hc2spLgoKTm90ZSB0aGF0IHRoZSBm
aWRkbGluZyB3aXRoIHRoZSBlbmFibGUgYml0IHNob3VsZG4ndCByZWFsbHkg
YmUgZG9uZSBieQpxZW11LCBidXQgbWFraW5nIHRoaXMgd29yayByaWdodCAo
dmlhIGxpYnhjIGFuZCB0aGUgaHlwZXJ2aXNvcikgd2lsbApyZXF1aXJlIG1v
cmUgZXh0ZW5zaXZlIGNoYW5nZXMsIHdoaWNoIGNhbiBiZSBwb3N0cG9uZWQg
dW50aWwgYWZ0ZXIgdGhlCnNlY3VyaXR5IGlzc3VlIGdvdCBhZGRyZXNzZWQu
CgpUaGlzIGlzIGEgcHJlcGFyYXRvcnkgcGF0Y2ggZm9yIFhTQS0xMzEuCgpT
aWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+
CkFja2VkLWJ5OiBTdGVmYW5vIFN0YWJlbGxpbmkgPHN0ZWZhbm8uc3RhYmVs
bGluaUBldS5jaXRyaXguY29tPgoKLS0tIGEvaHcvcGFzcy10aHJvdWdoLmMK
KysrIGIvaHcvcGFzcy10aHJvdWdoLmMKQEAgLTY0OCw3ICs2NDgsNyBAQCBz
dGF0aWMgc3RydWN0IHB0X3JlZ19pbmZvX3RibCBwdF9lbXVfcmVnCiAgICAg
ICAgIC5zaXplICAgICAgID0gMiwKICAgICAgICAgLmluaXRfdmFsICAgPSAw
eDAwMDAsCiAgICAgICAgIC5yb19tYXNrICAgID0gMHhGRjhFLAotICAgICAg
ICAuZW11X21hc2sgICA9IDB4MDE3RiwKKyAgICAgICAgLmVtdV9tYXNrICAg
PSAweDAxN0UsCiAgICAgICAgIC5pbml0ICAgICAgID0gcHRfbXNnY3RybF9y
ZWdfaW5pdCwKICAgICAgICAgLnUudy5yZWFkICAgPSBwdF93b3JkX3JlZ19y
ZWFkLAogICAgICAgICAudS53LndyaXRlICA9IHB0X21zZ2N0cmxfcmVnX3dy
aXRlLApAQCAtMzg5OSw2ICszODk5LDkgQEAgc3RhdGljIGludCBwdF9tc2dj
dHJsX3JlZ193cml0ZShzdHJ1Y3QgcAogCiAgICAgLyogbW9kaWZ5IGVtdWxh
dGUgcmVnaXN0ZXIgKi8KICAgICB3cml0YWJsZV9tYXNrID0gcmVnLT5lbXVf
bWFzayAmIH5yZWctPnJvX21hc2sgJiB2YWxpZF9tYXNrOworICAgIC8qIGFs
c28gZW11bGF0ZSBNU0lfRU5BQkxFIGJpdCBmb3IgTVNJLUlOVHggdHJhbnNs
YXRpb24gKi8KKyAgICBpZiAocHRkZXYtPm1zaV90cmFuc19lbikKKyAgICAg
ICAgd3JpdGFibGVfbWFzayB8PSBQQ0lfTVNJX0ZMQUdTX0VOQUJMRSAmIHZh
bGlkX21hc2s7CiAgICAgY2ZnX2VudHJ5LT5kYXRhID0gUFRfTUVSR0VfVkFM
VUUoKnZhbHVlLCBjZmdfZW50cnktPmRhdGEsIHdyaXRhYmxlX21hc2spOwog
ICAgIC8qIHVwZGF0ZSB0aGUgbXNpX2luZm8gdG9vICovCiAgICAgcHRkZXYt
Pm1zaS0+ZmxhZ3MgfD0gY2ZnX2VudHJ5LT5kYXRhICYKQEAgLTM5MDcsNiAr
MzkxMCw5IEBAIHN0YXRpYyBpbnQgcHRfbXNnY3RybF9yZWdfd3JpdGUoc3Ry
dWN0IHAKICAgICAvKiBjcmVhdGUgdmFsdWUgZm9yIHdyaXRpbmcgdG8gSS9P
IGRldmljZSByZWdpc3RlciAqLwogICAgIHZhbCA9ICp2YWx1ZTsKICAgICB0
aHJvdWdoYWJsZV9tYXNrID0gfnJlZy0+ZW11X21hc2sgJiB2YWxpZF9tYXNr
OworICAgIC8qIGRvbid0IHBhc3MgdGhyb3VnaCBNU0lfRU5BQkxFIGJpdCBm
b3IgTVNJLUlOVHggdHJhbnNsYXRpb24gKi8KKyAgICBpZiAocHRkZXYtPm1z
aV90cmFuc19lbikKKyAgICAgICAgdGhyb3VnaGFibGVfbWFzayAmPSB+UENJ
X01TSV9GTEFHU19FTkFCTEU7CiAgICAgKnZhbHVlID0gUFRfTUVSR0VfVkFM
VUUoKnZhbHVlLCBkZXZfdmFsdWUsIHRocm91Z2hhYmxlX21hc2spOwogCiAg
ICAgLyogdXBkYXRlIE1TSSAqLwpAQCAtMzk0NiwxMiArMzk1Miw2IEBAIHN0
YXRpYyBpbnQgcHRfbXNnY3RybF9yZWdfd3JpdGUoc3RydWN0IHAKICAgICBl
bHNlCiAgICAgICAgIHB0ZGV2LT5tc2ktPmZsYWdzICY9IH5QQ0lfTVNJX0ZM
QUdTX0VOQUJMRTsKIAotICAgIC8qIHBhc3MgdGhyb3VnaCBNU0lfRU5BQkxF
IGJpdCB3aGVuIG5vIE1TSS1JTlR4IHRyYW5zbGF0aW9uICovCi0gICAgaWYg
KCFwdGRldi0+bXNpX3RyYW5zX2VuKSB7Ci0gICAgICAgICp2YWx1ZSAmPSB+
UENJX01TSV9GTEFHU19FTkFCTEU7Ci0gICAgICAgICp2YWx1ZSB8PSB2YWwg
JiBQQ0lfTVNJX0ZMQUdTX0VOQUJMRTsKLSAgICB9Ci0KICAgICByZXR1cm4g
MDsKIH0KIAo=

--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-4.patch"
Content-Disposition: attachment; filename="xsa131-qemut-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-5.patch"
Content-Disposition: attachment; filename="xsa131-qemut-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-6.patch"
Content-Disposition: attachment; filename="xsa131-qemut-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-7.patch"
Content-Disposition: attachment; filename="xsa131-qemut-7.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiBhZGQgYSBmZXcgUENJIGNvbmZpZyBzcGFjZSBmaWVsZCBkZXNj
cmlwdGlvbnMKClNpbmNlIHRoZSBuZXh0IHBhdGNoIHdpbGwgdHVybiBhbGwg
bm90IGV4cGxpY2l0bHkgZGVzY3JpYmVkIGZpZWxkcwpyZWFkLW9ubHkgYnkg
ZGVmYXVsdCwgdGhvc2UgZmllbGRzIHRoYXQgaGF2ZSBndWVzdCB3cml0YWJs
ZSBiaXRzIG5lZWQKdG8gYmUgZ2l2ZW4gZXhwbGljaXQgZGVzY3JpcHRvcnMu
CgpUaGlzIGlzIGEgcHJlcGFyYXRvcnkgcGF0Y2ggZm9yIFhTQS0xMzEuCgpT
aWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+
CgotLS0gYS9ody9wYXNzLXRocm91Z2guYworKysgYi9ody9wYXNzLXRocm91
Z2guYwpAQCAtNTM4LDYgKzUzOCwxNiBAQCBzdGF0aWMgc3RydWN0IHB0X3Jl
Z19pbmZvX3RibCBwdF9lbXVfcmVnCiAgICAgICAgIC51LmIucmVzdG9yZSAg
PSBOVUxMLAogICAgIH0sCiAgICAgeworICAgICAgICAub2Zmc2V0ICAgICA9
IFBDSV9WUERfQUREUiwKKyAgICAgICAgLnNpemUgICAgICAgPSAyLAorICAg
ICAgICAucm9fbWFzayAgICA9IDB4MDAwMywKKyAgICAgICAgLmVtdV9tYXNr
ICAgPSAweDAwMDMsCisgICAgICAgIC5pbml0ICAgICAgID0gcHRfY29tbW9u
X3JlZ19pbml0LAorICAgICAgICAudS53LnJlYWQgICA9IHB0X3dvcmRfcmVn
X3JlYWQsCisgICAgICAgIC51Lncud3JpdGUgID0gcHRfd29yZF9yZWdfd3Jp
dGUsCisgICAgICAgIC51LncucmVzdG9yZSA9IHB0X3dvcmRfcmVnX3Jlc3Rv
cmUsCisgICAgfSwKKyAgICB7CiAgICAgICAgIC5zaXplID0gMCwKICAgICB9
LAogfTsKQEAgLTU5OSw2ICs2MDksMTcgQEAgc3RhdGljIHN0cnVjdCBwdF9y
ZWdfaW5mb190YmwgcHRfZW11X3JlZwogICAgICAgICAudS53LndyaXRlICA9
IHB0X3dvcmRfcmVnX3dyaXRlLAogICAgICAgICAudS53LnJlc3RvcmUgID0g
cHRfd29yZF9yZWdfcmVzdG9yZSwKICAgICB9LAorICAgIC8qIERldmljZSBT
dGF0dXMgcmVnICovCisgICAgeworICAgICAgICAub2Zmc2V0ICAgICA9IFBD
SV9FWFBfREVWU1RBLAorICAgICAgICAuc2l6ZSAgICAgICA9IDIsCisgICAg
ICAgIC5yZXNfbWFzayAgID0gMHhGRkMwLAorICAgICAgICAucm9fbWFzayAg
ICA9IDB4MDAzMCwKKyAgICAgICAgLmluaXQgICAgICAgPSBwdF9jb21tb25f
cmVnX2luaXQsCisgICAgICAgIC51LncucmVhZCAgID0gcHRfd29yZF9yZWdf
cmVhZCwKKyAgICAgICAgLnUudy53cml0ZSAgPSBwdF93b3JkX3JlZ193cml0
ZSwKKyAgICAgICAgLnUudy5yZXN0b3JlICA9IHB0X3dvcmRfcmVnX3Jlc3Rv
cmUsCisgICAgfSwKICAgICAvKiBMaW5rIENvbnRyb2wgcmVnICovCiAgICAg
ewogICAgICAgICAub2Zmc2V0ICAgICA9IFBDSV9FWFBfTE5LQ1RMLApAQCAt
NjExLDYgKzYzMiwxNiBAQCBzdGF0aWMgc3RydWN0IHB0X3JlZ19pbmZvX3Ri
bCBwdF9lbXVfcmVnCiAgICAgICAgIC51Lncud3JpdGUgID0gcHRfd29yZF9y
ZWdfd3JpdGUsCiAgICAgICAgIC51LncucmVzdG9yZSAgPSBwdF93b3JkX3Jl
Z19yZXN0b3JlLAogICAgIH0sCisgICAgLyogTGluayBTdGF0dXMgcmVnICov
CisgICAgeworICAgICAgICAub2Zmc2V0ICAgICA9IFBDSV9FWFBfTE5LU1RB
LAorICAgICAgICAuc2l6ZSAgICAgICA9IDIsCisgICAgICAgIC5yb19tYXNr
ICAgID0gMHgzRkZGLAorICAgICAgICAuaW5pdCAgICAgICA9IHB0X2NvbW1v
bl9yZWdfaW5pdCwKKyAgICAgICAgLnUudy5yZWFkICAgPSBwdF93b3JkX3Jl
Z19yZWFkLAorICAgICAgICAudS53LndyaXRlICA9IHB0X3dvcmRfcmVnX3dy
aXRlLAorICAgICAgICAudS53LnJlc3RvcmUgPSBwdF93b3JkX3JlZ19yZXN0
b3JlLAorICAgIH0sCiAgICAgLyogRGV2aWNlIENvbnRyb2wgMiByZWcgKi8K
ICAgICB7CiAgICAgICAgIC5vZmZzZXQgICAgID0gMHgyOCwKLS0tIGEvaHcv
cGFzcy10aHJvdWdoLmgKKysrIGIvaHcvcGFzcy10aHJvdWdoLmgKQEAgLTEw
NSw2ICsxMDUsMTQgQEAKICNkZWZpbmUgUENJX0VYUF9UWVBFX1JPT1RfRUMg
ICAgIDB4YQogI2VuZGlmCiAKKyNpZm5kZWYgUENJX1ZQRF9BRERSCisvKiBW
aXRhbCBQcm9kdWN0IERhdGEgKi8KKyNkZWZpbmUgUENJX1ZQRF9BRERSCQky
CS8qIEFkZHJlc3MgdG8gYWNjZXNzICgxNSBiaXRzISkgKi8KKyNkZWZpbmUg
IFBDSV9WUERfQUREUl9NQVNLCTB4N2ZmZgkvKiBBZGRyZXNzIG1hc2sgKi8K
KyNkZWZpbmUgIFBDSV9WUERfQUREUl9GCQkweDgwMDAJLyogV3JpdGUgMCwg
MSBpbmRpY2F0ZXMgY29tcGxldGlvbiAqLworI2RlZmluZSBQQ0lfVlBEX0RB
VEEJCTQJLyogMzItYml0cyBvZiBkYXRhIHJldHVybmVkIGhlcmUgKi8KKyNl
bmRpZgorCiAjaWZuZGVmIFBDSV9FUlJfVU5DT1JfTUFTSwogLyogVW5jb3Jy
ZWN0YWJsZSBFcnJvciBNYXNrICovCiAjZGVmaW5lIFBDSV9FUlJfVU5DT1Jf
TUFTSyAgICAgIDgK

--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-8.patch"
Content-Disposition: attachment; filename="xsa131-qemut-8.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-1.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-2.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-3.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-3.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiBjb3JyZWN0bHkgaGFuZGxlIFBNIHN0YXR1cyBiaXQKCnhlbl9w
dF9wbWNzcl9yZWdfd3JpdGUoKSBuZWVkcyBhbiBhZGp1c3RtZW50IHRvIGRl
YWwgd2l0aCB0aGUgUlcxQwpuYXR1cmUgb2YgdGhlIG5vdCBwYXNzZWQgdGhy
b3VnaCBiaXQgMTUgKFBDSV9QTV9DVFJMX1BNRV9TVEFUVVMpLgoKVGhpcyBp
cyBhIHByZXBhcmF0b3J5IHBhdGNoIGZvciBYU0EtMTMxLgoKU2lnbmVkLW9m
Zi1ieTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpSZXZpZXdl
ZC1ieTogU3RlZmFubyBTdGFiZWxsaW5pIDxzdGVmYW5vLnN0YWJlbGxpbmlA
ZXUuY2l0cml4LmNvbT4KCi0tLSBhL2h3L3hlbi94ZW5fcHRfY29uZmlnX2lu
aXQuYworKysgYi9ody94ZW4veGVuX3B0X2NvbmZpZ19pbml0LmMKQEAgLTk1
MCw3ICs5NTAsOCBAQCBzdGF0aWMgaW50IHhlbl9wdF9wbWNzcl9yZWdfd3Jp
dGUoWGVuUENJCiAKICAgICAvKiBjcmVhdGUgdmFsdWUgZm9yIHdyaXRpbmcg
dG8gSS9PIGRldmljZSByZWdpc3RlciAqLwogICAgIHRocm91Z2hhYmxlX21h
c2sgPSB+cmVnLT5lbXVfbWFzayAmIHZhbGlkX21hc2s7Ci0gICAgKnZhbCA9
IFhFTl9QVF9NRVJHRV9WQUxVRSgqdmFsLCBkZXZfdmFsdWUsIHRocm91Z2hh
YmxlX21hc2spOworICAgICp2YWwgPSBYRU5fUFRfTUVSR0VfVkFMVUUoKnZh
bCwgZGV2X3ZhbHVlICYgflBDSV9QTV9DVFJMX1BNRV9TVEFUVVMsCisgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICB0aHJvdWdoYWJsZV9tYXNrKTsK
IAogICAgIHJldHVybiAwOwogfQo=

--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-1.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-2.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-3.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-3.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiBjb3JyZWN0bHkgaGFuZGxlIFBNIHN0YXR1cyBiaXQKCnhlbl9w
dF9wbWNzcl9yZWdfd3JpdGUoKSBuZWVkcyBhbiBhZGp1c3RtZW50IHRvIGRl
YWwgd2l0aCB0aGUgUlcxQwpuYXR1cmUgb2YgdGhlIG5vdCBwYXNzZWQgdGhy
b3VnaCBiaXQgMTUgKFBDSV9QTV9DVFJMX1BNRV9TVEFUVVMpLgoKVGhpcyBp
cyBhIHByZXBhcmF0b3J5IHBhdGNoIGZvciBYU0EtMTMxLgoKU2lnbmVkLW9m
Zi1ieTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpSZXZpZXdl
ZC1ieTogU3RlZmFubyBTdGFiZWxsaW5pIDxzdGVmYW5vLnN0YWJlbGxpbmlA
ZXUuY2l0cml4LmNvbT4KCi0tLSBhL2h3L3hlbl9wdF9jb25maWdfaW5pdC5j
CisrKyBiL2h3L3hlbl9wdF9jb25maWdfaW5pdC5jCkBAIC05NTAsNyArOTUw
LDggQEAgc3RhdGljIGludCB4ZW5fcHRfcG1jc3JfcmVnX3dyaXRlKFhlblBD
SQogCiAgICAgLyogY3JlYXRlIHZhbHVlIGZvciB3cml0aW5nIHRvIEkvTyBk
ZXZpY2UgcmVnaXN0ZXIgKi8KICAgICB0aHJvdWdoYWJsZV9tYXNrID0gfnJl
Zy0+ZW11X21hc2sgJiB2YWxpZF9tYXNrOwotICAgICp2YWwgPSBYRU5fUFRf
TUVSR0VfVkFMVUUoKnZhbCwgZGV2X3ZhbHVlLCB0aHJvdWdoYWJsZV9tYXNr
KTsKKyAgICAqdmFsID0gWEVOX1BUX01FUkdFX1ZBTFVFKCp2YWwsIGRldl92
YWx1ZSAmIH5QQ0lfUE1fQ1RSTF9QTUVfU1RBVFVTLAorICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgdGhyb3VnaGFibGVfbWFzayk7CiAKICAgICBy
ZXR1cm4gMDsKIH0K

--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-4.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-5.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-6.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-7.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-7.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiBhZGQgYSBmZXcgUENJIGNvbmZpZyBzcGFjZSBmaWVsZCBkZXNj
cmlwdGlvbnMKClNpbmNlIHRoZSBuZXh0IHBhdGNoIHdpbGwgdHVybiBhbGwg
bm90IGV4cGxpY2l0bHkgZGVzY3JpYmVkIGZpZWxkcwpyZWFkLW9ubHkgYnkg
ZGVmYXVsdCwgdGhvc2UgZmllbGRzIHRoYXQgaGF2ZSBndWVzdCB3cml0YWJs
ZSBiaXRzIG5lZWQKdG8gYmUgZ2l2ZW4gZXhwbGljaXQgZGVzY3JpcHRvcnMu
CgpUaGlzIGlzIGEgcHJlcGFyYXRvcnkgcGF0Y2ggZm9yIFhTQS0xMzEuCgpT
aWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+
Ci0tLQpOb3RlczoKLSBibGluZGx5IGFsbG93aW5nIGFsbCBWUEQgcmVhZHMg
bWF5IHN0aWxsIGJlIGEgcHJvYmxlbSAob3V0IG9mIGJvdW5kcwogIGFkZHJl
c3NlcyBhcmVuJ3QgYWxsb3dlZCwgYnV0IHRoZSBzcGVjIGRvZXNuJ3Qgc2F5
IHdoYXQgdGhlIGVmZmVjdAogIHdvdWxkIGJlKSA9PT4gYWxzbyBhbiBpc3N1
ZSBpbiBwY2liYWNrPwotIFZlbmRvciBTcGVjaWZpYyBjYXAgcmVncyBhcmVu
J3QgaW4gdGhlIHRhYmxlICh3aWxsIGJlY29tZSByL28gYnkKICBkZWZhdWx0
IHdpdGggdGhpcyBjaGFuZ2UpCi0gbWFueSBQQ0llIGNhcCByZWdzIGFyZW4n
dCBpbiB0aGUgdGFibGUgKHdpbGwgYWdhaW4gYmVjb21lIHIvbykKLSBzYW1l
IGZvciBQTSBjYXAgcmVncyBhdCBvZmZzZXRzIDYgYW5kIDcKCi0tLSBhL2h3
L3hlbl9wdF9jb25maWdfaW5pdC5jCisrKyBiL2h3L3hlbl9wdF9jb25maWdf
aW5pdC5jCkBAIC03NTYsNiArNzU2LDE1IEBAIHN0YXRpYyBYZW5QVFJlZ0lu
Zm8geGVuX3B0X2VtdV9yZWdfdnBkW10KICAgICAgICAgLnUuYi53cml0ZSAg
PSB4ZW5fcHRfYnl0ZV9yZWdfd3JpdGUsCiAgICAgfSwKICAgICB7CisgICAg
ICAgIC5vZmZzZXQgICAgID0gUENJX1ZQRF9BRERSLAorICAgICAgICAuc2l6
ZSAgICAgICA9IDIsCisgICAgICAgIC5yb19tYXNrICAgID0gMHgwMDAzLAor
ICAgICAgICAuZW11X21hc2sgICA9IDB4MDAwMywKKyAgICAgICAgLmluaXQg
ICAgICAgPSB4ZW5fcHRfY29tbW9uX3JlZ19pbml0LAorICAgICAgICAudS53
LnJlYWQgICA9IHhlbl9wdF93b3JkX3JlZ19yZWFkLAorICAgICAgICAudS53
LndyaXRlICA9IHhlbl9wdF93b3JkX3JlZ193cml0ZSwKKyAgICB9LAorICAg
IHsKICAgICAgICAgLnNpemUgPSAwLAogICAgIH0sCiB9OwpAQCAtODkxLDYg
KzkwMCwxNiBAQCBzdGF0aWMgWGVuUFRSZWdJbmZvIHhlbl9wdF9lbXVfcmVn
X3BjaWVbCiAgICAgICAgIC51LncucmVhZCAgID0geGVuX3B0X3dvcmRfcmVn
X3JlYWQsCiAgICAgICAgIC51Lncud3JpdGUgID0geGVuX3B0X3dvcmRfcmVn
X3dyaXRlLAogICAgIH0sCisgICAgLyogRGV2aWNlIFN0YXR1cyByZWcgKi8K
KyAgICB7CisgICAgICAgIC5vZmZzZXQgICAgID0gUENJX0VYUF9ERVZTVEEs
CisgICAgICAgIC5zaXplICAgICAgID0gMiwKKyAgICAgICAgLnJlc19tYXNr
ICAgPSAweEZGQzAsCisgICAgICAgIC5yb19tYXNrICAgID0gMHgwMDMwLAor
ICAgICAgICAuaW5pdCAgICAgICA9IHhlbl9wdF9jb21tb25fcmVnX2luaXQs
CisgICAgICAgIC51LncucmVhZCAgID0geGVuX3B0X3dvcmRfcmVnX3JlYWQs
CisgICAgICAgIC51Lncud3JpdGUgID0geGVuX3B0X3dvcmRfcmVnX3dyaXRl
LAorICAgIH0sCiAgICAgLyogTGluayBDb250cm9sIHJlZyAqLwogICAgIHsK
ICAgICAgICAgLm9mZnNldCAgICAgPSBQQ0lfRVhQX0xOS0NUTCwKQEAgLTkw
Miw2ICs5MjEsMTUgQEAgc3RhdGljIFhlblBUUmVnSW5mbyB4ZW5fcHRfZW11
X3JlZ19wY2llWwogICAgICAgICAudS53LnJlYWQgICA9IHhlbl9wdF93b3Jk
X3JlZ19yZWFkLAogICAgICAgICAudS53LndyaXRlICA9IHhlbl9wdF93b3Jk
X3JlZ193cml0ZSwKICAgICB9LAorICAgIC8qIExpbmsgU3RhdHVzIHJlZyAq
LworICAgIHsKKyAgICAgICAgLm9mZnNldCAgICAgPSBQQ0lfRVhQX0xOS1NU
QSwKKyAgICAgICAgLnNpemUgICAgICAgPSAyLAorICAgICAgICAucm9fbWFz
ayAgICA9IDB4M0ZGRiwKKyAgICAgICAgLmluaXQgICAgICAgPSB4ZW5fcHRf
Y29tbW9uX3JlZ19pbml0LAorICAgICAgICAudS53LnJlYWQgICA9IHhlbl9w
dF93b3JkX3JlZ19yZWFkLAorICAgICAgICAudS53LndyaXRlICA9IHhlbl9w
dF93b3JkX3JlZ193cml0ZSwKKyAgICB9LAogICAgIC8qIERldmljZSBDb250
cm9sIDIgcmVnICovCiAgICAgewogICAgICAgICAub2Zmc2V0ICAgICA9IDB4
MjgsCg==

--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-8.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-8.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.4-1.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.4-1.patch"
Content-Transfer-Encoding: base64

eGVuL01TSTogZG9uJ3Qgb3Blbi1jb2RlIHBhc3MtdGhyb3VnaCBvZiBlbmFi
bGUgYml0IG1vZGlmaWNhdGlvbnMKCldpdGhvdXQgdGhpcyB0aGUgYWN0dWFs
IFhTQS0xMzEgZml4IHdvdWxkIGNhdXNlIHRoZSBlbmFibGUgYml0IHRvIG5v
dApnZXQgc2V0IGFueW1vcmUgKGR1ZSB0byB0aGUgd3JpdGUgYmFjayBnZXR0
aW5nIHN1cHByZXNzZWQgdGhlcmUgYmFzZWQKb24gdGhlIE9SIG9mIGVtdV9t
YXNrLCByb19tYXNrLCBhbmQgcmVzX21hc2spLgoKTm90ZSB0aGF0IHRoZSBm
aWRkbGluZyB3aXRoIHRoZSBlbmFibGUgYml0IHNob3VsZG4ndCByZWFsbHkg
YmUgZG9uZSBieQpxZW11LCBidXQgbWFraW5nIHRoaXMgd29yayByaWdodCAo
dmlhIGxpYnhjIGFuZCB0aGUgaHlwZXJ2aXNvcikgd2lsbApyZXF1aXJlIG1v
cmUgZXh0ZW5zaXZlIGNoYW5nZXMsIHdoaWNoIGNhbiBiZSBwb3N0cG9uZWQg
dW50aWwgYWZ0ZXIgdGhlCnNlY3VyaXR5IGlzc3VlIGdvdCBhZGRyZXNzZWQu
CgpUaGlzIGlzIGEgcHJlcGFyYXRvcnkgcGF0Y2ggZm9yIFhTQS0xMzEuCgpT
aWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+
CkFja2VkLWJ5OiBTdGVmYW5vIFN0YWJlbGxpbmkgPHN0ZWZhbm8uc3RhYmVs
bGluaUBldS5jaXRyaXguY29tPgoKLS0tIGEvaHcveGVuL3hlbl9wdF9jb25m
aWdfaW5pdC5jCisrKyBiL2h3L3hlbi94ZW5fcHRfY29uZmlnX2luaXQuYwpA
QCAtMTA1NSw3ICsxMDU1LDYgQEAgc3RhdGljIGludCB4ZW5fcHRfbXNnY3Ry
bF9yZWdfd3JpdGUoWGVuUAogICAgIFhlblBUTVNJICptc2kgPSBzLT5tc2k7
CiAgICAgdWludDE2X3Qgd3JpdGFibGVfbWFzayA9IDA7CiAgICAgdWludDE2
X3QgdGhyb3VnaGFibGVfbWFzayA9IDA7Ci0gICAgdWludDE2X3QgcmF3X3Zh
bDsKIAogICAgIC8qIEN1cnJlbnRseSBubyBzdXBwb3J0IGZvciBtdWx0aS12
ZWN0b3IgKi8KICAgICBpZiAoKnZhbCAmIFBDSV9NU0lfRkxBR1NfUVNJWkUp
IHsKQEAgLTEwNjgsMTIgKzEwNjcsMTEgQEAgc3RhdGljIGludCB4ZW5fcHRf
bXNnY3RybF9yZWdfd3JpdGUoWGVuUAogICAgIG1zaS0+ZmxhZ3MgfD0gY2Zn
X2VudHJ5LT5kYXRhICYgflBDSV9NU0lfRkxBR1NfRU5BQkxFOwogCiAgICAg
LyogY3JlYXRlIHZhbHVlIGZvciB3cml0aW5nIHRvIEkvTyBkZXZpY2UgcmVn
aXN0ZXIgKi8KLSAgICByYXdfdmFsID0gKnZhbDsKICAgICB0aHJvdWdoYWJs
ZV9tYXNrID0gfnJlZy0+ZW11X21hc2sgJiB2YWxpZF9tYXNrOwogICAgICp2
YWwgPSBYRU5fUFRfTUVSR0VfVkFMVUUoKnZhbCwgZGV2X3ZhbHVlLCB0aHJv
dWdoYWJsZV9tYXNrKTsKIAogICAgIC8qIHVwZGF0ZSBNU0kgKi8KLSAgICBp
ZiAocmF3X3ZhbCAmIFBDSV9NU0lfRkxBR1NfRU5BQkxFKSB7CisgICAgaWYg
KCp2YWwgJiBQQ0lfTVNJX0ZMQUdTX0VOQUJMRSkgewogICAgICAgICAvKiBz
ZXR1cCBNU0kgcGlycSBmb3IgdGhlIGZpcnN0IHRpbWUgKi8KICAgICAgICAg
aWYgKCFtc2ktPmluaXRpYWxpemVkKSB7CiAgICAgICAgICAgICAvKiBJbml0
IHBoeXNpY2FsIG9uZSAqLwpAQCAtMTEwMSwxMCArMTA5OSw2IEBAIHN0YXRp
YyBpbnQgeGVuX3B0X21zZ2N0cmxfcmVnX3dyaXRlKFhlblAKICAgICAgICAg
bXNpLT5mbGFncyAmPSB+UENJX01TSV9GTEFHU19FTkFCTEU7CiAgICAgfQog
Ci0gICAgLyogcGFzcyB0aHJvdWdoIE1TSV9FTkFCTEUgYml0ICovCi0gICAg
KnZhbCAmPSB+UENJX01TSV9GTEFHU19FTkFCTEU7Ci0gICAgKnZhbCB8PSBy
YXdfdmFsICYgUENJX01TSV9GTEFHU19FTkFCTEU7Ci0KICAgICByZXR1cm4g
MDsKIH0KIApAQCAtMTMwMyw3ICsxMjk3LDcgQEAgc3RhdGljIFhlblBUUmVn
SW5mbyB4ZW5fcHRfZW11X3JlZ19tc2lbXQogICAgICAgICAuc2l6ZSAgICAg
ICA9IDIsCiAgICAgICAgIC5pbml0X3ZhbCAgID0gMHgwMDAwLAogICAgICAg
ICAucm9fbWFzayAgICA9IDB4RkY4RSwKLSAgICAgICAgLmVtdV9tYXNrICAg
PSAweDAxN0YsCisgICAgICAgIC5lbXVfbWFzayAgID0gMHgwMTdFLAogICAg
ICAgICAuaW5pdCAgICAgICA9IHhlbl9wdF9tc2djdHJsX3JlZ19pbml0LAog
ICAgICAgICAudS53LnJlYWQgICA9IHhlbl9wdF93b3JkX3JlZ19yZWFkLAog
ICAgICAgICAudS53LndyaXRlICA9IHhlbl9wdF9tc2djdHJsX3JlZ193cml0
ZSwK

--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-5.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-5.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiBtYXJrIGFsbCBQQ0llIGNhcGFiaWxpdHkgYml0cyByZWFkLW9u
bHkKCnhlbl9wdF9lbXVfcmVnX3BjaWVbXSdzIFBDSV9FWFBfREVWQ0FQIG5l
ZWRzIHRvIGNvdmVyIGFsbCBiaXRzIGFzIHJlYWQtCm9ubHkgdG8gYXZvaWQg
dW5pbnRlbmRlZCB3cml0ZS1iYWNrIChqdXN0IGEgcHJlY2F1dGlvbiwgdGhl
IGZpZWxkIG91Z2h0CnRvIGJlIHJlYWQtb25seSBpbiBoYXJkd2FyZSkuCgpU
aGlzIGlzIGEgcHJlcGFyYXRvcnkgcGF0Y2ggZm9yIFhTQS0xMzEuCgpTaWdu
ZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+ClJl
dmlld2VkLWJ5OiBTdGVmYW5vIFN0YWJlbGxpbmkgPHN0ZWZhbm8uc3RhYmVs
bGluaUBldS5jaXRyaXguY29tPgoKLS0tIGEvaHcveGVuL3hlbl9wdF9jb25m
aWdfaW5pdC5jCisrKyBiL2h3L3hlbi94ZW5fcHRfY29uZmlnX2luaXQuYwpA
QCAtODczLDcgKzg3Myw3IEBAIHN0YXRpYyBYZW5QVFJlZ0luZm8geGVuX3B0
X2VtdV9yZWdfcGNpZVsKICAgICAgICAgLm9mZnNldCAgICAgPSBQQ0lfRVhQ
X0RFVkNBUCwKICAgICAgICAgLnNpemUgICAgICAgPSA0LAogICAgICAgICAu
aW5pdF92YWwgICA9IDB4MDAwMDAwMDAsCi0gICAgICAgIC5yb19tYXNrICAg
ID0gMHgxRkZDRkZGRiwKKyAgICAgICAgLnJvX21hc2sgICAgPSAweEZGRkZG
RkZGLAogICAgICAgICAuZW11X21hc2sgICA9IDB4MTAwMDAwMDAsCiAgICAg
ICAgIC5pbml0ICAgICAgID0geGVuX3B0X2NvbW1vbl9yZWdfaW5pdCwKICAg
ICAgICAgLnUuZHcucmVhZCAgPSB4ZW5fcHRfbG9uZ19yZWdfcmVhZCwK

--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-6.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-7.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-7.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiBhZGQgYSBmZXcgUENJIGNvbmZpZyBzcGFjZSBmaWVsZCBkZXNj
cmlwdGlvbnMKClNpbmNlIHRoZSBuZXh0IHBhdGNoIHdpbGwgdHVybiBhbGwg
bm90IGV4cGxpY2l0bHkgZGVzY3JpYmVkIGZpZWxkcwpyZWFkLW9ubHkgYnkg
ZGVmYXVsdCwgdGhvc2UgZmllbGRzIHRoYXQgaGF2ZSBndWVzdCB3cml0YWJs
ZSBiaXRzIG5lZWQKdG8gYmUgZ2l2ZW4gZXhwbGljaXQgZGVzY3JpcHRvcnMu
CgpUaGlzIGlzIGEgcHJlcGFyYXRvcnkgcGF0Y2ggZm9yIFhTQS0xMzEuCgpT
aWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+
Ci0tLQpOb3RlczoKLSBibGluZGx5IGFsbG93aW5nIGFsbCBWUEQgcmVhZHMg
bWF5IHN0aWxsIGJlIGEgcHJvYmxlbSAob3V0IG9mIGJvdW5kcwogIGFkZHJl
c3NlcyBhcmVuJ3QgYWxsb3dlZCwgYnV0IHRoZSBzcGVjIGRvZXNuJ3Qgc2F5
IHdoYXQgdGhlIGVmZmVjdAogIHdvdWxkIGJlKSA9PT4gYWxzbyBhbiBpc3N1
ZSBpbiBwY2liYWNrPwotIFZlbmRvciBTcGVjaWZpYyBjYXAgcmVncyBhcmVu
J3QgaW4gdGhlIHRhYmxlICh3aWxsIGJlY29tZSByL28gYnkKICBkZWZhdWx0
IHdpdGggdGhpcyBjaGFuZ2UpCi0gbWFueSBQQ0llIGNhcCByZWdzIGFyZW4n
dCBpbiB0aGUgdGFibGUgKHdpbGwgYWdhaW4gYmVjb21lIHIvbykKLSBzYW1l
IGZvciBQTSBjYXAgcmVncyBhdCBvZmZzZXRzIDYgYW5kIDcKCi0tLSBhL2h3
L3hlbi94ZW5fcHRfY29uZmlnX2luaXQuYworKysgYi9ody94ZW4veGVuX3B0
X2NvbmZpZ19pbml0LmMKQEAgLTc1Niw2ICs3NTYsMTUgQEAgc3RhdGljIFhl
blBUUmVnSW5mbyB4ZW5fcHRfZW11X3JlZ192cGRbXQogICAgICAgICAudS5i
LndyaXRlICA9IHhlbl9wdF9ieXRlX3JlZ193cml0ZSwKICAgICB9LAogICAg
IHsKKyAgICAgICAgLm9mZnNldCAgICAgPSBQQ0lfVlBEX0FERFIsCisgICAg
ICAgIC5zaXplICAgICAgID0gMiwKKyAgICAgICAgLnJvX21hc2sgICAgPSAw
eDAwMDMsCisgICAgICAgIC5lbXVfbWFzayAgID0gMHgwMDAzLAorICAgICAg
ICAuaW5pdCAgICAgICA9IHhlbl9wdF9jb21tb25fcmVnX2luaXQsCisgICAg
ICAgIC51LncucmVhZCAgID0geGVuX3B0X3dvcmRfcmVnX3JlYWQsCisgICAg
ICAgIC51Lncud3JpdGUgID0geGVuX3B0X3dvcmRfcmVnX3dyaXRlLAorICAg
IH0sCisgICAgewogICAgICAgICAuc2l6ZSA9IDAsCiAgICAgfSwKIH07CkBA
IC04OTEsNiArOTAwLDE2IEBAIHN0YXRpYyBYZW5QVFJlZ0luZm8geGVuX3B0
X2VtdV9yZWdfcGNpZVsKICAgICAgICAgLnUudy5yZWFkICAgPSB4ZW5fcHRf
d29yZF9yZWdfcmVhZCwKICAgICAgICAgLnUudy53cml0ZSAgPSB4ZW5fcHRf
d29yZF9yZWdfd3JpdGUsCiAgICAgfSwKKyAgICAvKiBEZXZpY2UgU3RhdHVz
IHJlZyAqLworICAgIHsKKyAgICAgICAgLm9mZnNldCAgICAgPSBQQ0lfRVhQ
X0RFVlNUQSwKKyAgICAgICAgLnNpemUgICAgICAgPSAyLAorICAgICAgICAu
cmVzX21hc2sgICA9IDB4RkZDMCwKKyAgICAgICAgLnJvX21hc2sgICAgPSAw
eDAwMzAsCisgICAgICAgIC5pbml0ICAgICAgID0geGVuX3B0X2NvbW1vbl9y
ZWdfaW5pdCwKKyAgICAgICAgLnUudy5yZWFkICAgPSB4ZW5fcHRfd29yZF9y
ZWdfcmVhZCwKKyAgICAgICAgLnUudy53cml0ZSAgPSB4ZW5fcHRfd29yZF9y
ZWdfd3JpdGUsCisgICAgfSwKICAgICAvKiBMaW5rIENvbnRyb2wgcmVnICov
CiAgICAgewogICAgICAgICAub2Zmc2V0ICAgICA9IFBDSV9FWFBfTE5LQ1RM
LApAQCAtOTAyLDYgKzkyMSwxNSBAQCBzdGF0aWMgWGVuUFRSZWdJbmZvIHhl
bl9wdF9lbXVfcmVnX3BjaWVbCiAgICAgICAgIC51LncucmVhZCAgID0geGVu
X3B0X3dvcmRfcmVnX3JlYWQsCiAgICAgICAgIC51Lncud3JpdGUgID0geGVu
X3B0X3dvcmRfcmVnX3dyaXRlLAogICAgIH0sCisgICAgLyogTGluayBTdGF0
dXMgcmVnICovCisgICAgeworICAgICAgICAub2Zmc2V0ICAgICA9IFBDSV9F
WFBfTE5LU1RBLAorICAgICAgICAuc2l6ZSAgICAgICA9IDIsCisgICAgICAg
IC5yb19tYXNrICAgID0gMHgzRkZGLAorICAgICAgICAuaW5pdCAgICAgICA9
IHhlbl9wdF9jb21tb25fcmVnX2luaXQsCisgICAgICAgIC51LncucmVhZCAg
ID0geGVuX3B0X3dvcmRfcmVnX3JlYWQsCisgICAgICAgIC51Lncud3JpdGUg
ID0geGVuX3B0X3dvcmRfcmVnX3dyaXRlLAorICAgIH0sCiAgICAgLyogRGV2
aWNlIENvbnRyb2wgMiByZWcgKi8KICAgICB7CiAgICAgICAgIC5vZmZzZXQg
ICAgID0gMHgyOCwK

--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-8.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-8.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiB1bmtub3duIFBDSSBjb25maWcgc3BhY2UgZmllbGRzIHNob3Vs
ZCBiZSByZWFkLW9ubHkKCi4uLiBieSBkZWZhdWx0LiBBZGQgYSBwZXItZGV2
aWNlICJwZXJtaXNzaXZlIiBtb2RlIHNpbWlsYXIgdG8gcGNpYmFjaydzCnRv
IGFsbG93IHJlc3RvcmluZyBwcmV2aW91cyBiZWhhdmlvciAoYW5kIGhlbmNl
IGJyZWFrIHNlY3VyaXR5IGFnYWluLAppLmUuIHNob3VsZCBiZSB1c2VkIG9u
bHkgZm9yIHRydXN0ZWQgZ3Vlc3RzKS4KClRoaXMgaXMgcGFydCBvZiBYU0Et
MTMxLgoKU2lnbmVkLW9mZi1ieTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1
c2UuY29tPgpBY2tlZC1ieTogU3RlZmFubyBTdGFiZWxsaW5pIDxzdGVmYW5v
LnN0YWJlbGxpbmlAZXUuY2l0cml4LmNvbT4KUmV2aWV3ZWQtYnk6IEFudGhv
bnkgUEVSQVJEIDxhbnRob255LnBlcmFyZEBjaXRyaXguY29tPikKLS0tCk5v
dGVzOgotIFdoYXQgcHVycG9zZSBkb2VzIHhlbl9wdF9oZWFkZXJfdHlwZV9y
ZWdfaW5pdCgpIHNlcnZlICh3aXRoIC5lbXVfbWFzawogIGJlaW5nIHplcm8p
PwotIEluIHRoZSBxZW11LXRyYWQgY2FzZSBubyBlcXVpdmFsZW50IGxvZ2lj
IHRvIHRoYXQgc2V0dGluZy91c2luZwogIGRpcmVjdF9wY2lfe21zaV90cmFu
c2xhdGUscG93ZXJfbWdtdH0gaXMgYmVpbmcgYWRkZWQsIGFzIHRoYXQgbG9n
aWMKICBzZWVtcyBicm9rZW4gKHNldHRpbmcgZ2xvYmFscyBmcm9tIGRldmlj
ZSAwIHhlbnN0b3JlIHNldHRpbmdzKS4KCi0tLSBhL2h3L3hlbi94ZW5fcHQu
YworKysgYi9ody94ZW4veGVuX3B0LmMKQEAgLTIzOSw2ICsyMzksNyBAQCBz
dGF0aWMgdm9pZCB4ZW5fcHRfcGNpX3dyaXRlX2NvbmZpZyhQQ0lECiAgICAg
WGVuUFRSZWcgKnJlZ19lbnRyeSA9IE5VTEw7CiAgICAgdWludDMyX3QgZmlu
ZF9hZGRyID0gYWRkcjsKICAgICBYZW5QVFJlZ0luZm8gKnJlZyA9IE5VTEw7
CisgICAgYm9vbCB3cF9mbGFnID0gZmFsc2U7CiAKICAgICBpZiAoeGVuX3B0
X3BjaV9jb25maWdfYWNjZXNzX2NoZWNrKGQsIGFkZHIsIGxlbikpIHsKICAg
ICAgICAgcmV0dXJuOwpAQCAtMjgwLDYgKzI4MSwxMCBAQCBzdGF0aWMgdm9p
ZCB4ZW5fcHRfcGNpX3dyaXRlX2NvbmZpZyhQQ0lECiAKICAgICAvKiBwYXNz
IGRpcmVjdGx5IHRvIHRoZSByZWFsIGRldmljZSBmb3IgcGFzc3Rocm91Z2gg
dHlwZSByZWdpc3RlciBncm91cCAqLwogICAgIGlmIChyZWdfZ3JwX2VudHJ5
ID09IE5VTEwpIHsKKyAgICAgICAgaWYgKCFzLT5wZXJtaXNzaXZlKSB7Cisg
ICAgICAgICAgICB3Yl9tYXNrID0gMDsKKyAgICAgICAgICAgIHdwX2ZsYWcg
PSB0cnVlOworICAgICAgICB9CiAgICAgICAgIGdvdG8gb3V0OwogICAgIH0K
IApAQCAtMzAwLDEyICszMDUsMTUgQEAgc3RhdGljIHZvaWQgeGVuX3B0X3Bj
aV93cml0ZV9jb25maWcoUENJRAogICAgICAgICAgICAgdWludDMyX3QgcmVh
bF9vZmZzZXQgPSByZWdfZ3JwX2VudHJ5LT5iYXNlX29mZnNldCArIHJlZy0+
b2Zmc2V0OwogICAgICAgICAgICAgdWludDMyX3QgdmFsaWRfbWFzayA9IDB4
RkZGRkZGRkYgPj4gKCg0IC0gZW11bF9sZW4pIDw8IDMpOwogICAgICAgICAg
ICAgdWludDhfdCAqcHRyX3ZhbCA9IE5VTEw7CisgICAgICAgICAgICB1aW50
MzJfdCB3cF9tYXNrID0gcmVnLT5lbXVfbWFzayB8IHJlZy0+cm9fbWFzazsK
IAogICAgICAgICAgICAgdmFsaWRfbWFzayA8PD0gKGZpbmRfYWRkciAtIHJl
YWxfb2Zmc2V0KSA8PCAzOwogICAgICAgICAgICAgcHRyX3ZhbCA9ICh1aW50
OF90ICopJnZhbCArIChyZWFsX29mZnNldCAmIDMpOwotICAgICAgICAgICAg
aWYgKHJlZy0+ZW11X21hc2sgPT0gKDB4RkZGRkZGRkYgPj4gKCg0IC0gcmVn
LT5zaXplKSA8PCAzKSkpIHsKLSAgICAgICAgICAgICAgICB3Yl9tYXNrICY9
IH4oKHJlZy0+ZW11X21hc2sKLSAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgID4+ICgoZmluZF9hZGRyIC0gcmVhbF9vZmZzZXQpIDw8IDMpKQorICAg
ICAgICAgICAgaWYgKCFzLT5wZXJtaXNzaXZlKSB7CisgICAgICAgICAgICAg
ICAgd3BfbWFzayB8PSByZWctPnJlc19tYXNrOworICAgICAgICAgICAgfQor
ICAgICAgICAgICAgaWYgKHdwX21hc2sgPT0gKDB4RkZGRkZGRkYgPj4gKCg0
IC0gcmVnLT5zaXplKSA8PCAzKSkpIHsKKyAgICAgICAgICAgICAgICB3Yl9t
YXNrICY9IH4oKHdwX21hc2sgPj4gKChmaW5kX2FkZHIgLSByZWFsX29mZnNl
dCkgPDwgMykpCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIDw8ICgo
bGVuIC0gZW11bF9sZW4pIDw8IDMpKTsKICAgICAgICAgICAgIH0KIApAQCAt
MzQ5LDYgKzM1NywxNiBAQCBzdGF0aWMgdm9pZCB4ZW5fcHRfcGNpX3dyaXRl
X2NvbmZpZyhQQ0lECiAgICAgICAgIH0gZWxzZSB7CiAgICAgICAgICAgICAv
KiBub3RoaW5nIHRvIGRvIHdpdGggcGFzc3Rocm91Z2ggdHlwZSByZWdpc3Rl
ciwKICAgICAgICAgICAgICAqIGNvbnRpbnVlIHRvIGZpbmQgbmV4dCBieXRl
ICovCisgICAgICAgICAgICBpZiAoIXMtPnBlcm1pc3NpdmUpIHsKKyAgICAg
ICAgICAgICAgICB3Yl9tYXNrICY9IH4oMHhmZiA8PCAoKGxlbiAtIGVtdWxf
bGVuKSA8PCAzKSk7CisgICAgICAgICAgICAgICAgLyogVW51c2VkIEJBUnMg
d2lsbCBtYWtlIGl0IGhlcmUsIGJ1dCB3ZSBkb24ndCB3YW50IHRvIGlzc3Vl
CisgICAgICAgICAgICAgICAgICogd2FybmluZ3MgZm9yIHdyaXRlcyB0byB0
aGVtIChib2d1cyB3cml0ZXMgZ2V0IGRlYWx0IHdpdGgKKyAgICAgICAgICAg
ICAgICAgKiBhYm92ZSkuCisgICAgICAgICAgICAgICAgICovCisgICAgICAg
ICAgICAgICAgaWYgKGluZGV4IDwgMCkgeworICAgICAgICAgICAgICAgICAg
ICB3cF9mbGFnID0gdHJ1ZTsKKyAgICAgICAgICAgICAgICB9CisgICAgICAg
ICAgICB9CiAgICAgICAgICAgICBlbXVsX2xlbi0tOwogICAgICAgICAgICAg
ZmluZF9hZGRyKys7CiAgICAgICAgIH0KQEAgLTM2MCw2ICszNzgsMTMgQEAg
c3RhdGljIHZvaWQgeGVuX3B0X3BjaV93cml0ZV9jb25maWcoUENJRAogICAg
IG1lbW9yeV9yZWdpb25fdHJhbnNhY3Rpb25fY29tbWl0KCk7CiAKIG91dDoK
KyAgICBpZiAod3BfZmxhZyAmJiAhcy0+cGVybWlzc2l2ZV93YXJuZWQpIHsK
KyAgICAgICAgcy0+cGVybWlzc2l2ZV93YXJuZWQgPSB0cnVlOworICAgICAg
ICB4ZW5fcHRfbG9nKGQsICJXcml0ZS1iYWNrIHRvIHVua25vd24gZmllbGQg
MHglMDJ4IChwYXJ0aWFsbHkpIGluaGliaXRlZCAoMHglMCp4KVxuIiwKKyAg
ICAgICAgICAgICAgICAgICBhZGRyLCBsZW4gKiAyLCB3Yl9tYXNrKTsKKyAg
ICAgICAgeGVuX3B0X2xvZyhkLCAiSWYgdGhlIGRldmljZSBkb2Vzbid0IHdv
cmssIHRyeSBlbmFibGluZyBwZXJtaXNzaXZlIG1vZGVcbiIpOworICAgICAg
ICB4ZW5fcHRfbG9nKGQsICIodW5zYWZlKSBhbmQgaWYgaXQgaGVscHMgcmVw
b3J0IHRoZSBwcm9ibGVtIHRvIHhlbi1kZXZlbFxuIik7CisgICAgfQogICAg
IGZvciAoaW5kZXggPSAwOyB3Yl9tYXNrOyBpbmRleCArPSBsZW4pIHsKICAg
ICAgICAgLyogdW5rbm93biByZWdzIGFyZSBwYXNzZWQgdGhyb3VnaCAqLwog
ICAgICAgICB3aGlsZSAoISh3Yl9tYXNrICYgMHhmZikpIHsKQEAgLTgyMSw2
ICs4NDYsNyBAQCBzdGF0aWMgdm9pZCB4ZW5fcHRfdW5yZWdpc3Rlcl9kZXZp
Y2UoUENJCiAKIHN0YXRpYyBQcm9wZXJ0eSB4ZW5fcGNpX3Bhc3N0aHJvdWdo
X3Byb3BlcnRpZXNbXSA9IHsKICAgICBERUZJTkVfUFJPUF9QQ0lfSE9TVF9E
RVZBRERSKCJob3N0YWRkciIsIFhlblBDSVBhc3N0aHJvdWdoU3RhdGUsIGhv
c3RhZGRyKSwKKyAgICBERUZJTkVfUFJPUF9CT09MKCJwZXJtaXNzaXZlIiwg
WGVuUENJUGFzc3Rocm91Z2hTdGF0ZSwgcGVybWlzc2l2ZSwgZmFsc2UpLAog
ICAgIERFRklORV9QUk9QX0VORF9PRl9MSVNUKCksCiB9OwogCi0tLSBhL2h3
L3hlbi94ZW5fcHQuaAorKysgYi9ody94ZW4veGVuX3B0LmgKQEAgLTE5Nyw2
ICsxOTcsOCBAQCBzdHJ1Y3QgWGVuUENJUGFzc3Rocm91Z2hTdGF0ZSB7CiAK
ICAgICBQQ0lIb3N0RGV2aWNlQWRkcmVzcyBob3N0YWRkcjsKICAgICBib29s
IGlzX3ZpcnRmbjsKKyAgICBib29sIHBlcm1pc3NpdmU7CisgICAgYm9vbCBw
ZXJtaXNzaXZlX3dhcm5lZDsKICAgICBYZW5Ib3N0UENJRGV2aWNlIHJlYWxf
ZGV2aWNlOwogICAgIFhlblBUUmVnaW9uIGJhc2VzW1BDSV9OVU1fUkVHSU9O
U107IC8qIEFjY2VzcyByZWdpb25zICovCiAgICAgUUxJU1RfSEVBRCgsIFhl
blBUUmVnR3JvdXApIHJlZ19ncnBzOwotLS0gYS9ody94ZW4veGVuX3B0X2Nv
bmZpZ19pbml0LmMKKysrIGIvaHcveGVuL3hlbl9wdF9jb25maWdfaW5pdC5j
CkBAIC0xMDEsNiArMTAxLDEwIEBAIHN0YXRpYyB1aW50MzJfdCBnZXRfdGhy
b3VnaGFibGVfbWFzayhjb24KIHsKICAgICB1aW50MzJfdCB0aHJvdWdoYWJs
ZV9tYXNrID0gfihyZWctPmVtdV9tYXNrIHwgcmVnLT5yb19tYXNrKTsKIAor
ICAgIGlmICghcy0+cGVybWlzc2l2ZSkgeworICAgICAgICB0aHJvdWdoYWJs
ZV9tYXNrICY9IH5yZWctPnJlc19tYXNrOworICAgIH0KKwogICAgIHJldHVy
biB0aHJvdWdoYWJsZV9tYXNrICYgdmFsaWRfbWFzazsKIH0KIAo=

--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoK-0005R4-Ue; Tue, 02 Jun 2015 14:04:56 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoH-0005QG-CW; Tue, 02 Jun 2015 14:04:54 +0000
Received: from [193.109.254.147] by server-16.bemta-14.messagelabs.com id
	87/68-31650-408BD655; Tue, 02 Jun 2015 14:04:52 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-15.tower-27.messagelabs.com!1433253890!19655171!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13278 invoked from network); 2 Jun 2015 14:04:51 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-15.tower-27.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:04:51 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo8-0006Si-LW; Tue, 02 Jun 2015 14:04:44 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo8-0001oT-IC; Tue, 02 Jun 2015 14:04:44 +0000
Date: Tue, 02 Jun 2015 14:04:44 +0000
Message-Id: <E1Yzmo8-0001oT-IC@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 129 (CVE-2015-4104) - PCI MSI
 mask bits inadvertently exposed to guests
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4104 / XSA-129
                              version 2

            PCI MSI mask bits inadvertently exposed to guests

UPDATES IN VERSION 2
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

The mask bits optionally available in the PCI MSI capability structure
are used by the hypervisor to occasionally suppress interrupt
delivery.  Unprivileged guests were, however, nevertheless allowed
direct control of these bits.

IMPACT
======

Interrupts may be observed by Xen at unexpected times, which may lead
to a host crash and therefore a Denial of Service.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

Furthermore, the vulnerability is only applicable when the
passed-through PCI devices are MSI-capable.  (Most modern devices
are.)

MITIGATION
==========

This issue can be avoided by not assigning MSI capable PCI devices to
untrusted HVM guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa129-qemuu.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa129-qemuu-4.3.patch       Xen 4.3.x
xsa129-qemut.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa129*.patch
3c6b5a085eec3a528b18207ca65222300911fd25501a9ffaffa76a5d85d23992  xsa129-qemut.patch
314808fbaa97d06bc4bb6cb6644dca1ae2da55534661c662c6e442d5b91e6061  xsa129-qemuu-4.3.patch
9f0658e197c539306118723d63b468d09fe3a1d9f9364f6d06e53b7be8268bdc  xsa129-qemuu.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of patches or migitations is NOT permitted (except on
systems used and administered only by organisations which are members
of the Xen Project Security Issues Predisclosure List).  Specifically,
deployent on public cloud systems is NOT permitted.

This is because the altered PCI config space access behavior is visible
to guests.

Deployment is permitted only AFTER the embargo ends.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdRAAoJEIP+FMlX6CvZe+4H/RcQcEsggqHg5eK/9yowQV1c
erLWwpP18+v1pSRKqC+In/snL4g6H1DiC7ezwEbyQzOA8GGgiikTHqyTyFATvEHN
hCwMgYW4ZYcR/euqJ7kgi7q368+39sM6ZzEnKCwr4GUeWLtBh+6ABeih5XlfjyfS
0HWuw+NBkT7IcIR/KaQwa17or3fZ2cZKq1NU4EksFjuD+ucMS7a4sPs1SztoSbXc
Qf5TZn0XsDWoAodX/EmI4xRubpKL6Ae6noOCkBDelssvwzIhR1rZfFL8qALy+axf
vb4le4Woy7USkWssOURSvkY8iMio25qvwGFxORzI9x4ImMU+XC+r6QSCLER202Q=
=VQRQ
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa129-qemut.patch"
Content-Disposition: attachment; filename="xsa129-qemut.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa129-qemuu-4.3.patch"
Content-Disposition: attachment; filename="xsa129-qemuu-4.3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa129-qemuu.patch"
Content-Disposition: attachment; filename="xsa129-qemuu.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoM-0005SP-UL; Tue, 02 Jun 2015 14:04:58 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoK-0005Qq-LD; Tue, 02 Jun 2015 14:04:56 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	84/78-03895-708BD655; Tue, 02 Jun 2015 14:04:55 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-6.tower-31.messagelabs.com!1433253893!7968773!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 18766 invoked from network); 2 Jun 2015 14:04:54 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-6.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:04:54 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoC-0006Sy-MY; Tue, 02 Jun 2015 14:04:48 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoC-0001pV-KC; Tue, 02 Jun 2015 14:04:48 +0000
Date: Tue, 02 Jun 2015 14:04:48 +0000
Message-Id: <E1YzmoC-0001pV-KC@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 130 (CVE-2015-4105) - Guest
 triggerable qemu MSI-X pass-through error messages
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4105 / XSA-130
                              version 2

         Guest triggerable qemu MSI-X pass-through error messages

UPDATES IN VERSION 2
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

Device model code dealing with guest PCI MSI-X interrupt management
activities logs messages on certain (supposedly) invalid guest
operations.

IMPACT
======

A buggy or malicious guest repeatedly invoking such operations may
result in the host disk to fill up, possibly leading to a Denial of
Service.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

Furthermore, the vulnerability is only applicable when the
passed-through PCI devices are MSI-X capable.  (Many modern devices
are.)

MITIGATION
==========

This issue can be avoided by not assigning MSI-X capable PCI devices to
untrusted HVM guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa130-qemuu.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa130-qemuu-4.3.patch       Xen 4.3.x
xsa130-qemut.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa130*.patch
0ed6d75b6758c43a3042994f5127cb69d03796acf5c4d305d7ec2486500753da  xsa130-qemut.patch
fd6e835e945c2eee197f9e18501aeefb6e1d33a714f6ce66c16481d5aca8fcd0  xsa130-qemuu-4.3.patch
87fb70041d1fe9c997461c4a6fdaf9157667ec2eff7c77b8db6ee8f9d730753d  xsa130-qemuu.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdWAAoJEIP+FMlX6CvZhyIH/3VkV4yhOpHsYzHEdkcikqTP
w3KzOsPqtZs2++XWN48Ewpt1Dy12vLkq65hljfvHj9AIWmB0qgWXNC51lkkIFffT
KgcNuUbuJkyy+hNk7K/OWblXbehTrSIAWkl13xKymIQYiS+UN8TYp9kM7QIFkYh2
GGJlCzTljnxeKFZY0z7uW6OKnZzBkdcGmRS5tyH+cqikfAEDSGaV7ffSC0mukd0/
LrTodM+0+8C40znDAyjUiz91YfGXyXtTTEKvmPzdhiv9Fsp3FZ6kMkSGPhcAUUUh
WJmP23QXwm1Tt0qZn9wp1w1DmgihkDoS9Jdw/as29qSCNE2UrfsXaPghGkujQTU=
=KrtH
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa130-qemut.patch"
Content-Disposition: attachment; filename="xsa130-qemut.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa130-qemuu-4.3.patch"
Content-Disposition: attachment; filename="xsa130-qemuu-4.3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa130-qemuu.patch"
Content-Disposition: attachment; filename="xsa130-qemuu.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoI-0005QY-4O; Tue, 02 Jun 2015 14:04:54 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoF-0005Px-LX; Tue, 02 Jun 2015 14:04:51 +0000
Received: from [85.158.139.211] by server-8.bemta-5.messagelabs.com id
	06/6C-29702-208BD655; Tue, 02 Jun 2015 14:04:50 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-8.tower-206.messagelabs.com!1433253887!11229616!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1381 invoked from network); 2 Jun 2015 14:04:48 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-8.tower-206.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:04:48 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo4-0006SW-PC; Tue, 02 Jun 2015 14:04:40 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo4-0001nH-5B; Tue, 02 Jun 2015 14:04:40 +0000
Date: Tue, 02 Jun 2015 14:04:40 +0000
Message-Id: <E1Yzmo4-0001nH-5B@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 128 (CVE-2015-4103) - Potential
 unintended writes to host MSI message data field via qemu
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4103 / XSA-128
                              version 2

    Potential unintended writes to host MSI message data field via qemu

UPDATES IN VERSION 2
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

Logic is in place to avoid writes to certain host config space fields
when the guest must nevertheless be able to access their virtual
counterparts.  A bug in how this logic deals with accesses spanning
multiple fields allows the guest to write to the host MSI message data
field.

While generally the writes write back the values previously read,
their value in config space may have got changed by the host between
the qemu read and write.  In such a case host side interrupt handling
could become confused, possibly losing interrupts or allowing spurious
interrupt injection into other guests.

IMPACT
======

Certain untrusted guest administrators may be able to confuse host
side interrupt handling, leading to a Denial of Service.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

Furthermore, the vulnerability is only applicable when the
passed-through PCI devices are MSI-capable.  (Most modern devices
are.)

MITIGATION
==========

This issue can be avoided by not assigning MSI capable PCI devices to
untrusted HVM guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa128-qemuu.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa128-qemuu-4.3.patch       Xen 4.3.x
xsa128-qemut.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa128*.patch
68b85a4c7d531d343d7fac2e92dbec3677bc2e4a83de75d78d7f605a2fc8ad3f  xsa128-qemut.patch
2ec657a6f22cac922854548c9d83698656ab7a36634ad05de7f14439cc4405bc  xsa128-qemuu-4.3.patch
104cf2e2816d253cc1eca3084f6ea9b6007f7773a88bda245bab00539e08b359  xsa128-qemuu.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdOAAoJEIP+FMlX6CvZEPUIAIti0HdxCX4JNy5MKqNFxHRB
KtGibssSaoGcPmkhLDqtOQ+8BwTUe/owezKlX799Jf0Jqn1bVXejCLyh0e6cyauq
pPoyQd+zblIpTFw3ByqVzicLajmVfY5v8yGGBAnSpuvfVEd3K5qWZCvFx+rEJ4AB
JI8jQdMAn2oFGtLbYDysRUpSjg/OtqIC6o3a4yfVnPDcduPq9XFpnxcdHHVfrklS
SeY1MGLbJtrNzya+zX1GZxFh5kuZnF/qSY3o60LF+2ZpK9nyH8toX1flvW9lXa86
9r1zxgy6qE1iWOHo4E1HjlK3lUUqW0XgkB/3zj+2LtX1uTwOhPtATn5/Neje0GY=
=4I3/
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa128-qemut.patch"
Content-Disposition: attachment; filename="xsa128-qemut.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa128-qemuu-4.3.patch"
Content-Disposition: attachment; filename="xsa128-qemuu-4.3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa128-qemuu.patch"
Content-Disposition: attachment; filename="xsa128-qemuu.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoT-0005Uy-DJ; Tue, 02 Jun 2015 14:05:05 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoR-0005Tp-9A; Tue, 02 Jun 2015 14:05:03 +0000
Received: from [193.109.254.147] by server-4.bemta-14.messagelabs.com id
	A7/F3-27764-E08BD655; Tue, 02 Jun 2015 14:05:02 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-5.tower-27.messagelabs.com!1433253899!15017316!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4184 invoked from network); 2 Jun 2015 14:05:00 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-5.tower-27.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:05:00 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoG-0006TF-1x; Tue, 02 Jun 2015 14:04:52 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoF-0001rG-Vs; Tue, 02 Jun 2015 14:04:52 +0000
Date: Tue, 02 Jun 2015 14:04:51 +0000
Message-Id: <E1YzmoF-0001rG-Vs@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 131 (CVE-2015-4106) - Unmediated
 PCI register access in qemu
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4106 / XSA-131
                              version 3

                Unmediated PCI register access in qemu

UPDATES IN VERSION 3
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

Qemu allows guests to not only read, but also write all parts of the
PCI config space (but not extended config space) of passed through PCI
devices not explicitly dealt with for (partial) emulation purposes.

IMPACT
======

Since the effect depends on the specific purpose of the the config
space field, it's not possbile to give a general statement about the
exact impact on the host or other guests.  Privilege escalation, host
crash (Denial of Service), and leaked information all cannot be
excluded.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

MITIGATION
==========

This issue can be avoided by not assigning PCI devices to untrusted HVM
guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa131-qemuu-$n.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa131-qemuu-4.4-1.patch        Xen 4.4.x replacement for xsa131-qemuu-1.patch
xsa131-qemuu-4.3-$n.patch       Xen 4.3.x
xsa131-qemut-$n.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x
xsa131-qemut-4.2-1.patch        Xen 4.2.x replacement for xsa131-qemut-1.patch

$ sha256sum xsa131*.patch
2ff4aa092247ff0911d837adc5f4de1ffa8ed32a39eaea9b0bfc4a40b7921b06  xsa131-qemut-1.patch
dafa524374d890e517d4e2600a594064b55af645172422b9e81a64b5f4a64575  xsa131-qemut-2.patch
b37d3e22ce4410bf0db87217c60a543f0143a23ab0652f1746bd5fe17dbadd70  xsa131-qemut-3.patch
b5f0882717129142f11297a62b2ed826da94ce5ed42f6b2ea60f9101b652aed9  xsa131-qemut-4.2-1.patch
3bfc58b6288bafb4c2039265be32c6bd9e048b63a4cae279ead3ec1154af9abe  xsa131-qemut-4.patch
60c44b63d2c7bd7e12631db7fd05622d782e1a5ccd7dfa17a1671b36b5ff7bee  xsa131-qemut-5.patch
8f2a9c4333155fac670ad3a932703051ce8a47f4f6d3a067458e5ab49da7e93a  xsa131-qemut-6.patch
ed4facfa80b2ab7ecfc9b232878d3f4d54ad93214c75f4b4af71c8f07a1d04c4  xsa131-qemut-7.patch
d400d03ae792699fec9a54bbb6b08c2f5523427ef8af85b0c5ede497ba87f61c  xsa131-qemut-8.patch
7a7f294303a8bcf9a316e3e6b8a0511dac3e92dbf7e373b21c94b97835c03f2f  xsa131-qemuu-1.patch
dc72bd4993fdcea3dc98d18f314da3ac1c7e73e0b99dac325b0e59d0229f67e5  xsa131-qemuu-2.patch
61524a47fd29406ba9a2983ea9cb59e45a56d716d65d78689177d9c8e95f76e6  xsa131-qemuu-3.patch
21493c5db68115d97a6aecf1159ee05023b59545627d7f03d7fdaa238bb3bd27  xsa131-qemuu-4.3-1.patch
5828647db6f090ce6c7ea20f90331008f2a0bba18b3a3a371f2ba9054871a7cb  xsa131-qemuu-4.3-2.patch
eab05df32e8a7c729cc52affd28b109a8f75cabb8fd4027934059d303b2232fa  xsa131-qemuu-4.3-3.patch
8dc95a2a8a45d851476b938e4cab2e65d87b8dc28c721949824ce900552ba489  xsa131-qemuu-4.3-4.patch
7a358fba18ae9c0dde1134564151a97c8e6d6f5982ac74c450f81d2ed8e9d540  xsa131-qemuu-4.3-5.patch
fcb77a8d2adde1daf03f8faeb6e92788b2727f5b11563b6f770c74251b0964a4  xsa131-qemuu-4.3-6.patch
79933b2744e7b69c4eb23f3974d242e2592cb4553be115a4aec1c6e30e7564cf  xsa131-qemuu-4.3-7.patch
bb4021a36a9f36dc0082cfd42869adc737ec4afea92ac1100f0971118174b58c  xsa131-qemuu-4.3-8.patch
f70516fa38a3d2e0cf906c41e3b7dfd7cf998c9189b232dac20633c7b0d1ab8b  xsa131-qemuu-4.4-1.patch
041c82a341755bcbab18f834a0fccf9c031674d956958092cbfa5e64f05b6318  xsa131-qemuu-4.patch
91aeb9c0d3e9a251faf12840e0519a342cfb7e35af3fea429bedb452182fae47  xsa131-qemuu-5.patch
60482fe37fd405032b92de85ed5d333c210c85662b1645016dce2f0053aa6ec0  xsa131-qemuu-6.patch
05fc2e614620449e52a056ce6e5f4033970ade22fde623e3b789fc57b3e4143e  xsa131-qemuu-7.patch
358849d7c0dff29bf96f49e56d00c4d7bd4c8d0c71c122a7b3655e10f45cb53b  xsa131-qemuu-8.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of patches or migitations is NOT permitted (except on
systems used and administered only by organisations which are members
of the Xen Project Security Issues Predisclosure List).  Specifically,
deployent on public cloud systems is NOT permitted.

This is because the altered PCI config space access behavior is visible
to guests.

Deployment is permitted only AFTER the embargo ends.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdZAAoJEIP+FMlX6CvZ1yEIAKWoq6O8Nk8zewvKojXnmt0J
irQ4p9uXBDN682d9Vloq+y86PSt5NLs83ZfAHWSkWPkkgyDXy4tmnte9LGMLmVI+
Z7nZs4dsH2bixFMJfqjKWE//py37TIVmI4M37xOgkNV8HTQJ0ZHWgYur5ilNJu9x
HJ1duL3//+zkelA+zUQQSNMPvc2OUCSRGW5UVDwn95xJDAgURWe2d6c6bg8yG7T6
ufwO0x1CWTRaVsbLRSCST3NEVl7bxmYR5RBxlBaUIpgzT53aK3XHoiAezjTdK1Ul
TiZ3Hb0XVtFbNEz2cCWQBEdQPKYhJjxpUBdRi9zlsiFwHa+lG+CA3i1IcqXIXQo=
=tNVc
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-1.patch"
Content-Disposition: attachment; filename="xsa131-qemut-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-2.patch"
Content-Disposition: attachment; filename="xsa131-qemut-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-3.patch"
Content-Disposition: attachment; filename="xsa131-qemut-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-4.2-1.patch"
Content-Disposition: attachment; filename="xsa131-qemut-4.2-1.patch"
Content-Transfer-Encoding: base64

eGVuL01TSTogZG9uJ3Qgb3Blbi1jb2RlIHBhc3MtdGhyb3VnaCBvZiBlbmFi
bGUgYml0IG1vZGlmaWNhdGlvbnMKCldpdGhvdXQgdGhpcyB0aGUgYWN0dWFs
IFhTQS0xMzEgZml4IHdvdWxkIGNhdXNlIHRoZSBlbmFibGUgYml0IHRvIG5v
dApnZXQgc2V0IGFueW1vcmUgKGR1ZSB0byB0aGUgd3JpdGUgYmFjayBnZXR0
aW5nIHN1cHByZXNzZWQgdGhlcmUgYmFzZWQKb24gdGhlIE9SIG9mIGVtdV9t
YXNrLCByb19tYXNrLCBhbmQgcmVzX21hc2spLgoKTm90ZSB0aGF0IHRoZSBm
aWRkbGluZyB3aXRoIHRoZSBlbmFibGUgYml0IHNob3VsZG4ndCByZWFsbHkg
YmUgZG9uZSBieQpxZW11LCBidXQgbWFraW5nIHRoaXMgd29yayByaWdodCAo
dmlhIGxpYnhjIGFuZCB0aGUgaHlwZXJ2aXNvcikgd2lsbApyZXF1aXJlIG1v
cmUgZXh0ZW5zaXZlIGNoYW5nZXMsIHdoaWNoIGNhbiBiZSBwb3N0cG9uZWQg
dW50aWwgYWZ0ZXIgdGhlCnNlY3VyaXR5IGlzc3VlIGdvdCBhZGRyZXNzZWQu
CgpUaGlzIGlzIGEgcHJlcGFyYXRvcnkgcGF0Y2ggZm9yIFhTQS0xMzEuCgpT
aWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+
CkFja2VkLWJ5OiBTdGVmYW5vIFN0YWJlbGxpbmkgPHN0ZWZhbm8uc3RhYmVs
bGluaUBldS5jaXRyaXguY29tPgoKLS0tIGEvaHcvcGFzcy10aHJvdWdoLmMK
KysrIGIvaHcvcGFzcy10aHJvdWdoLmMKQEAgLTY0OCw3ICs2NDgsNyBAQCBz
dGF0aWMgc3RydWN0IHB0X3JlZ19pbmZvX3RibCBwdF9lbXVfcmVnCiAgICAg
ICAgIC5zaXplICAgICAgID0gMiwKICAgICAgICAgLmluaXRfdmFsICAgPSAw
eDAwMDAsCiAgICAgICAgIC5yb19tYXNrICAgID0gMHhGRjhFLAotICAgICAg
ICAuZW11X21hc2sgICA9IDB4MDE3RiwKKyAgICAgICAgLmVtdV9tYXNrICAg
PSAweDAxN0UsCiAgICAgICAgIC5pbml0ICAgICAgID0gcHRfbXNnY3RybF9y
ZWdfaW5pdCwKICAgICAgICAgLnUudy5yZWFkICAgPSBwdF93b3JkX3JlZ19y
ZWFkLAogICAgICAgICAudS53LndyaXRlICA9IHB0X21zZ2N0cmxfcmVnX3dy
aXRlLApAQCAtMzg5OSw2ICszODk5LDkgQEAgc3RhdGljIGludCBwdF9tc2dj
dHJsX3JlZ193cml0ZShzdHJ1Y3QgcAogCiAgICAgLyogbW9kaWZ5IGVtdWxh
dGUgcmVnaXN0ZXIgKi8KICAgICB3cml0YWJsZV9tYXNrID0gcmVnLT5lbXVf
bWFzayAmIH5yZWctPnJvX21hc2sgJiB2YWxpZF9tYXNrOworICAgIC8qIGFs
c28gZW11bGF0ZSBNU0lfRU5BQkxFIGJpdCBmb3IgTVNJLUlOVHggdHJhbnNs
YXRpb24gKi8KKyAgICBpZiAocHRkZXYtPm1zaV90cmFuc19lbikKKyAgICAg
ICAgd3JpdGFibGVfbWFzayB8PSBQQ0lfTVNJX0ZMQUdTX0VOQUJMRSAmIHZh
bGlkX21hc2s7CiAgICAgY2ZnX2VudHJ5LT5kYXRhID0gUFRfTUVSR0VfVkFM
VUUoKnZhbHVlLCBjZmdfZW50cnktPmRhdGEsIHdyaXRhYmxlX21hc2spOwog
ICAgIC8qIHVwZGF0ZSB0aGUgbXNpX2luZm8gdG9vICovCiAgICAgcHRkZXYt
Pm1zaS0+ZmxhZ3MgfD0gY2ZnX2VudHJ5LT5kYXRhICYKQEAgLTM5MDcsNiAr
MzkxMCw5IEBAIHN0YXRpYyBpbnQgcHRfbXNnY3RybF9yZWdfd3JpdGUoc3Ry
dWN0IHAKICAgICAvKiBjcmVhdGUgdmFsdWUgZm9yIHdyaXRpbmcgdG8gSS9P
IGRldmljZSByZWdpc3RlciAqLwogICAgIHZhbCA9ICp2YWx1ZTsKICAgICB0
aHJvdWdoYWJsZV9tYXNrID0gfnJlZy0+ZW11X21hc2sgJiB2YWxpZF9tYXNr
OworICAgIC8qIGRvbid0IHBhc3MgdGhyb3VnaCBNU0lfRU5BQkxFIGJpdCBm
b3IgTVNJLUlOVHggdHJhbnNsYXRpb24gKi8KKyAgICBpZiAocHRkZXYtPm1z
aV90cmFuc19lbikKKyAgICAgICAgdGhyb3VnaGFibGVfbWFzayAmPSB+UENJ
X01TSV9GTEFHU19FTkFCTEU7CiAgICAgKnZhbHVlID0gUFRfTUVSR0VfVkFM
VUUoKnZhbHVlLCBkZXZfdmFsdWUsIHRocm91Z2hhYmxlX21hc2spOwogCiAg
ICAgLyogdXBkYXRlIE1TSSAqLwpAQCAtMzk0NiwxMiArMzk1Miw2IEBAIHN0
YXRpYyBpbnQgcHRfbXNnY3RybF9yZWdfd3JpdGUoc3RydWN0IHAKICAgICBl
bHNlCiAgICAgICAgIHB0ZGV2LT5tc2ktPmZsYWdzICY9IH5QQ0lfTVNJX0ZM
QUdTX0VOQUJMRTsKIAotICAgIC8qIHBhc3MgdGhyb3VnaCBNU0lfRU5BQkxF
IGJpdCB3aGVuIG5vIE1TSS1JTlR4IHRyYW5zbGF0aW9uICovCi0gICAgaWYg
KCFwdGRldi0+bXNpX3RyYW5zX2VuKSB7Ci0gICAgICAgICp2YWx1ZSAmPSB+
UENJX01TSV9GTEFHU19FTkFCTEU7Ci0gICAgICAgICp2YWx1ZSB8PSB2YWwg
JiBQQ0lfTVNJX0ZMQUdTX0VOQUJMRTsKLSAgICB9Ci0KICAgICByZXR1cm4g
MDsKIH0KIAo=

--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-4.patch"
Content-Disposition: attachment; filename="xsa131-qemut-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-5.patch"
Content-Disposition: attachment; filename="xsa131-qemut-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-6.patch"
Content-Disposition: attachment; filename="xsa131-qemut-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-7.patch"
Content-Disposition: attachment; filename="xsa131-qemut-7.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemut-8.patch"
Content-Disposition: attachment; filename="xsa131-qemut-8.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-1.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-2.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-3.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-1.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-2.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-3.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-4.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-5.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-6.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-7.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-7.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.3-8.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.3-8.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.4-1.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.4-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-4.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-5.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-6.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-7.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-7.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa131-qemuu-8.patch"
Content-Disposition: attachment; filename="xsa131-qemuu-8.patch"
Content-Transfer-Encoding: base64

eGVuL3B0OiB1bmtub3duIFBDSSBjb25maWcgc3BhY2UgZmllbGRzIHNob3Vs
ZCBiZSByZWFkLW9ubHkKCi4uLiBieSBkZWZhdWx0LiBBZGQgYSBwZXItZGV2
aWNlICJwZXJtaXNzaXZlIiBtb2RlIHNpbWlsYXIgdG8gcGNpYmFjaydzCnRv
IGFsbG93IHJlc3RvcmluZyBwcmV2aW91cyBiZWhhdmlvciAoYW5kIGhlbmNl
IGJyZWFrIHNlY3VyaXR5IGFnYWluLAppLmUuIHNob3VsZCBiZSB1c2VkIG9u
bHkgZm9yIHRydXN0ZWQgZ3Vlc3RzKS4KClRoaXMgaXMgcGFydCBvZiBYU0Et
MTMxLgoKU2lnbmVkLW9mZi1ieTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1
c2UuY29tPgpBY2tlZC1ieTogU3RlZmFubyBTdGFiZWxsaW5pIDxzdGVmYW5v
LnN0YWJlbGxpbmlAZXUuY2l0cml4LmNvbT4KUmV2aWV3ZWQtYnk6IEFudGhv
bnkgUEVSQVJEIDxhbnRob255LnBlcmFyZEBjaXRyaXguY29tPikKLS0tCk5v
dGVzOgotIFdoYXQgcHVycG9zZSBkb2VzIHhlbl9wdF9oZWFkZXJfdHlwZV9y
ZWdfaW5pdCgpIHNlcnZlICh3aXRoIC5lbXVfbWFzawogIGJlaW5nIHplcm8p
PwotIEluIHRoZSBxZW11LXRyYWQgY2FzZSBubyBlcXVpdmFsZW50IGxvZ2lj
IHRvIHRoYXQgc2V0dGluZy91c2luZwogIGRpcmVjdF9wY2lfe21zaV90cmFu
c2xhdGUscG93ZXJfbWdtdH0gaXMgYmVpbmcgYWRkZWQsIGFzIHRoYXQgbG9n
aWMKICBzZWVtcyBicm9rZW4gKHNldHRpbmcgZ2xvYmFscyBmcm9tIGRldmlj
ZSAwIHhlbnN0b3JlIHNldHRpbmdzKS4KCi0tLSBhL2h3L3hlbi94ZW5fcHQu
YworKysgYi9ody94ZW4veGVuX3B0LmMKQEAgLTIzOSw2ICsyMzksNyBAQCBz
dGF0aWMgdm9pZCB4ZW5fcHRfcGNpX3dyaXRlX2NvbmZpZyhQQ0lECiAgICAg
WGVuUFRSZWcgKnJlZ19lbnRyeSA9IE5VTEw7CiAgICAgdWludDMyX3QgZmlu
ZF9hZGRyID0gYWRkcjsKICAgICBYZW5QVFJlZ0luZm8gKnJlZyA9IE5VTEw7
CisgICAgYm9vbCB3cF9mbGFnID0gZmFsc2U7CiAKICAgICBpZiAoeGVuX3B0
X3BjaV9jb25maWdfYWNjZXNzX2NoZWNrKGQsIGFkZHIsIGxlbikpIHsKICAg
ICAgICAgcmV0dXJuOwpAQCAtMjgwLDYgKzI4MSwxMCBAQCBzdGF0aWMgdm9p
ZCB4ZW5fcHRfcGNpX3dyaXRlX2NvbmZpZyhQQ0lECiAKICAgICAvKiBwYXNz
IGRpcmVjdGx5IHRvIHRoZSByZWFsIGRldmljZSBmb3IgcGFzc3Rocm91Z2gg
dHlwZSByZWdpc3RlciBncm91cCAqLwogICAgIGlmIChyZWdfZ3JwX2VudHJ5
ID09IE5VTEwpIHsKKyAgICAgICAgaWYgKCFzLT5wZXJtaXNzaXZlKSB7Cisg
ICAgICAgICAgICB3Yl9tYXNrID0gMDsKKyAgICAgICAgICAgIHdwX2ZsYWcg
PSB0cnVlOworICAgICAgICB9CiAgICAgICAgIGdvdG8gb3V0OwogICAgIH0K
IApAQCAtMzAwLDEyICszMDUsMTUgQEAgc3RhdGljIHZvaWQgeGVuX3B0X3Bj
aV93cml0ZV9jb25maWcoUENJRAogICAgICAgICAgICAgdWludDMyX3QgcmVh
bF9vZmZzZXQgPSByZWdfZ3JwX2VudHJ5LT5iYXNlX29mZnNldCArIHJlZy0+
b2Zmc2V0OwogICAgICAgICAgICAgdWludDMyX3QgdmFsaWRfbWFzayA9IDB4
RkZGRkZGRkYgPj4gKCg0IC0gZW11bF9sZW4pIDw8IDMpOwogICAgICAgICAg
ICAgdWludDhfdCAqcHRyX3ZhbCA9IE5VTEw7CisgICAgICAgICAgICB1aW50
MzJfdCB3cF9tYXNrID0gcmVnLT5lbXVfbWFzayB8IHJlZy0+cm9fbWFzazsK
IAogICAgICAgICAgICAgdmFsaWRfbWFzayA8PD0gKGZpbmRfYWRkciAtIHJl
YWxfb2Zmc2V0KSA8PCAzOwogICAgICAgICAgICAgcHRyX3ZhbCA9ICh1aW50
OF90ICopJnZhbCArIChyZWFsX29mZnNldCAmIDMpOwotICAgICAgICAgICAg
aWYgKHJlZy0+ZW11X21hc2sgPT0gKDB4RkZGRkZGRkYgPj4gKCg0IC0gcmVn
LT5zaXplKSA8PCAzKSkpIHsKLSAgICAgICAgICAgICAgICB3Yl9tYXNrICY9
IH4oKHJlZy0+ZW11X21hc2sKLSAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgID4+ICgoZmluZF9hZGRyIC0gcmVhbF9vZmZzZXQpIDw8IDMpKQorICAg
ICAgICAgICAgaWYgKCFzLT5wZXJtaXNzaXZlKSB7CisgICAgICAgICAgICAg
ICAgd3BfbWFzayB8PSByZWctPnJlc19tYXNrOworICAgICAgICAgICAgfQor
ICAgICAgICAgICAgaWYgKHdwX21hc2sgPT0gKDB4RkZGRkZGRkYgPj4gKCg0
IC0gcmVnLT5zaXplKSA8PCAzKSkpIHsKKyAgICAgICAgICAgICAgICB3Yl9t
YXNrICY9IH4oKHdwX21hc2sgPj4gKChmaW5kX2FkZHIgLSByZWFsX29mZnNl
dCkgPDwgMykpCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIDw8ICgo
bGVuIC0gZW11bF9sZW4pIDw8IDMpKTsKICAgICAgICAgICAgIH0KIApAQCAt
MzQ5LDYgKzM1NywxNiBAQCBzdGF0aWMgdm9pZCB4ZW5fcHRfcGNpX3dyaXRl
X2NvbmZpZyhQQ0lECiAgICAgICAgIH0gZWxzZSB7CiAgICAgICAgICAgICAv
KiBub3RoaW5nIHRvIGRvIHdpdGggcGFzc3Rocm91Z2ggdHlwZSByZWdpc3Rl
ciwKICAgICAgICAgICAgICAqIGNvbnRpbnVlIHRvIGZpbmQgbmV4dCBieXRl
ICovCisgICAgICAgICAgICBpZiAoIXMtPnBlcm1pc3NpdmUpIHsKKyAgICAg
ICAgICAgICAgICB3Yl9tYXNrICY9IH4oMHhmZiA8PCAoKGxlbiAtIGVtdWxf
bGVuKSA8PCAzKSk7CisgICAgICAgICAgICAgICAgLyogVW51c2VkIEJBUnMg
d2lsbCBtYWtlIGl0IGhlcmUsIGJ1dCB3ZSBkb24ndCB3YW50IHRvIGlzc3Vl
CisgICAgICAgICAgICAgICAgICogd2FybmluZ3MgZm9yIHdyaXRlcyB0byB0
aGVtIChib2d1cyB3cml0ZXMgZ2V0IGRlYWx0IHdpdGgKKyAgICAgICAgICAg
ICAgICAgKiBhYm92ZSkuCisgICAgICAgICAgICAgICAgICovCisgICAgICAg
ICAgICAgICAgaWYgKGluZGV4IDwgMCkgeworICAgICAgICAgICAgICAgICAg
ICB3cF9mbGFnID0gdHJ1ZTsKKyAgICAgICAgICAgICAgICB9CisgICAgICAg
ICAgICB9CiAgICAgICAgICAgICBlbXVsX2xlbi0tOwogICAgICAgICAgICAg
ZmluZF9hZGRyKys7CiAgICAgICAgIH0KQEAgLTM2MCw2ICszNzgsMTMgQEAg
c3RhdGljIHZvaWQgeGVuX3B0X3BjaV93cml0ZV9jb25maWcoUENJRAogICAg
IG1lbW9yeV9yZWdpb25fdHJhbnNhY3Rpb25fY29tbWl0KCk7CiAKIG91dDoK
KyAgICBpZiAod3BfZmxhZyAmJiAhcy0+cGVybWlzc2l2ZV93YXJuZWQpIHsK
KyAgICAgICAgcy0+cGVybWlzc2l2ZV93YXJuZWQgPSB0cnVlOworICAgICAg
ICB4ZW5fcHRfbG9nKGQsICJXcml0ZS1iYWNrIHRvIHVua25vd24gZmllbGQg
MHglMDJ4IChwYXJ0aWFsbHkpIGluaGliaXRlZCAoMHglMCp4KVxuIiwKKyAg
ICAgICAgICAgICAgICAgICBhZGRyLCBsZW4gKiAyLCB3Yl9tYXNrKTsKKyAg
ICAgICAgeGVuX3B0X2xvZyhkLCAiSWYgdGhlIGRldmljZSBkb2Vzbid0IHdv
cmssIHRyeSBlbmFibGluZyBwZXJtaXNzaXZlIG1vZGVcbiIpOworICAgICAg
ICB4ZW5fcHRfbG9nKGQsICIodW5zYWZlKSBhbmQgaWYgaXQgaGVscHMgcmVw
b3J0IHRoZSBwcm9ibGVtIHRvIHhlbi1kZXZlbFxuIik7CisgICAgfQogICAg
IGZvciAoaW5kZXggPSAwOyB3Yl9tYXNrOyBpbmRleCArPSBsZW4pIHsKICAg
ICAgICAgLyogdW5rbm93biByZWdzIGFyZSBwYXNzZWQgdGhyb3VnaCAqLwog
ICAgICAgICB3aGlsZSAoISh3Yl9tYXNrICYgMHhmZikpIHsKQEAgLTgyMSw2
ICs4NDYsNyBAQCBzdGF0aWMgdm9pZCB4ZW5fcHRfdW5yZWdpc3Rlcl9kZXZp
Y2UoUENJCiAKIHN0YXRpYyBQcm9wZXJ0eSB4ZW5fcGNpX3Bhc3N0aHJvdWdo
X3Byb3BlcnRpZXNbXSA9IHsKICAgICBERUZJTkVfUFJPUF9QQ0lfSE9TVF9E
RVZBRERSKCJob3N0YWRkciIsIFhlblBDSVBhc3N0aHJvdWdoU3RhdGUsIGhv
c3RhZGRyKSwKKyAgICBERUZJTkVfUFJPUF9CT09MKCJwZXJtaXNzaXZlIiwg
WGVuUENJUGFzc3Rocm91Z2hTdGF0ZSwgcGVybWlzc2l2ZSwgZmFsc2UpLAog
ICAgIERFRklORV9QUk9QX0VORF9PRl9MSVNUKCksCiB9OwogCi0tLSBhL2h3
L3hlbi94ZW5fcHQuaAorKysgYi9ody94ZW4veGVuX3B0LmgKQEAgLTE5Nyw2
ICsxOTcsOCBAQCBzdHJ1Y3QgWGVuUENJUGFzc3Rocm91Z2hTdGF0ZSB7CiAK
ICAgICBQQ0lIb3N0RGV2aWNlQWRkcmVzcyBob3N0YWRkcjsKICAgICBib29s
IGlzX3ZpcnRmbjsKKyAgICBib29sIHBlcm1pc3NpdmU7CisgICAgYm9vbCBw
ZXJtaXNzaXZlX3dhcm5lZDsKICAgICBYZW5Ib3N0UENJRGV2aWNlIHJlYWxf
ZGV2aWNlOwogICAgIFhlblBUUmVnaW9uIGJhc2VzW1BDSV9OVU1fUkVHSU9O
U107IC8qIEFjY2VzcyByZWdpb25zICovCiAgICAgUUxJU1RfSEVBRCgsIFhl
blBUUmVnR3JvdXApIHJlZ19ncnBzOwotLS0gYS9ody94ZW4veGVuX3B0X2Nv
bmZpZ19pbml0LmMKKysrIGIvaHcveGVuL3hlbl9wdF9jb25maWdfaW5pdC5j
CkBAIC0xMDEsNiArMTAxLDEwIEBAIHN0YXRpYyB1aW50MzJfdCBnZXRfdGhy
b3VnaGFibGVfbWFzayhjb24KIHsKICAgICB1aW50MzJfdCB0aHJvdWdoYWJs
ZV9tYXNrID0gfihyZWctPmVtdV9tYXNrIHwgcmVnLT5yb19tYXNrKTsKIAor
ICAgIGlmICghcy0+cGVybWlzc2l2ZSkgeworICAgICAgICB0aHJvdWdoYWJs
ZV9tYXNrICY9IH5yZWctPnJlc19tYXNrOworICAgIH0KKwogICAgIHJldHVy
biB0aHJvdWdoYWJsZV9tYXNrICYgdmFsaWRfbWFzazsKIH0KIAo=

--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 14:06:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 14:06:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzmoK-0005R4-Ue; Tue, 02 Jun 2015 14:04:56 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1YzmoH-0005QG-CW; Tue, 02 Jun 2015 14:04:54 +0000
Received: from [193.109.254.147] by server-16.bemta-14.messagelabs.com id
	87/68-31650-408BD655; Tue, 02 Jun 2015 14:04:52 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-15.tower-27.messagelabs.com!1433253890!19655171!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13278 invoked from network); 2 Jun 2015 14:04:51 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-15.tower-27.messagelabs.com with AES256-SHA encrypted SMTP;
	2 Jun 2015 14:04:51 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo8-0006Si-LW; Tue, 02 Jun 2015 14:04:44 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Yzmo8-0001oT-IC; Tue, 02 Jun 2015 14:04:44 +0000
Date: Tue, 02 Jun 2015 14:04:44 +0000
Message-Id: <E1Yzmo8-0001oT-IC@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 129 (CVE-2015-4104) - PCI MSI
 mask bits inadvertently exposed to guests
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4104 / XSA-129
                              version 2

            PCI MSI mask bits inadvertently exposed to guests

UPDATES IN VERSION 2
====================

Public release.

CVE assigned.

ISSUE DESCRIPTION
=================

The mask bits optionally available in the PCI MSI capability structure
are used by the hypervisor to occasionally suppress interrupt
delivery.  Unprivileged guests were, however, nevertheless allowed
direct control of these bits.

IMPACT
======

Interrupts may be observed by Xen at unexpected times, which may lead
to a host crash and therefore a Denial of Service.

VULNERABLE SYSTEMS
==================

Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only HVM guests with their device model run in Dom0 can take advantage
of this vulnerability.

Only HVM guests which have been granted access to physical PCI devices
(`PCI passthrough') can take advantage of this vulnerability.

Furthermore, the vulnerability is only applicable when the
passed-through PCI devices are MSI-capable.  (Most modern devices
are.)

MITIGATION
==========

This issue can be avoided by not assigning MSI capable PCI devices to
untrusted HVM guests.

This issue can also be avoided by only using PV guests.

It can also be avoided by configuring HVM guests with their device
model run in a separate (stub) domain.  (When using xl, this can be
requested with "device_model_stubdomain_override=1" in the domain
configuration file.)

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa129-qemuu.patch           qemu-upstream-unstable, Xen 4.5.x, Xen 4.4.x
xsa129-qemuu-4.3.patch       Xen 4.3.x
xsa129-qemut.patch           qemu-xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa129*.patch
3c6b5a085eec3a528b18207ca65222300911fd25501a9ffaffa76a5d85d23992  xsa129-qemut.patch
314808fbaa97d06bc4bb6cb6644dca1ae2da55534661c662c6e442d5b91e6061  xsa129-qemuu-4.3.patch
9f0658e197c539306118723d63b468d09fe3a1d9f9364f6d06e53b7be8268bdc  xsa129-qemuu.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of patches or migitations is NOT permitted (except on
systems used and administered only by organisations which are members
of the Xen Project Security Issues Predisclosure List).  Specifically,
deployent on public cloud systems is NOT permitted.

This is because the altered PCI config space access behavior is visible
to guests.

Deployment is permitted only AFTER the embargo ends.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVbbdRAAoJEIP+FMlX6CvZe+4H/RcQcEsggqHg5eK/9yowQV1c
erLWwpP18+v1pSRKqC+In/snL4g6H1DiC7ezwEbyQzOA8GGgiikTHqyTyFATvEHN
hCwMgYW4ZYcR/euqJ7kgi7q368+39sM6ZzEnKCwr4GUeWLtBh+6ABeih5XlfjyfS
0HWuw+NBkT7IcIR/KaQwa17or3fZ2cZKq1NU4EksFjuD+ucMS7a4sPs1SztoSbXc
Qf5TZn0XsDWoAodX/EmI4xRubpKL6Ae6noOCkBDelssvwzIhR1rZfFL8qALy+axf
vb4le4Woy7USkWssOURSvkY8iMio25qvwGFxORzI9x4ImMU+XC+r6QSCLER202Q=
=VQRQ
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa129-qemut.patch"
Content-Disposition: attachment; filename="xsa129-qemut.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa129-qemuu-4.3.patch"
Content-Disposition: attachment; filename="xsa129-qemuu-4.3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa129-qemuu.patch"
Content-Disposition: attachment; filename="xsa129-qemuu.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Tue Jun 02 15:14:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 15:14:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YznsW-0007bC-44; Tue, 02 Jun 2015 15:13:20 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <srn@prgmr.com>) id 1YznsU-0007ah-E5
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 15:13:18 +0000
Received: from [85.158.139.211] by server-6.bemta-5.messagelabs.com id
	FF/A6-08467-D08CD655; Tue, 02 Jun 2015 15:13:17 +0000
X-Env-Sender: srn@prgmr.com
X-Msg-Ref: server-9.tower-206.messagelabs.com!1433257996!11264163!1
X-Originating-IP: [71.19.149.6]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 19504 invoked from network); 2 Jun 2015 15:13:17 -0000
Received: from mail.prgmr.com (HELO mail.prgmr.com) (71.19.149.6)
	by server-9.tower-206.messagelabs.com with SMTP;
	2 Jun 2015 15:13:17 -0000
Received: from [192.168.1.3] (173-228-60-9.dsl.dynamic.fusionbroadband.com
	[173.228.60.9]) (Authenticated sender: srn)
	by mail.prgmr.com (Postfix) with ESMTPSA id 9AFAC72008C;
	Tue,  2 Jun 2015 11:17:53 -0400 (EDT)
Message-ID: <556DC80A.1050303@prgmr.com>
Date: Tue, 02 Jun 2015 08:13:14 -0700
From: Sarah Newman <srn@prgmr.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Phil Susi <psusi@ubuntu.com>, Xen-users@lists.xen.org
References: <556C6421.5000508@ubuntu.com>
In-Reply-To: <556C6421.5000508@ubuntu.com>
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/01/2015 06:54 AM, Phil Susi wrote:
> I have a domU that has been running just fine for the last year with 2048m of ram.  I changed the config to give it 4096m of ram, and now when I start
> it up, it crashes without any output to the console at all.  It doesn't even make it to the grub loader screen.  What could be the cause?  It might be
> worth mentioning that the host is 64 bit but the guest is only 32 bit.

Do standard builds of pv-grub work? If you don't have anything else handy, Xen4Centos ships it in
https://mirrors.kernel.org/centos/6/xen4/x86_64/Packages/xen-runtime-4.4.2-2.el6.x86_64.rpm


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 15:14:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 15:14:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YznsW-0007bC-44; Tue, 02 Jun 2015 15:13:20 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <srn@prgmr.com>) id 1YznsU-0007ah-E5
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 15:13:18 +0000
Received: from [85.158.139.211] by server-6.bemta-5.messagelabs.com id
	FF/A6-08467-D08CD655; Tue, 02 Jun 2015 15:13:17 +0000
X-Env-Sender: srn@prgmr.com
X-Msg-Ref: server-9.tower-206.messagelabs.com!1433257996!11264163!1
X-Originating-IP: [71.19.149.6]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 19504 invoked from network); 2 Jun 2015 15:13:17 -0000
Received: from mail.prgmr.com (HELO mail.prgmr.com) (71.19.149.6)
	by server-9.tower-206.messagelabs.com with SMTP;
	2 Jun 2015 15:13:17 -0000
Received: from [192.168.1.3] (173-228-60-9.dsl.dynamic.fusionbroadband.com
	[173.228.60.9]) (Authenticated sender: srn)
	by mail.prgmr.com (Postfix) with ESMTPSA id 9AFAC72008C;
	Tue,  2 Jun 2015 11:17:53 -0400 (EDT)
Message-ID: <556DC80A.1050303@prgmr.com>
Date: Tue, 02 Jun 2015 08:13:14 -0700
From: Sarah Newman <srn@prgmr.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Phil Susi <psusi@ubuntu.com>, Xen-users@lists.xen.org
References: <556C6421.5000508@ubuntu.com>
In-Reply-To: <556C6421.5000508@ubuntu.com>
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/01/2015 06:54 AM, Phil Susi wrote:
> I have a domU that has been running just fine for the last year with 2048m of ram.  I changed the config to give it 4096m of ram, and now when I start
> it up, it crashes without any output to the console at all.  It doesn't even make it to the grub loader screen.  What could be the cause?  It might be
> worth mentioning that the host is 64 bit but the guest is only 32 bit.

Do standard builds of pv-grub work? If you don't have anything else handy, Xen4Centos ships it in
https://mirrors.kernel.org/centos/6/xen4/x86_64/Packages/xen-runtime-4.4.2-2.el6.x86_64.rpm


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 15:32:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 15:32:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzoAc-0002Yb-MZ; Tue, 02 Jun 2015 15:32:02 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <srn@prgmr.com>) id 1YzoAb-0002YW-4V
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 15:32:01 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	17/90-13047-07CCD655; Tue, 02 Jun 2015 15:32:00 +0000
X-Env-Sender: srn@prgmr.com
X-Msg-Ref: server-3.tower-27.messagelabs.com!1433259119!19599411!1
X-Originating-IP: [71.19.149.6]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 23104 invoked from network); 2 Jun 2015 15:31:59 -0000
Received: from mail.prgmr.com (HELO mail.prgmr.com) (71.19.149.6)
	by server-3.tower-27.messagelabs.com with SMTP;
	2 Jun 2015 15:31:59 -0000
Received: from [192.168.1.3] (173-228-60-9.dsl.dynamic.fusionbroadband.com
	[173.228.60.9]) (Authenticated sender: srn)
	by mail.prgmr.com (Postfix) with ESMTPSA id 2BD2672008C
	for <xen-users@lists.xen.org>; Tue,  2 Jun 2015 11:36:36 -0400 (EDT)
Message-ID: <556DCC6D.20203@prgmr.com>
Date: Tue, 02 Jun 2015 08:31:57 -0700
From: Sarah Newman <srn@prgmr.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: [Xen-users] internal-db option for xenstored
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Is there any particular advantage or disadvantage to using the internal-db option for xenstored? Unlike CentOS 5, Xen4CentOS does not automatically
mount /var/lib/xenstored on tmpfs and during stress testing I started to notice performance issues.

The only advantage I can think of for /var/lib/xenstored is that it's still possible to access the domU console after xenstored crashes if you restart
it with "xenstored --no-domain-init --pid-file=/var/run/xenstored.pid --preserve-local", but it still can't properly shut down the domain.

Thanks, Sarah

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 15:32:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 15:32:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzoAc-0002Yb-MZ; Tue, 02 Jun 2015 15:32:02 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <srn@prgmr.com>) id 1YzoAb-0002YW-4V
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 15:32:01 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	17/90-13047-07CCD655; Tue, 02 Jun 2015 15:32:00 +0000
X-Env-Sender: srn@prgmr.com
X-Msg-Ref: server-3.tower-27.messagelabs.com!1433259119!19599411!1
X-Originating-IP: [71.19.149.6]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 23104 invoked from network); 2 Jun 2015 15:31:59 -0000
Received: from mail.prgmr.com (HELO mail.prgmr.com) (71.19.149.6)
	by server-3.tower-27.messagelabs.com with SMTP;
	2 Jun 2015 15:31:59 -0000
Received: from [192.168.1.3] (173-228-60-9.dsl.dynamic.fusionbroadband.com
	[173.228.60.9]) (Authenticated sender: srn)
	by mail.prgmr.com (Postfix) with ESMTPSA id 2BD2672008C
	for <xen-users@lists.xen.org>; Tue,  2 Jun 2015 11:36:36 -0400 (EDT)
Message-ID: <556DCC6D.20203@prgmr.com>
Date: Tue, 02 Jun 2015 08:31:57 -0700
From: Sarah Newman <srn@prgmr.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: [Xen-users] internal-db option for xenstored
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Is there any particular advantage or disadvantage to using the internal-db option for xenstored? Unlike CentOS 5, Xen4CentOS does not automatically
mount /var/lib/xenstored on tmpfs and during stress testing I started to notice performance issues.

The only advantage I can think of for /var/lib/xenstored is that it's still possible to access the domU console after xenstored crashes if you restart
it with "xenstored --no-domain-init --pid-file=/var/run/xenstored.pid --preserve-local", but it still can't properly shut down the domain.

Thanks, Sarah

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 16:08:18 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 16:08:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzojR-0000I8-IF; Tue, 02 Jun 2015 16:08:01 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=588cd0506=julien.grall@citrix.com>)
	id 1YzojQ-0000Hz-2i
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 16:08:00 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	F9/E7-13047-FD4DD655; Tue, 02 Jun 2015 16:07:59 +0000
X-Env-Sender: prvs=588cd0506=julien.grall@citrix.com
X-Msg-Ref: server-16.tower-27.messagelabs.com!1433261276!12097307!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21263 invoked from network); 2 Jun 2015 16:07:58 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-16.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 16:07:58 -0000
X-IronPort-AV: E=Sophos;i="5.13,540,1427760000"; d="scan'208";a="268225417"
Message-ID: <556DD374.1070200@citrix.com>
Date: Tue, 2 Jun 2015 17:01:56 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Icedove/31.7.0
MIME-Version: 1.0
To: "Chris (Christopher) Brand" <chris.brand@broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<1430902156.2660.154.camel@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D796044@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
In-Reply-To: <4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 30/05/15 00:07, Chris (Christopher) Brand wrote:
> Hi Julien,

Hi Chris,

> I have now seen DomU come up. More often, though, I see some "Division by zero in kernel" errors from clocksource_of_init(), then nothing after it reports the sched clock (but it reports it at "0 Hz"). Log extract below. It looks like the initial problem is that "Architected timer frequency not available". If I hack arch_timer_detect_rate() to set arch_timer_rate to the 27MHz value that Dom0 gets, DomU comes up ok (Yay!).

For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
This register has to be setup correctly by the firmware/bootloader.

Do you know if the timer node in the device tree for your platform has a
property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is
not correctly set.

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 16:08:18 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 16:08:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzojR-0000I8-IF; Tue, 02 Jun 2015 16:08:01 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=588cd0506=julien.grall@citrix.com>)
	id 1YzojQ-0000Hz-2i
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 16:08:00 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	F9/E7-13047-FD4DD655; Tue, 02 Jun 2015 16:07:59 +0000
X-Env-Sender: prvs=588cd0506=julien.grall@citrix.com
X-Msg-Ref: server-16.tower-27.messagelabs.com!1433261276!12097307!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21263 invoked from network); 2 Jun 2015 16:07:58 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-16.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 16:07:58 -0000
X-IronPort-AV: E=Sophos;i="5.13,540,1427760000"; d="scan'208";a="268225417"
Message-ID: <556DD374.1070200@citrix.com>
Date: Tue, 2 Jun 2015 17:01:56 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Icedove/31.7.0
MIME-Version: 1.0
To: "Chris (Christopher) Brand" <chris.brand@broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<1430902156.2660.154.camel@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D796044@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
In-Reply-To: <4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 30/05/15 00:07, Chris (Christopher) Brand wrote:
> Hi Julien,

Hi Chris,

> I have now seen DomU come up. More often, though, I see some "Division by zero in kernel" errors from clocksource_of_init(), then nothing after it reports the sched clock (but it reports it at "0 Hz"). Log extract below. It looks like the initial problem is that "Architected timer frequency not available". If I hack arch_timer_detect_rate() to set arch_timer_rate to the 27MHz value that Dom0 gets, DomU comes up ok (Yay!).

For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
This register has to be setup correctly by the firmware/bootloader.

Do you know if the timer node in the device tree for your platform has a
property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is
not correctly set.

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 16:55:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 16:55:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzpSl-0007iJ-AY; Tue, 02 Jun 2015 16:54:51 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <phillsusi@gmail.com>) id 1YzpSj-0007i0-Ql
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 16:54:49 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	EF/2C-21074-9DFDD655; Tue, 02 Jun 2015 16:54:49 +0000
X-Env-Sender: phillsusi@gmail.com
X-Msg-Ref: server-4.tower-206.messagelabs.com!1433264084!11318638!1
X-Originating-IP: [209.85.220.174]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11449 invoked from network); 2 Jun 2015 16:54:45 -0000
Received: from mail-qk0-f174.google.com (HELO mail-qk0-f174.google.com)
	(209.85.220.174)
	by server-4.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 16:54:45 -0000
Received: by qkx62 with SMTP id 62so104127658qkx.3
	for <Xen-users@lists.xen.org>; Tue, 02 Jun 2015 09:54:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=sender:message-id:date:from:user-agent:mime-version:to:subject
	:references:in-reply-to:content-type:content-transfer-encoding;
	bh=M7uoLeBqFMwd8NmrQLkA9+thiz6ty9T0zZy4KLqvTB8=;
	b=RvMzDTFfu7eUcKF4NRQp64Gt0gIZCEs/3xXgk0x60FrPwMSzaaCJwHVr0OI+FJq9dS
	YWhBSxyTffRmX2xf69M0v+16DISPcE+c7d5aVNOIr+19c4jI/i206uJ+iAX/ErUr5kQY
	Kgm54Q7xdubIT5GfpKDF3RuM8mUTMB9/dVQVwm3U1v+zBeCabY428oYeTA2/13PNhoTF
	bhtogSQyLloSB5rjeD6O+llNnj21/1/nvW65DvK0SFf9X3Ep6H7GO2vNUu4EB/2mwAqA
	UJB8iXNWExYRPWy1b1YaZEak1/t8kTtH5kGTdwdPrHoxjKkTlecX/uxutVgF4ZHmh6J9
	loyA==
X-Received: by 10.140.152.130 with SMTP id 124mr31415559qhy.65.1433264084349; 
	Tue, 02 Jun 2015 09:54:44 -0700 (PDT)
Received: from [10.1.1.233] (fl-67-77-88-12.sta.embarqhsd.net. [67.77.88.12])
	by mx.google.com with ESMTPSA id
	o3sm7616635qga.36.2015.06.02.09.54.43
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 02 Jun 2015 09:54:43 -0700 (PDT)
Message-ID: <556DDFB7.3060602@ubuntu.com>
Date: Tue, 02 Jun 2015 12:54:15 -0400
From: Phil Susi <psusi@ubuntu.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Sarah Newman <srn@prgmr.com>, Xen-users@lists.xen.org
References: <556C6421.5000508@ubuntu.com> <556DC80A.1050303@prgmr.com>
In-Reply-To: <556DC80A.1050303@prgmr.com>
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 6/2/2015 11:13 AM, Sarah Newman wrote:
> On 06/01/2015 06:54 AM, Phil Susi wrote:
>> I have a domU that has been running just fine for the last year with 2048m of ram.  I changed the config to give it 4096m of ram, and now when I start
>> it up, it crashes without any output to the console at all.  It doesn't even make it to the grub loader screen.  What could be the cause?  It might be
>> worth mentioning that the host is 64 bit but the guest is only 32 bit.
>
> Do standard builds of pv-grub work? If you don't have anything else handy, Xen4Centos ships it in
> https://mirrors.kernel.org/centos/6/xen4/x86_64/Packages/xen-runtime-4.4.2-2.el6.x86_64.rpm

It at least gets me a rescue prompt of grub legacy 0.97, so I guess that 
points to it being a bug in my local build of grub-xen.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 16:55:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 16:55:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzpSl-0007iJ-AY; Tue, 02 Jun 2015 16:54:51 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <phillsusi@gmail.com>) id 1YzpSj-0007i0-Ql
	for Xen-users@lists.xen.org; Tue, 02 Jun 2015 16:54:49 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	EF/2C-21074-9DFDD655; Tue, 02 Jun 2015 16:54:49 +0000
X-Env-Sender: phillsusi@gmail.com
X-Msg-Ref: server-4.tower-206.messagelabs.com!1433264084!11318638!1
X-Originating-IP: [209.85.220.174]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11449 invoked from network); 2 Jun 2015 16:54:45 -0000
Received: from mail-qk0-f174.google.com (HELO mail-qk0-f174.google.com)
	(209.85.220.174)
	by server-4.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	2 Jun 2015 16:54:45 -0000
Received: by qkx62 with SMTP id 62so104127658qkx.3
	for <Xen-users@lists.xen.org>; Tue, 02 Jun 2015 09:54:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=sender:message-id:date:from:user-agent:mime-version:to:subject
	:references:in-reply-to:content-type:content-transfer-encoding;
	bh=M7uoLeBqFMwd8NmrQLkA9+thiz6ty9T0zZy4KLqvTB8=;
	b=RvMzDTFfu7eUcKF4NRQp64Gt0gIZCEs/3xXgk0x60FrPwMSzaaCJwHVr0OI+FJq9dS
	YWhBSxyTffRmX2xf69M0v+16DISPcE+c7d5aVNOIr+19c4jI/i206uJ+iAX/ErUr5kQY
	Kgm54Q7xdubIT5GfpKDF3RuM8mUTMB9/dVQVwm3U1v+zBeCabY428oYeTA2/13PNhoTF
	bhtogSQyLloSB5rjeD6O+llNnj21/1/nvW65DvK0SFf9X3Ep6H7GO2vNUu4EB/2mwAqA
	UJB8iXNWExYRPWy1b1YaZEak1/t8kTtH5kGTdwdPrHoxjKkTlecX/uxutVgF4ZHmh6J9
	loyA==
X-Received: by 10.140.152.130 with SMTP id 124mr31415559qhy.65.1433264084349; 
	Tue, 02 Jun 2015 09:54:44 -0700 (PDT)
Received: from [10.1.1.233] (fl-67-77-88-12.sta.embarqhsd.net. [67.77.88.12])
	by mx.google.com with ESMTPSA id
	o3sm7616635qga.36.2015.06.02.09.54.43
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 02 Jun 2015 09:54:43 -0700 (PDT)
Message-ID: <556DDFB7.3060602@ubuntu.com>
Date: Tue, 02 Jun 2015 12:54:15 -0400
From: Phil Susi <psusi@ubuntu.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Sarah Newman <srn@prgmr.com>, Xen-users@lists.xen.org
References: <556C6421.5000508@ubuntu.com> <556DC80A.1050303@prgmr.com>
In-Reply-To: <556DC80A.1050303@prgmr.com>
Subject: Re: [Xen-users] domU crashes when given 4g or more of ram
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 6/2/2015 11:13 AM, Sarah Newman wrote:
> On 06/01/2015 06:54 AM, Phil Susi wrote:
>> I have a domU that has been running just fine for the last year with 2048m of ram.  I changed the config to give it 4096m of ram, and now when I start
>> it up, it crashes without any output to the console at all.  It doesn't even make it to the grub loader screen.  What could be the cause?  It might be
>> worth mentioning that the host is 64 bit but the guest is only 32 bit.
>
> Do standard builds of pv-grub work? If you don't have anything else handy, Xen4Centos ships it in
> https://mirrors.kernel.org/centos/6/xen4/x86_64/Packages/xen-runtime-4.4.2-2.el6.x86_64.rpm

It at least gets me a rescue prompt of grub legacy 0.97, so I guess that 
points to it being a bug in my local build of grub-xen.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 22:47:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 22:47:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Yzux1-0002Xa-Js; Tue, 02 Jun 2015 22:46:27 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <chris.brand@broadcom.com>) id 1Yzux0-0002WN-HE
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 22:46:26 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	8E/AD-21074-1423E655; Tue, 02 Jun 2015 22:46:25 +0000
X-Env-Sender: chris.brand@broadcom.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1433285184!7222319!1
X-Originating-IP: [216.31.210.64]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32645 invoked from network); 2 Jun 2015 22:46:25 -0000
Received: from mail-gw3-out.broadcom.com (HELO mail-gw3-out.broadcom.com)
	(216.31.210.64) by server-11.tower-206.messagelabs.com with SMTP;
	2 Jun 2015 22:46:25 -0000
X-IronPort-AV: E=Sophos;i="5.13,541,1427785200"; d="scan'208";a="66276007"
Received: from irvexchcas08.broadcom.com (HELO
	IRVEXCHCAS08.corp.ad.broadcom.com) ([10.9.208.57])
	by mail-gw3-out.broadcom.com with ESMTP; 02 Jun 2015 15:57:39 -0700
Received: from SJEXCHCAS05.corp.ad.broadcom.com (10.16.203.12) by
	IRVEXCHCAS08.corp.ad.broadcom.com (10.9.208.57) with Microsoft SMTP
	Server (TLS) id 14.3.235.1; Tue, 2 Jun 2015 15:46:22 -0700
Received: from SJEXCHMB05.corp.ad.broadcom.com ([fe80::4ccf:d24d:fe6c:9594])
	by SJEXCHCAS05.corp.ad.broadcom.com ([::1]) with mapi id 14.03.0235.001;
	Tue, 2 Jun 2015 15:46:23 -0700
From: "Chris (Christopher) Brand" <chris.brand@broadcom.com>
To: Julien Grall <julien.grall@citrix.com>
Thread-Topic: [Xen-users] Debugging DomU
Thread-Index: AdCB2wWZcr9SQU3CS2ODe9QE3SnJMACfCemAAAUH66AAIWukAACjOORwACWVbwABa+9kIAAqoyMAAAGcR8AAL4ylAAEI4IqwAIsLYwAAZrncAAArZ/SAAA3FjUAANrEygAAF+fvgABn11wAAB6x6AAAzniUAAAEt5lAAzlJcAAAA78vA
Date: Tue, 2 Jun 2015 22:46:22 +0000
Message-ID: <4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<1430902156.2660.154.camel@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D796044@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
	<556DD374.1070200@citrix.com>
In-Reply-To: <556DD374.1070200@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.16.203.100]
MIME-Version: 1.0
Cc: xen-users <xen-users@lists.xen.org>, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Julien,

>For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
>This register has to be setup correctly by the firmware/bootloader.

>Do you know if the timer node in the device tree for your platform has a property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is not correctly set.

It does indeed. I think I understand what's happening, then.
Bootloader is running only on core 0, and is setting CNTFRQ. When DomU runs, its vcpu0 runs on a random physical core. If it happens to run on core0, everything is fine. If it happens to run on any other core, though, it fails because CNTFRQ is zero. So I need to ensure that CNTFRQ is set for the other cores.

Chris


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 02 22:47:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2015 22:47:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Yzux1-0002Xa-Js; Tue, 02 Jun 2015 22:46:27 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <chris.brand@broadcom.com>) id 1Yzux0-0002WN-HE
	for xen-users@lists.xen.org; Tue, 02 Jun 2015 22:46:26 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	8E/AD-21074-1423E655; Tue, 02 Jun 2015 22:46:25 +0000
X-Env-Sender: chris.brand@broadcom.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1433285184!7222319!1
X-Originating-IP: [216.31.210.64]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32645 invoked from network); 2 Jun 2015 22:46:25 -0000
Received: from mail-gw3-out.broadcom.com (HELO mail-gw3-out.broadcom.com)
	(216.31.210.64) by server-11.tower-206.messagelabs.com with SMTP;
	2 Jun 2015 22:46:25 -0000
X-IronPort-AV: E=Sophos;i="5.13,541,1427785200"; d="scan'208";a="66276007"
Received: from irvexchcas08.broadcom.com (HELO
	IRVEXCHCAS08.corp.ad.broadcom.com) ([10.9.208.57])
	by mail-gw3-out.broadcom.com with ESMTP; 02 Jun 2015 15:57:39 -0700
Received: from SJEXCHCAS05.corp.ad.broadcom.com (10.16.203.12) by
	IRVEXCHCAS08.corp.ad.broadcom.com (10.9.208.57) with Microsoft SMTP
	Server (TLS) id 14.3.235.1; Tue, 2 Jun 2015 15:46:22 -0700
Received: from SJEXCHMB05.corp.ad.broadcom.com ([fe80::4ccf:d24d:fe6c:9594])
	by SJEXCHCAS05.corp.ad.broadcom.com ([::1]) with mapi id 14.03.0235.001;
	Tue, 2 Jun 2015 15:46:23 -0700
From: "Chris (Christopher) Brand" <chris.brand@broadcom.com>
To: Julien Grall <julien.grall@citrix.com>
Thread-Topic: [Xen-users] Debugging DomU
Thread-Index: AdCB2wWZcr9SQU3CS2ODe9QE3SnJMACfCemAAAUH66AAIWukAACjOORwACWVbwABa+9kIAAqoyMAAAGcR8AAL4ylAAEI4IqwAIsLYwAAZrncAAArZ/SAAA3FjUAANrEygAAF+fvgABn11wAAB6x6AAAzniUAAAEt5lAAzlJcAAAA78vA
Date: Tue, 2 Jun 2015 22:46:22 +0000
Message-ID: <4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<1430902156.2660.154.camel@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D796044@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
	<556DD374.1070200@citrix.com>
In-Reply-To: <556DD374.1070200@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.16.203.100]
MIME-Version: 1.0
Cc: xen-users <xen-users@lists.xen.org>, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Julien,

>For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
>This register has to be setup correctly by the firmware/bootloader.

>Do you know if the timer node in the device tree for your platform has a property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is not correctly set.

It does indeed. I think I understand what's happening, then.
Bootloader is running only on core 0, and is setting CNTFRQ. When DomU runs, its vcpu0 runs on a random physical core. If it happens to run on core0, everything is fine. If it happens to run on any other core, though, it fails because CNTFRQ is zero. So I need to ensure that CNTFRQ is set for the other cores.

Chris


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 01:32:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 01:32:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzxWK-0000ui-O6; Wed, 03 Jun 2015 01:31:04 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <linuxhack2012@gmail.com>) id 1YzxWJ-0000ud-Nx
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 01:31:03 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	D0/74-03895-7D85E655; Wed, 03 Jun 2015 01:31:03 +0000
X-Env-Sender: linuxhack2012@gmail.com
X-Msg-Ref: server-12.tower-31.messagelabs.com!1433295062!12486432!1
X-Originating-IP: [209.85.215.52]
X-SpamReason: No, hits=1.7 required=7.0 tests=BODY_RANDOM_LONG,
	HTML_20_30,HTML_MESSAGE,RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30092 invoked from network); 3 Jun 2015 01:31:02 -0000
Received: from mail-la0-f52.google.com (HELO mail-la0-f52.google.com)
	(209.85.215.52)
	by server-12.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 01:31:02 -0000
Received: by labko7 with SMTP id ko7so135047991lab.2
	for <xen-users@lists.xen.org>; Tue, 02 Jun 2015 18:31:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=bZHe1lXdMbj+O98GcKPjoDeAzbJn48hCJTK8U8p+g1w=;
	b=PR1uv/h4eqqCLrLi1dHQG6jwkdpJqv2We5lP5TfLPVV4waCsCZOpoOAhm2+qJ1/bAk
	Ia0QddFllA7q7rym/cF4u7hsLZ+NfWrjapu0uaCgrLcES+i7rKJCgTXS0U0PXWBKGedx
	uA6HKv9MY7C9dJksz4YKh6PDiDwTOZlAx4Eu3qQBR9DhbDbBNcWwhRQGI72wZlb3sryH
	B8buWLg3MDmtNQZx8rORNqsYT90kk9wnLamDhfFCMwrz6UCk1s9LYCPpgNgbwjBrdbSp
	fyT3OATGKvM7w+xo3BPC13Iz4qBbe5k/iW71m4BH/GXqpZzECXT7iYjJhtvdv05VKW8N
	H+xA==
MIME-Version: 1.0
X-Received: by 10.152.42.200 with SMTP id q8mr17701997lal.53.1433295061954;
	Tue, 02 Jun 2015 18:31:01 -0700 (PDT)
Received: by 10.112.118.114 with HTTP; Tue, 2 Jun 2015 18:31:01 -0700 (PDT)
Date: Wed, 3 Jun 2015 07:01:01 +0530
Message-ID: <CAHtGawfbdVwcPXRaOB0g4q_jac9XpAYMjZb4LLqAcDM23Oevkw@mail.gmail.com>
From: Linux Hack <linuxhack2012@gmail.com>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: [Xen-users] Apply venom patch without rebooting guests
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0879047206954986461=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============0879047206954986461==
Content-Type: multipart/alternative; boundary=001a11c3514206b6da05179303de

--001a11c3514206b6da05179303de
Content-Type: text/plain; charset=UTF-8

Hi,

I plan to apply venom patch using below method on dom0's which will avoid
downtime for guests.

* Migrate all the VM's to another dom0 where I have space
* Apply venom patch on source dom0 and reboot the Dom0
* once its up will migrate back the vm's to old dom0 itself.

But my concern is if i am doing by the above plan will newly applied xen
related patch will be applied for the drivers whatever loaded on guests?

Also is there way to get hypervisior details from guest vm?



Thanks
Darren

--001a11c3514206b6da05179303de
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I plan to apply venom patch using b=
elow method on dom0&#39;s which will avoid downtime for guests.</div><div><=
br></div><div>* Migrate all the VM&#39;s to another dom0 where I have space=
</div><div>* Apply venom patch on source dom0 and reboot the Dom0</div><div=
>* once its up will migrate back the vm&#39;s to old dom0 itself.=C2=A0</di=
v><div><br></div><div>But my concern is if i am doing by the above plan wil=
l newly applied xen related patch will be applied for the drivers whatever =
loaded on guests?=C2=A0</div><div><br></div><div>Also is there way to get h=
ypervisior details from guest vm?</div><div><br></div><div><br></div><div><=
br></div><div>Thanks</div><div>Darren</div></div>

--001a11c3514206b6da05179303de--


--===============0879047206954986461==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============0879047206954986461==--


From xen-users-bounces@lists.xen.org Wed Jun 03 01:32:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 01:32:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1YzxWK-0000ui-O6; Wed, 03 Jun 2015 01:31:04 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <linuxhack2012@gmail.com>) id 1YzxWJ-0000ud-Nx
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 01:31:03 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	D0/74-03895-7D85E655; Wed, 03 Jun 2015 01:31:03 +0000
X-Env-Sender: linuxhack2012@gmail.com
X-Msg-Ref: server-12.tower-31.messagelabs.com!1433295062!12486432!1
X-Originating-IP: [209.85.215.52]
X-SpamReason: No, hits=1.7 required=7.0 tests=BODY_RANDOM_LONG,
	HTML_20_30,HTML_MESSAGE,RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30092 invoked from network); 3 Jun 2015 01:31:02 -0000
Received: from mail-la0-f52.google.com (HELO mail-la0-f52.google.com)
	(209.85.215.52)
	by server-12.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 01:31:02 -0000
Received: by labko7 with SMTP id ko7so135047991lab.2
	for <xen-users@lists.xen.org>; Tue, 02 Jun 2015 18:31:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=bZHe1lXdMbj+O98GcKPjoDeAzbJn48hCJTK8U8p+g1w=;
	b=PR1uv/h4eqqCLrLi1dHQG6jwkdpJqv2We5lP5TfLPVV4waCsCZOpoOAhm2+qJ1/bAk
	Ia0QddFllA7q7rym/cF4u7hsLZ+NfWrjapu0uaCgrLcES+i7rKJCgTXS0U0PXWBKGedx
	uA6HKv9MY7C9dJksz4YKh6PDiDwTOZlAx4Eu3qQBR9DhbDbBNcWwhRQGI72wZlb3sryH
	B8buWLg3MDmtNQZx8rORNqsYT90kk9wnLamDhfFCMwrz6UCk1s9LYCPpgNgbwjBrdbSp
	fyT3OATGKvM7w+xo3BPC13Iz4qBbe5k/iW71m4BH/GXqpZzECXT7iYjJhtvdv05VKW8N
	H+xA==
MIME-Version: 1.0
X-Received: by 10.152.42.200 with SMTP id q8mr17701997lal.53.1433295061954;
	Tue, 02 Jun 2015 18:31:01 -0700 (PDT)
Received: by 10.112.118.114 with HTTP; Tue, 2 Jun 2015 18:31:01 -0700 (PDT)
Date: Wed, 3 Jun 2015 07:01:01 +0530
Message-ID: <CAHtGawfbdVwcPXRaOB0g4q_jac9XpAYMjZb4LLqAcDM23Oevkw@mail.gmail.com>
From: Linux Hack <linuxhack2012@gmail.com>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: [Xen-users] Apply venom patch without rebooting guests
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0879047206954986461=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============0879047206954986461==
Content-Type: multipart/alternative; boundary=001a11c3514206b6da05179303de

--001a11c3514206b6da05179303de
Content-Type: text/plain; charset=UTF-8

Hi,

I plan to apply venom patch using below method on dom0's which will avoid
downtime for guests.

* Migrate all the VM's to another dom0 where I have space
* Apply venom patch on source dom0 and reboot the Dom0
* once its up will migrate back the vm's to old dom0 itself.

But my concern is if i am doing by the above plan will newly applied xen
related patch will be applied for the drivers whatever loaded on guests?

Also is there way to get hypervisior details from guest vm?



Thanks
Darren

--001a11c3514206b6da05179303de
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I plan to apply venom patch using b=
elow method on dom0&#39;s which will avoid downtime for guests.</div><div><=
br></div><div>* Migrate all the VM&#39;s to another dom0 where I have space=
</div><div>* Apply venom patch on source dom0 and reboot the Dom0</div><div=
>* once its up will migrate back the vm&#39;s to old dom0 itself.=C2=A0</di=
v><div><br></div><div>But my concern is if i am doing by the above plan wil=
l newly applied xen related patch will be applied for the drivers whatever =
loaded on guests?=C2=A0</div><div><br></div><div>Also is there way to get h=
ypervisior details from guest vm?</div><div><br></div><div><br></div><div><=
br></div><div>Thanks</div><div>Darren</div></div>

--001a11c3514206b6da05179303de--


--===============0879047206954986461==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============0879047206954986461==--


From xen-users-bounces@lists.xen.org Wed Jun 03 09:17:27 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:17:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z04mY-0008GK-Gv; Wed, 03 Jun 2015 09:16:18 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589ea9610=Ian.Campbell@citrix.com>)
	id 1Z04mX-0008GF-CM
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:16:17 +0000
Received: from [85.158.137.68] by server-12.bemta-3.messagelabs.com id
	24/7D-26286-FD5CE655; Wed, 03 Jun 2015 09:16:15 +0000
X-Env-Sender: prvs=589ea9610=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-31.messagelabs.com!1433322972!12701560!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22033 invoked from network); 3 Jun 2015 09:16:14 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:16:14 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="268470561"
Message-ID: <1433322956.7108.23.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Linux Hack <linuxhack2012@gmail.com>
Date: Wed, 3 Jun 2015 10:15:56 +0100
In-Reply-To: <CAHtGawfbdVwcPXRaOB0g4q_jac9XpAYMjZb4LLqAcDM23Oevkw@mail.gmail.com>
References: <CAHtGawfbdVwcPXRaOB0g4q_jac9XpAYMjZb4LLqAcDM23Oevkw@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: Re: [Xen-users] Apply venom patch without rebooting guests
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-03 at 07:01 +0530, Linux Hack wrote:
> Hi,
> 
> 
> I plan to apply venom patch using below method on dom0's which will
> avoid downtime for guests.
> 
> 
> * Migrate all the VM's to another dom0 where I have space
> * Apply venom patch on source dom0 and reboot the Dom0
> * once its up will migrate back the vm's to old dom0 itself. 
> 
> 
> But my concern is if i am doing by the above plan will newly applied
> xen related patch will be applied for the drivers whatever loaded on
> guests? 

XSA-133 / CVE-2015-3456 (I don't think using the marketing name is
useful, see also [0]) was a qemu issue, so even just a local host
migration (after having updated the qemu binary) should be sufficient
since the DM is restarted on the other end of a migration.

Of course migrating away and rebooting the dom0 would make 100% sure you
hadn't accidentally missed a VM. (I suppose looking at /prod/*/exe could
help too, since you'd see the old binary)

> Also is there way to get hypervisior details from guest vm?

Depends on the guest, Linux puts some stuff in /sys/.../hypervisor IIRC,
and there is some stuff in dmesg on boot. Note that the qemu version
isn't one of the things you'll see there.

Ian.

[0] http://backronym.fail/



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 09:17:27 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:17:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z04mY-0008GK-Gv; Wed, 03 Jun 2015 09:16:18 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589ea9610=Ian.Campbell@citrix.com>)
	id 1Z04mX-0008GF-CM
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:16:17 +0000
Received: from [85.158.137.68] by server-12.bemta-3.messagelabs.com id
	24/7D-26286-FD5CE655; Wed, 03 Jun 2015 09:16:15 +0000
X-Env-Sender: prvs=589ea9610=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-31.messagelabs.com!1433322972!12701560!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22033 invoked from network); 3 Jun 2015 09:16:14 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:16:14 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="268470561"
Message-ID: <1433322956.7108.23.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Linux Hack <linuxhack2012@gmail.com>
Date: Wed, 3 Jun 2015 10:15:56 +0100
In-Reply-To: <CAHtGawfbdVwcPXRaOB0g4q_jac9XpAYMjZb4LLqAcDM23Oevkw@mail.gmail.com>
References: <CAHtGawfbdVwcPXRaOB0g4q_jac9XpAYMjZb4LLqAcDM23Oevkw@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: Re: [Xen-users] Apply venom patch without rebooting guests
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-03 at 07:01 +0530, Linux Hack wrote:
> Hi,
> 
> 
> I plan to apply venom patch using below method on dom0's which will
> avoid downtime for guests.
> 
> 
> * Migrate all the VM's to another dom0 where I have space
> * Apply venom patch on source dom0 and reboot the Dom0
> * once its up will migrate back the vm's to old dom0 itself. 
> 
> 
> But my concern is if i am doing by the above plan will newly applied
> xen related patch will be applied for the drivers whatever loaded on
> guests? 

XSA-133 / CVE-2015-3456 (I don't think using the marketing name is
useful, see also [0]) was a qemu issue, so even just a local host
migration (after having updated the qemu binary) should be sufficient
since the DM is restarted on the other end of a migration.

Of course migrating away and rebooting the dom0 would make 100% sure you
hadn't accidentally missed a VM. (I suppose looking at /prod/*/exe could
help too, since you'd see the old binary)

> Also is there way to get hypervisior details from guest vm?

Depends on the guest, Linux puts some stuff in /sys/.../hypervisor IIRC,
and there is some stuff in dmesg on boot. Note that the qemu version
isn't one of the things you'll see there.

Ian.

[0] http://backronym.fail/



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 09:19:46 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:19:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z04po-0000Pe-A4; Wed, 03 Jun 2015 09:19:40 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589ea9610=Ian.Campbell@citrix.com>)
	id 1Z04pn-0000PZ-7w
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:19:39 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	88/75-13517-AA6CE655; Wed, 03 Jun 2015 09:19:38 +0000
X-Env-Sender: prvs=589ea9610=Ian.Campbell@citrix.com
X-Msg-Ref: server-14.tower-31.messagelabs.com!1433323176!10226210!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13461 invoked from network); 3 Jun 2015 09:19:37 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-14.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:19:37 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="271175396"
Message-ID: <1433323159.7108.27.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Sarah Newman <srn@prgmr.com>
Date: Wed, 3 Jun 2015 10:19:19 +0100
In-Reply-To: <556DCC6D.20203@prgmr.com>
References: <556DCC6D.20203@prgmr.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: Re: [Xen-users] internal-db option for xenstored
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Tue, 2015-06-02 at 08:31 -0700, Sarah Newman wrote:
> Is there any particular advantage or disadvantage to using the internal-db option for xenstored?

IIRC --internal-db was added for use in a xenstore stubdom (i.e. without
any filesystem available), I don't know if anyone has ever tried it on
the dom0 process version of xenstored.

That's not to say it wont Just Work using in process mode, but you may
possibly be in unchartered waters somewhat. It'd be very interesting to
try it and see though.

> Unlike CentOS 5, Xen4CentOS does not automatically
> mount /var/lib/xenstored on tmpfs

Making the trivial configuration change to fstab would likely be less
risky overall. You could also raise this as a bug with Xen4CentOS since
it is the sort of thing they may wish to address.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 09:19:46 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:19:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z04po-0000Pe-A4; Wed, 03 Jun 2015 09:19:40 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589ea9610=Ian.Campbell@citrix.com>)
	id 1Z04pn-0000PZ-7w
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:19:39 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	88/75-13517-AA6CE655; Wed, 03 Jun 2015 09:19:38 +0000
X-Env-Sender: prvs=589ea9610=Ian.Campbell@citrix.com
X-Msg-Ref: server-14.tower-31.messagelabs.com!1433323176!10226210!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13461 invoked from network); 3 Jun 2015 09:19:37 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-14.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:19:37 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="271175396"
Message-ID: <1433323159.7108.27.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Sarah Newman <srn@prgmr.com>
Date: Wed, 3 Jun 2015 10:19:19 +0100
In-Reply-To: <556DCC6D.20203@prgmr.com>
References: <556DCC6D.20203@prgmr.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: Re: [Xen-users] internal-db option for xenstored
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Tue, 2015-06-02 at 08:31 -0700, Sarah Newman wrote:
> Is there any particular advantage or disadvantage to using the internal-db option for xenstored?

IIRC --internal-db was added for use in a xenstore stubdom (i.e. without
any filesystem available), I don't know if anyone has ever tried it on
the dom0 process version of xenstored.

That's not to say it wont Just Work using in process mode, but you may
possibly be in unchartered waters somewhat. It'd be very interesting to
try it and see though.

> Unlike CentOS 5, Xen4CentOS does not automatically
> mount /var/lib/xenstored on tmpfs

Making the trivial configuration change to fstab would likely be less
risky overall. You could also raise this as a bug with Xen4CentOS since
it is the sort of thing they may wish to address.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 09:37:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:37:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z056c-0001pJ-Li; Wed, 03 Jun 2015 09:37:02 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589ea9610=Ian.Campbell@citrix.com>)
	id 1Z056b-0001p5-Ke
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:37:01 +0000
Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id
	E6/F7-31880-CBACE655; Wed, 03 Jun 2015 09:37:00 +0000
X-Env-Sender: prvs=589ea9610=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-206.messagelabs.com!1433324218!11436104!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4248 invoked from network); 3 Jun 2015 09:37:00 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:37:00 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="268474668"
Message-ID: <1433323699.7108.35.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: "Chris (Christopher) Brand" <chris.brand@broadcom.com>
Date: Wed, 3 Jun 2015 10:28:19 +0100
In-Reply-To: <4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<1430902156.2660.154.camel@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D796044@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
	<556DD374.1070200@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: Julien Grall <julien.grall@citrix.com>, xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Tue, 2015-06-02 at 22:46 +0000, Chris (Christopher) Brand wrote:
> Hi Julien,
> 
> >For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
> >This register has to be setup correctly by the firmware/bootloader.
> 
> >Do you know if the timer node in the device tree for your platform has a property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is not correctly set.
> 
> It does indeed. I think I understand what's happening, then.
> Bootloader is running only on core 0, and is setting CNTFRQ. When DomU
> runs, its vcpu0 runs on a random physical core. If it happens to run
> on core0, everything is fine. If it happens to run on any other core,
> though, it fails because CNTFRQ is zero. So I need to ensure that
> CNTFRQ is set for the other cores.

Perhaps on secondary pCPU bring up Xen should check that either the
clock frequency was overridden by the DT or that the new CPU's CNTFRQ
says the same as the boot CPU?

Anyone care to send such a patch?

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 09:37:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:37:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z056c-0001pJ-Li; Wed, 03 Jun 2015 09:37:02 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589ea9610=Ian.Campbell@citrix.com>)
	id 1Z056b-0001p5-Ke
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:37:01 +0000
Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id
	E6/F7-31880-CBACE655; Wed, 03 Jun 2015 09:37:00 +0000
X-Env-Sender: prvs=589ea9610=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-206.messagelabs.com!1433324218!11436104!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4248 invoked from network); 3 Jun 2015 09:37:00 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:37:00 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="268474668"
Message-ID: <1433323699.7108.35.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: "Chris (Christopher) Brand" <chris.brand@broadcom.com>
Date: Wed, 3 Jun 2015 10:28:19 +0100
In-Reply-To: <4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<1430902156.2660.154.camel@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D796044@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
	<556DD374.1070200@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: Julien Grall <julien.grall@citrix.com>, xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Tue, 2015-06-02 at 22:46 +0000, Chris (Christopher) Brand wrote:
> Hi Julien,
> 
> >For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
> >This register has to be setup correctly by the firmware/bootloader.
> 
> >Do you know if the timer node in the device tree for your platform has a property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is not correctly set.
> 
> It does indeed. I think I understand what's happening, then.
> Bootloader is running only on core 0, and is setting CNTFRQ. When DomU
> runs, its vcpu0 runs on a random physical core. If it happens to run
> on core0, everything is fine. If it happens to run on any other core,
> though, it fails because CNTFRQ is zero. So I need to ensure that
> CNTFRQ is set for the other cores.

Perhaps on secondary pCPU bring up Xen should check that either the
clock frequency was overridden by the DT or that the new CPU's CNTFRQ
says the same as the boot CPU?

Anyone care to send such a patch?

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 09:59:04 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:59:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z05RV-0003qf-4x; Wed, 03 Jun 2015 09:58:37 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589f75306=julien.grall@citrix.com>)
	id 1Z05RU-0003qa-1Q
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:58:36 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	FA/75-32733-BCFCE655; Wed, 03 Jun 2015 09:58:35 +0000
X-Env-Sender: prvs=589f75306=julien.grall@citrix.com
X-Msg-Ref: server-12.tower-27.messagelabs.com!1433325513!19934370!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 25915 invoked from network); 3 Jun 2015 09:58:34 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-12.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:58:34 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="268478887"
Message-ID: <556ECFC0.7010302@citrix.com>
Date: Wed, 3 Jun 2015 10:58:24 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>, "Chris (Christopher) Brand"
	<chris.brand@broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
	<556DD374.1070200@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
	<1433323699.7108.35.camel@citrix.com>
In-Reply-To: <1433323699.7108.35.camel@citrix.com>
X-DLP: MIA1
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Ian,

On 03/06/2015 10:28, Ian Campbell wrote:
> On Tue, 2015-06-02 at 22:46 +0000, Chris (Christopher) Brand wrote:
>> Hi Julien,
>>
>>> For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
>>> This register has to be setup correctly by the firmware/bootloader.
>>
>>> Do you know if the timer node in the device tree for your platform has a property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is not correctly set.
>>
>> It does indeed. I think I understand what's happening, then.
>> Bootloader is running only on core 0, and is setting CNTFRQ. When DomU
>> runs, its vcpu0 runs on a random physical core. If it happens to run
>> on core0, everything is fine. If it happens to run on any other core,
>> though, it fails because CNTFRQ is zero. So I need to ensure that
>> CNTFRQ is set for the other cores.
>
> Perhaps on secondary pCPU bring up Xen should check that either the
> clock frequency was overridden by the DT or that the new CPU's CNTFRQ
> says the same as the boot CPU?

I was thinking about the same. To add a warning if the "clock-frequency" 
property is checked and verifying that the CNTFRQ is not empty.

>
> Anyone care to send such a patch?

I will do it. I have another patch related to debug registers based on 
this thread too.

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 09:59:04 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 09:59:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z05RV-0003qf-4x; Wed, 03 Jun 2015 09:58:37 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=589f75306=julien.grall@citrix.com>)
	id 1Z05RU-0003qa-1Q
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 09:58:36 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	FA/75-32733-BCFCE655; Wed, 03 Jun 2015 09:58:35 +0000
X-Env-Sender: prvs=589f75306=julien.grall@citrix.com
X-Msg-Ref: server-12.tower-27.messagelabs.com!1433325513!19934370!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 25915 invoked from network); 3 Jun 2015 09:58:34 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-12.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 09:58:34 -0000
X-IronPort-AV: E=Sophos;i="5.13,546,1427760000"; d="scan'208";a="268478887"
Message-ID: <556ECFC0.7010302@citrix.com>
Date: Wed, 3 Jun 2015 10:58:24 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>, "Chris (Christopher) Brand"
	<chris.brand@broadcom.com>
References: <4EE5B48738DDED408878C97C8E050A8B1D783317@SJEXCHMB05.corp.ad.broadcom.com>
	<55547E02.6060604@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D797B1D@SJEXCHMB05.corp.ad.broadcom.com>
	<5555C7EA.9030900@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79B769@SJEXCHMB05.corp.ad.broadcom.com>
	<55605E96.3090608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79D369@SJEXCHMB05.corp.ad.broadcom.com>
	<55643343.3060903@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79EC12@SJEXCHMB05.corp.ad.broadcom.com>
	<5565FEB7.80608@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79F413@SJEXCHMB05.corp.ad.broadcom.com>
	<5566D50A.9050506@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D79FED7@SJEXCHMB05.corp.ad.broadcom.com>
	<556862F0.2030601@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A183E@SJEXCHMB05.corp.ad.broadcom.com>
	<556DD374.1070200@citrix.com>
	<4EE5B48738DDED408878C97C8E050A8B1D7A3400@SJEXCHMB05.corp.ad.broadcom.com>
	<1433323699.7108.35.camel@citrix.com>
In-Reply-To: <1433323699.7108.35.camel@citrix.com>
X-DLP: MIA1
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] Debugging DomU
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Ian,

On 03/06/2015 10:28, Ian Campbell wrote:
> On Tue, 2015-06-02 at 22:46 +0000, Chris (Christopher) Brand wrote:
>> Hi Julien,
>>
>>> For DOMU, the timer frequency is retrieved from CNTFRQ_EL0.
>>> This register has to be setup correctly by the firmware/bootloader.
>>
>>> Do you know if the timer node in the device tree for your platform has a property "clock-frequency"? If yes, it will be very likely CNTFRQ_EL0 is not correctly set.
>>
>> It does indeed. I think I understand what's happening, then.
>> Bootloader is running only on core 0, and is setting CNTFRQ. When DomU
>> runs, its vcpu0 runs on a random physical core. If it happens to run
>> on core0, everything is fine. If it happens to run on any other core,
>> though, it fails because CNTFRQ is zero. So I need to ensure that
>> CNTFRQ is set for the other cores.
>
> Perhaps on secondary pCPU bring up Xen should check that either the
> clock frequency was overridden by the DT or that the new CPU's CNTFRQ
> says the same as the boot CPU?

I was thinking about the same. To add a warning if the "clock-frequency" 
property is checked and verifying that the CNTFRQ is not empty.

>
> Anyone care to send such a patch?

I will do it. I have another patch related to debug registers based on 
this thread too.

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 14:30:02 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 14:30:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z09f9-0002ie-6z; Wed, 03 Jun 2015 14:28:59 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z09f7-0002iZ-S9
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 14:28:58 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	E7/86-23832-92F0F655; Wed, 03 Jun 2015 14:28:57 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-9.tower-31.messagelabs.com!1433341734!9077835!1
X-Originating-IP: [209.85.217.178]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22876 invoked from network); 3 Jun 2015 14:28:55 -0000
Received: from mail-lb0-f178.google.com (HELO mail-lb0-f178.google.com)
	(209.85.217.178)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 14:28:55 -0000
Received: by lbcue7 with SMTP id ue7so8226451lbc.0
	for <xen-users@lists.xen.org>; Wed, 03 Jun 2015 07:28:54 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=eRWwPsfXrz1pDCqwO3e6dde4ZOBtemxY3Ha1+iaiY+E=;
	b=FPOwBfDOJt4PX4KNNLPAjpm1ZoS6jwLw3Mp5iRcxL79bDOTmgYF5wkK19sp+sSPOHl
	9nTtmfSXAh4fgNFBv+HY6mcwlzlyy419KLwyMMIq5ApX2YfvP/Xwj5bLtNVt5TUKSGCN
	pL40EGlIYfsC5MkW/Jlkfz7OX69le/WNy/JATbC45C6g23Q6hSAYCsE8VX8QUt4luo90
	CAnZPRaBrx6qBDXw96GyOP+WQV6YoRk4m9eGteQhDEtNjqYIbxTEPF51WabeAGQ4eVIs
	4JT3Fj/ahYG6MWyKeAKh3V0QIo2I6TeTpTsLgkgb1VEFWcukwXUhO/Fd5gnMqz7JhzUF
	v+9Q==
X-Gm-Message-State: ALoCoQnOBvrd5eq1KzojkopKKxhjI99eoZDWy3uCMajZMA9FVabrWbE6h+zprn5wrhGVqqWjK2AP
MIME-Version: 1.0
X-Received: by 10.112.180.201 with SMTP id dq9mr33301855lbc.78.1433341734725; 
	Wed, 03 Jun 2015 07:28:54 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Wed, 3 Jun 2015 07:28:54 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:6cdf:9b05:f6f0:8d0]
In-Reply-To: <CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
Date: Wed, 3 Jun 2015 16:28:54 +0200
Message-ID: <CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Content-Type: multipart/mixed; boundary=001a11c345c0f165de05179de08b
Cc: xen-users@lists.xen.org, kathy.hadley@dornerworks.com,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--001a11c345c0f165de05179de08b
Content-Type: multipart/alternative; boundary=001a11c345c0f165d705179de089

--001a11c345c0f165d705179de089
Content-Type: text/plain; charset=UTF-8

On Sat, May 30, 2015 at 11:29 AM, Mr Idris <mr@idris.web.id> wrote:

> On 5/29/15, Nathan Studer <nate.studer@gmail.com> wrote:
> > On Fri, May 29, 2015 at 6:45 AM, Mr Idris <mr@idris.web.id> wrote:
> >> Hi,
> >> On 5/28/15, Nathan Studer <nate.studer@gmail.com> wrote:
> >>>> I write small program to call arinc653, it gives me no error when i
> >>>> compiled with parameter -lxenctrl and -luuid. When i run it, it works
> >>>> fine like i set variable to xc_sched_xfair_schedule_set(xci, 0,
> >>>> &sched); and when it's correct will give true. But still when i check
> >>>> 'xl list' still no state running on VM.
> >>>>
> >>>> Name                                        ID   Mem VCPUs      State
> >>>> Time(s)
> >>>> Domain-0                                     0  6258     1     r-----
> >>>> 370.1
> >>>> Debian                                       3   512     1     ------
> >>>>  0.0
> >>>>
> >>>
> >>> Are you sure you have the Debian VM's UUID right?  Can you run "xl
> >>> list -v" to confirm the UUID below?
> >>>
> >> here is "xl list -v"
> >>
> >> Name                                        ID   Mem VCPUs      State
> >>  Time(s)   UUID                            Reason-Code   Security
> >> Label
> >> Domain-0                                     0  6771     1     r-----
> >>    176.2 00000000-0000-0000-0000-000000000000        -
> >> -
> >> Debian                                       3   512     1     ------
> >>      0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -
> >> -
> >>
> >>>> Here is the arinc653_schedule_set
> >>>>
> >>>> #include <stdio.h>
> >>>> #include <xenctrl.h>
> >>>> #include <uuid/uuid.h>
> >>>>
> >>>> int main()
> >>>> {
> >>>>         struct xen_sysctl_arinc653_schedule sched;
> >>>>         xc_interface *xci = xc_interface_open(NULL, NULL, 0);
> >>>>         int i;
> >>>>
> >>>>         /* initialize major frame and number of minor frames */
> >>>>         sched.major_frame = 0;
> >>>>         sched.num_sched_entries = 2;
> >>>>
> >>>>         uuid_parse("", sched.sched_entries[0].dom_handle);
> >>>
> >>> uuid_parse fails when given a null string, so
> >>> sched.sched_entries[0].dom_handle is likely junk.  You can use
> >>> uuid_clear(sched.sched_entries[0].dom_handle) instead to set this
> >>> handle to the NULL string.
> >>>
> >>>>         sched.sched_entries[0].vcpu_id = 0;
> >>>>         sched.sched_entries[0].runtime = 10;
> >>>>         sched.major_frame += sched.sched_entries[0].runtime;
> >>>>
> >>>>         uuid_parse("938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc",
> >>>> sched.sched_entries[1].dom_handle);
> >>>>         sched.sched_entries[1].vcpu_id = 0;
> >>>>         sched.sched_entries[1].runtime = 10;
> >>>>         sched.major_frame += sched.sched_entries[1].runtime;
> >>>>
> >>>>         i = xc_sched_arinc653_schedule_set(xci, 0, &sched);
> >>>>         if (i)
> >>>>         {
> >>>>                 printf("true\n");
> >>>>         } else {
> >>>>                 printf("false\n");
> >>>>         }
> >>>
> >>> Your print statement is somewhat misleading here, since
> >>> xc_sched_arinc653_schedule_set returns 0 on success and something else
> >>> on failure not true/false.
> >>>
> >>>>         return 0;
> >>>> }
> >>>>
> >>>> interestingly when i run this program suddenly the dom0 hang but when
> >>>> i make num_sched_entries bigger than 2, it runs and give me true
> >>>> message.
> >>>
> >>> If sched.sched_entries[0].dom_handle has junk, it will hang because
> >>> dom0 does not have a slice.
> >>>
> >>> If the only thing that you are changing is num_sched_entries than it's
> >>> unlikely that the schedule you are loading is valid, which would
> >>> result in the schedule being rejected and an error being returned.
> >>> The "true" output would seem to confirm this.
> >>>
> >>>      Nate
> >>>
> >>>>
> >>>> Does anyone have any idea what change I need to make to get the
> >>>> scheduler
> >>>> to run
> >>>> the VM?  I appreciate the help.
> >>>>
> >>>> Thanks,
> >>>> Idris
> >>>>
> >>>> _______________________________________________
> >>>> Xen-users mailing list
> >>>> Xen-users@lists.xen.org
> >>>> http://lists.xen.org/xen-users
> >>>
> >>
> >> I tried using 'uuid_clear(sched.sched_entries[0].dom_handle);' or
> >> 'uuid_parse("00000000-0000-0000-0000-000000000000",
> >> sched.sched_entries[0].dom_handle);' both make computer hang.
> >>
> >> I also tried using 'strncpy((char *)sched.sched_entries[0].dom_handle,
> >> dom0_str, sizeof(sched.sched_entries[0].dom_handle));' it gives me
> >> nothing either computer hang or message true/false or VM run.
> >
> > What exactly happens here?  At least one of the messages should print.
> >
>
> I checked using valgrind, there is an error on line 'strncpy((char
> *)sched.sched_entries[0].dom_handle, dom0_str,
> sizeof(sched.sched_entries[0].dom_handle));'
>
> ==2873== Invalid read of size 1
> ==2873==    at 0x4C296D1: strncpy (mc_replace_strmem.c:463)
> ==2873==    by 0x4008C7: main (arinc653_schedule_set.c:21)
> ==2873==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
>
> I don't know what i'm doing wrong ,so any help will be appreciated.
>
> > Can you try memset(sched.sched_entries[0].dom_handle, 0,
> > sizeof(sched.sched_entries[0].dom_handle))?
> >
> > The arinc653 scheduler is doing a memcmp on the entire array, so the
> > entire thing needs to be cleared.
> >
> >      Nate
>
> I tried, but it also suddenly hang dom0. Anyway, how do i get error
> message when it suddenly hang?
>
> Thanks,
> Idris
>
Hi all,

I have managed to call arinc653_scheduler_set.c without error.  The message
when i run it like this

not
error

not
error

hypercall bounce and schedule set finish *

true

* this message because i set on xc_sched_arinc653_schedule_set().


but when i try 'xl list -v' still VM is not running

--001a11c345c0f165d705179de089
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On S=
at, May 30, 2015 at 11:29 AM, Mr Idris <span dir=3D"ltr">&lt;<a href=3D"mai=
lto:mr@idris.web.id" target=3D"_blank">mr@idris.web.id</a>&gt;</span> wrote=
:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex"><div class=3D""><div=
 class=3D"h5">On 5/29/15, Nathan Studer &lt;<a href=3D"mailto:nate.studer@g=
mail.com">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt; On Fri, May 29, 2015 at 6:45 AM, Mr Idris &lt;<a href=3D"mailto:mr@idr=
is.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; Hi,<br>
&gt;&gt; On 5/28/15, Nathan Studer &lt;<a href=3D"mailto:nate.studer@gmail.=
com">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt; I write small program to call arinc653, it gives me no err=
or when i<br>
&gt;&gt;&gt;&gt; compiled with parameter -lxenctrl and -luuid. When i run i=
t, it works<br>
&gt;&gt;&gt;&gt; fine like i set variable to xc_sched_xfair_schedule_set(xc=
i, 0,<br>
&gt;&gt;&gt;&gt; &amp;sched); and when it&#39;s correct will give true. But=
 still when i check<br>
&gt;&gt;&gt;&gt; &#39;xl list&#39; still no state running on VM.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;&gt;&gt; Time(s)<br>
&gt;&gt;&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A00=C2=A0 6258=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;&gt;&gt; 370.1<br>
&gt;&gt;&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0----=
--<br>
&gt;&gt;&gt;&gt;=C2=A0 0.0<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Are you sure you have the Debian VM&#39;s UUID right?=C2=A0 Ca=
n you run &quot;xl<br>
&gt;&gt;&gt; list -v&quot; to confirm the UUID below?<br>
&gt;&gt;&gt;<br>
&gt;&gt; here is &quot;xl list -v&quot;<br>
&gt;&gt;<br>
&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;=C2=A0 Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=
=C2=A0 =C2=A0Security<br>
&gt;&gt; Label<br>
&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A00=C2=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;=C2=A0 =C2=A0 176.2 00000000-0000-0000-0000-000000000000=C2=A0 =C2=
=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0=
 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt;<br>
&gt;&gt;&gt;&gt; Here is the arinc653_schedule_set<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;stdio.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;xenctrl.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;uuid/uuid.h&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; int main()<br>
&gt;&gt;&gt;&gt; {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0struct xen_sysctl_arinc65=
3_schedule sched;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0xc_interface *xci =3D xc_=
interface_open(NULL, NULL, 0);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0int i;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0/* initialize major frame=
 and number of minor frames */<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame =3D 0;<=
br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.num_sched_entries =
=3D 2;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;&quot;, =
sched.sched_entries[0].dom_handle);<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; uuid_parse fails when given a null string, so<br>
&gt;&gt;&gt; sched.sched_entries[0].dom_handle is likely junk.=C2=A0 You ca=
n use<br>
&gt;&gt;&gt; uuid_clear(sched.sched_entries[0].dom_handle) instead to set t=
his<br>
&gt;&gt;&gt; handle to the NULL string.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[0].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;938b9c5b=
-8d9d-402a-9be0-0e0cc4cf67dc&quot;,<br>
&gt;&gt;&gt;&gt; sched.sched_entries[1].dom_handle);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[1].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0i =3D xc_sched_arinc653_s=
chedule_set(xci, 0, &amp;sched);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0if (i)<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0{<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;true\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0} else {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;false\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0}<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Your print statement is somewhat misleading here, since<br>
&gt;&gt;&gt; xc_sched_arinc653_schedule_set returns 0 on success and someth=
ing else<br>
&gt;&gt;&gt; on failure not true/false.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0return 0;<br>
&gt;&gt;&gt;&gt; }<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; interestingly when i run this program suddenly the dom0 ha=
ng but when<br>
&gt;&gt;&gt;&gt; i make num_sched_entries bigger than 2, it runs and give m=
e true<br>
&gt;&gt;&gt;&gt; message.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If sched.sched_entries[0].dom_handle has junk, it will hang be=
cause<br>
&gt;&gt;&gt; dom0 does not have a slice.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If the only thing that you are changing is num_sched_entries t=
han it&#39;s<br>
&gt;&gt;&gt; unlikely that the schedule you are loading is valid, which wou=
ld<br>
&gt;&gt;&gt; result in the schedule being rejected and an error being retur=
ned.<br>
&gt;&gt;&gt; The &quot;true&quot; output would seem to confirm this.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Does anyone have any idea what change I need to make to ge=
t the<br>
&gt;&gt;&gt;&gt; scheduler<br>
&gt;&gt;&gt;&gt; to run<br>
&gt;&gt;&gt;&gt; the VM?=C2=A0 I appreciate the help.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Thanks,<br>
&gt;&gt;&gt;&gt; Idris<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt;&gt; Xen-users mailing list<br>
&gt;&gt;&gt;&gt; <a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists=
.xen.org</a><br>
&gt;&gt;&gt;&gt; <a href=3D"http://lists.xen.org/xen-users" target=3D"_blan=
k">http://lists.xen.org/xen-users</a><br>
&gt;&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; I tried using &#39;uuid_clear(sched.sched_entries[0].dom_handle);&=
#39; or<br>
&gt;&gt; &#39;uuid_parse(&quot;00000000-0000-0000-0000-000000000000&quot;,<=
br>
&gt;&gt; sched.sched_entries[0].dom_handle);&#39; both make computer hang.<=
br>
&gt;&gt;<br>
&gt;&gt; I also tried using &#39;strncpy((char *)sched.sched_entries[0].dom=
_handle,<br>
&gt;&gt; dom0_str, sizeof(sched.sched_entries[0].dom_handle));&#39; it give=
s me<br>
&gt;&gt; nothing either computer hang or message true/false or VM run.<br>
&gt;<br>
&gt; What exactly happens here?=C2=A0 At least one of the messages should p=
rint.<br>
&gt;<br>
<br>
</div></div>I checked using valgrind, there is an error on line &#39;strncp=
y((char<br>
<span class=3D"">*)sched.sched_entries[0].dom_handle, dom0_str,<br>
sizeof(sched.sched_entries[0].dom_handle));&#39;<br>
<br>
</span>=3D=3D2873=3D=3D Invalid read of size 1<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 at 0x4C296D1: strncpy (mc_replace_strmem.c:46=
3)<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 by 0x4008C7: main (arinc653_schedule_set.c:21=
)<br>
=3D=3D2873=3D=3D=C2=A0 Address 0x0 is not stack&#39;d, malloc&#39;d or (rec=
ently) free&#39;d<br>
<br>
I don&#39;t know what i&#39;m doing wrong ,so any help will be appreciated.=
<br>
<span class=3D""><br>
&gt; Can you try memset(sched.sched_entries[0].dom_handle, 0,<br>
&gt; sizeof(sched.sched_entries[0].dom_handle))?<br>
&gt;<br>
&gt; The arinc653 scheduler is doing a memcmp on the entire array, so the<b=
r>
&gt; entire thing needs to be cleared.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
<br>
</span>I tried, but it also suddenly hang dom0. Anyway, how do i get error<=
br>
message when it suddenly hang?<br>
<br>
Thanks,<br>
Idris<br>
</blockquote></div>Hi all, <br><br></div><div class=3D"gmail_extra">I have =
managed to call arinc653_scheduler_set.c without error.=C2=A0 The message w=
hen i run it like this <br><br>not error=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 <br>not error=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 <br>hypercall bounce and schedule set finish *=C2=A0 =C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>true=C2=A0=C2=A0 <br><br>=
</div><div class=3D"gmail_extra">* this message because i set on xc_sched_a=
rinc653_schedule_set(). <br><br><br></div><div class=3D"gmail_extra">but wh=
en i try &#39;xl list -v&#39; still VM is not running <br></div></div>

--001a11c345c0f165d705179de089--
--001a11c345c0f165de05179de08b
Content-Type: text/x-csrc; charset=US-ASCII; name="arinc653_scheduler_set.c"
Content-Disposition: attachment; filename="arinc653_scheduler_set.c"
Content-Transfer-Encoding: base64
X-Attachment-Id: f_iagsmp8w0
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--001a11c345c0f165de05179de08b
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--001a11c345c0f165de05179de08b--


From xen-users-bounces@lists.xen.org Wed Jun 03 14:30:02 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 14:30:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z09f9-0002ie-6z; Wed, 03 Jun 2015 14:28:59 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z09f7-0002iZ-S9
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 14:28:58 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	E7/86-23832-92F0F655; Wed, 03 Jun 2015 14:28:57 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-9.tower-31.messagelabs.com!1433341734!9077835!1
X-Originating-IP: [209.85.217.178]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22876 invoked from network); 3 Jun 2015 14:28:55 -0000
Received: from mail-lb0-f178.google.com (HELO mail-lb0-f178.google.com)
	(209.85.217.178)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 14:28:55 -0000
Received: by lbcue7 with SMTP id ue7so8226451lbc.0
	for <xen-users@lists.xen.org>; Wed, 03 Jun 2015 07:28:54 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=eRWwPsfXrz1pDCqwO3e6dde4ZOBtemxY3Ha1+iaiY+E=;
	b=FPOwBfDOJt4PX4KNNLPAjpm1ZoS6jwLw3Mp5iRcxL79bDOTmgYF5wkK19sp+sSPOHl
	9nTtmfSXAh4fgNFBv+HY6mcwlzlyy419KLwyMMIq5ApX2YfvP/Xwj5bLtNVt5TUKSGCN
	pL40EGlIYfsC5MkW/Jlkfz7OX69le/WNy/JATbC45C6g23Q6hSAYCsE8VX8QUt4luo90
	CAnZPRaBrx6qBDXw96GyOP+WQV6YoRk4m9eGteQhDEtNjqYIbxTEPF51WabeAGQ4eVIs
	4JT3Fj/ahYG6MWyKeAKh3V0QIo2I6TeTpTsLgkgb1VEFWcukwXUhO/Fd5gnMqz7JhzUF
	v+9Q==
X-Gm-Message-State: ALoCoQnOBvrd5eq1KzojkopKKxhjI99eoZDWy3uCMajZMA9FVabrWbE6h+zprn5wrhGVqqWjK2AP
MIME-Version: 1.0
X-Received: by 10.112.180.201 with SMTP id dq9mr33301855lbc.78.1433341734725; 
	Wed, 03 Jun 2015 07:28:54 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Wed, 3 Jun 2015 07:28:54 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:6cdf:9b05:f6f0:8d0]
In-Reply-To: <CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
Date: Wed, 3 Jun 2015 16:28:54 +0200
Message-ID: <CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Content-Type: multipart/mixed; boundary=001a11c345c0f165de05179de08b
Cc: xen-users@lists.xen.org, kathy.hadley@dornerworks.com,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--001a11c345c0f165de05179de08b
Content-Type: multipart/alternative; boundary=001a11c345c0f165d705179de089

--001a11c345c0f165d705179de089
Content-Type: text/plain; charset=UTF-8

On Sat, May 30, 2015 at 11:29 AM, Mr Idris <mr@idris.web.id> wrote:

> On 5/29/15, Nathan Studer <nate.studer@gmail.com> wrote:
> > On Fri, May 29, 2015 at 6:45 AM, Mr Idris <mr@idris.web.id> wrote:
> >> Hi,
> >> On 5/28/15, Nathan Studer <nate.studer@gmail.com> wrote:
> >>>> I write small program to call arinc653, it gives me no error when i
> >>>> compiled with parameter -lxenctrl and -luuid. When i run it, it works
> >>>> fine like i set variable to xc_sched_xfair_schedule_set(xci, 0,
> >>>> &sched); and when it's correct will give true. But still when i check
> >>>> 'xl list' still no state running on VM.
> >>>>
> >>>> Name                                        ID   Mem VCPUs      State
> >>>> Time(s)
> >>>> Domain-0                                     0  6258     1     r-----
> >>>> 370.1
> >>>> Debian                                       3   512     1     ------
> >>>>  0.0
> >>>>
> >>>
> >>> Are you sure you have the Debian VM's UUID right?  Can you run "xl
> >>> list -v" to confirm the UUID below?
> >>>
> >> here is "xl list -v"
> >>
> >> Name                                        ID   Mem VCPUs      State
> >>  Time(s)   UUID                            Reason-Code   Security
> >> Label
> >> Domain-0                                     0  6771     1     r-----
> >>    176.2 00000000-0000-0000-0000-000000000000        -
> >> -
> >> Debian                                       3   512     1     ------
> >>      0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -
> >> -
> >>
> >>>> Here is the arinc653_schedule_set
> >>>>
> >>>> #include <stdio.h>
> >>>> #include <xenctrl.h>
> >>>> #include <uuid/uuid.h>
> >>>>
> >>>> int main()
> >>>> {
> >>>>         struct xen_sysctl_arinc653_schedule sched;
> >>>>         xc_interface *xci = xc_interface_open(NULL, NULL, 0);
> >>>>         int i;
> >>>>
> >>>>         /* initialize major frame and number of minor frames */
> >>>>         sched.major_frame = 0;
> >>>>         sched.num_sched_entries = 2;
> >>>>
> >>>>         uuid_parse("", sched.sched_entries[0].dom_handle);
> >>>
> >>> uuid_parse fails when given a null string, so
> >>> sched.sched_entries[0].dom_handle is likely junk.  You can use
> >>> uuid_clear(sched.sched_entries[0].dom_handle) instead to set this
> >>> handle to the NULL string.
> >>>
> >>>>         sched.sched_entries[0].vcpu_id = 0;
> >>>>         sched.sched_entries[0].runtime = 10;
> >>>>         sched.major_frame += sched.sched_entries[0].runtime;
> >>>>
> >>>>         uuid_parse("938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc",
> >>>> sched.sched_entries[1].dom_handle);
> >>>>         sched.sched_entries[1].vcpu_id = 0;
> >>>>         sched.sched_entries[1].runtime = 10;
> >>>>         sched.major_frame += sched.sched_entries[1].runtime;
> >>>>
> >>>>         i = xc_sched_arinc653_schedule_set(xci, 0, &sched);
> >>>>         if (i)
> >>>>         {
> >>>>                 printf("true\n");
> >>>>         } else {
> >>>>                 printf("false\n");
> >>>>         }
> >>>
> >>> Your print statement is somewhat misleading here, since
> >>> xc_sched_arinc653_schedule_set returns 0 on success and something else
> >>> on failure not true/false.
> >>>
> >>>>         return 0;
> >>>> }
> >>>>
> >>>> interestingly when i run this program suddenly the dom0 hang but when
> >>>> i make num_sched_entries bigger than 2, it runs and give me true
> >>>> message.
> >>>
> >>> If sched.sched_entries[0].dom_handle has junk, it will hang because
> >>> dom0 does not have a slice.
> >>>
> >>> If the only thing that you are changing is num_sched_entries than it's
> >>> unlikely that the schedule you are loading is valid, which would
> >>> result in the schedule being rejected and an error being returned.
> >>> The "true" output would seem to confirm this.
> >>>
> >>>      Nate
> >>>
> >>>>
> >>>> Does anyone have any idea what change I need to make to get the
> >>>> scheduler
> >>>> to run
> >>>> the VM?  I appreciate the help.
> >>>>
> >>>> Thanks,
> >>>> Idris
> >>>>
> >>>> _______________________________________________
> >>>> Xen-users mailing list
> >>>> Xen-users@lists.xen.org
> >>>> http://lists.xen.org/xen-users
> >>>
> >>
> >> I tried using 'uuid_clear(sched.sched_entries[0].dom_handle);' or
> >> 'uuid_parse("00000000-0000-0000-0000-000000000000",
> >> sched.sched_entries[0].dom_handle);' both make computer hang.
> >>
> >> I also tried using 'strncpy((char *)sched.sched_entries[0].dom_handle,
> >> dom0_str, sizeof(sched.sched_entries[0].dom_handle));' it gives me
> >> nothing either computer hang or message true/false or VM run.
> >
> > What exactly happens here?  At least one of the messages should print.
> >
>
> I checked using valgrind, there is an error on line 'strncpy((char
> *)sched.sched_entries[0].dom_handle, dom0_str,
> sizeof(sched.sched_entries[0].dom_handle));'
>
> ==2873== Invalid read of size 1
> ==2873==    at 0x4C296D1: strncpy (mc_replace_strmem.c:463)
> ==2873==    by 0x4008C7: main (arinc653_schedule_set.c:21)
> ==2873==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
>
> I don't know what i'm doing wrong ,so any help will be appreciated.
>
> > Can you try memset(sched.sched_entries[0].dom_handle, 0,
> > sizeof(sched.sched_entries[0].dom_handle))?
> >
> > The arinc653 scheduler is doing a memcmp on the entire array, so the
> > entire thing needs to be cleared.
> >
> >      Nate
>
> I tried, but it also suddenly hang dom0. Anyway, how do i get error
> message when it suddenly hang?
>
> Thanks,
> Idris
>
Hi all,

I have managed to call arinc653_scheduler_set.c without error.  The message
when i run it like this

not
error

not
error

hypercall bounce and schedule set finish *

true

* this message because i set on xc_sched_arinc653_schedule_set().


but when i try 'xl list -v' still VM is not running

--001a11c345c0f165d705179de089
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On S=
at, May 30, 2015 at 11:29 AM, Mr Idris <span dir=3D"ltr">&lt;<a href=3D"mai=
lto:mr@idris.web.id" target=3D"_blank">mr@idris.web.id</a>&gt;</span> wrote=
:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex"><div class=3D""><div=
 class=3D"h5">On 5/29/15, Nathan Studer &lt;<a href=3D"mailto:nate.studer@g=
mail.com">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt; On Fri, May 29, 2015 at 6:45 AM, Mr Idris &lt;<a href=3D"mailto:mr@idr=
is.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; Hi,<br>
&gt;&gt; On 5/28/15, Nathan Studer &lt;<a href=3D"mailto:nate.studer@gmail.=
com">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt; I write small program to call arinc653, it gives me no err=
or when i<br>
&gt;&gt;&gt;&gt; compiled with parameter -lxenctrl and -luuid. When i run i=
t, it works<br>
&gt;&gt;&gt;&gt; fine like i set variable to xc_sched_xfair_schedule_set(xc=
i, 0,<br>
&gt;&gt;&gt;&gt; &amp;sched); and when it&#39;s correct will give true. But=
 still when i check<br>
&gt;&gt;&gt;&gt; &#39;xl list&#39; still no state running on VM.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;&gt;&gt; Time(s)<br>
&gt;&gt;&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A00=C2=A0 6258=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;&gt;&gt; 370.1<br>
&gt;&gt;&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0----=
--<br>
&gt;&gt;&gt;&gt;=C2=A0 0.0<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Are you sure you have the Debian VM&#39;s UUID right?=C2=A0 Ca=
n you run &quot;xl<br>
&gt;&gt;&gt; list -v&quot; to confirm the UUID below?<br>
&gt;&gt;&gt;<br>
&gt;&gt; here is &quot;xl list -v&quot;<br>
&gt;&gt;<br>
&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;=C2=A0 Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=
=C2=A0 =C2=A0Security<br>
&gt;&gt; Label<br>
&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A00=C2=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;=C2=A0 =C2=A0 176.2 00000000-0000-0000-0000-000000000000=C2=A0 =C2=
=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0=
 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt;<br>
&gt;&gt;&gt;&gt; Here is the arinc653_schedule_set<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;stdio.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;xenctrl.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;uuid/uuid.h&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; int main()<br>
&gt;&gt;&gt;&gt; {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0struct xen_sysctl_arinc65=
3_schedule sched;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0xc_interface *xci =3D xc_=
interface_open(NULL, NULL, 0);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0int i;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0/* initialize major frame=
 and number of minor frames */<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame =3D 0;<=
br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.num_sched_entries =
=3D 2;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;&quot;, =
sched.sched_entries[0].dom_handle);<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; uuid_parse fails when given a null string, so<br>
&gt;&gt;&gt; sched.sched_entries[0].dom_handle is likely junk.=C2=A0 You ca=
n use<br>
&gt;&gt;&gt; uuid_clear(sched.sched_entries[0].dom_handle) instead to set t=
his<br>
&gt;&gt;&gt; handle to the NULL string.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[0].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;938b9c5b=
-8d9d-402a-9be0-0e0cc4cf67dc&quot;,<br>
&gt;&gt;&gt;&gt; sched.sched_entries[1].dom_handle);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[1].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0i =3D xc_sched_arinc653_s=
chedule_set(xci, 0, &amp;sched);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0if (i)<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0{<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;true\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0} else {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;false\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0}<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Your print statement is somewhat misleading here, since<br>
&gt;&gt;&gt; xc_sched_arinc653_schedule_set returns 0 on success and someth=
ing else<br>
&gt;&gt;&gt; on failure not true/false.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0return 0;<br>
&gt;&gt;&gt;&gt; }<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; interestingly when i run this program suddenly the dom0 ha=
ng but when<br>
&gt;&gt;&gt;&gt; i make num_sched_entries bigger than 2, it runs and give m=
e true<br>
&gt;&gt;&gt;&gt; message.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If sched.sched_entries[0].dom_handle has junk, it will hang be=
cause<br>
&gt;&gt;&gt; dom0 does not have a slice.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If the only thing that you are changing is num_sched_entries t=
han it&#39;s<br>
&gt;&gt;&gt; unlikely that the schedule you are loading is valid, which wou=
ld<br>
&gt;&gt;&gt; result in the schedule being rejected and an error being retur=
ned.<br>
&gt;&gt;&gt; The &quot;true&quot; output would seem to confirm this.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Does anyone have any idea what change I need to make to ge=
t the<br>
&gt;&gt;&gt;&gt; scheduler<br>
&gt;&gt;&gt;&gt; to run<br>
&gt;&gt;&gt;&gt; the VM?=C2=A0 I appreciate the help.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Thanks,<br>
&gt;&gt;&gt;&gt; Idris<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt;&gt; Xen-users mailing list<br>
&gt;&gt;&gt;&gt; <a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists=
.xen.org</a><br>
&gt;&gt;&gt;&gt; <a href=3D"http://lists.xen.org/xen-users" target=3D"_blan=
k">http://lists.xen.org/xen-users</a><br>
&gt;&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; I tried using &#39;uuid_clear(sched.sched_entries[0].dom_handle);&=
#39; or<br>
&gt;&gt; &#39;uuid_parse(&quot;00000000-0000-0000-0000-000000000000&quot;,<=
br>
&gt;&gt; sched.sched_entries[0].dom_handle);&#39; both make computer hang.<=
br>
&gt;&gt;<br>
&gt;&gt; I also tried using &#39;strncpy((char *)sched.sched_entries[0].dom=
_handle,<br>
&gt;&gt; dom0_str, sizeof(sched.sched_entries[0].dom_handle));&#39; it give=
s me<br>
&gt;&gt; nothing either computer hang or message true/false or VM run.<br>
&gt;<br>
&gt; What exactly happens here?=C2=A0 At least one of the messages should p=
rint.<br>
&gt;<br>
<br>
</div></div>I checked using valgrind, there is an error on line &#39;strncp=
y((char<br>
<span class=3D"">*)sched.sched_entries[0].dom_handle, dom0_str,<br>
sizeof(sched.sched_entries[0].dom_handle));&#39;<br>
<br>
</span>=3D=3D2873=3D=3D Invalid read of size 1<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 at 0x4C296D1: strncpy (mc_replace_strmem.c:46=
3)<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 by 0x4008C7: main (arinc653_schedule_set.c:21=
)<br>
=3D=3D2873=3D=3D=C2=A0 Address 0x0 is not stack&#39;d, malloc&#39;d or (rec=
ently) free&#39;d<br>
<br>
I don&#39;t know what i&#39;m doing wrong ,so any help will be appreciated.=
<br>
<span class=3D""><br>
&gt; Can you try memset(sched.sched_entries[0].dom_handle, 0,<br>
&gt; sizeof(sched.sched_entries[0].dom_handle))?<br>
&gt;<br>
&gt; The arinc653 scheduler is doing a memcmp on the entire array, so the<b=
r>
&gt; entire thing needs to be cleared.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
<br>
</span>I tried, but it also suddenly hang dom0. Anyway, how do i get error<=
br>
message when it suddenly hang?<br>
<br>
Thanks,<br>
Idris<br>
</blockquote></div>Hi all, <br><br></div><div class=3D"gmail_extra">I have =
managed to call arinc653_scheduler_set.c without error.=C2=A0 The message w=
hen i run it like this <br><br>not error=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 <br>not error=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 <br>hypercall bounce and schedule set finish *=C2=A0 =C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>true=C2=A0=C2=A0 <br><br>=
</div><div class=3D"gmail_extra">* this message because i set on xc_sched_a=
rinc653_schedule_set(). <br><br><br></div><div class=3D"gmail_extra">but wh=
en i try &#39;xl list -v&#39; still VM is not running <br></div></div>

--001a11c345c0f165d705179de089--
--001a11c345c0f165de05179de08b
Content-Type: text/x-csrc; charset=US-ASCII; name="arinc653_scheduler_set.c"
Content-Disposition: attachment; filename="arinc653_scheduler_set.c"
Content-Transfer-Encoding: base64
X-Attachment-Id: f_iagsmp8w0
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--001a11c345c0f165de05179de08b
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--001a11c345c0f165de05179de08b--


From xen-users-bounces@lists.xen.org Wed Jun 03 14:35:14 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 14:35:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z09kw-00039H-5u; Wed, 03 Jun 2015 14:34:58 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z09ku-00039C-LD
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 14:34:56 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	C5/EB-08244-F801F655; Wed, 03 Jun 2015 14:34:55 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-12.tower-206.messagelabs.com!1433342094!11558243!1
X-Originating-IP: [209.85.217.175]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14020 invoked from network); 3 Jun 2015 14:34:54 -0000
Received: from mail-lb0-f175.google.com (HELO mail-lb0-f175.google.com)
	(209.85.217.175)
	by server-12.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 14:34:54 -0000
Received: by lbcmx3 with SMTP id mx3so8341258lbc.1
	for <xen-users@lists.xen.org>; Wed, 03 Jun 2015 07:34:53 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=ibGf1sJSxhGNLuW4R1u+UYBnDzX5GwCkHU6DRobhyos=;
	b=OyVEX6oqMfQafBsp/i4k7rfdg08YUuFG1O6Dq2dZHDd0nLvDkgPId3pvgJRS5A66eP
	WbJV3wg6AnnY8t5uF33hyOfpqYYAt6a3wX3Bh1Wi01zFdIecVhp/lXCxHXcRlu0jFdL8
	tOswmihu6oFygNNoQYwp/m3mzTNWWYnr+ddirbpPMMznr+o7Rg0DWkgAQYrV3dd/iU7y
	PUpNFnd+5X0uN1355yZqTGS+Wyk8GuOC9FGHVQPHfe2MANcfgRbv/aQluusmkw5guzsB
	4+E5Q31bd8BF3eEAWfBnlp/AmkEy2E+Z12IsbVHHx3jtEK2wiHYnbU5XacD+O6NLWip/
	qICA==
X-Gm-Message-State: ALoCoQn86PZiLjuVYUNuB60lO2zdrR0OTBUVCV02/UgMRWd3ZOxCjw7drfGARhunUwn0w7JVL9F0
MIME-Version: 1.0
X-Received: by 10.112.180.201 with SMTP id dq9mr33337574lbc.78.1433342093895; 
	Wed, 03 Jun 2015 07:34:53 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Wed, 3 Jun 2015 07:34:53 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:6cdf:9b05:f6f0:8d0]
In-Reply-To: <CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
Date: Wed, 3 Jun 2015 16:34:53 +0200
Message-ID: <CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Cc: xen-users@lists.xen.org, kathy.hadley@dornerworks.com,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============5645281821736019157=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============5645281821736019157==
Content-Type: multipart/alternative; boundary=001a11c345c05933b305179df6f6

--001a11c345c05933b305179df6f6
Content-Type: text/plain; charset=UTF-8

On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:

> On Sat, May 30, 2015 at 11:29 AM, Mr Idris <mr@idris.web.id> wrote:
>
>> On 5/29/15, Nathan Studer <nate.studer@gmail.com> wrote:
>> > On Fri, May 29, 2015 at 6:45 AM, Mr Idris <mr@idris.web.id> wrote:
>> >> Hi,
>> >> On 5/28/15, Nathan Studer <nate.studer@gmail.com> wrote:
>> >>>> I write small program to call arinc653, it gives me no error when i
>> >>>> compiled with parameter -lxenctrl and -luuid. When i run it, it works
>> >>>> fine like i set variable to xc_sched_xfair_schedule_set(xci, 0,
>> >>>> &sched); and when it's correct will give true. But still when i check
>> >>>> 'xl list' still no state running on VM.
>> >>>>
>> >>>> Name                                        ID   Mem VCPUs      State
>> >>>> Time(s)
>> >>>> Domain-0                                     0  6258     1     r-----
>> >>>> 370.1
>> >>>> Debian                                       3   512     1     ------
>> >>>>  0.0
>> >>>>
>> >>>
>> >>> Are you sure you have the Debian VM's UUID right?  Can you run "xl
>> >>> list -v" to confirm the UUID below?
>> >>>
>> >> here is "xl list -v"
>> >>
>> >> Name                                        ID   Mem VCPUs      State
>> >>  Time(s)   UUID                            Reason-Code   Security
>> >> Label
>> >> Domain-0                                     0  6771     1     r-----
>> >>    176.2 00000000-0000-0000-0000-000000000000        -
>> >> -
>> >> Debian                                       3   512     1     ------
>> >>      0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -
>> >> -
>> >>
>> >>>> Here is the arinc653_schedule_set
>> >>>>
>> >>>> #include <stdio.h>
>> >>>> #include <xenctrl.h>
>> >>>> #include <uuid/uuid.h>
>> >>>>
>> >>>> int main()
>> >>>> {
>> >>>>         struct xen_sysctl_arinc653_schedule sched;
>> >>>>         xc_interface *xci = xc_interface_open(NULL, NULL, 0);
>> >>>>         int i;
>> >>>>
>> >>>>         /* initialize major frame and number of minor frames */
>> >>>>         sched.major_frame = 0;
>> >>>>         sched.num_sched_entries = 2;
>> >>>>
>> >>>>         uuid_parse("", sched.sched_entries[0].dom_handle);
>> >>>
>> >>> uuid_parse fails when given a null string, so
>> >>> sched.sched_entries[0].dom_handle is likely junk.  You can use
>> >>> uuid_clear(sched.sched_entries[0].dom_handle) instead to set this
>> >>> handle to the NULL string.
>> >>>
>> >>>>         sched.sched_entries[0].vcpu_id = 0;
>> >>>>         sched.sched_entries[0].runtime = 10;
>> >>>>         sched.major_frame += sched.sched_entries[0].runtime;
>> >>>>
>> >>>>         uuid_parse("938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc",
>> >>>> sched.sched_entries[1].dom_handle);
>> >>>>         sched.sched_entries[1].vcpu_id = 0;
>> >>>>         sched.sched_entries[1].runtime = 10;
>> >>>>         sched.major_frame += sched.sched_entries[1].runtime;
>> >>>>
>> >>>>         i = xc_sched_arinc653_schedule_set(xci, 0, &sched);
>> >>>>         if (i)
>> >>>>         {
>> >>>>                 printf("true\n");
>> >>>>         } else {
>> >>>>                 printf("false\n");
>> >>>>         }
>> >>>
>> >>> Your print statement is somewhat misleading here, since
>> >>> xc_sched_arinc653_schedule_set returns 0 on success and something else
>> >>> on failure not true/false.
>> >>>
>> >>>>         return 0;
>> >>>> }
>> >>>>
>> >>>> interestingly when i run this program suddenly the dom0 hang but when
>> >>>> i make num_sched_entries bigger than 2, it runs and give me true
>> >>>> message.
>> >>>
>> >>> If sched.sched_entries[0].dom_handle has junk, it will hang because
>> >>> dom0 does not have a slice.
>> >>>
>> >>> If the only thing that you are changing is num_sched_entries than it's
>> >>> unlikely that the schedule you are loading is valid, which would
>> >>> result in the schedule being rejected and an error being returned.
>> >>> The "true" output would seem to confirm this.
>> >>>
>> >>>      Nate
>> >>>
>> >>>>
>> >>>> Does anyone have any idea what change I need to make to get the
>> >>>> scheduler
>> >>>> to run
>> >>>> the VM?  I appreciate the help.
>> >>>>
>> >>>> Thanks,
>> >>>> Idris
>> >>>>
>> >>>> _______________________________________________
>> >>>> Xen-users mailing list
>> >>>> Xen-users@lists.xen.org
>> >>>> http://lists.xen.org/xen-users
>> >>>
>> >>
>> >> I tried using 'uuid_clear(sched.sched_entries[0].dom_handle);' or
>> >> 'uuid_parse("00000000-0000-0000-0000-000000000000",
>> >> sched.sched_entries[0].dom_handle);' both make computer hang.
>> >>
>> >> I also tried using 'strncpy((char *)sched.sched_entries[0].dom_handle,
>> >> dom0_str, sizeof(sched.sched_entries[0].dom_handle));' it gives me
>> >> nothing either computer hang or message true/false or VM run.
>> >
>> > What exactly happens here?  At least one of the messages should print.
>> >
>>
>> I checked using valgrind, there is an error on line 'strncpy((char
>> *)sched.sched_entries[0].dom_handle, dom0_str,
>> sizeof(sched.sched_entries[0].dom_handle));'
>>
>> ==2873== Invalid read of size 1
>> ==2873==    at 0x4C296D1: strncpy (mc_replace_strmem.c:463)
>> ==2873==    by 0x4008C7: main (arinc653_schedule_set.c:21)
>> ==2873==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
>>
>> I don't know what i'm doing wrong ,so any help will be appreciated.
>>
>> > Can you try memset(sched.sched_entries[0].dom_handle, 0,
>> > sizeof(sched.sched_entries[0].dom_handle))?
>> >
>> > The arinc653 scheduler is doing a memcmp on the entire array, so the
>> > entire thing needs to be cleared.
>> >
>> >      Nate
>>
>> I tried, but it also suddenly hang dom0. Anyway, how do i get error
>> message when it suddenly hang?
>>
>> Thanks,
>> Idris
>>
> Hi all,
>
> I have managed to call arinc653_scheduler_set.c without error.  The
> message when i run it like this
>
> not
> error
>
> not
> error
>
> hypercall bounce and schedule set finish *
>
> true
>
> * this message because i set on xc_sched_arinc653_schedule_set().
>
>
> but when i try 'xl list -v' still VM is not running
>

I'm sorry accidentally i press send but i haven't finished.

I continue, but when i try 'xl list -v' still VM is not running like this :
Name                                        ID   Mem VCPUs      State
Time(s)   UUID                            Reason-Code   Security
Label
Domain-0                                     0  6771     1     r-----
10.0 00000000-0000-0000-0000-000000000000        -
-
Debian                                       1   512     1     ------
0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -


Something weird after the small program run, the computer is becoming
really slow. Is it something related to runtime?
Does anyone have any idea what change I need to make to get the scheduler
to run
the VM?  I appreciate the help.

Thanks,
Idris

--001a11c345c05933b305179df6f6
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On W=
ed, Jun 3, 2015 at 4:28 PM, Mr Idris <span dir=3D"ltr">&lt;<a href=3D"mailt=
o:mr@idris.web.id" target=3D"_blank">mr@idris.web.id</a>&gt;</span> wrote:<=
br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div =
class=3D"gmail_extra"><div><div class=3D"h5"><div class=3D"gmail_quote">On =
Sat, May 30, 2015 at 11:29 AM, Mr Idris <span dir=3D"ltr">&lt;<a href=3D"ma=
ilto:mr@idris.web.id" target=3D"_blank">mr@idris.web.id</a>&gt;</span> wrot=
e:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div>On 5/29/1=
5, Nathan Studer &lt;<a href=3D"mailto:nate.studer@gmail.com" target=3D"_bl=
ank">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt; On Fri, May 29, 2015 at 6:45 AM, Mr Idris &lt;<a href=3D"mailto:mr@idr=
is.web.id" target=3D"_blank">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; Hi,<br>
&gt;&gt; On 5/28/15, Nathan Studer &lt;<a href=3D"mailto:nate.studer@gmail.=
com" target=3D"_blank">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt; I write small program to call arinc653, it gives me no err=
or when i<br>
&gt;&gt;&gt;&gt; compiled with parameter -lxenctrl and -luuid. When i run i=
t, it works<br>
&gt;&gt;&gt;&gt; fine like i set variable to xc_sched_xfair_schedule_set(xc=
i, 0,<br>
&gt;&gt;&gt;&gt; &amp;sched); and when it&#39;s correct will give true. But=
 still when i check<br>
&gt;&gt;&gt;&gt; &#39;xl list&#39; still no state running on VM.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;&gt;&gt; Time(s)<br>
&gt;&gt;&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A00=C2=A0 6258=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;&gt;&gt; 370.1<br>
&gt;&gt;&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0----=
--<br>
&gt;&gt;&gt;&gt;=C2=A0 0.0<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Are you sure you have the Debian VM&#39;s UUID right?=C2=A0 Ca=
n you run &quot;xl<br>
&gt;&gt;&gt; list -v&quot; to confirm the UUID below?<br>
&gt;&gt;&gt;<br>
&gt;&gt; here is &quot;xl list -v&quot;<br>
&gt;&gt;<br>
&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;=C2=A0 Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=
=C2=A0 =C2=A0Security<br>
&gt;&gt; Label<br>
&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A00=C2=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;=C2=A0 =C2=A0 176.2 00000000-0000-0000-0000-000000000000=C2=A0 =C2=
=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0=
 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt;<br>
&gt;&gt;&gt;&gt; Here is the arinc653_schedule_set<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;stdio.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;xenctrl.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;uuid/uuid.h&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; int main()<br>
&gt;&gt;&gt;&gt; {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0struct xen_sysctl_arinc65=
3_schedule sched;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0xc_interface *xci =3D xc_=
interface_open(NULL, NULL, 0);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0int i;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0/* initialize major frame=
 and number of minor frames */<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame =3D 0;<=
br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.num_sched_entries =
=3D 2;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;&quot;, =
sched.sched_entries[0].dom_handle);<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; uuid_parse fails when given a null string, so<br>
&gt;&gt;&gt; sched.sched_entries[0].dom_handle is likely junk.=C2=A0 You ca=
n use<br>
&gt;&gt;&gt; uuid_clear(sched.sched_entries[0].dom_handle) instead to set t=
his<br>
&gt;&gt;&gt; handle to the NULL string.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[0].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;938b9c5b=
-8d9d-402a-9be0-0e0cc4cf67dc&quot;,<br>
&gt;&gt;&gt;&gt; sched.sched_entries[1].dom_handle);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[1].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0i =3D xc_sched_arinc653_s=
chedule_set(xci, 0, &amp;sched);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0if (i)<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0{<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;true\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0} else {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;false\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0}<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Your print statement is somewhat misleading here, since<br>
&gt;&gt;&gt; xc_sched_arinc653_schedule_set returns 0 on success and someth=
ing else<br>
&gt;&gt;&gt; on failure not true/false.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0return 0;<br>
&gt;&gt;&gt;&gt; }<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; interestingly when i run this program suddenly the dom0 ha=
ng but when<br>
&gt;&gt;&gt;&gt; i make num_sched_entries bigger than 2, it runs and give m=
e true<br>
&gt;&gt;&gt;&gt; message.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If sched.sched_entries[0].dom_handle has junk, it will hang be=
cause<br>
&gt;&gt;&gt; dom0 does not have a slice.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If the only thing that you are changing is num_sched_entries t=
han it&#39;s<br>
&gt;&gt;&gt; unlikely that the schedule you are loading is valid, which wou=
ld<br>
&gt;&gt;&gt; result in the schedule being rejected and an error being retur=
ned.<br>
&gt;&gt;&gt; The &quot;true&quot; output would seem to confirm this.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Does anyone have any idea what change I need to make to ge=
t the<br>
&gt;&gt;&gt;&gt; scheduler<br>
&gt;&gt;&gt;&gt; to run<br>
&gt;&gt;&gt;&gt; the VM?=C2=A0 I appreciate the help.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Thanks,<br>
&gt;&gt;&gt;&gt; Idris<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt;&gt; Xen-users mailing list<br>
&gt;&gt;&gt;&gt; <a href=3D"mailto:Xen-users@lists.xen.org" target=3D"_blan=
k">Xen-users@lists.xen.org</a><br>
&gt;&gt;&gt;&gt; <a href=3D"http://lists.xen.org/xen-users" target=3D"_blan=
k">http://lists.xen.org/xen-users</a><br>
&gt;&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; I tried using &#39;uuid_clear(sched.sched_entries[0].dom_handle);&=
#39; or<br>
&gt;&gt; &#39;uuid_parse(&quot;00000000-0000-0000-0000-000000000000&quot;,<=
br>
&gt;&gt; sched.sched_entries[0].dom_handle);&#39; both make computer hang.<=
br>
&gt;&gt;<br>
&gt;&gt; I also tried using &#39;strncpy((char *)sched.sched_entries[0].dom=
_handle,<br>
&gt;&gt; dom0_str, sizeof(sched.sched_entries[0].dom_handle));&#39; it give=
s me<br>
&gt;&gt; nothing either computer hang or message true/false or VM run.<br>
&gt;<br>
&gt; What exactly happens here?=C2=A0 At least one of the messages should p=
rint.<br>
&gt;<br>
<br>
</div></div>I checked using valgrind, there is an error on line &#39;strncp=
y((char<br>
<span>*)sched.sched_entries[0].dom_handle, dom0_str,<br>
sizeof(sched.sched_entries[0].dom_handle));&#39;<br>
<br>
</span>=3D=3D2873=3D=3D Invalid read of size 1<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 at 0x4C296D1: strncpy (mc_replace_strmem.c:46=
3)<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 by 0x4008C7: main (arinc653_schedule_set.c:21=
)<br>
=3D=3D2873=3D=3D=C2=A0 Address 0x0 is not stack&#39;d, malloc&#39;d or (rec=
ently) free&#39;d<br>
<br>
I don&#39;t know what i&#39;m doing wrong ,so any help will be appreciated.=
<br>
<span><br>
&gt; Can you try memset(sched.sched_entries[0].dom_handle, 0,<br>
&gt; sizeof(sched.sched_entries[0].dom_handle))?<br>
&gt;<br>
&gt; The arinc653 scheduler is doing a memcmp on the entire array, so the<b=
r>
&gt; entire thing needs to be cleared.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
<br>
</span>I tried, but it also suddenly hang dom0. Anyway, how do i get error<=
br>
message when it suddenly hang?<br>
<br>
Thanks,<br>
Idris<br>
</blockquote></div></div></div>Hi all, <br><br></div><div class=3D"gmail_ex=
tra">I have managed to call arinc653_scheduler_set.c without error.=C2=A0 T=
he message when i run it like this <br><br>not error=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>not error=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 <br>hypercall bounce and schedule set finish *=C2=A0 =C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>true=C2=A0=C2=
=A0 <br><br></div><div class=3D"gmail_extra">* this message because i set o=
n xc_sched_arinc653_schedule_set(). <br><br><br></div><div class=3D"gmail_e=
xtra">but when i try &#39;xl list -v&#39; still VM is not running <br></div=
></div></blockquote><div><br><div>I&#39;m sorry accidentally i press send b=
ut i haven&#39;t finished. <br><br>I continue, but when i try &#39;xl list =
-v&#39; still VM is not running like this : <br>Name=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
 ID=C2=A0=C2=A0 Mem VCPUs=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 State=C2=A0=C2=A0 T=
ime(s)=C2=A0=C2=A0 UUID=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=20
Reason-Code=C2=A0=C2=A0 Security Label=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>Domain-0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
 0=C2=A0 6771=C2=A0=C2=A0=C2=A0=C2=A0 1=C2=A0=C2=A0=C2=A0=C2=A0 r-----=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 10.0=20
00000000-0000-0000-0000-000000000000=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 -=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=20
-=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 <br>Debian=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
 1=C2=A0=C2=A0 512=C2=A0=C2=A0=C2=A0=C2=A0 1=C2=A0=C2=A0=C2=A0=C2=A0 ------=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 0.0=20
938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 -=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 - <br><br><br></div><div>Something weird after the sm=
all program run, the computer is becoming really slow. Is it something rela=
ted to runtime?<br>Does anyone have any idea what change I need to make to =
get the scheduler to run<br>
the VM?=C2=A0 I appreciate the help.<br></div><div><br></div><div>Thanks, <=
br></div><div>Idris<br></div><div><br></div>=C2=A0</div></div><br></div></d=
iv>

--001a11c345c05933b305179df6f6--


--===============5645281821736019157==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============5645281821736019157==--


From xen-users-bounces@lists.xen.org Wed Jun 03 14:35:14 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 14:35:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z09kw-00039H-5u; Wed, 03 Jun 2015 14:34:58 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z09ku-00039C-LD
	for xen-users@lists.xen.org; Wed, 03 Jun 2015 14:34:56 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	C5/EB-08244-F801F655; Wed, 03 Jun 2015 14:34:55 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-12.tower-206.messagelabs.com!1433342094!11558243!1
X-Originating-IP: [209.85.217.175]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14020 invoked from network); 3 Jun 2015 14:34:54 -0000
Received: from mail-lb0-f175.google.com (HELO mail-lb0-f175.google.com)
	(209.85.217.175)
	by server-12.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	3 Jun 2015 14:34:54 -0000
Received: by lbcmx3 with SMTP id mx3so8341258lbc.1
	for <xen-users@lists.xen.org>; Wed, 03 Jun 2015 07:34:53 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=ibGf1sJSxhGNLuW4R1u+UYBnDzX5GwCkHU6DRobhyos=;
	b=OyVEX6oqMfQafBsp/i4k7rfdg08YUuFG1O6Dq2dZHDd0nLvDkgPId3pvgJRS5A66eP
	WbJV3wg6AnnY8t5uF33hyOfpqYYAt6a3wX3Bh1Wi01zFdIecVhp/lXCxHXcRlu0jFdL8
	tOswmihu6oFygNNoQYwp/m3mzTNWWYnr+ddirbpPMMznr+o7Rg0DWkgAQYrV3dd/iU7y
	PUpNFnd+5X0uN1355yZqTGS+Wyk8GuOC9FGHVQPHfe2MANcfgRbv/aQluusmkw5guzsB
	4+E5Q31bd8BF3eEAWfBnlp/AmkEy2E+Z12IsbVHHx3jtEK2wiHYnbU5XacD+O6NLWip/
	qICA==
X-Gm-Message-State: ALoCoQn86PZiLjuVYUNuB60lO2zdrR0OTBUVCV02/UgMRWd3ZOxCjw7drfGARhunUwn0w7JVL9F0
MIME-Version: 1.0
X-Received: by 10.112.180.201 with SMTP id dq9mr33337574lbc.78.1433342093895; 
	Wed, 03 Jun 2015 07:34:53 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Wed, 3 Jun 2015 07:34:53 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:6cdf:9b05:f6f0:8d0]
In-Reply-To: <CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
Date: Wed, 3 Jun 2015 16:34:53 +0200
Message-ID: <CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Cc: xen-users@lists.xen.org, kathy.hadley@dornerworks.com,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============5645281821736019157=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============5645281821736019157==
Content-Type: multipart/alternative; boundary=001a11c345c05933b305179df6f6

--001a11c345c05933b305179df6f6
Content-Type: text/plain; charset=UTF-8

On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:

> On Sat, May 30, 2015 at 11:29 AM, Mr Idris <mr@idris.web.id> wrote:
>
>> On 5/29/15, Nathan Studer <nate.studer@gmail.com> wrote:
>> > On Fri, May 29, 2015 at 6:45 AM, Mr Idris <mr@idris.web.id> wrote:
>> >> Hi,
>> >> On 5/28/15, Nathan Studer <nate.studer@gmail.com> wrote:
>> >>>> I write small program to call arinc653, it gives me no error when i
>> >>>> compiled with parameter -lxenctrl and -luuid. When i run it, it works
>> >>>> fine like i set variable to xc_sched_xfair_schedule_set(xci, 0,
>> >>>> &sched); and when it's correct will give true. But still when i check
>> >>>> 'xl list' still no state running on VM.
>> >>>>
>> >>>> Name                                        ID   Mem VCPUs      State
>> >>>> Time(s)
>> >>>> Domain-0                                     0  6258     1     r-----
>> >>>> 370.1
>> >>>> Debian                                       3   512     1     ------
>> >>>>  0.0
>> >>>>
>> >>>
>> >>> Are you sure you have the Debian VM's UUID right?  Can you run "xl
>> >>> list -v" to confirm the UUID below?
>> >>>
>> >> here is "xl list -v"
>> >>
>> >> Name                                        ID   Mem VCPUs      State
>> >>  Time(s)   UUID                            Reason-Code   Security
>> >> Label
>> >> Domain-0                                     0  6771     1     r-----
>> >>    176.2 00000000-0000-0000-0000-000000000000        -
>> >> -
>> >> Debian                                       3   512     1     ------
>> >>      0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -
>> >> -
>> >>
>> >>>> Here is the arinc653_schedule_set
>> >>>>
>> >>>> #include <stdio.h>
>> >>>> #include <xenctrl.h>
>> >>>> #include <uuid/uuid.h>
>> >>>>
>> >>>> int main()
>> >>>> {
>> >>>>         struct xen_sysctl_arinc653_schedule sched;
>> >>>>         xc_interface *xci = xc_interface_open(NULL, NULL, 0);
>> >>>>         int i;
>> >>>>
>> >>>>         /* initialize major frame and number of minor frames */
>> >>>>         sched.major_frame = 0;
>> >>>>         sched.num_sched_entries = 2;
>> >>>>
>> >>>>         uuid_parse("", sched.sched_entries[0].dom_handle);
>> >>>
>> >>> uuid_parse fails when given a null string, so
>> >>> sched.sched_entries[0].dom_handle is likely junk.  You can use
>> >>> uuid_clear(sched.sched_entries[0].dom_handle) instead to set this
>> >>> handle to the NULL string.
>> >>>
>> >>>>         sched.sched_entries[0].vcpu_id = 0;
>> >>>>         sched.sched_entries[0].runtime = 10;
>> >>>>         sched.major_frame += sched.sched_entries[0].runtime;
>> >>>>
>> >>>>         uuid_parse("938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc",
>> >>>> sched.sched_entries[1].dom_handle);
>> >>>>         sched.sched_entries[1].vcpu_id = 0;
>> >>>>         sched.sched_entries[1].runtime = 10;
>> >>>>         sched.major_frame += sched.sched_entries[1].runtime;
>> >>>>
>> >>>>         i = xc_sched_arinc653_schedule_set(xci, 0, &sched);
>> >>>>         if (i)
>> >>>>         {
>> >>>>                 printf("true\n");
>> >>>>         } else {
>> >>>>                 printf("false\n");
>> >>>>         }
>> >>>
>> >>> Your print statement is somewhat misleading here, since
>> >>> xc_sched_arinc653_schedule_set returns 0 on success and something else
>> >>> on failure not true/false.
>> >>>
>> >>>>         return 0;
>> >>>> }
>> >>>>
>> >>>> interestingly when i run this program suddenly the dom0 hang but when
>> >>>> i make num_sched_entries bigger than 2, it runs and give me true
>> >>>> message.
>> >>>
>> >>> If sched.sched_entries[0].dom_handle has junk, it will hang because
>> >>> dom0 does not have a slice.
>> >>>
>> >>> If the only thing that you are changing is num_sched_entries than it's
>> >>> unlikely that the schedule you are loading is valid, which would
>> >>> result in the schedule being rejected and an error being returned.
>> >>> The "true" output would seem to confirm this.
>> >>>
>> >>>      Nate
>> >>>
>> >>>>
>> >>>> Does anyone have any idea what change I need to make to get the
>> >>>> scheduler
>> >>>> to run
>> >>>> the VM?  I appreciate the help.
>> >>>>
>> >>>> Thanks,
>> >>>> Idris
>> >>>>
>> >>>> _______________________________________________
>> >>>> Xen-users mailing list
>> >>>> Xen-users@lists.xen.org
>> >>>> http://lists.xen.org/xen-users
>> >>>
>> >>
>> >> I tried using 'uuid_clear(sched.sched_entries[0].dom_handle);' or
>> >> 'uuid_parse("00000000-0000-0000-0000-000000000000",
>> >> sched.sched_entries[0].dom_handle);' both make computer hang.
>> >>
>> >> I also tried using 'strncpy((char *)sched.sched_entries[0].dom_handle,
>> >> dom0_str, sizeof(sched.sched_entries[0].dom_handle));' it gives me
>> >> nothing either computer hang or message true/false or VM run.
>> >
>> > What exactly happens here?  At least one of the messages should print.
>> >
>>
>> I checked using valgrind, there is an error on line 'strncpy((char
>> *)sched.sched_entries[0].dom_handle, dom0_str,
>> sizeof(sched.sched_entries[0].dom_handle));'
>>
>> ==2873== Invalid read of size 1
>> ==2873==    at 0x4C296D1: strncpy (mc_replace_strmem.c:463)
>> ==2873==    by 0x4008C7: main (arinc653_schedule_set.c:21)
>> ==2873==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
>>
>> I don't know what i'm doing wrong ,so any help will be appreciated.
>>
>> > Can you try memset(sched.sched_entries[0].dom_handle, 0,
>> > sizeof(sched.sched_entries[0].dom_handle))?
>> >
>> > The arinc653 scheduler is doing a memcmp on the entire array, so the
>> > entire thing needs to be cleared.
>> >
>> >      Nate
>>
>> I tried, but it also suddenly hang dom0. Anyway, how do i get error
>> message when it suddenly hang?
>>
>> Thanks,
>> Idris
>>
> Hi all,
>
> I have managed to call arinc653_scheduler_set.c without error.  The
> message when i run it like this
>
> not
> error
>
> not
> error
>
> hypercall bounce and schedule set finish *
>
> true
>
> * this message because i set on xc_sched_arinc653_schedule_set().
>
>
> but when i try 'xl list -v' still VM is not running
>

I'm sorry accidentally i press send but i haven't finished.

I continue, but when i try 'xl list -v' still VM is not running like this :
Name                                        ID   Mem VCPUs      State
Time(s)   UUID                            Reason-Code   Security
Label
Domain-0                                     0  6771     1     r-----
10.0 00000000-0000-0000-0000-000000000000        -
-
Debian                                       1   512     1     ------
0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -


Something weird after the small program run, the computer is becoming
really slow. Is it something related to runtime?
Does anyone have any idea what change I need to make to get the scheduler
to run
the VM?  I appreciate the help.

Thanks,
Idris

--001a11c345c05933b305179df6f6
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On W=
ed, Jun 3, 2015 at 4:28 PM, Mr Idris <span dir=3D"ltr">&lt;<a href=3D"mailt=
o:mr@idris.web.id" target=3D"_blank">mr@idris.web.id</a>&gt;</span> wrote:<=
br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div =
class=3D"gmail_extra"><div><div class=3D"h5"><div class=3D"gmail_quote">On =
Sat, May 30, 2015 at 11:29 AM, Mr Idris <span dir=3D"ltr">&lt;<a href=3D"ma=
ilto:mr@idris.web.id" target=3D"_blank">mr@idris.web.id</a>&gt;</span> wrot=
e:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div>On 5/29/1=
5, Nathan Studer &lt;<a href=3D"mailto:nate.studer@gmail.com" target=3D"_bl=
ank">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt; On Fri, May 29, 2015 at 6:45 AM, Mr Idris &lt;<a href=3D"mailto:mr@idr=
is.web.id" target=3D"_blank">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; Hi,<br>
&gt;&gt; On 5/28/15, Nathan Studer &lt;<a href=3D"mailto:nate.studer@gmail.=
com" target=3D"_blank">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt; I write small program to call arinc653, it gives me no err=
or when i<br>
&gt;&gt;&gt;&gt; compiled with parameter -lxenctrl and -luuid. When i run i=
t, it works<br>
&gt;&gt;&gt;&gt; fine like i set variable to xc_sched_xfair_schedule_set(xc=
i, 0,<br>
&gt;&gt;&gt;&gt; &amp;sched); and when it&#39;s correct will give true. But=
 still when i check<br>
&gt;&gt;&gt;&gt; &#39;xl list&#39; still no state running on VM.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;&gt;&gt; Time(s)<br>
&gt;&gt;&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A00=C2=A0 6258=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;&gt;&gt; 370.1<br>
&gt;&gt;&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0----=
--<br>
&gt;&gt;&gt;&gt;=C2=A0 0.0<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Are you sure you have the Debian VM&#39;s UUID right?=C2=A0 Ca=
n you run &quot;xl<br>
&gt;&gt;&gt; list -v&quot; to confirm the UUID below?<br>
&gt;&gt;&gt;<br>
&gt;&gt; here is &quot;xl list -v&quot;<br>
&gt;&gt;<br>
&gt;&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt;=C2=A0 Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=
=C2=A0 =C2=A0Security<br>
&gt;&gt; Label<br>
&gt;&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A00=C2=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt;=C2=A0 =C2=A0 176.2 00000000-0000-0000-0000-000000000000=C2=A0 =C2=
=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A03=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0=
 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; -<br>
&gt;&gt;<br>
&gt;&gt;&gt;&gt; Here is the arinc653_schedule_set<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;stdio.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;xenctrl.h&gt;<br>
&gt;&gt;&gt;&gt; #include &lt;uuid/uuid.h&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; int main()<br>
&gt;&gt;&gt;&gt; {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0struct xen_sysctl_arinc65=
3_schedule sched;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0xc_interface *xci =3D xc_=
interface_open(NULL, NULL, 0);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0int i;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0/* initialize major frame=
 and number of minor frames */<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame =3D 0;<=
br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.num_sched_entries =
=3D 2;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;&quot;, =
sched.sched_entries[0].dom_handle);<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; uuid_parse fails when given a null string, so<br>
&gt;&gt;&gt; sched.sched_entries[0].dom_handle is likely junk.=C2=A0 You ca=
n use<br>
&gt;&gt;&gt; uuid_clear(sched.sched_entries[0].dom_handle) instead to set t=
his<br>
&gt;&gt;&gt; handle to the NULL string.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[0].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[0].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0uuid_parse(&quot;938b9c5b=
-8d9d-402a-9be0-0e0cc4cf67dc&quot;,<br>
&gt;&gt;&gt;&gt; sched.sched_entries[1].dom_handle);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].vc=
pu_id =3D 0;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.sched_entries[1].ru=
ntime =3D 10;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sched.major_frame +=3D sc=
hed.sched_entries[1].runtime;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0i =3D xc_sched_arinc653_s=
chedule_set(xci, 0, &amp;sched);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0if (i)<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0{<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;true\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0} else {<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0printf(&quot;false\n&quot;);<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0}<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Your print statement is somewhat misleading here, since<br>
&gt;&gt;&gt; xc_sched_arinc653_schedule_set returns 0 on success and someth=
ing else<br>
&gt;&gt;&gt; on failure not true/false.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0return 0;<br>
&gt;&gt;&gt;&gt; }<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; interestingly when i run this program suddenly the dom0 ha=
ng but when<br>
&gt;&gt;&gt;&gt; i make num_sched_entries bigger than 2, it runs and give m=
e true<br>
&gt;&gt;&gt;&gt; message.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If sched.sched_entries[0].dom_handle has junk, it will hang be=
cause<br>
&gt;&gt;&gt; dom0 does not have a slice.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If the only thing that you are changing is num_sched_entries t=
han it&#39;s<br>
&gt;&gt;&gt; unlikely that the schedule you are loading is valid, which wou=
ld<br>
&gt;&gt;&gt; result in the schedule being rejected and an error being retur=
ned.<br>
&gt;&gt;&gt; The &quot;true&quot; output would seem to confirm this.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Does anyone have any idea what change I need to make to ge=
t the<br>
&gt;&gt;&gt;&gt; scheduler<br>
&gt;&gt;&gt;&gt; to run<br>
&gt;&gt;&gt;&gt; the VM?=C2=A0 I appreciate the help.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Thanks,<br>
&gt;&gt;&gt;&gt; Idris<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt;&gt; Xen-users mailing list<br>
&gt;&gt;&gt;&gt; <a href=3D"mailto:Xen-users@lists.xen.org" target=3D"_blan=
k">Xen-users@lists.xen.org</a><br>
&gt;&gt;&gt;&gt; <a href=3D"http://lists.xen.org/xen-users" target=3D"_blan=
k">http://lists.xen.org/xen-users</a><br>
&gt;&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; I tried using &#39;uuid_clear(sched.sched_entries[0].dom_handle);&=
#39; or<br>
&gt;&gt; &#39;uuid_parse(&quot;00000000-0000-0000-0000-000000000000&quot;,<=
br>
&gt;&gt; sched.sched_entries[0].dom_handle);&#39; both make computer hang.<=
br>
&gt;&gt;<br>
&gt;&gt; I also tried using &#39;strncpy((char *)sched.sched_entries[0].dom=
_handle,<br>
&gt;&gt; dom0_str, sizeof(sched.sched_entries[0].dom_handle));&#39; it give=
s me<br>
&gt;&gt; nothing either computer hang or message true/false or VM run.<br>
&gt;<br>
&gt; What exactly happens here?=C2=A0 At least one of the messages should p=
rint.<br>
&gt;<br>
<br>
</div></div>I checked using valgrind, there is an error on line &#39;strncp=
y((char<br>
<span>*)sched.sched_entries[0].dom_handle, dom0_str,<br>
sizeof(sched.sched_entries[0].dom_handle));&#39;<br>
<br>
</span>=3D=3D2873=3D=3D Invalid read of size 1<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 at 0x4C296D1: strncpy (mc_replace_strmem.c:46=
3)<br>
=3D=3D2873=3D=3D=C2=A0 =C2=A0 by 0x4008C7: main (arinc653_schedule_set.c:21=
)<br>
=3D=3D2873=3D=3D=C2=A0 Address 0x0 is not stack&#39;d, malloc&#39;d or (rec=
ently) free&#39;d<br>
<br>
I don&#39;t know what i&#39;m doing wrong ,so any help will be appreciated.=
<br>
<span><br>
&gt; Can you try memset(sched.sched_entries[0].dom_handle, 0,<br>
&gt; sizeof(sched.sched_entries[0].dom_handle))?<br>
&gt;<br>
&gt; The arinc653 scheduler is doing a memcmp on the entire array, so the<b=
r>
&gt; entire thing needs to be cleared.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
<br>
</span>I tried, but it also suddenly hang dom0. Anyway, how do i get error<=
br>
message when it suddenly hang?<br>
<br>
Thanks,<br>
Idris<br>
</blockquote></div></div></div>Hi all, <br><br></div><div class=3D"gmail_ex=
tra">I have managed to call arinc653_scheduler_set.c without error.=C2=A0 T=
he message when i run it like this <br><br>not error=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>not error=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 <br>hypercall bounce and schedule set finish *=C2=A0 =C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>true=C2=A0=C2=
=A0 <br><br></div><div class=3D"gmail_extra">* this message because i set o=
n xc_sched_arinc653_schedule_set(). <br><br><br></div><div class=3D"gmail_e=
xtra">but when i try &#39;xl list -v&#39; still VM is not running <br></div=
></div></blockquote><div><br><div>I&#39;m sorry accidentally i press send b=
ut i haven&#39;t finished. <br><br>I continue, but when i try &#39;xl list =
-v&#39; still VM is not running like this : <br>Name=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
 ID=C2=A0=C2=A0 Mem VCPUs=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 State=C2=A0=C2=A0 T=
ime(s)=C2=A0=C2=A0 UUID=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=20
Reason-Code=C2=A0=C2=A0 Security Label=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>Domain-0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
 0=C2=A0 6771=C2=A0=C2=A0=C2=A0=C2=A0 1=C2=A0=C2=A0=C2=A0=C2=A0 r-----=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 10.0=20
00000000-0000-0000-0000-000000000000=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 -=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=20
-=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 <br>Debian=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
 1=C2=A0=C2=A0 512=C2=A0=C2=A0=C2=A0=C2=A0 1=C2=A0=C2=A0=C2=A0=C2=A0 ------=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 0.0=20
938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 -=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 - <br><br><br></div><div>Something weird after the sm=
all program run, the computer is becoming really slow. Is it something rela=
ted to runtime?<br>Does anyone have any idea what change I need to make to =
get the scheduler to run<br>
the VM?=C2=A0 I appreciate the help.<br></div><div><br></div><div>Thanks, <=
br></div><div>Idris<br></div><div><br></div>=C2=A0</div></div><br></div></d=
iv>

--001a11c345c05933b305179df6f6--


--===============5645281821736019157==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============5645281821736019157==--


From xen-users-bounces@lists.xen.org Wed Jun 03 22:58:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 22:58:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0HbJ-0001O2-B5; Wed, 03 Jun 2015 22:57:33 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <simon.waterman@zynstra.com>) id 1Z0HbH-0001Nx-JP
	for xen-users@lists.xenproject.org; Wed, 03 Jun 2015 22:57:31 +0000
Received: from [85.158.137.68] by server-9.bemta-3.messagelabs.com id
	C1/ED-17050-A568F655; Wed, 03 Jun 2015 22:57:30 +0000
X-Env-Sender: simon.waterman@zynstra.com
X-Msg-Ref: server-6.tower-31.messagelabs.com!1433372246!8477875!1
X-Originating-IP: [157.55.234.78]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11016 invoked from network); 3 Jun 2015 22:57:27 -0000
Received: from mail-db3on0078.outbound.protection.outlook.com (HELO
	emea01-db3-obe.outbound.protection.outlook.com) (157.55.234.78)
	by server-6.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	3 Jun 2015 22:57:27 -0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com (25.163.166.157) by
	VI1PR04MB1501.eurprd04.prod.outlook.com (25.163.166.157) with Microsoft
	SMTP Server (TLS) id 15.1.172.22; Wed, 3 Jun 2015 22:57:24 +0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) by
	VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) with mapi id
	15.01.0172.012; Wed, 3 Jun 2015 22:57:24 +0000
From: Simon Waterman <simon.waterman@zynstra.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Thread-Topic: Kernel BUG in page_alloc.c (mismatched start and end zone) using
	xl generated e820 map
Thread-Index: AQHQnk90VBaaD7EKZkuu0AsbDhRjrg==
Date: Wed, 3 Jun 2015 22:57:23 +0000
Message-ID: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [193.63.64.25]
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:VI1PR04MB1501;
x-microsoft-antispam-prvs: <VI1PR04MB150125DC8E47401BAD62683883B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
	RULEID:(601004)(520003)(5005006)(3002001); SRVR:VI1PR04MB1501;
	BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB1501; 
x-forefront-prvs: 05961EBAFC
x-forefront-antispam-report: SFV:NSPM;
	SFS:(10009020)(6009001)(189002)(199003)(62966003)(5002640100001)(575784001)(5001830100001)(68736005)(86362001)(122556002)(107886002)(16601075003)(5001960100002)(87936001)(110136002)(106356001)(77156002)(189998001)(76576001)(2656002)(19580405001)(50986999)(106116001)(66066001)(5890100001)(229853001)(2501003)(64706001)(5001860100001)(102836002)(97736004)(105586002)(46102003)(40100003)(2900100001)(33656002)(15975445007)(92566002)(2351001)(81156007)(450100001)(74316001)(19580395003)(101416001)(54356999)(4001540100001);
	DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB1501;
	H:VI1PR04MB1501.eurprd04.prod.outlook.com; FPR:; SPF:None;
	PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: zynstra.com does not designate
	permitted sender hosts)
MIME-Version: 1.0
X-OriginatorOrg: zynstra.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jun 2015 22:57:23.5310 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4c2b4c7a-32de-4e00-8ebe-361d80e7a665
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB1501
Subject: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and end
 zone) using xl generated e820 map
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi,

We're hitting the kernel BUG below in one of our VMs running on Xen 4.4 and
Linux kernel 3.13.0.  We use the xl toolstack and are using PCI pass-through
to pass network cards and a disk controller.  It happens on a variety of our
hardware but not all servers and it seems to be related to the e820 map
passed by xl.

The problem occurs when we put the server under heavy load - the 'dd' command
at the top of the stack trace seems to be sufficient to cause the problem if
run a few times.

We didn't get a problem with previous versions of Xen (we were using 4.2.2)
but at that time we were using xend and as I understand it the RAM map
provided to the guest is fabricated rather than based upon the real hardware map.

root@server1:/home/user0# DD_PERF="$(dd if=/dev/zero of=/data/zeros bs=1M \
count=4096 2>&1 | tail -n 1 | cut -d ',' -f '2 3' ; rm -f /data/zeros)"
[  814.365651] ------------[ cut here ]------------
[  814.365668] kernel BUG at /build/ci/git/build/Kernel/kernel-trusty-domu/work/ubuntu-precise/mm/page_alloc.c:955!
[  814.365675] invalid opcode: 0000 [#1] SMP
[  814.365681] Modules linked in: drbd lru_cache libcrc32c xen_blkback xen_netback
xt_addrtype xt_multiport xt_hl nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT
xt_tcpudp xt_owner nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack
xt_NFLOG nfnetlink_log nfnetlink ipt_ULOG ip6table_filter ip6_tables iptable_filter
ip_tables x_tables x86_pkg_temp_thermal dm_multipath coretemp crct10dif_pclmul
scsi_dh crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul
glue_helper ablk_helper cryptd tmem xenfs xen_privcmd zfs(POF) zunicode(POF)
zcommon(POF) znvpair(POF) spl(OF) zavl(POF) dm_mirror dm_region_hash dm_log raid0
multipath linear dm_raid raid456 async_raid6_recov async_memcpy async_pq async_xor
async_tx raid1 raid10 xor igb i2c_algo_bit dca ahci raid6_pq libahci ptp pps_core aufs
[  814.365772] CPU: 0 PID: 9772 Comm: dd Tainted: PF          O 3.13.0-34-trusty-domu #60~precise1
[  814.365779] task: ffff88005d022fc0 ti: ffff880007a22000 task.ti: ffff880007a22000
[  814.365786] RIP: e030:[<ffffffff81145f84>]  [<ffffffff81145f84>] move_freepages+0x104/0x110
[  814.365799] RSP: e02b:ffff880007a23698  EFLAGS: 00010006
[  814.365803] RAX: ffff88010a24f000 RBX: 0000000000000000 RCX: 0000000000000001
[  814.365808] RDX: ffffea000428ffc0 RSI: ffffea0004288000 RDI: ffff88010a24ff00
[  814.365812] RBP: ffff880007a236a0 R08: ffff88010a24ff00 R09: 0000000000000000
[  814.365817] R10: 0000000000000000 R11: ffffea00042880a0 R12: ffffea0004288080
[  814.365821] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000014
[  814.365833] FS:  00007fed6b790740(0000) GS:ffff880109800000(0000) knlGS:ffff88001f800000
[  814.365838] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[  814.365843] CR2: 00007f8ebd683ab0 CR3: 00000000581af000 CR4: 0000000000002660
[  814.365848] Stack:
[  814.365851]  ffffffff81146003 ffff880007a23718 ffffffff811478eb 0000000000017614
[  814.365859]  ffffffff81009ebd ffff88010a24ff88 ffffffff00000000 ffffea00042880a0
[  814.365866]  ffff88010a24ff00 0000000200000000 0000000000000000 0000000000000002
[  814.365874] Call Trace:
[  814.365880]  [<ffffffff81146003>] ? move_freepages_block+0x73/0x80
[  814.365887]  [<ffffffff811478eb>] __rmqueue+0x39b/0x4a0
[  814.365896]  [<ffffffff81009ebd>] ? xen_force_evtchn_callback+0xd/0x10
[  814.365902]  [<ffffffff81149e5c>] get_page_from_freelist+0x68c/0x930
[  814.365909]  [<ffffffff8114a27b>] __alloc_pages_nodemask+0x17b/0xb60
[  814.365915]  [<ffffffff8100a742>] ? check_events+0x12/0x20
[  814.365923]  [<ffffffff811e17fe>] ? __find_get_block+0xbe/0x230
[  814.365932]  [<ffffffff8115ecc9>] ? zone_statistics+0x89/0xa0
[  814.365939]  [<ffffffff81188983>] alloc_pages_current+0xa3/0x160
[  814.365946]  [<ffffffff811913a5>] new_slab+0x295/0x320
[  814.365954]  [<ffffffff8169a9b7>] __slab_alloc+0x2a8/0x459
[  814.365960]  [<ffffffff811e0d11>] ? alloc_buffer_head+0x21/0x70
[  814.365968]  [<ffffffff81277f0d>] ? jbd2_journal_dirty_metadata+0xcd/0x2d0
[  814.365975]  [<ffffffff81193213>] kmem_cache_alloc+0x183/0x1d0
[  814.365982]  [<ffffffff811e0d11>] alloc_buffer_head+0x21/0x70
[  814.365990]  [<ffffffff811a3406>] ? __mem_cgroup_commit_charge+0x156/0x3d0
[  814.365996]  [<ffffffff811e100a>] alloc_page_buffers+0x3a/0xc0
[  814.366002]  [<ffffffff811e1f2e>] create_empty_buffers+0x1e/0xd0
[  814.366009]  [<ffffffff811e2027>] create_page_buffers+0x47/0x50
[  814.366016]  [<ffffffff811e3081>] __block_write_begin+0x71/0x430
[  814.366022]  [<ffffffff81276723>] ? jbd2__journal_start+0xf3/0x1e0
[  814.366030]  [<ffffffff81230430>] ? __ext4_get_inode_loc+0x3e0/0x3e0
[  814.366037]  [<ffffffff81235dbc>] ? ext4_da_write_begin+0xec/0x2e0
[  814.366044]  [<ffffffff8125dfe9>] ? __ext4_journal_start_sb+0x69/0xe0
[  814.366050]  [<ffffffff81235dfe>] ext4_da_write_begin+0x12e/0x2e0
[  814.366057]  [<ffffffff8123684a>] ? ext4_da_write_end+0xba/0x250
[  814.366065]  [<ffffffff81140d68>] generic_file_buffered_write+0xf8/0x250
[  814.366073]  [<ffffffff81142421>] __generic_file_aio_write+0x1c1/0x3d0
[  814.366078]  [<ffffffff81142688>] generic_file_aio_write+0x58/0xa0
[  814.366084]  [<ffffffff8122be59>] ext4_file_write+0x99/0x400
[  814.366092]  [<ffffffff81097f74>] ? arch_vtime_task_switch+0x94/0xa0
[  814.366101]  [<ffffffff816b044e>] ? xen_hypervisor_callback+0x1e/0x30
[  814.366108]  [<ffffffff81009ef0>] ? xen_clocksource_read+0x20/0x30
[  814.366115]  [<ffffffff811ae43a>] do_sync_write+0x5a/0x90
[  814.366120]  [<ffffffff811aebc4>] vfs_write+0xb4/0x1f0
[  814.366126]  [<ffffffff811af5f9>] SyS_write+0x49/0xa0
[  814.366132]  [<ffffffff816aebff>] tracesys+0xe1/0xe6
[  814.366136] Code: de 41 d3 e6 4c 89 66 20 4d 89 48 08 4d 63 c6 4c 89 56 10 44
01 f0 49 c1 e0 06 4c 01 c6 48 39 f2 73 96 5b 41 5c 41 5d 41 5e 5d c3 <0f> 0b 66
2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 b8 00 00
[  814.366191] RIP  [<ffffffff81145f84>] move_freepages+0x104/0x110
[  814.366197]  RSP <ffff880007a23698>
[  814.366205] ---[ end trace cbb29943cef93713 ]---

We've annotated the code in page_alloc.c with some debug as shown below together
with the log output it produces when the BUG is hit.  It seems to happen when
move_freepages is called with a page at the top of RAM spanning the end of usable RAM.

----- Code from page_alloc.c with debug output
#ifndef CONFIG_HOLES_IN_ZONE
        /*
         * page_zone is not safe to call in this context when
         * CONFIG_HOLES_IN_ZONE is set. This bug check is probably redundant
         * anyway as we check zone boundaries in move_freepages_block().
         * Remove at a later date when no bug reports exist related to
         * grouping pages by mobility
         */
        struct zone *zs, *ze;

        if (page_zone(start_page) != page_zone(end_page)) {
            zs = page_zone(start_page);
            ze = page_zone(end_page);
            printk(KERN_ERR "Input Zone = %s\n", zone->name);
            printk(KERN_ERR "Input Zone Start PFN = %lx\n", zone->zone_start_pfn);
            printk(KERN_ERR "Input Zone End PFN = %lx\n", zone_end_pfn(zone));
            printk(KERN_ERR "Start Zone = %s\n", zs->name);
            printk(KERN_ERR "Start PFN = %lx\n", page_to_pfn(start_page));
            printk(KERN_ERR "End Zone = %s\n", ze->name);
            printk(KERN_ERR "End PFN = %lx\n", page_to_pfn(end_page));
        }
        /* BUG_ON(page_zone(start_page) != page_zone(end_page)); */

----- Debug output when the BUG is hit
May 29 23:04:14 server1 kernel: [ 1212.185507] Input Zone Start PFN = 100000
May 29 23:04:14 server1 kernel: [ 1212.185511] Input Zone End PFN = 118000
May 29 23:04:14 server1 kernel: [ 1212.185514] Start Zone = Normal
May 29 23:04:14 server1 kernel: [ 1212.185516] Start PFN =10a200
May 29 23:04:14 server1 kernel: [ 1212.185519] End Zone = DMA
May 29 23:04:14 server1 kernel: [ 1212.185522] End PFN = 10a3ff

Output from dmesg is included below, showing the e820 map provided by xl.
If we tweak the e820 sanitize code in libxl_x86.c to align the end of usable RAM with
a 2MB (512 page) boundary everything seems fine but I'm not sure this is a good solution.
Hope someone can help us to understand the problem and a better solution.

[    0.000000] Initializing cgroup subsys cpuset
[    0.000000] Initializing cgroup subsys cpu
[    0.000000] Initializing cgroup subsys cpuacct
[    0.000000] Linux version 3.13.0-34-trusty-domu (root@zdev-ci-1)
(gcc version 4.8.2 (Ubuntu 4.8.2-19ubuntu1) ) #60~precise1 SMP Fri May 29 00:48:02 BST 2015
(Ubuntu 3.13.0-34.60~precise1-trusty-domu 3.13.11.4)
[    0.000000] Command line: root=/dev/zvol/diskvm/67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
ro xencons=tty console=tty1 console=hvc0 iommu=soft libata.fua=1 boot=zfs-z rpool=diskvm
bootvol=67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
[    0.000000] KERNEL supported cpus:
[    0.000000]   Intel GenuineIntel
[    0.000000]   AMD AuthenticAMD
[    0.000000] ACPI in unprivileged domain disabled
[    0.000000] Freeing 75dac-80000 pfn range: 41556 pages freed
[    0.000000] Released 41556 pages of unused memory
[    0.000000] Set 565844 page(s) to 1-1 mapping
[    0.000000] Populating 100000-10a254 pfn range: 41556 pages added
[    0.000000] e820: BIOS-provided physical RAM map:
[    0.000000] Xen: [mem 0x0000000000000000-0x000000000009ffff] usable
[    0.000000] Xen: [mem 0x00000000000a0000-0x00000000000fffff] reserved
[    0.000000] Xen: [mem 0x0000000000100000-0x0000000075dabfff] usable
[    0.000000] Xen: [mem 0x0000000075dac000-0x0000000075dbdfff] ACPI data
[    0.000000] Xen: [mem 0x0000000075dde000-0x000000008fffffff] reserved
[    0.000000] Xen: [mem 0x00000000beffe000-0x00000000beffefff] reserved
[    0.000000] Xen: [mem 0x00000000fec00000-0x00000000feefffff] reserved
[    0.000000] Xen: [mem 0x00000000ff800000-0x00000000ffffffff] reserved
[    0.000000] Xen: [mem 0x0000000100000000-0x000000010a253fff] usable
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] DMI not present or invalid.
[    0.000000] e820: last_pfn = 0x10a254 max_arch_pfn = 0x400000000
[    0.000000] e820: last_pfn = 0x75dac max_arch_pfn = 0x400000000
[    0.000000] Scanning 1 areas for low memory corruption
[    0.000000] init_memory_mapping: [mem 0x00000000-0x000fffff]
[    0.000000] init_memory_mapping: [mem 0x10a000000-0x10a1fffff]
[    0.000000] init_memory_mapping: [mem 0x108000000-0x109ffffff]
[    0.000000] init_memory_mapping: [mem 0x100000000-0x107ffffff]
[    0.000000] init_memory_mapping: [mem 0x00100000-0x75dabfff]
[    0.000000] init_memory_mapping: [mem 0x10a200000-0x10a253fff]
[    0.000000] RAMDISK: [mem 0x023dd000-0x05416fff]
[    0.000000] NUMA turned off
[    0.000000] Faking a node at [mem 0x0000000000000000-0x000000010a253fff]
[    0.000000] Initmem setup node 0 [mem 0x00000000-0x10a253fff]
[    0.000000]   NODE_DATA [mem 0x10a24f000-0x10a253fff]
[    0.000000] Zone ranges:
[    0.000000]   DMA      [mem 0x00001000-0x00ffffff]
[    0.000000]   DMA32    [mem 0x01000000-0xffffffff]
[    0.000000]   Normal   [mem 0x100000000-0x10a253fff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x00001000-0x0009ffff]
[    0.000000]   node   0: [mem 0x00100000-0x75dabfff]
[    0.000000]   node   0: [mem 0x100000000-0x10a253fff]
[    0.000000] SFI: Simple Firmware Interface v0.81 http://simplefirmware.org
[    0.000000] smpboot: Allowing 2 CPUs, 0 hotplug CPUs
[    0.000000] e820: [mem 0xbefff000-0xfebfffff] available for PCI devices
[    0.000000] Booting paravirtualized kernel on Xen
[    0.000000] Xen version: 4.4.3-pre (preserve-AD)
[    0.000000] setup_percpu: NR_CPUS:256 nr_cpumask_bits:256 nr_cpu_ids:2 nr_node_ids:1
[    0.000000] PERCPU: Embedded 29 pages/cpu @ffff880109800000 s86080 r8192 d24512 u1048576
[    0.000000] Built 1 zonelists in Node order, mobility grouping on.  Total pages: 515977
[    0.000000] Policy zone: Normal
[    0.000000] Kernel command line: root=/dev/zvol/diskvm/67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
ro xencons=tty console=tty1 console=hvc0 iommu=soft libata.fua=1 boot=zfs-z rpool=diskvm
bootvol=67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
[    0.000000] PID hash table entries: 4096 (order: 3, 32768 bytes)
[    0.000000] software IO TLB [mem 0x103400000-0x107400000] (64MB) mapped at [ffff880103400000-ffff8801073fffff]
[    0.000000] Memory: 1921448K/2096764K available (6860K kernel code, 1077K rwdata, 3200K rodata, 1288K init, 1416K bss, 175316K reserved)
[    0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
[    0.000000] Hierarchical RCU implementation.
[    0.000000]   RCU dyntick-idle grace-period acceleration is enabled.
[    0.000000]   RCU restricting CPUs from NR_CPUS=256 to nr_cpu_ids=2.
[    0.000000]   Offload RCU callbacks from all CPUs
[    0.000000]   Offload RCU callbacks from CPUs: 0-1.
[    0.000000] NR_IRQS:16640 nr_irqs:288 16

Best wishes,

Simon
Zynstra is a private limited company registered in England and Wales (registered number 07864369). Our registered office and Headquarters are at The Innovation Centre, Broad Quay, Bath, BA1 1UD. This email, its contents and any attachments are confidential. If you have received this message in error please delete it from your system and advise the sender immediately.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 03 22:58:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2015 22:58:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0HbJ-0001O2-B5; Wed, 03 Jun 2015 22:57:33 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <simon.waterman@zynstra.com>) id 1Z0HbH-0001Nx-JP
	for xen-users@lists.xenproject.org; Wed, 03 Jun 2015 22:57:31 +0000
Received: from [85.158.137.68] by server-9.bemta-3.messagelabs.com id
	C1/ED-17050-A568F655; Wed, 03 Jun 2015 22:57:30 +0000
X-Env-Sender: simon.waterman@zynstra.com
X-Msg-Ref: server-6.tower-31.messagelabs.com!1433372246!8477875!1
X-Originating-IP: [157.55.234.78]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11016 invoked from network); 3 Jun 2015 22:57:27 -0000
Received: from mail-db3on0078.outbound.protection.outlook.com (HELO
	emea01-db3-obe.outbound.protection.outlook.com) (157.55.234.78)
	by server-6.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	3 Jun 2015 22:57:27 -0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com (25.163.166.157) by
	VI1PR04MB1501.eurprd04.prod.outlook.com (25.163.166.157) with Microsoft
	SMTP Server (TLS) id 15.1.172.22; Wed, 3 Jun 2015 22:57:24 +0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) by
	VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) with mapi id
	15.01.0172.012; Wed, 3 Jun 2015 22:57:24 +0000
From: Simon Waterman <simon.waterman@zynstra.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Thread-Topic: Kernel BUG in page_alloc.c (mismatched start and end zone) using
	xl generated e820 map
Thread-Index: AQHQnk90VBaaD7EKZkuu0AsbDhRjrg==
Date: Wed, 3 Jun 2015 22:57:23 +0000
Message-ID: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [193.63.64.25]
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:VI1PR04MB1501;
x-microsoft-antispam-prvs: <VI1PR04MB150125DC8E47401BAD62683883B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
	RULEID:(601004)(520003)(5005006)(3002001); SRVR:VI1PR04MB1501;
	BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB1501; 
x-forefront-prvs: 05961EBAFC
x-forefront-antispam-report: SFV:NSPM;
	SFS:(10009020)(6009001)(189002)(199003)(62966003)(5002640100001)(575784001)(5001830100001)(68736005)(86362001)(122556002)(107886002)(16601075003)(5001960100002)(87936001)(110136002)(106356001)(77156002)(189998001)(76576001)(2656002)(19580405001)(50986999)(106116001)(66066001)(5890100001)(229853001)(2501003)(64706001)(5001860100001)(102836002)(97736004)(105586002)(46102003)(40100003)(2900100001)(33656002)(15975445007)(92566002)(2351001)(81156007)(450100001)(74316001)(19580395003)(101416001)(54356999)(4001540100001);
	DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB1501;
	H:VI1PR04MB1501.eurprd04.prod.outlook.com; FPR:; SPF:None;
	PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: zynstra.com does not designate
	permitted sender hosts)
MIME-Version: 1.0
X-OriginatorOrg: zynstra.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jun 2015 22:57:23.5310 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4c2b4c7a-32de-4e00-8ebe-361d80e7a665
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB1501
Subject: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and end
 zone) using xl generated e820 map
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi,

We're hitting the kernel BUG below in one of our VMs running on Xen 4.4 and
Linux kernel 3.13.0.  We use the xl toolstack and are using PCI pass-through
to pass network cards and a disk controller.  It happens on a variety of our
hardware but not all servers and it seems to be related to the e820 map
passed by xl.

The problem occurs when we put the server under heavy load - the 'dd' command
at the top of the stack trace seems to be sufficient to cause the problem if
run a few times.

We didn't get a problem with previous versions of Xen (we were using 4.2.2)
but at that time we were using xend and as I understand it the RAM map
provided to the guest is fabricated rather than based upon the real hardware map.

root@server1:/home/user0# DD_PERF="$(dd if=/dev/zero of=/data/zeros bs=1M \
count=4096 2>&1 | tail -n 1 | cut -d ',' -f '2 3' ; rm -f /data/zeros)"
[  814.365651] ------------[ cut here ]------------
[  814.365668] kernel BUG at /build/ci/git/build/Kernel/kernel-trusty-domu/work/ubuntu-precise/mm/page_alloc.c:955!
[  814.365675] invalid opcode: 0000 [#1] SMP
[  814.365681] Modules linked in: drbd lru_cache libcrc32c xen_blkback xen_netback
xt_addrtype xt_multiport xt_hl nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT
xt_tcpudp xt_owner nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack
xt_NFLOG nfnetlink_log nfnetlink ipt_ULOG ip6table_filter ip6_tables iptable_filter
ip_tables x_tables x86_pkg_temp_thermal dm_multipath coretemp crct10dif_pclmul
scsi_dh crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul
glue_helper ablk_helper cryptd tmem xenfs xen_privcmd zfs(POF) zunicode(POF)
zcommon(POF) znvpair(POF) spl(OF) zavl(POF) dm_mirror dm_region_hash dm_log raid0
multipath linear dm_raid raid456 async_raid6_recov async_memcpy async_pq async_xor
async_tx raid1 raid10 xor igb i2c_algo_bit dca ahci raid6_pq libahci ptp pps_core aufs
[  814.365772] CPU: 0 PID: 9772 Comm: dd Tainted: PF          O 3.13.0-34-trusty-domu #60~precise1
[  814.365779] task: ffff88005d022fc0 ti: ffff880007a22000 task.ti: ffff880007a22000
[  814.365786] RIP: e030:[<ffffffff81145f84>]  [<ffffffff81145f84>] move_freepages+0x104/0x110
[  814.365799] RSP: e02b:ffff880007a23698  EFLAGS: 00010006
[  814.365803] RAX: ffff88010a24f000 RBX: 0000000000000000 RCX: 0000000000000001
[  814.365808] RDX: ffffea000428ffc0 RSI: ffffea0004288000 RDI: ffff88010a24ff00
[  814.365812] RBP: ffff880007a236a0 R08: ffff88010a24ff00 R09: 0000000000000000
[  814.365817] R10: 0000000000000000 R11: ffffea00042880a0 R12: ffffea0004288080
[  814.365821] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000014
[  814.365833] FS:  00007fed6b790740(0000) GS:ffff880109800000(0000) knlGS:ffff88001f800000
[  814.365838] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[  814.365843] CR2: 00007f8ebd683ab0 CR3: 00000000581af000 CR4: 0000000000002660
[  814.365848] Stack:
[  814.365851]  ffffffff81146003 ffff880007a23718 ffffffff811478eb 0000000000017614
[  814.365859]  ffffffff81009ebd ffff88010a24ff88 ffffffff00000000 ffffea00042880a0
[  814.365866]  ffff88010a24ff00 0000000200000000 0000000000000000 0000000000000002
[  814.365874] Call Trace:
[  814.365880]  [<ffffffff81146003>] ? move_freepages_block+0x73/0x80
[  814.365887]  [<ffffffff811478eb>] __rmqueue+0x39b/0x4a0
[  814.365896]  [<ffffffff81009ebd>] ? xen_force_evtchn_callback+0xd/0x10
[  814.365902]  [<ffffffff81149e5c>] get_page_from_freelist+0x68c/0x930
[  814.365909]  [<ffffffff8114a27b>] __alloc_pages_nodemask+0x17b/0xb60
[  814.365915]  [<ffffffff8100a742>] ? check_events+0x12/0x20
[  814.365923]  [<ffffffff811e17fe>] ? __find_get_block+0xbe/0x230
[  814.365932]  [<ffffffff8115ecc9>] ? zone_statistics+0x89/0xa0
[  814.365939]  [<ffffffff81188983>] alloc_pages_current+0xa3/0x160
[  814.365946]  [<ffffffff811913a5>] new_slab+0x295/0x320
[  814.365954]  [<ffffffff8169a9b7>] __slab_alloc+0x2a8/0x459
[  814.365960]  [<ffffffff811e0d11>] ? alloc_buffer_head+0x21/0x70
[  814.365968]  [<ffffffff81277f0d>] ? jbd2_journal_dirty_metadata+0xcd/0x2d0
[  814.365975]  [<ffffffff81193213>] kmem_cache_alloc+0x183/0x1d0
[  814.365982]  [<ffffffff811e0d11>] alloc_buffer_head+0x21/0x70
[  814.365990]  [<ffffffff811a3406>] ? __mem_cgroup_commit_charge+0x156/0x3d0
[  814.365996]  [<ffffffff811e100a>] alloc_page_buffers+0x3a/0xc0
[  814.366002]  [<ffffffff811e1f2e>] create_empty_buffers+0x1e/0xd0
[  814.366009]  [<ffffffff811e2027>] create_page_buffers+0x47/0x50
[  814.366016]  [<ffffffff811e3081>] __block_write_begin+0x71/0x430
[  814.366022]  [<ffffffff81276723>] ? jbd2__journal_start+0xf3/0x1e0
[  814.366030]  [<ffffffff81230430>] ? __ext4_get_inode_loc+0x3e0/0x3e0
[  814.366037]  [<ffffffff81235dbc>] ? ext4_da_write_begin+0xec/0x2e0
[  814.366044]  [<ffffffff8125dfe9>] ? __ext4_journal_start_sb+0x69/0xe0
[  814.366050]  [<ffffffff81235dfe>] ext4_da_write_begin+0x12e/0x2e0
[  814.366057]  [<ffffffff8123684a>] ? ext4_da_write_end+0xba/0x250
[  814.366065]  [<ffffffff81140d68>] generic_file_buffered_write+0xf8/0x250
[  814.366073]  [<ffffffff81142421>] __generic_file_aio_write+0x1c1/0x3d0
[  814.366078]  [<ffffffff81142688>] generic_file_aio_write+0x58/0xa0
[  814.366084]  [<ffffffff8122be59>] ext4_file_write+0x99/0x400
[  814.366092]  [<ffffffff81097f74>] ? arch_vtime_task_switch+0x94/0xa0
[  814.366101]  [<ffffffff816b044e>] ? xen_hypervisor_callback+0x1e/0x30
[  814.366108]  [<ffffffff81009ef0>] ? xen_clocksource_read+0x20/0x30
[  814.366115]  [<ffffffff811ae43a>] do_sync_write+0x5a/0x90
[  814.366120]  [<ffffffff811aebc4>] vfs_write+0xb4/0x1f0
[  814.366126]  [<ffffffff811af5f9>] SyS_write+0x49/0xa0
[  814.366132]  [<ffffffff816aebff>] tracesys+0xe1/0xe6
[  814.366136] Code: de 41 d3 e6 4c 89 66 20 4d 89 48 08 4d 63 c6 4c 89 56 10 44
01 f0 49 c1 e0 06 4c 01 c6 48 39 f2 73 96 5b 41 5c 41 5d 41 5e 5d c3 <0f> 0b 66
2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 b8 00 00
[  814.366191] RIP  [<ffffffff81145f84>] move_freepages+0x104/0x110
[  814.366197]  RSP <ffff880007a23698>
[  814.366205] ---[ end trace cbb29943cef93713 ]---

We've annotated the code in page_alloc.c with some debug as shown below together
with the log output it produces when the BUG is hit.  It seems to happen when
move_freepages is called with a page at the top of RAM spanning the end of usable RAM.

----- Code from page_alloc.c with debug output
#ifndef CONFIG_HOLES_IN_ZONE
        /*
         * page_zone is not safe to call in this context when
         * CONFIG_HOLES_IN_ZONE is set. This bug check is probably redundant
         * anyway as we check zone boundaries in move_freepages_block().
         * Remove at a later date when no bug reports exist related to
         * grouping pages by mobility
         */
        struct zone *zs, *ze;

        if (page_zone(start_page) != page_zone(end_page)) {
            zs = page_zone(start_page);
            ze = page_zone(end_page);
            printk(KERN_ERR "Input Zone = %s\n", zone->name);
            printk(KERN_ERR "Input Zone Start PFN = %lx\n", zone->zone_start_pfn);
            printk(KERN_ERR "Input Zone End PFN = %lx\n", zone_end_pfn(zone));
            printk(KERN_ERR "Start Zone = %s\n", zs->name);
            printk(KERN_ERR "Start PFN = %lx\n", page_to_pfn(start_page));
            printk(KERN_ERR "End Zone = %s\n", ze->name);
            printk(KERN_ERR "End PFN = %lx\n", page_to_pfn(end_page));
        }
        /* BUG_ON(page_zone(start_page) != page_zone(end_page)); */

----- Debug output when the BUG is hit
May 29 23:04:14 server1 kernel: [ 1212.185507] Input Zone Start PFN = 100000
May 29 23:04:14 server1 kernel: [ 1212.185511] Input Zone End PFN = 118000
May 29 23:04:14 server1 kernel: [ 1212.185514] Start Zone = Normal
May 29 23:04:14 server1 kernel: [ 1212.185516] Start PFN =10a200
May 29 23:04:14 server1 kernel: [ 1212.185519] End Zone = DMA
May 29 23:04:14 server1 kernel: [ 1212.185522] End PFN = 10a3ff

Output from dmesg is included below, showing the e820 map provided by xl.
If we tweak the e820 sanitize code in libxl_x86.c to align the end of usable RAM with
a 2MB (512 page) boundary everything seems fine but I'm not sure this is a good solution.
Hope someone can help us to understand the problem and a better solution.

[    0.000000] Initializing cgroup subsys cpuset
[    0.000000] Initializing cgroup subsys cpu
[    0.000000] Initializing cgroup subsys cpuacct
[    0.000000] Linux version 3.13.0-34-trusty-domu (root@zdev-ci-1)
(gcc version 4.8.2 (Ubuntu 4.8.2-19ubuntu1) ) #60~precise1 SMP Fri May 29 00:48:02 BST 2015
(Ubuntu 3.13.0-34.60~precise1-trusty-domu 3.13.11.4)
[    0.000000] Command line: root=/dev/zvol/diskvm/67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
ro xencons=tty console=tty1 console=hvc0 iommu=soft libata.fua=1 boot=zfs-z rpool=diskvm
bootvol=67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
[    0.000000] KERNEL supported cpus:
[    0.000000]   Intel GenuineIntel
[    0.000000]   AMD AuthenticAMD
[    0.000000] ACPI in unprivileged domain disabled
[    0.000000] Freeing 75dac-80000 pfn range: 41556 pages freed
[    0.000000] Released 41556 pages of unused memory
[    0.000000] Set 565844 page(s) to 1-1 mapping
[    0.000000] Populating 100000-10a254 pfn range: 41556 pages added
[    0.000000] e820: BIOS-provided physical RAM map:
[    0.000000] Xen: [mem 0x0000000000000000-0x000000000009ffff] usable
[    0.000000] Xen: [mem 0x00000000000a0000-0x00000000000fffff] reserved
[    0.000000] Xen: [mem 0x0000000000100000-0x0000000075dabfff] usable
[    0.000000] Xen: [mem 0x0000000075dac000-0x0000000075dbdfff] ACPI data
[    0.000000] Xen: [mem 0x0000000075dde000-0x000000008fffffff] reserved
[    0.000000] Xen: [mem 0x00000000beffe000-0x00000000beffefff] reserved
[    0.000000] Xen: [mem 0x00000000fec00000-0x00000000feefffff] reserved
[    0.000000] Xen: [mem 0x00000000ff800000-0x00000000ffffffff] reserved
[    0.000000] Xen: [mem 0x0000000100000000-0x000000010a253fff] usable
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] DMI not present or invalid.
[    0.000000] e820: last_pfn = 0x10a254 max_arch_pfn = 0x400000000
[    0.000000] e820: last_pfn = 0x75dac max_arch_pfn = 0x400000000
[    0.000000] Scanning 1 areas for low memory corruption
[    0.000000] init_memory_mapping: [mem 0x00000000-0x000fffff]
[    0.000000] init_memory_mapping: [mem 0x10a000000-0x10a1fffff]
[    0.000000] init_memory_mapping: [mem 0x108000000-0x109ffffff]
[    0.000000] init_memory_mapping: [mem 0x100000000-0x107ffffff]
[    0.000000] init_memory_mapping: [mem 0x00100000-0x75dabfff]
[    0.000000] init_memory_mapping: [mem 0x10a200000-0x10a253fff]
[    0.000000] RAMDISK: [mem 0x023dd000-0x05416fff]
[    0.000000] NUMA turned off
[    0.000000] Faking a node at [mem 0x0000000000000000-0x000000010a253fff]
[    0.000000] Initmem setup node 0 [mem 0x00000000-0x10a253fff]
[    0.000000]   NODE_DATA [mem 0x10a24f000-0x10a253fff]
[    0.000000] Zone ranges:
[    0.000000]   DMA      [mem 0x00001000-0x00ffffff]
[    0.000000]   DMA32    [mem 0x01000000-0xffffffff]
[    0.000000]   Normal   [mem 0x100000000-0x10a253fff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x00001000-0x0009ffff]
[    0.000000]   node   0: [mem 0x00100000-0x75dabfff]
[    0.000000]   node   0: [mem 0x100000000-0x10a253fff]
[    0.000000] SFI: Simple Firmware Interface v0.81 http://simplefirmware.org
[    0.000000] smpboot: Allowing 2 CPUs, 0 hotplug CPUs
[    0.000000] e820: [mem 0xbefff000-0xfebfffff] available for PCI devices
[    0.000000] Booting paravirtualized kernel on Xen
[    0.000000] Xen version: 4.4.3-pre (preserve-AD)
[    0.000000] setup_percpu: NR_CPUS:256 nr_cpumask_bits:256 nr_cpu_ids:2 nr_node_ids:1
[    0.000000] PERCPU: Embedded 29 pages/cpu @ffff880109800000 s86080 r8192 d24512 u1048576
[    0.000000] Built 1 zonelists in Node order, mobility grouping on.  Total pages: 515977
[    0.000000] Policy zone: Normal
[    0.000000] Kernel command line: root=/dev/zvol/diskvm/67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
ro xencons=tty console=tty1 console=hvc0 iommu=soft libata.fua=1 boot=zfs-z rpool=diskvm
bootvol=67ec09dd-a0ed-4c51-8b75-cc08efea62fa/bin/1
[    0.000000] PID hash table entries: 4096 (order: 3, 32768 bytes)
[    0.000000] software IO TLB [mem 0x103400000-0x107400000] (64MB) mapped at [ffff880103400000-ffff8801073fffff]
[    0.000000] Memory: 1921448K/2096764K available (6860K kernel code, 1077K rwdata, 3200K rodata, 1288K init, 1416K bss, 175316K reserved)
[    0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
[    0.000000] Hierarchical RCU implementation.
[    0.000000]   RCU dyntick-idle grace-period acceleration is enabled.
[    0.000000]   RCU restricting CPUs from NR_CPUS=256 to nr_cpu_ids=2.
[    0.000000]   Offload RCU callbacks from all CPUs
[    0.000000]   Offload RCU callbacks from CPUs: 0-1.
[    0.000000] NR_IRQS:16640 nr_irqs:288 16

Best wishes,

Simon
Zynstra is a private limited company registered in England and Wales (registered number 07864369). Our registered office and Headquarters are at The Innovation Centre, Broad Quay, Bath, BA1 1UD. This email, its contents and any attachments are confidential. If you have received this message in error please delete it from your system and advise the sender immediately.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 04 08:37:05 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2015 08:37:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0Qcx-00033r-D3; Thu, 04 Jun 2015 08:35:51 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=5906d0598=Ian.Campbell@citrix.com>)
	id 1Z0Qcu-00033m-UT
	for xen-users@lists.xenproject.org; Thu, 04 Jun 2015 08:35:49 +0000
Received: from [85.158.137.68] by server-1.bemta-3.messagelabs.com id
	51/2B-10437-4ED00755; Thu, 04 Jun 2015 08:35:48 +0000
X-Env-Sender: prvs=5906d0598=Ian.Campbell@citrix.com
X-Msg-Ref: server-8.tower-31.messagelabs.com!1433406946!13046593!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20115 invoked from network); 4 Jun 2015 08:35:47 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-8.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	4 Jun 2015 08:35:47 -0000
X-IronPort-AV: E=Sophos;i="5.13,551,1427760000"; d="scan'208";a="268861285"
Message-ID: <1433406938.7108.85.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Simon Waterman <simon.waterman@zynstra.com>
Date: Thu, 4 Jun 2015 09:35:38 +0100
In-Reply-To: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
References: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: Re: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and
 end zone) using xl generated e820 map
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-03 at 22:57 +0000, Simon Waterman wrote:
> Hi,
> 
> We're hitting the kernel BUG below in one of our VMs running on Xen 4.4 and
> Linux kernel 3.13.0.

This is a rather old kernel, and not even the latest stable version of
it (3.13.11 was the last, with 900+ fixes over .0)

If you can't arrange to test something up to date then I'd suggest at
least switching to the latest 3.14.y which is a long term supported (by
kernel.org) kernel.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 04 08:37:05 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2015 08:37:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0Qcx-00033r-D3; Thu, 04 Jun 2015 08:35:51 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=5906d0598=Ian.Campbell@citrix.com>)
	id 1Z0Qcu-00033m-UT
	for xen-users@lists.xenproject.org; Thu, 04 Jun 2015 08:35:49 +0000
Received: from [85.158.137.68] by server-1.bemta-3.messagelabs.com id
	51/2B-10437-4ED00755; Thu, 04 Jun 2015 08:35:48 +0000
X-Env-Sender: prvs=5906d0598=Ian.Campbell@citrix.com
X-Msg-Ref: server-8.tower-31.messagelabs.com!1433406946!13046593!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20115 invoked from network); 4 Jun 2015 08:35:47 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-8.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	4 Jun 2015 08:35:47 -0000
X-IronPort-AV: E=Sophos;i="5.13,551,1427760000"; d="scan'208";a="268861285"
Message-ID: <1433406938.7108.85.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Simon Waterman <simon.waterman@zynstra.com>
Date: Thu, 4 Jun 2015 09:35:38 +0100
In-Reply-To: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
References: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: Re: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and
 end zone) using xl generated e820 map
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-03 at 22:57 +0000, Simon Waterman wrote:
> Hi,
> 
> We're hitting the kernel BUG below in one of our VMs running on Xen 4.4 and
> Linux kernel 3.13.0.

This is a rather old kernel, and not even the latest stable version of
it (3.13.11 was the last, with 900+ fixes over .0)

If you can't arrange to test something up to date then I'd suggest at
least switching to the latest 3.14.y which is a long term supported (by
kernel.org) kernel.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 04 13:15:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2015 13:15:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0Uym-0006c6-Qm; Thu, 04 Jun 2015 13:14:40 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <nate.studer@gmail.com>) id 1Z0Uyl-0006bz-PJ
	for xen-users@lists.xen.org; Thu, 04 Jun 2015 13:14:39 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	A1/32-13047-F3F40755; Thu, 04 Jun 2015 13:14:39 +0000
X-Env-Sender: nate.studer@gmail.com
X-Msg-Ref: server-7.tower-27.messagelabs.com!1433423677!20317517!1
X-Originating-IP: [209.85.213.42]
X-SpamReason: No, hits=0.3 required=7.0 tests=RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1058 invoked from network); 4 Jun 2015 13:14:38 -0000
Received: from mail-yh0-f42.google.com (HELO mail-yh0-f42.google.com)
	(209.85.213.42)
	by server-7.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	4 Jun 2015 13:14:38 -0000
Received: by yhpn97 with SMTP id n97so9706234yhp.0
	for <xen-users@lists.xen.org>; Thu, 04 Jun 2015 06:14:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=xM6T9GOEDBiZGS4m/z5JSDpmCoSO4GtUlmqUcdivvoY=;
	b=csHCr8EShGuicH/SsBOGw5br4lvzs6zAvcwbNymU7ojMtk6DCG8KomlQF97t/IINBO
	kInxrsM6cOqevYRyvnif3QflvhKHLm1WUhcZcQgRHQCO19jCU0RI41tOtF+ld2A0Qys8
	uAdLt1JTv+tup5DcxkaNRHFnVyqA2bAQihrQEWvUOKetSs6msx62uEV2LEb6+rzF1ew7
	G2Gy4sOs5tlN7mFdklhPR2sG4sfe/tZEeEto5wOrihh2Ltmse8KbR+OTb1ugWaqCq7af
	rZyAl2xPprLFQWxkr2U/te0d1CdnzyKC3yo3HsSgeAjnUlOyRofkmC7wzTo0co/t8K2f
	0RrQ==
MIME-Version: 1.0
X-Received: by 10.236.11.136 with SMTP id 8mr41157922yhx.146.1433423677021;
	Thu, 04 Jun 2015 06:14:37 -0700 (PDT)
Received: by 10.13.226.148 with HTTP; Thu, 4 Jun 2015 06:14:36 -0700 (PDT)
In-Reply-To: <CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
Date: Thu, 4 Jun 2015 09:14:36 -0400
Message-ID: <CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
From: Nathan Studer <nate.studer@gmail.com>
To: Mr Idris <mr@idris.web.id>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
> On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
>>
>> Hi all,
>>
>> I have managed to call arinc653_scheduler_set.c without error.  The
>> message when i run it like this
>>
>> not error
>> not error
>> hypercall bounce and schedule set finish *
>> true
>>
>> * this message because i set on xc_sched_arinc653_schedule_set().
>>
>>
>> but when i try 'xl list -v' still VM is not running
>
>
> I'm sorry accidentally i press send but i haven't finished.
>
> I continue, but when i try 'xl list -v' still VM is not running like this :
> Name                                        ID   Mem VCPUs      State
> Time(s)   UUID                            Reason-Code   Security Label
> Domain-0                                     0  6771     1     r-----
> 10.0 00000000-0000-0000-0000-000000000000        -                -
> Debian                                       1   512     1     ------
> 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
>
>
> Something weird after the small program run, the computer is becoming really
> slow. Is it something related to runtime?

That's how you know it's working!  The arinc653 scheduler is not work
conserving or pre-emptive, so you should expect some performance
degradation.  It probably should not be that bad, so I think it is a
symptom of the problem below.

> Does anyone have any idea what change I need to make to get the scheduler to
> run
> the VM?  I appreciate the help.

>From the attached program, which is similar to your previous program:

sched.sched_entries[0].vcpu_id = 0;
sched.sched_entries[0].runtime = 30;
sched.major_frame += sched.sched_entries[0].runtime;

The runtime field is in units of nanoseconds.  30 nanoseconds is
orders of magnitude shorter than the context switch time.  I'm not
sure what the scheduler would do with a runtime this small, but it
would not be pretty.  For most configurations, the slice runtimes
should be in the milliseconds range, so multiple your runtimes by
1000000, and see if that fixes your issue.

sched.sched_entries[*].runtime = 10000000;  /* 10 ms */

     Nate

>
> Thanks,
> Idris
>
>
>

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 04 13:15:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2015 13:15:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0Uym-0006c6-Qm; Thu, 04 Jun 2015 13:14:40 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <nate.studer@gmail.com>) id 1Z0Uyl-0006bz-PJ
	for xen-users@lists.xen.org; Thu, 04 Jun 2015 13:14:39 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	A1/32-13047-F3F40755; Thu, 04 Jun 2015 13:14:39 +0000
X-Env-Sender: nate.studer@gmail.com
X-Msg-Ref: server-7.tower-27.messagelabs.com!1433423677!20317517!1
X-Originating-IP: [209.85.213.42]
X-SpamReason: No, hits=0.3 required=7.0 tests=RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1058 invoked from network); 4 Jun 2015 13:14:38 -0000
Received: from mail-yh0-f42.google.com (HELO mail-yh0-f42.google.com)
	(209.85.213.42)
	by server-7.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	4 Jun 2015 13:14:38 -0000
Received: by yhpn97 with SMTP id n97so9706234yhp.0
	for <xen-users@lists.xen.org>; Thu, 04 Jun 2015 06:14:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=xM6T9GOEDBiZGS4m/z5JSDpmCoSO4GtUlmqUcdivvoY=;
	b=csHCr8EShGuicH/SsBOGw5br4lvzs6zAvcwbNymU7ojMtk6DCG8KomlQF97t/IINBO
	kInxrsM6cOqevYRyvnif3QflvhKHLm1WUhcZcQgRHQCO19jCU0RI41tOtF+ld2A0Qys8
	uAdLt1JTv+tup5DcxkaNRHFnVyqA2bAQihrQEWvUOKetSs6msx62uEV2LEb6+rzF1ew7
	G2Gy4sOs5tlN7mFdklhPR2sG4sfe/tZEeEto5wOrihh2Ltmse8KbR+OTb1ugWaqCq7af
	rZyAl2xPprLFQWxkr2U/te0d1CdnzyKC3yo3HsSgeAjnUlOyRofkmC7wzTo0co/t8K2f
	0RrQ==
MIME-Version: 1.0
X-Received: by 10.236.11.136 with SMTP id 8mr41157922yhx.146.1433423677021;
	Thu, 04 Jun 2015 06:14:37 -0700 (PDT)
Received: by 10.13.226.148 with HTTP; Thu, 4 Jun 2015 06:14:36 -0700 (PDT)
In-Reply-To: <CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
Date: Thu, 4 Jun 2015 09:14:36 -0400
Message-ID: <CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
From: Nathan Studer <nate.studer@gmail.com>
To: Mr Idris <mr@idris.web.id>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
> On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
>>
>> Hi all,
>>
>> I have managed to call arinc653_scheduler_set.c without error.  The
>> message when i run it like this
>>
>> not error
>> not error
>> hypercall bounce and schedule set finish *
>> true
>>
>> * this message because i set on xc_sched_arinc653_schedule_set().
>>
>>
>> but when i try 'xl list -v' still VM is not running
>
>
> I'm sorry accidentally i press send but i haven't finished.
>
> I continue, but when i try 'xl list -v' still VM is not running like this :
> Name                                        ID   Mem VCPUs      State
> Time(s)   UUID                            Reason-Code   Security Label
> Domain-0                                     0  6771     1     r-----
> 10.0 00000000-0000-0000-0000-000000000000        -                -
> Debian                                       1   512     1     ------
> 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
>
>
> Something weird after the small program run, the computer is becoming really
> slow. Is it something related to runtime?

That's how you know it's working!  The arinc653 scheduler is not work
conserving or pre-emptive, so you should expect some performance
degradation.  It probably should not be that bad, so I think it is a
symptom of the problem below.

> Does anyone have any idea what change I need to make to get the scheduler to
> run
> the VM?  I appreciate the help.

>From the attached program, which is similar to your previous program:

sched.sched_entries[0].vcpu_id = 0;
sched.sched_entries[0].runtime = 30;
sched.major_frame += sched.sched_entries[0].runtime;

The runtime field is in units of nanoseconds.  30 nanoseconds is
orders of magnitude shorter than the context switch time.  I'm not
sure what the scheduler would do with a runtime this small, but it
would not be pretty.  For most configurations, the slice runtimes
should be in the milliseconds range, so multiple your runtimes by
1000000, and see if that fixes your issue.

sched.sched_entries[*].runtime = 10000000;  /* 10 ms */

     Nate

>
> Thanks,
> Idris
>
>
>

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 04 15:10:04 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2015 15:10:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0WlG-0006vI-Im; Thu, 04 Jun 2015 15:08:50 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z0WlE-0006vC-LF
	for xen-users@lists.xen.org; Thu, 04 Jun 2015 15:08:48 +0000
Received: from [85.158.137.68] by server-1.bemta-3.messagelabs.com id
	9A/C3-10437-FF960755; Thu, 04 Jun 2015 15:08:47 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-10.tower-31.messagelabs.com!1433430525!13160555!1
X-Originating-IP: [209.85.217.173]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_10_20,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15318 invoked from network); 4 Jun 2015 15:08:46 -0000
Received: from mail-lb0-f173.google.com (HELO mail-lb0-f173.google.com)
	(209.85.217.173)
	by server-10.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	4 Jun 2015 15:08:46 -0000
Received: by lbcmx3 with SMTP id mx3so29166545lbc.1
	for <xen-users@lists.xen.org>; Thu, 04 Jun 2015 08:08:45 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=sa8x/MBuFZ8+wiuM271anCYKAceLPZn5BYWrfg0E7vQ=;
	b=BCAYzZ3l4e/CAu1eK8mzyviiYRH59Pyidkkz6rXwa64saAQm80ylZNDkFmONtT9D00
	5Jzy0EOcPqBF34I27cLU4jF79p4PqCXMzFWVeKuq6B+5iWw3MW3RwUh00FfLtT9zaF/J
	5Xbysez5EtxImXFArZr9N2+J6UtC3snT4HMKjLuSvgCUOLINxYdkrQ/VX4GtLWgAgNKQ
	Ytu2rbMuHtPAV2Ra+kiLySejAi01n1EJxvxx2tc3wyj2IaUuQqMRj+sjrIcGzMJVkL7X
	2ngexQBWolCzEN7B0/HsVhODbRkk7ZnUOPafONE4pKKqu/kgYMB33IO4nQ3JBvDqlaR9
	d0UA==
X-Gm-Message-State: ALoCoQlzaQeNGBqkJJIGcoflorPaS+q2uWmYA1Vw32lZNwEA1VaMmmEOQb2RZAeJx9WVQXTsSLzG
MIME-Version: 1.0
X-Received: by 10.112.13.97 with SMTP id g1mr7314545lbc.52.1433430525676; Thu,
	04 Jun 2015 08:08:45 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Thu, 4 Jun 2015 08:08:45 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:1d0f:cc56:33e3:1469]
In-Reply-To: <CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
	<CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
Date: Thu, 4 Jun 2015 17:08:45 +0200
Message-ID: <CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4269950771850679310=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============4269950771850679310==
Content-Type: multipart/alternative; boundary=001a11c3b2084b26570517b28d6a

--001a11c3b2084b26570517b28d6a
Content-Type: text/plain; charset=UTF-8

On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer <nate.studer@gmail.com> wrote:

> On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
> > On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
> >>
> >> Hi all,
> >>
> >> I have managed to call arinc653_scheduler_set.c without error.  The
> >> message when i run it like this
> >>
> >> not error
> >> not error
> >> hypercall bounce and schedule set finish *
> >> true
> >>
> >> * this message because i set on xc_sched_arinc653_schedule_set().
> >>
> >>
> >> but when i try 'xl list -v' still VM is not running
> >
> >
> > I'm sorry accidentally i press send but i haven't finished.
> >
> > I continue, but when i try 'xl list -v' still VM is not running like
> this :
> > Name                                        ID   Mem VCPUs      State
> > Time(s)   UUID                            Reason-Code   Security Label
> > Domain-0                                     0  6771     1     r-----
> > 10.0 00000000-0000-0000-0000-000000000000        -                -
> > Debian                                       1   512     1     ------
> > 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
> >
> >
> > Something weird after the small program run, the computer is becoming
> really
> > slow. Is it something related to runtime?
>
> That's how you know it's working!  The arinc653 scheduler is not work
> conserving or pre-emptive, so you should expect some performance
> degradation.  It probably should not be that bad, so I think it is a
> symptom of the problem below.
>
> > Does anyone have any idea what change I need to make to get the
> scheduler to
> > run
> > the VM?  I appreciate the help.
>
> From the attached program, which is similar to your previous program:
>
> sched.sched_entries[0].vcpu_id = 0;
> sched.sched_entries[0].runtime = 30;
> sched.major_frame += sched.sched_entries[0].runtime;
>
> The runtime field is in units of nanoseconds.  30 nanoseconds is
> orders of magnitude shorter than the context switch time.  I'm not
> sure what the scheduler would do with a runtime this small, but it
> would not be pretty.  For most configurations, the slice runtimes
> should be in the milliseconds range, so multiple your runtimes by
> 1000000, and see if that fixes your issue.
>
> sched.sched_entries[*].runtime = 10000000;  /* 10 ms */
>
>      Nate
>
>
After i changed runtime value to 1000000 or greater and run again. It was
suddenly hang with panic on CPU 0 with error message :

(XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
(XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
(XEN) ----[ Xen-4.4.1  x86_64  debug=y  Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff82d080129707>] on_selected_cpus+0x7/0xd6
(XEN) RFLAGS: 0000000000010046   CONTEXT: hypervisor
(XEN) rax: 0000000000000046   rbx: ffff82d08013a9c8   rcx: 0000000000000000
(XEN) rdx: 0000000000000000   rsi: ffff82d08013a9c8   rdi: ffff82d0802d7c18
(XEN) rbp: ffff82d0802d7c58   rsp: ffff82d0802d7c10   r8:  0000000000000004
(XEN) r9:  000000000000003f   r10: 0000000000000000   r11: 0000000000000246
(XEN) r12: 0000000000000000   r13: 0000000000000000   r14: ffff82d0802d7d38
(XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000426f0
(XEN) cr3: 00000000df888000   cr2: 0000000000989740
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff82d0802d7c10:
(XEN)    ffff82d08012984e 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 ffff82d0802735f0 0000000000000001 ffff82d0802f9200
(XEN)    0000000000989740 ffff82d0802d7cc8 ffff82d08013af14 0000000000200e8c
(XEN)    0000000000000000 00000002030bc067 000000000000000e 0000000000000092
(XEN)    0000000000989740 ffff82d0802d7ce8 000000000000000e 0000000000000000
(XEN)    0000000000989740 ffff8302154ff000 0000000000000000 ffff82d0802d7ce8
(XEN)    ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38 ffff82d0802d7d28
(XEN)    ffff82d080190631 0000000000000086 ffff8300dfb98000 0000000000989680
(XEN)    0000003222af7456 ffff82d0802d7e68 0000000000000000 00007d2f7fd282a7
(XEN)    ffff82d08022a33d 0000000000000000 ffff82d0802d7e68 0000003222af7456
(XEN)    0000000000989680 ffff82d0802d7e20 ffff8302154fd010 0000000000000246
(XEN)    0000003222b7f318 ffff8300df6fe060 0000000000000002 0000000000000086
(XEN)    0000003226424461 0000000000000005 ffff82d080274620 0000000000000005
(XEN)    0000000e00000000 ffff82d0801254ae 000000000000e008 0000000000010002
(XEN)    ffff82d0802d7de0 000000000000e010 0000000000000003 00ff82d080319728
(XEN)    80000000802fa2a0 ffff8300dfb98000 0000003222af7456 ffff82d0803196e0
(XEN)    ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0 ffff82d08012616c
(XEN)    ffff82d0802d7e60 ffff82d080319700 00000000002d7e60 ffff82d0803196e0
(XEN)    ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 ffff82d08012c7b6
(XEN)    ffff82d0802d0000 0000000000000246 0000003222aebd61 ffff82d0802eff00
(XEN) Xen call trace:
(XEN)    [<ffff82d080129707>] on_selected_cpus+0x7/0xd6
(XEN)    [<ffff82d08013af14>] __trap_to_gdb+0x130/0x9fc
(XEN)    [<ffff82d0801892b7>] debugger_trap_fatal+0x15/0x2c
(XEN)    [<ffff82d080190631>] do_page_fault+0x456/0x536
(XEN)    [<ffff82d08022a33d>] handle_exception_saved+0x2e/0x6c
(XEN)    [<ffff82d0801254ae>] a653sched_do_schedule+0x10a/0x1de
(XEN)    [<ffff82d08012616c>] schedule+0x116/0x5df
(XEN)    [<ffff82d080129359>] __do_softirq+0x81/0x8c
(XEN)    [<ffff82d0801293b2>] do_softirq+0x13/0x15
(XEN)    [<ffff82d08015f355>] idle_loop+0x64/0x74
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
(XEN) WARNING WARNING WARNING: Avoiding recursive gdb.

this is the output from 'xl info'

host                   : boaman
release                : 3.2.0-4-amd64
version                : #1 SMP Debian 3.2.65-1+deb7u2
machine                : x86_64
nr_cpus                : 1
max_cpu_id             : 0
nr_nodes               : 1
cores_per_socket       : 1
threads_per_core       : 1
cpu_mhz                : 2826
hw_caps                :
bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:00000000
virt_caps              : hvm
total_memory           : 8123
free_memory            : 745
sharing_freed_memory   : 0
sharing_used_memory    : 0
outstanding_claims     : 0
free_cpus              : 0
xen_major              : 4
xen_minor              : 4
xen_extra              : .1
xen_version            : 4.4.1
xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
hvm-3.0-x86_32p hvm-3.0-x86_64
xen_scheduler          : arinc653
xen_pagesize           : 4096
platform_params        : virt_start=0xffff800000000000
xen_changeset          :
xen_commandline        : placeholder loglvl=all guest_loglvl=all
com1=115200,8n1,0x3f8,5 console=com1,vga gdb=com1 kgdboc=com1,115200
sched=arinc653 maxcpus=1
cc_compiler            : gcc (Debian 4.7.2-5) 4.7.2
cc_compile_by          : manam
cc_compile_domain      :
cc_compile_date        : Wed Jun  3 11:55:42 CEST 2015
xend_config_format     : 4

Regards,
Idris

--001a11c3b2084b26570517b28d6a
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On T=
hu, Jun 4, 2015 at 3:14 PM, Nathan Studer <span dir=3D"ltr">&lt;<a href=3D"=
mailto:nate.studer@gmail.com" target=3D"_blank">nate.studer@gmail.com</a>&g=
t;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><span=
>On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris &lt;<a href=3D"mailto:mr@idris.w=
eb.id" target=3D"_blank">mr@idris.web.id</a>&gt; wrote:<br>
&gt; On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris &lt;<a href=3D"mailto:mr@idri=
s.web.id" target=3D"_blank">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt;<br>
</span><span>&gt;&gt; Hi all,<br>
&gt;&gt;<br>
&gt;&gt; I have managed to call arinc653_scheduler_set.c without error.=C2=
=A0 The<br>
&gt;&gt; message when i run it like this<br>
&gt;&gt;<br>
&gt;&gt; not error<br>
&gt;&gt; not error<br>
&gt;&gt; hypercall bounce and schedule set finish *<br>
&gt;&gt; true<br>
&gt;&gt;<br>
&gt;&gt; * this message because i set on xc_sched_arinc653_schedule_set().<=
br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; but when i try &#39;xl list -v&#39; still VM is not running<br>
&gt;<br>
&gt;<br>
&gt; I&#39;m sorry accidentally i press send but i haven&#39;t finished.<br=
>
&gt;<br>
&gt; I continue, but when i try &#39;xl list -v&#39; still VM is not runnin=
g like this :<br>
&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 I=
D=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt; Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=C2=A0 =C2=
=A0Security Label<br>
&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A00=C2=
=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt; 10.0 00000000-0000-0000-0000-000000000000=C2=A0 =C2=A0 =C2=A0 =C2=A0 -=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A01=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<br>
&gt; 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0 =C2=A0 =C2=A0 =C2=A0 -=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;<br>
&gt;<br>
&gt; Something weird after the small program run, the computer is becoming =
really<br>
&gt; slow. Is it something related to runtime?<br>
<br>
</span>That&#39;s how you know it&#39;s working!=C2=A0 The arinc653 schedul=
er is not work<br>
conserving or pre-emptive, so you should expect some performance<br>
degradation.=C2=A0 It probably should not be that bad, so I think it is a<b=
r>
symptom of the problem below.<br>
<span><br>
&gt; Does anyone have any idea what change I need to make to get the schedu=
ler to<br>
&gt; run<br>
&gt; the VM?=C2=A0 I appreciate the help.<br>
<br>
</span>From the attached program, which is similar to your previous program=
:<br>
<span><br>
sched.sched_entries[0].vcpu_id =3D 0;<br>
sched.sched_entries[0].runtime =3D 30;<br>
sched.major_frame +=3D sched.sched_entries[0].runtime;<br>
<br>
</span>The runtime field is in units of nanoseconds.=C2=A0 30 nanoseconds i=
s<br>
orders of magnitude shorter than the context switch time.=C2=A0 I&#39;m not=
<br>
sure what the scheduler would do with a runtime this small, but it<br>
would not be pretty.=C2=A0 For most configurations, the slice runtimes<br>
should be in the milliseconds range, so multiple your runtimes by<br>
1000000, and see if that fixes your issue.<br>
<br>
sched.sched_entries[*].runtime =3D 10000000;=C2=A0 /* 10 ms */<br>
<br>
=C2=A0 =C2=A0 =C2=A0Nate<br>
<br></blockquote><div>=C2=A0</div></div>After i changed runtime value to 10=
00000 or greater and run again. It was suddenly hang with panic on CPU 0 wi=
th error message : <br><br>(XEN) Assertion &#39;local_irq_is_enabled()&#39;=
 failed at smp.c:55<br>(XEN) WARNING WARNING WARNING: Avoiding recursive gd=
b.<br>(XEN) ----[ Xen-4.4.1=C2=A0 x86_64=C2=A0 debug=3Dy=C2=A0 Not tainted =
]----<br>(XEN) CPU:=C2=A0=C2=A0=C2=A0 0<br>(XEN) RIP:=C2=A0=C2=A0=C2=A0 e00=
8:[&lt;ffff82d080129707&gt;] on_selected_cpus+0x7/0xd6<br>(XEN) RFLAGS: 000=
0000000010046=C2=A0=C2=A0 CONTEXT: hypervisor<br>(XEN) rax: 000000000000004=
6=C2=A0=C2=A0 rbx: ffff82d08013a9c8=C2=A0=C2=A0 rcx: 0000000000000000<br>(X=
EN) rdx: 0000000000000000=C2=A0=C2=A0 rsi: ffff82d08013a9c8=C2=A0=C2=A0 rdi=
: ffff82d0802d7c18<br>(XEN) rbp: ffff82d0802d7c58=C2=A0=C2=A0 rsp: ffff82d0=
802d7c10=C2=A0=C2=A0 r8:=C2=A0 0000000000000004<br>(XEN) r9:=C2=A0 00000000=
0000003f=C2=A0=C2=A0 r10: 0000000000000000=C2=A0=C2=A0 r11: 000000000000024=
6<br>(XEN) r12: 0000000000000000=C2=A0=C2=A0 r13: 0000000000000000=C2=A0=C2=
=A0 r14: ffff82d0802d7d38<br>(XEN) r15: 0000000000000000=C2=A0=C2=A0 cr0: 0=
00000008005003b=C2=A0=C2=A0 cr4: 00000000000426f0<br>(XEN) cr3: 00000000df8=
88000=C2=A0=C2=A0 cr2: 0000000000989740<br>(XEN) ds: 0000=C2=A0=C2=A0 es: 0=
000=C2=A0=C2=A0 fs: 0000=C2=A0=C2=A0 gs: 0000=C2=A0=C2=A0 ss: e010=C2=A0=C2=
=A0 cs: e008<br>(XEN) Xen stack trace from rsp=3Dffff82d0802d7c10:<br>(XEN)=
=C2=A0=C2=A0=C2=A0 ffff82d08012984e 0000000000000000 0000000000000000 00000=
00000000000<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000000000000 ffff82d0802735f0 00=
00000000000001 ffff82d0802f9200<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000000989740=
 ffff82d0802d7cc8 ffff82d08013af14 0000000000200e8c<br>(XEN)=C2=A0=C2=A0=C2=
=A0 0000000000000000 00000002030bc067 000000000000000e 0000000000000092<br>=
(XEN)=C2=A0=C2=A0=C2=A0 0000000000989740 ffff82d0802d7ce8 000000000000000e =
0000000000000000<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000000989740 ffff8302154ff0=
00 0000000000000000 ffff82d0802d7ce8<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0801=
892b7 ffff8302154ff000 ffff82d0802d7d38 ffff82d0802d7d28<br>(XEN)=C2=A0=C2=
=A0=C2=A0 ffff82d080190631 0000000000000086 ffff8300dfb98000 00000000009896=
80<br>(XEN)=C2=A0=C2=A0=C2=A0 0000003222af7456 ffff82d0802d7e68 00000000000=
00000 00007d2f7fd282a7<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d08022a33d 00000000=
00000000 ffff82d0802d7e68 0000003222af7456<br>(XEN)=C2=A0=C2=A0=C2=A0 00000=
00000989680 ffff82d0802d7e20 ffff8302154fd010 0000000000000246<br>(XEN)=C2=
=A0=C2=A0=C2=A0 0000003222b7f318 ffff8300df6fe060 0000000000000002 00000000=
00000086<br>(XEN)=C2=A0=C2=A0=C2=A0 0000003226424461 0000000000000005 ffff8=
2d080274620 0000000000000005<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000e00000000 ff=
ff82d0801254ae 000000000000e008 0000000000010002<br>(XEN)=C2=A0=C2=A0=C2=A0=
 ffff82d0802d7de0 000000000000e010 0000000000000003 00ff82d080319728<br>(XE=
N)=C2=A0=C2=A0=C2=A0 80000000802fa2a0 ffff8300dfb98000 0000003222af7456 fff=
f82d0803196e0<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0803196e8 0000000000000000 =
ffff82d0802d7eb0 ffff82d08012616c<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0802d7e=
60 ffff82d080319700 00000000002d7e60 ffff82d0803196e0<br>(XEN)=C2=A0=C2=A0=
=C2=A0 ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 ffff82d08012c7b6<=
br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0802d0000 0000000000000246 0000003222aebd=
61 ffff82d0802eff00<br>(XEN) Xen call trace:<br>(XEN)=C2=A0=C2=A0=C2=A0 [&l=
t;ffff82d080129707&gt;] on_selected_cpus+0x7/0xd6<br>(XEN)=C2=A0=C2=A0=C2=
=A0 [&lt;ffff82d08013af14&gt;] __trap_to_gdb+0x130/0x9fc<br>(XEN)=C2=A0=C2=
=A0=C2=A0 [&lt;ffff82d0801892b7&gt;] debugger_trap_fatal+0x15/0x2c<br>(XEN)=
=C2=A0=C2=A0=C2=A0 [&lt;ffff82d080190631&gt;] do_page_fault+0x456/0x536<br>=
(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d08022a33d&gt;] handle_exception_saved+0=
x2e/0x6c<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d0801254ae&gt;] a653sched_do=
_schedule+0x10a/0x1de<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d08012616c&gt;]=
 schedule+0x116/0x5df<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d080129359&gt;]=
 __do_softirq+0x81/0x8c<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d0801293b2&gt=
;] do_softirq+0x13/0x15<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d08015f355&gt=
;] idle_loop+0x64/0x74<br>(XEN) <br>(XEN) <br>(XEN) ***********************=
*****************<br>(XEN) Panic on CPU 0:<br>(XEN) Assertion &#39;local_ir=
q_is_enabled()&#39; failed at smp.c:55<br>(XEN) ***************************=
*************<br>(XEN) <br>(XEN) Reboot in five seconds...<br>(XEN) WARNING=
 WARNING WARNING: Avoiding recursive gdb.<br>=C2=A0<br></div><div class=3D"=
gmail_extra">this is the output from &#39;xl info&#39;<br><br>host=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 : boaman<br>release=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 3.2.0-4-amd6=
4<br>version=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 : #1 SMP Debian 3.2.65-1+deb7u2<br>machine=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 : x86_64<br>nr_cpus=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 1<br>max_cpu_id=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 0<br>nr_n=
odes=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 : 1<br>cores_per_socket=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 : 1<br>threads_per_core=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 1<br>cpu_mhz=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 : 2826<br>hw_caps=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : bfebfbff:20100800:000000=
00:00000900:0408e3fd:00000000:00000001:00000000<br>virt_caps=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : hvm<br>to=
tal_memory=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 81=
23<br>free_memory=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 : 745<br>sharing_freed_memory=C2=A0=C2=A0 : 0<br>sharing_used_mem=
ory=C2=A0=C2=A0=C2=A0 : 0<br>outstanding_claims=C2=A0=C2=A0=C2=A0=C2=A0 : 0=
<br>free_cpus=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 : 0<br>xen_major=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 4<br>xen_minor=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 4<br>xen_ext=
ra=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 : .1<br>xen_version=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 : 4.4.1<br>xen_caps=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : xen-3.0-x86_64 xen-3.0-x=
86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64 <br>xen_scheduler=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : arinc653<br>xen_pages=
ize=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 4096<br>p=
latform_params=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : virt_start=3D0xf=
fff800000000000<br>xen_changeset=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 : <br>xen_commandline=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 : placeholder loglvl=3Dall guest_loglvl=3Dall com1=3D115200,8n1,0x3f8,5=
 console=3Dcom1,vga gdb=3Dcom1 kgdboc=3Dcom1,115200 sched=3Darinc653 maxcpu=
s=3D1<br>cc_compiler=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 : gcc (Debian 4.7.2-5) 4.7.2<br>cc_compile_by=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : manam<br>cc_compile_domain=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 : <br>cc_compile_date=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 : Wed Jun=C2=A0 3 11:55:42 CEST 2015<br>xend_config_format=
=C2=A0=C2=A0=C2=A0=C2=A0 : 4<br><br></div><div class=3D"gmail_extra">Regard=
s, <br></div><div class=3D"gmail_extra">Idris<br></div></div>

--001a11c3b2084b26570517b28d6a--


--===============4269950771850679310==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============4269950771850679310==--


From xen-users-bounces@lists.xen.org Thu Jun 04 15:10:04 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2015 15:10:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0WlG-0006vI-Im; Thu, 04 Jun 2015 15:08:50 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z0WlE-0006vC-LF
	for xen-users@lists.xen.org; Thu, 04 Jun 2015 15:08:48 +0000
Received: from [85.158.137.68] by server-1.bemta-3.messagelabs.com id
	9A/C3-10437-FF960755; Thu, 04 Jun 2015 15:08:47 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-10.tower-31.messagelabs.com!1433430525!13160555!1
X-Originating-IP: [209.85.217.173]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_10_20,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15318 invoked from network); 4 Jun 2015 15:08:46 -0000
Received: from mail-lb0-f173.google.com (HELO mail-lb0-f173.google.com)
	(209.85.217.173)
	by server-10.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	4 Jun 2015 15:08:46 -0000
Received: by lbcmx3 with SMTP id mx3so29166545lbc.1
	for <xen-users@lists.xen.org>; Thu, 04 Jun 2015 08:08:45 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=sa8x/MBuFZ8+wiuM271anCYKAceLPZn5BYWrfg0E7vQ=;
	b=BCAYzZ3l4e/CAu1eK8mzyviiYRH59Pyidkkz6rXwa64saAQm80ylZNDkFmONtT9D00
	5Jzy0EOcPqBF34I27cLU4jF79p4PqCXMzFWVeKuq6B+5iWw3MW3RwUh00FfLtT9zaF/J
	5Xbysez5EtxImXFArZr9N2+J6UtC3snT4HMKjLuSvgCUOLINxYdkrQ/VX4GtLWgAgNKQ
	Ytu2rbMuHtPAV2Ra+kiLySejAi01n1EJxvxx2tc3wyj2IaUuQqMRj+sjrIcGzMJVkL7X
	2ngexQBWolCzEN7B0/HsVhODbRkk7ZnUOPafONE4pKKqu/kgYMB33IO4nQ3JBvDqlaR9
	d0UA==
X-Gm-Message-State: ALoCoQlzaQeNGBqkJJIGcoflorPaS+q2uWmYA1Vw32lZNwEA1VaMmmEOQb2RZAeJx9WVQXTsSLzG
MIME-Version: 1.0
X-Received: by 10.112.13.97 with SMTP id g1mr7314545lbc.52.1433430525676; Thu,
	04 Jun 2015 08:08:45 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Thu, 4 Jun 2015 08:08:45 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:1d0f:cc56:33e3:1469]
In-Reply-To: <CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
	<CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
Date: Thu, 4 Jun 2015 17:08:45 +0200
Message-ID: <CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>,
	josh.holtrop@dornerworks.com
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4269950771850679310=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============4269950771850679310==
Content-Type: multipart/alternative; boundary=001a11c3b2084b26570517b28d6a

--001a11c3b2084b26570517b28d6a
Content-Type: text/plain; charset=UTF-8

On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer <nate.studer@gmail.com> wrote:

> On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
> > On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
> >>
> >> Hi all,
> >>
> >> I have managed to call arinc653_scheduler_set.c without error.  The
> >> message when i run it like this
> >>
> >> not error
> >> not error
> >> hypercall bounce and schedule set finish *
> >> true
> >>
> >> * this message because i set on xc_sched_arinc653_schedule_set().
> >>
> >>
> >> but when i try 'xl list -v' still VM is not running
> >
> >
> > I'm sorry accidentally i press send but i haven't finished.
> >
> > I continue, but when i try 'xl list -v' still VM is not running like
> this :
> > Name                                        ID   Mem VCPUs      State
> > Time(s)   UUID                            Reason-Code   Security Label
> > Domain-0                                     0  6771     1     r-----
> > 10.0 00000000-0000-0000-0000-000000000000        -                -
> > Debian                                       1   512     1     ------
> > 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
> >
> >
> > Something weird after the small program run, the computer is becoming
> really
> > slow. Is it something related to runtime?
>
> That's how you know it's working!  The arinc653 scheduler is not work
> conserving or pre-emptive, so you should expect some performance
> degradation.  It probably should not be that bad, so I think it is a
> symptom of the problem below.
>
> > Does anyone have any idea what change I need to make to get the
> scheduler to
> > run
> > the VM?  I appreciate the help.
>
> From the attached program, which is similar to your previous program:
>
> sched.sched_entries[0].vcpu_id = 0;
> sched.sched_entries[0].runtime = 30;
> sched.major_frame += sched.sched_entries[0].runtime;
>
> The runtime field is in units of nanoseconds.  30 nanoseconds is
> orders of magnitude shorter than the context switch time.  I'm not
> sure what the scheduler would do with a runtime this small, but it
> would not be pretty.  For most configurations, the slice runtimes
> should be in the milliseconds range, so multiple your runtimes by
> 1000000, and see if that fixes your issue.
>
> sched.sched_entries[*].runtime = 10000000;  /* 10 ms */
>
>      Nate
>
>
After i changed runtime value to 1000000 or greater and run again. It was
suddenly hang with panic on CPU 0 with error message :

(XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
(XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
(XEN) ----[ Xen-4.4.1  x86_64  debug=y  Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff82d080129707>] on_selected_cpus+0x7/0xd6
(XEN) RFLAGS: 0000000000010046   CONTEXT: hypervisor
(XEN) rax: 0000000000000046   rbx: ffff82d08013a9c8   rcx: 0000000000000000
(XEN) rdx: 0000000000000000   rsi: ffff82d08013a9c8   rdi: ffff82d0802d7c18
(XEN) rbp: ffff82d0802d7c58   rsp: ffff82d0802d7c10   r8:  0000000000000004
(XEN) r9:  000000000000003f   r10: 0000000000000000   r11: 0000000000000246
(XEN) r12: 0000000000000000   r13: 0000000000000000   r14: ffff82d0802d7d38
(XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000426f0
(XEN) cr3: 00000000df888000   cr2: 0000000000989740
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff82d0802d7c10:
(XEN)    ffff82d08012984e 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 ffff82d0802735f0 0000000000000001 ffff82d0802f9200
(XEN)    0000000000989740 ffff82d0802d7cc8 ffff82d08013af14 0000000000200e8c
(XEN)    0000000000000000 00000002030bc067 000000000000000e 0000000000000092
(XEN)    0000000000989740 ffff82d0802d7ce8 000000000000000e 0000000000000000
(XEN)    0000000000989740 ffff8302154ff000 0000000000000000 ffff82d0802d7ce8
(XEN)    ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38 ffff82d0802d7d28
(XEN)    ffff82d080190631 0000000000000086 ffff8300dfb98000 0000000000989680
(XEN)    0000003222af7456 ffff82d0802d7e68 0000000000000000 00007d2f7fd282a7
(XEN)    ffff82d08022a33d 0000000000000000 ffff82d0802d7e68 0000003222af7456
(XEN)    0000000000989680 ffff82d0802d7e20 ffff8302154fd010 0000000000000246
(XEN)    0000003222b7f318 ffff8300df6fe060 0000000000000002 0000000000000086
(XEN)    0000003226424461 0000000000000005 ffff82d080274620 0000000000000005
(XEN)    0000000e00000000 ffff82d0801254ae 000000000000e008 0000000000010002
(XEN)    ffff82d0802d7de0 000000000000e010 0000000000000003 00ff82d080319728
(XEN)    80000000802fa2a0 ffff8300dfb98000 0000003222af7456 ffff82d0803196e0
(XEN)    ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0 ffff82d08012616c
(XEN)    ffff82d0802d7e60 ffff82d080319700 00000000002d7e60 ffff82d0803196e0
(XEN)    ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 ffff82d08012c7b6
(XEN)    ffff82d0802d0000 0000000000000246 0000003222aebd61 ffff82d0802eff00
(XEN) Xen call trace:
(XEN)    [<ffff82d080129707>] on_selected_cpus+0x7/0xd6
(XEN)    [<ffff82d08013af14>] __trap_to_gdb+0x130/0x9fc
(XEN)    [<ffff82d0801892b7>] debugger_trap_fatal+0x15/0x2c
(XEN)    [<ffff82d080190631>] do_page_fault+0x456/0x536
(XEN)    [<ffff82d08022a33d>] handle_exception_saved+0x2e/0x6c
(XEN)    [<ffff82d0801254ae>] a653sched_do_schedule+0x10a/0x1de
(XEN)    [<ffff82d08012616c>] schedule+0x116/0x5df
(XEN)    [<ffff82d080129359>] __do_softirq+0x81/0x8c
(XEN)    [<ffff82d0801293b2>] do_softirq+0x13/0x15
(XEN)    [<ffff82d08015f355>] idle_loop+0x64/0x74
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
(XEN) WARNING WARNING WARNING: Avoiding recursive gdb.

this is the output from 'xl info'

host                   : boaman
release                : 3.2.0-4-amd64
version                : #1 SMP Debian 3.2.65-1+deb7u2
machine                : x86_64
nr_cpus                : 1
max_cpu_id             : 0
nr_nodes               : 1
cores_per_socket       : 1
threads_per_core       : 1
cpu_mhz                : 2826
hw_caps                :
bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:00000000
virt_caps              : hvm
total_memory           : 8123
free_memory            : 745
sharing_freed_memory   : 0
sharing_used_memory    : 0
outstanding_claims     : 0
free_cpus              : 0
xen_major              : 4
xen_minor              : 4
xen_extra              : .1
xen_version            : 4.4.1
xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
hvm-3.0-x86_32p hvm-3.0-x86_64
xen_scheduler          : arinc653
xen_pagesize           : 4096
platform_params        : virt_start=0xffff800000000000
xen_changeset          :
xen_commandline        : placeholder loglvl=all guest_loglvl=all
com1=115200,8n1,0x3f8,5 console=com1,vga gdb=com1 kgdboc=com1,115200
sched=arinc653 maxcpus=1
cc_compiler            : gcc (Debian 4.7.2-5) 4.7.2
cc_compile_by          : manam
cc_compile_domain      :
cc_compile_date        : Wed Jun  3 11:55:42 CEST 2015
xend_config_format     : 4

Regards,
Idris

--001a11c3b2084b26570517b28d6a
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On T=
hu, Jun 4, 2015 at 3:14 PM, Nathan Studer <span dir=3D"ltr">&lt;<a href=3D"=
mailto:nate.studer@gmail.com" target=3D"_blank">nate.studer@gmail.com</a>&g=
t;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><span=
>On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris &lt;<a href=3D"mailto:mr@idris.w=
eb.id" target=3D"_blank">mr@idris.web.id</a>&gt; wrote:<br>
&gt; On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris &lt;<a href=3D"mailto:mr@idri=
s.web.id" target=3D"_blank">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt;<br>
</span><span>&gt;&gt; Hi all,<br>
&gt;&gt;<br>
&gt;&gt; I have managed to call arinc653_scheduler_set.c without error.=C2=
=A0 The<br>
&gt;&gt; message when i run it like this<br>
&gt;&gt;<br>
&gt;&gt; not error<br>
&gt;&gt; not error<br>
&gt;&gt; hypercall bounce and schedule set finish *<br>
&gt;&gt; true<br>
&gt;&gt;<br>
&gt;&gt; * this message because i set on xc_sched_arinc653_schedule_set().<=
br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; but when i try &#39;xl list -v&#39; still VM is not running<br>
&gt;<br>
&gt;<br>
&gt; I&#39;m sorry accidentally i press send but i haven&#39;t finished.<br=
>
&gt;<br>
&gt; I continue, but when i try &#39;xl list -v&#39; still VM is not runnin=
g like this :<br>
&gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 I=
D=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt; Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=C2=A0 =C2=
=A0Security Label<br>
&gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A00=C2=
=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt; 10.0 00000000-0000-0000-0000-000000000000=C2=A0 =C2=A0 =C2=A0 =C2=A0 -=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A01=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<br>
&gt; 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0 =C2=A0 =C2=A0 =C2=A0 -=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;<br>
&gt;<br>
&gt; Something weird after the small program run, the computer is becoming =
really<br>
&gt; slow. Is it something related to runtime?<br>
<br>
</span>That&#39;s how you know it&#39;s working!=C2=A0 The arinc653 schedul=
er is not work<br>
conserving or pre-emptive, so you should expect some performance<br>
degradation.=C2=A0 It probably should not be that bad, so I think it is a<b=
r>
symptom of the problem below.<br>
<span><br>
&gt; Does anyone have any idea what change I need to make to get the schedu=
ler to<br>
&gt; run<br>
&gt; the VM?=C2=A0 I appreciate the help.<br>
<br>
</span>From the attached program, which is similar to your previous program=
:<br>
<span><br>
sched.sched_entries[0].vcpu_id =3D 0;<br>
sched.sched_entries[0].runtime =3D 30;<br>
sched.major_frame +=3D sched.sched_entries[0].runtime;<br>
<br>
</span>The runtime field is in units of nanoseconds.=C2=A0 30 nanoseconds i=
s<br>
orders of magnitude shorter than the context switch time.=C2=A0 I&#39;m not=
<br>
sure what the scheduler would do with a runtime this small, but it<br>
would not be pretty.=C2=A0 For most configurations, the slice runtimes<br>
should be in the milliseconds range, so multiple your runtimes by<br>
1000000, and see if that fixes your issue.<br>
<br>
sched.sched_entries[*].runtime =3D 10000000;=C2=A0 /* 10 ms */<br>
<br>
=C2=A0 =C2=A0 =C2=A0Nate<br>
<br></blockquote><div>=C2=A0</div></div>After i changed runtime value to 10=
00000 or greater and run again. It was suddenly hang with panic on CPU 0 wi=
th error message : <br><br>(XEN) Assertion &#39;local_irq_is_enabled()&#39;=
 failed at smp.c:55<br>(XEN) WARNING WARNING WARNING: Avoiding recursive gd=
b.<br>(XEN) ----[ Xen-4.4.1=C2=A0 x86_64=C2=A0 debug=3Dy=C2=A0 Not tainted =
]----<br>(XEN) CPU:=C2=A0=C2=A0=C2=A0 0<br>(XEN) RIP:=C2=A0=C2=A0=C2=A0 e00=
8:[&lt;ffff82d080129707&gt;] on_selected_cpus+0x7/0xd6<br>(XEN) RFLAGS: 000=
0000000010046=C2=A0=C2=A0 CONTEXT: hypervisor<br>(XEN) rax: 000000000000004=
6=C2=A0=C2=A0 rbx: ffff82d08013a9c8=C2=A0=C2=A0 rcx: 0000000000000000<br>(X=
EN) rdx: 0000000000000000=C2=A0=C2=A0 rsi: ffff82d08013a9c8=C2=A0=C2=A0 rdi=
: ffff82d0802d7c18<br>(XEN) rbp: ffff82d0802d7c58=C2=A0=C2=A0 rsp: ffff82d0=
802d7c10=C2=A0=C2=A0 r8:=C2=A0 0000000000000004<br>(XEN) r9:=C2=A0 00000000=
0000003f=C2=A0=C2=A0 r10: 0000000000000000=C2=A0=C2=A0 r11: 000000000000024=
6<br>(XEN) r12: 0000000000000000=C2=A0=C2=A0 r13: 0000000000000000=C2=A0=C2=
=A0 r14: ffff82d0802d7d38<br>(XEN) r15: 0000000000000000=C2=A0=C2=A0 cr0: 0=
00000008005003b=C2=A0=C2=A0 cr4: 00000000000426f0<br>(XEN) cr3: 00000000df8=
88000=C2=A0=C2=A0 cr2: 0000000000989740<br>(XEN) ds: 0000=C2=A0=C2=A0 es: 0=
000=C2=A0=C2=A0 fs: 0000=C2=A0=C2=A0 gs: 0000=C2=A0=C2=A0 ss: e010=C2=A0=C2=
=A0 cs: e008<br>(XEN) Xen stack trace from rsp=3Dffff82d0802d7c10:<br>(XEN)=
=C2=A0=C2=A0=C2=A0 ffff82d08012984e 0000000000000000 0000000000000000 00000=
00000000000<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000000000000 ffff82d0802735f0 00=
00000000000001 ffff82d0802f9200<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000000989740=
 ffff82d0802d7cc8 ffff82d08013af14 0000000000200e8c<br>(XEN)=C2=A0=C2=A0=C2=
=A0 0000000000000000 00000002030bc067 000000000000000e 0000000000000092<br>=
(XEN)=C2=A0=C2=A0=C2=A0 0000000000989740 ffff82d0802d7ce8 000000000000000e =
0000000000000000<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000000989740 ffff8302154ff0=
00 0000000000000000 ffff82d0802d7ce8<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0801=
892b7 ffff8302154ff000 ffff82d0802d7d38 ffff82d0802d7d28<br>(XEN)=C2=A0=C2=
=A0=C2=A0 ffff82d080190631 0000000000000086 ffff8300dfb98000 00000000009896=
80<br>(XEN)=C2=A0=C2=A0=C2=A0 0000003222af7456 ffff82d0802d7e68 00000000000=
00000 00007d2f7fd282a7<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d08022a33d 00000000=
00000000 ffff82d0802d7e68 0000003222af7456<br>(XEN)=C2=A0=C2=A0=C2=A0 00000=
00000989680 ffff82d0802d7e20 ffff8302154fd010 0000000000000246<br>(XEN)=C2=
=A0=C2=A0=C2=A0 0000003222b7f318 ffff8300df6fe060 0000000000000002 00000000=
00000086<br>(XEN)=C2=A0=C2=A0=C2=A0 0000003226424461 0000000000000005 ffff8=
2d080274620 0000000000000005<br>(XEN)=C2=A0=C2=A0=C2=A0 0000000e00000000 ff=
ff82d0801254ae 000000000000e008 0000000000010002<br>(XEN)=C2=A0=C2=A0=C2=A0=
 ffff82d0802d7de0 000000000000e010 0000000000000003 00ff82d080319728<br>(XE=
N)=C2=A0=C2=A0=C2=A0 80000000802fa2a0 ffff8300dfb98000 0000003222af7456 fff=
f82d0803196e0<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0803196e8 0000000000000000 =
ffff82d0802d7eb0 ffff82d08012616c<br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0802d7e=
60 ffff82d080319700 00000000002d7e60 ffff82d0803196e0<br>(XEN)=C2=A0=C2=A0=
=C2=A0 ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 ffff82d08012c7b6<=
br>(XEN)=C2=A0=C2=A0=C2=A0 ffff82d0802d0000 0000000000000246 0000003222aebd=
61 ffff82d0802eff00<br>(XEN) Xen call trace:<br>(XEN)=C2=A0=C2=A0=C2=A0 [&l=
t;ffff82d080129707&gt;] on_selected_cpus+0x7/0xd6<br>(XEN)=C2=A0=C2=A0=C2=
=A0 [&lt;ffff82d08013af14&gt;] __trap_to_gdb+0x130/0x9fc<br>(XEN)=C2=A0=C2=
=A0=C2=A0 [&lt;ffff82d0801892b7&gt;] debugger_trap_fatal+0x15/0x2c<br>(XEN)=
=C2=A0=C2=A0=C2=A0 [&lt;ffff82d080190631&gt;] do_page_fault+0x456/0x536<br>=
(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d08022a33d&gt;] handle_exception_saved+0=
x2e/0x6c<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d0801254ae&gt;] a653sched_do=
_schedule+0x10a/0x1de<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d08012616c&gt;]=
 schedule+0x116/0x5df<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d080129359&gt;]=
 __do_softirq+0x81/0x8c<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d0801293b2&gt=
;] do_softirq+0x13/0x15<br>(XEN)=C2=A0=C2=A0=C2=A0 [&lt;ffff82d08015f355&gt=
;] idle_loop+0x64/0x74<br>(XEN) <br>(XEN) <br>(XEN) ***********************=
*****************<br>(XEN) Panic on CPU 0:<br>(XEN) Assertion &#39;local_ir=
q_is_enabled()&#39; failed at smp.c:55<br>(XEN) ***************************=
*************<br>(XEN) <br>(XEN) Reboot in five seconds...<br>(XEN) WARNING=
 WARNING WARNING: Avoiding recursive gdb.<br>=C2=A0<br></div><div class=3D"=
gmail_extra">this is the output from &#39;xl info&#39;<br><br>host=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 : boaman<br>release=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 3.2.0-4-amd6=
4<br>version=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 : #1 SMP Debian 3.2.65-1+deb7u2<br>machine=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 : x86_64<br>nr_cpus=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 1<br>max_cpu_id=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 0<br>nr_n=
odes=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 : 1<br>cores_per_socket=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 : 1<br>threads_per_core=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 1<br>cpu_mhz=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 : 2826<br>hw_caps=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : bfebfbff:20100800:000000=
00:00000900:0408e3fd:00000000:00000001:00000000<br>virt_caps=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : hvm<br>to=
tal_memory=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 81=
23<br>free_memory=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 : 745<br>sharing_freed_memory=C2=A0=C2=A0 : 0<br>sharing_used_mem=
ory=C2=A0=C2=A0=C2=A0 : 0<br>outstanding_claims=C2=A0=C2=A0=C2=A0=C2=A0 : 0=
<br>free_cpus=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 : 0<br>xen_major=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 4<br>xen_minor=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 4<br>xen_ext=
ra=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 : .1<br>xen_version=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 : 4.4.1<br>xen_caps=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : xen-3.0-x86_64 xen-3.0-x=
86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64 <br>xen_scheduler=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : arinc653<br>xen_pages=
ize=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 4096<br>p=
latform_params=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : virt_start=3D0xf=
fff800000000000<br>xen_changeset=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 : <br>xen_commandline=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 : placeholder loglvl=3Dall guest_loglvl=3Dall com1=3D115200,8n1,0x3f8,5=
 console=3Dcom1,vga gdb=3Dcom1 kgdboc=3Dcom1,115200 sched=3Darinc653 maxcpu=
s=3D1<br>cc_compiler=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 : gcc (Debian 4.7.2-5) 4.7.2<br>cc_compile_by=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : manam<br>cc_compile_domain=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 : <br>cc_compile_date=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 : Wed Jun=C2=A0 3 11:55:42 CEST 2015<br>xend_config_format=
=C2=A0=C2=A0=C2=A0=C2=A0 : 4<br><br></div><div class=3D"gmail_extra">Regard=
s, <br></div><div class=3D"gmail_extra">Idris<br></div></div>

--001a11c3b2084b26570517b28d6a--


--===============4269950771850679310==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============4269950771850679310==--


From xen-users-bounces@lists.xen.org Fri Jun 05 13:29:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jun 2015 13:29:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0rfr-0001If-IP; Fri, 05 Jun 2015 13:28:39 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z0rfp-0001Ia-Ue
	for xen-users@lists.xen.org; Fri, 05 Jun 2015 13:28:38 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	A2/8A-01068-504A1755; Fri, 05 Jun 2015 13:28:37 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-7.tower-31.messagelabs.com!1433510915!13513486!1
X-Originating-IP: [64.12.143.82]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 3645 invoked from network); 5 Jun 2015 13:28:36 -0000
Received: from omr-m09.mx.aol.com (HELO omr-m09.mx.aol.com) (64.12.143.82)
	by server-7.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 5 Jun 2015 13:28:36 -0000
Received: from mtaout-aaa01.mx.aol.com (mtaout-aaa01.mx.aol.com [172.27.1.225])
	by omr-m09.mx.aol.com (Outbound Mail Relay) with ESMTP id 9F7A4705928F9
	for <xen-users@lists.xen.org>; Fri,  5 Jun 2015 09:28:35 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-aaa01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id 29DD838000091
	for <xen-users@lists.xen.org>; Fri,  5 Jun 2015 09:28:35 -0400 (EDT)
Message-ID: <1433510897.16502.17.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Fri, 05 Jun 2015 14:28:17 +0100
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1433510915;
	bh=zkHX2cQus+aUZAPw9NpXyWvkN9KVjZYnHL2sDKU7psg=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=DUk5VSulgVnTTtwVj48lMsRJ3Vu/RCX7Z2T6WIERGQk+vmTivtf/rGVUQHxARmInY
	ohCNgbW1kLleRlFErDoohJ9jaRy3T3aTYbP1YnIZJFFeSgWX4+Zh0VLWrGg7q0hJQJ
	sr6l1gWjzk9FAaFzhPq/O9RaTCjUH87HyEuIXgNA=
x-aol-sid: 3039ac1b01e15571a4030b9f
X-AOL-IP: 185.25.64.249
Subject: [Xen-users] 32 bits on 64 bits kernel
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi,
I've installed the xen package from the Debian 8 x64 Jessie distribution
repositories and I am creating virtual machines using the xen-tools (xen
create image) without having any trouble, nevertheless when creating VMs
for a different architecture then the one where the XEN Hypervisor is
running on, that is, i386 virtual machines on an x86-64 host 
I have now noticed they still run the 64 bits kernel. I'd rather prefer
to have a fully 32 bits environment and I've started to follow :


http://wiki.xenproject.org/wiki/Mainline_Linux_Kernel_Configs	

Unfortunately following the above steps results in :

xl create -c /etc/xen/xxx-debian32RfL.cfg
Parsing config from /etc/xen/xxx-debian32RfL.cfg
xc: error: elf_xen_note_check: ERROR: Will only load images built for
the generic loader or Linux images (Not '' and ''): Invalid kernel
libxl: error: libxl_dom.c:407:libxl__build_pv: xc_dom_parse_image
failed: No such file or directory
libxl: error: libxl_create.c:1022:domcreate_rebuild_done: cannot
(re-)build domain: -3

I have configured the kernel using a standard debian configuration 
/usr/src/linux-config-3.16/config.i386_none_586.xz
and adding on the top of that one the needed options.

Am I missing some steps ?

Thanks,
Pietro


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 05 13:29:48 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jun 2015 13:29:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0rfr-0001If-IP; Fri, 05 Jun 2015 13:28:39 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z0rfp-0001Ia-Ue
	for xen-users@lists.xen.org; Fri, 05 Jun 2015 13:28:38 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	A2/8A-01068-504A1755; Fri, 05 Jun 2015 13:28:37 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-7.tower-31.messagelabs.com!1433510915!13513486!1
X-Originating-IP: [64.12.143.82]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 3645 invoked from network); 5 Jun 2015 13:28:36 -0000
Received: from omr-m09.mx.aol.com (HELO omr-m09.mx.aol.com) (64.12.143.82)
	by server-7.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 5 Jun 2015 13:28:36 -0000
Received: from mtaout-aaa01.mx.aol.com (mtaout-aaa01.mx.aol.com [172.27.1.225])
	by omr-m09.mx.aol.com (Outbound Mail Relay) with ESMTP id 9F7A4705928F9
	for <xen-users@lists.xen.org>; Fri,  5 Jun 2015 09:28:35 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-aaa01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id 29DD838000091
	for <xen-users@lists.xen.org>; Fri,  5 Jun 2015 09:28:35 -0400 (EDT)
Message-ID: <1433510897.16502.17.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Fri, 05 Jun 2015 14:28:17 +0100
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1433510915;
	bh=zkHX2cQus+aUZAPw9NpXyWvkN9KVjZYnHL2sDKU7psg=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=DUk5VSulgVnTTtwVj48lMsRJ3Vu/RCX7Z2T6WIERGQk+vmTivtf/rGVUQHxARmInY
	ohCNgbW1kLleRlFErDoohJ9jaRy3T3aTYbP1YnIZJFFeSgWX4+Zh0VLWrGg7q0hJQJ
	sr6l1gWjzk9FAaFzhPq/O9RaTCjUH87HyEuIXgNA=
x-aol-sid: 3039ac1b01e15571a4030b9f
X-AOL-IP: 185.25.64.249
Subject: [Xen-users] 32 bits on 64 bits kernel
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi,
I've installed the xen package from the Debian 8 x64 Jessie distribution
repositories and I am creating virtual machines using the xen-tools (xen
create image) without having any trouble, nevertheless when creating VMs
for a different architecture then the one where the XEN Hypervisor is
running on, that is, i386 virtual machines on an x86-64 host 
I have now noticed they still run the 64 bits kernel. I'd rather prefer
to have a fully 32 bits environment and I've started to follow :


http://wiki.xenproject.org/wiki/Mainline_Linux_Kernel_Configs	

Unfortunately following the above steps results in :

xl create -c /etc/xen/xxx-debian32RfL.cfg
Parsing config from /etc/xen/xxx-debian32RfL.cfg
xc: error: elf_xen_note_check: ERROR: Will only load images built for
the generic loader or Linux images (Not '' and ''): Invalid kernel
libxl: error: libxl_dom.c:407:libxl__build_pv: xc_dom_parse_image
failed: No such file or directory
libxl: error: libxl_create.c:1022:domcreate_rebuild_done: cannot
(re-)build domain: -3

I have configured the kernel using a standard debian configuration 
/usr/src/linux-config-3.16/config.i386_none_586.xz
and adding on the top of that one the needed options.

Am I missing some steps ?

Thanks,
Pietro


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 05 13:45:24 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jun 2015 13:45:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0rvB-0002jZ-Ea; Fri, 05 Jun 2015 13:44:29 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=591267e2d=Ian.Campbell@citrix.com>)
	id 1Z0rvA-0002jT-AX
	for xen-users@lists.xen.org; Fri, 05 Jun 2015 13:44:28 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	54/2F-03895-BB7A1755; Fri, 05 Jun 2015 13:44:27 +0000
X-Env-Sender: prvs=591267e2d=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-31.messagelabs.com!1433511865!9796806!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 9271 invoked from network); 5 Jun 2015 13:44:26 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	5 Jun 2015 13:44:26 -0000
X-IronPort-AV: E=Sophos;i="5.13,558,1427760000"; d="scan'208";a="272051046"
Message-ID: <1433511681.7108.311.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: pietrop <pulsarpietro@aol.com>
Date: Fri, 5 Jun 2015 14:41:21 +0100
In-Reply-To: <1433510897.16502.17.camel@aol.com>
References: <1433510897.16502.17.camel@aol.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] 32 bits on 64 bits kernel
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-05 at 14:28 +0100, pietrop wrote:
> I have configured the kernel using a standard debian configuration 
> /usr/src/linux-config-3.16/config.i386_none_586.xz

This doesn't enable PAE and therefore cannot support Xen pv operation.

In Debian the 32-bit kernel flavour with Xen support is '686-pae', so
config.i386_none_686-pae.xz should be the starting point.

You should be able to just use the existing linux-image.*-686-pae
package, unless you have a reason to build it yourself?

This might involve enabling multiarch to be able to install the i386
kernels on your 64-bit host. Or you can install it inside the guest
along with the pv-menu-list package and use pygrub or pvgrub to boot
from the guest filesystem.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 05 13:45:24 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jun 2015 13:45:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z0rvB-0002jZ-Ea; Fri, 05 Jun 2015 13:44:29 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=591267e2d=Ian.Campbell@citrix.com>)
	id 1Z0rvA-0002jT-AX
	for xen-users@lists.xen.org; Fri, 05 Jun 2015 13:44:28 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	54/2F-03895-BB7A1755; Fri, 05 Jun 2015 13:44:27 +0000
X-Env-Sender: prvs=591267e2d=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-31.messagelabs.com!1433511865!9796806!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 9271 invoked from network); 5 Jun 2015 13:44:26 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	5 Jun 2015 13:44:26 -0000
X-IronPort-AV: E=Sophos;i="5.13,558,1427760000"; d="scan'208";a="272051046"
Message-ID: <1433511681.7108.311.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: pietrop <pulsarpietro@aol.com>
Date: Fri, 5 Jun 2015 14:41:21 +0100
In-Reply-To: <1433510897.16502.17.camel@aol.com>
References: <1433510897.16502.17.camel@aol.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] 32 bits on 64 bits kernel
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-05 at 14:28 +0100, pietrop wrote:
> I have configured the kernel using a standard debian configuration 
> /usr/src/linux-config-3.16/config.i386_none_586.xz

This doesn't enable PAE and therefore cannot support Xen pv operation.

In Debian the 32-bit kernel flavour with Xen support is '686-pae', so
config.i386_none_686-pae.xz should be the starting point.

You should be able to just use the existing linux-image.*-686-pae
package, unless you have a reason to build it yourself?

This might involve enabling multiarch to be able to install the i386
kernels on your 64-bit host. Or you can install it inside the guest
along with the pv-menu-list package and use pygrub or pvgrub to boot
from the guest filesystem.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sat Jun 06 15:07:07 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jun 2015 15:07:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z1Ffg-0006Zq-RT; Sat, 06 Jun 2015 15:06:04 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <simon.waterman@zynstra.com>) id 1Z1Fff-0006Zl-M5
	for xen-users@lists.xenproject.org; Sat, 06 Jun 2015 15:06:03 +0000
Received: from [85.158.139.211] by server-5.bemta-5.messagelabs.com id
	C5/C8-19215-A5C03755; Sat, 06 Jun 2015 15:06:02 +0000
X-Env-Sender: simon.waterman@zynstra.com
X-Msg-Ref: server-7.tower-206.messagelabs.com!1433603161!12324800!1
X-Originating-IP: [157.55.234.90]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16776 invoked from network); 6 Jun 2015 15:06:02 -0000
Received: from mail-db3on0090.outbound.protection.outlook.com (HELO
	emea01-db3-obe.outbound.protection.outlook.com) (157.55.234.90)
	by server-7.tower-206.messagelabs.com with AES256-SHA encrypted SMTP;
	6 Jun 2015 15:06:02 -0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com (25.163.166.157) by
	VI1PR04MB1504.eurprd04.prod.outlook.com (25.163.167.12) with Microsoft
	SMTP Server (TLS) id 15.1.172.22; Sat, 6 Jun 2015 15:05:59 +0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) by
	VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) with mapi id
	15.01.0172.012; Sat, 6 Jun 2015 15:05:59 +0000
From: Simon Waterman <simon.waterman@zynstra.com>
To: Ian Campbell <ian.campbell@citrix.com>
Thread-Topic: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and end
	zone) using xl generated e820 map
Thread-Index: AQHQnk90VBaaD7EKZkuu0AsbDhRjrp2cBj4AgAOQwhU=
Date: Sat, 6 Jun 2015 15:05:58 +0000
Message-ID: <VI1PR04MB15016631F8A2D144B71F556483B10@VI1PR04MB1501.eurprd04.prod.outlook.com>
References: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>,
	<1433406938.7108.85.camel@citrix.com>
In-Reply-To: <1433406938.7108.85.camel@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [193.63.64.25]
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:VI1PR04MB1504;
x-microsoft-antispam-prvs: <VI1PR04MB150416D569E9C2C4C9F2D22483B10@VI1PR04MB1504.eurprd04.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
	RULEID:(601004)(5005006)(520003)(3002001); SRVR:VI1PR04MB1504;
	BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB1504; 
x-forefront-prvs: 05991796DF
x-forefront-antispam-report: SFV:NSPM;
	SFS:(10009020)(6009001)(51704005)(377424004)(92566002)(110136002)(5890100001)(2950100001)(189998001)(76576001)(5002640100001)(33656002)(2900100001)(5001960100002)(102836002)(122556002)(19580395003)(66066001)(77156002)(62966003)(40100003)(86362001)(2656002)(76176999)(50986999)(54356999)(106116001)(87936001)(46102003)(74316001)(7059030);
	DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB1504;
	H:VI1PR04MB1501.eurprd04.prod.outlook.com; FPR:; SPF:None;
	MLV:sfv; LANG:en; 
MIME-Version: 1.0
X-OriginatorOrg: zynstra.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jun 2015 15:05:58.7351 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4c2b4c7a-32de-4e00-8ebe-361d80e7a665
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB1504
Cc: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: Re: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and
 end zone) using xl generated e820 map
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


>On Wed, 2015-06-03 at 22:57 +0000, Simon Waterman wrote:
>> Hi,
>>
>> We're hitting the kernel BUG below in one of our VMs running on Xen 4.4 and
>> Linux kernel 3.13.0.

>This is a rather old kernel, and not even the latest stable version of
>it (3.13.11 was the last, with 900+ fixes over .0)

>If you can't arrange to test something up to date then I'd suggest at
>least switching to the latest 3.14.y which is a long term supported (by
>kernel.org) kernel.

>Ian.

Hi Ian,

I tried 3.19 and our test worked fine.  Guess we had just got a bit far behind.  Thanks for the guidance.

Simon
Zynstra is a private limited company registered in England and Wales (registered number 07864369). Our registered office and Headquarters are at The Innovation Centre, Broad Quay, Bath, BA1 1UD. This email, its contents and any attachments are confidential. If you have received this message in error please delete it from your system and advise the sender immediately.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sat Jun 06 15:07:07 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jun 2015 15:07:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z1Ffg-0006Zq-RT; Sat, 06 Jun 2015 15:06:04 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <simon.waterman@zynstra.com>) id 1Z1Fff-0006Zl-M5
	for xen-users@lists.xenproject.org; Sat, 06 Jun 2015 15:06:03 +0000
Received: from [85.158.139.211] by server-5.bemta-5.messagelabs.com id
	C5/C8-19215-A5C03755; Sat, 06 Jun 2015 15:06:02 +0000
X-Env-Sender: simon.waterman@zynstra.com
X-Msg-Ref: server-7.tower-206.messagelabs.com!1433603161!12324800!1
X-Originating-IP: [157.55.234.90]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16776 invoked from network); 6 Jun 2015 15:06:02 -0000
Received: from mail-db3on0090.outbound.protection.outlook.com (HELO
	emea01-db3-obe.outbound.protection.outlook.com) (157.55.234.90)
	by server-7.tower-206.messagelabs.com with AES256-SHA encrypted SMTP;
	6 Jun 2015 15:06:02 -0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com (25.163.166.157) by
	VI1PR04MB1504.eurprd04.prod.outlook.com (25.163.167.12) with Microsoft
	SMTP Server (TLS) id 15.1.172.22; Sat, 6 Jun 2015 15:05:59 +0000
Received: from VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) by
	VI1PR04MB1501.eurprd04.prod.outlook.com ([25.163.166.157]) with mapi id
	15.01.0172.012; Sat, 6 Jun 2015 15:05:59 +0000
From: Simon Waterman <simon.waterman@zynstra.com>
To: Ian Campbell <ian.campbell@citrix.com>
Thread-Topic: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and end
	zone) using xl generated e820 map
Thread-Index: AQHQnk90VBaaD7EKZkuu0AsbDhRjrp2cBj4AgAOQwhU=
Date: Sat, 6 Jun 2015 15:05:58 +0000
Message-ID: <VI1PR04MB15016631F8A2D144B71F556483B10@VI1PR04MB1501.eurprd04.prod.outlook.com>
References: <VI1PR04MB150111CBCB6C9532011C6A4F83B40@VI1PR04MB1501.eurprd04.prod.outlook.com>,
	<1433406938.7108.85.camel@citrix.com>
In-Reply-To: <1433406938.7108.85.camel@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [193.63.64.25]
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:VI1PR04MB1504;
x-microsoft-antispam-prvs: <VI1PR04MB150416D569E9C2C4C9F2D22483B10@VI1PR04MB1504.eurprd04.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
	RULEID:(601004)(5005006)(520003)(3002001); SRVR:VI1PR04MB1504;
	BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB1504; 
x-forefront-prvs: 05991796DF
x-forefront-antispam-report: SFV:NSPM;
	SFS:(10009020)(6009001)(51704005)(377424004)(92566002)(110136002)(5890100001)(2950100001)(189998001)(76576001)(5002640100001)(33656002)(2900100001)(5001960100002)(102836002)(122556002)(19580395003)(66066001)(77156002)(62966003)(40100003)(86362001)(2656002)(76176999)(50986999)(54356999)(106116001)(87936001)(46102003)(74316001)(7059030);
	DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB1504;
	H:VI1PR04MB1501.eurprd04.prod.outlook.com; FPR:; SPF:None;
	MLV:sfv; LANG:en; 
MIME-Version: 1.0
X-OriginatorOrg: zynstra.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jun 2015 15:05:58.7351 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4c2b4c7a-32de-4e00-8ebe-361d80e7a665
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB1504
Cc: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: Re: [Xen-users] Kernel BUG in page_alloc.c (mismatched start and
 end zone) using xl generated e820 map
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


>On Wed, 2015-06-03 at 22:57 +0000, Simon Waterman wrote:
>> Hi,
>>
>> We're hitting the kernel BUG below in one of our VMs running on Xen 4.4 and
>> Linux kernel 3.13.0.

>This is a rather old kernel, and not even the latest stable version of
>it (3.13.11 was the last, with 900+ fixes over .0)

>If you can't arrange to test something up to date then I'd suggest at
>least switching to the latest 3.14.y which is a long term supported (by
>kernel.org) kernel.

>Ian.

Hi Ian,

I tried 3.19 and our test worked fine.  Guess we had just got a bit far behind.  Thanks for the guidance.

Simon
Zynstra is a private limited company registered in England and Wales (registered number 07864369). Our registered office and Headquarters are at The Innovation Centre, Broad Quay, Bath, BA1 1UD. This email, its contents and any attachments are confidential. If you have received this message in error please delete it from your system and advise the sender immediately.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sun Jun 07 14:07:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 07 Jun 2015 14:07:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z1bDV-00077m-7L; Sun, 07 Jun 2015 14:06:25 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <jl4312@columbia.edu>) id 1Z1bDT-00076e-ED
	for xen-users@lists.xen.org; Sun, 07 Jun 2015 14:06:23 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	1F/81-03895-EDF44755; Sun, 07 Jun 2015 14:06:22 +0000
X-Env-Sender: jl4312@columbia.edu
X-Msg-Ref: server-4.tower-31.messagelabs.com!1433685980!12625061!1
X-Originating-IP: [128.59.72.251]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12475 invoked from network); 7 Jun 2015 14:06:21 -0000
Received: from buckwheat.cc.columbia.edu (HELO buckwheat.cc.columbia.edu)
	(128.59.72.251)
	by server-4.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 7 Jun 2015 14:06:21 -0000
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250])
	by buckwheat.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id
	t57E63q8010248
	for <xen-users@lists.xen.org>; Sun, 7 Jun 2015 10:06:20 -0400
Received: from hazelnut (localhost.localdomain [127.0.0.1])
	by hazelnut (Postfix) with ESMTP id 4ECA26D
	for <xen-users@lists.xen.org>; Sun,  7 Jun 2015 10:06:20 -0400 (EDT)
Received: from rambutan.cc.columbia.edu (rambutan.cc.columbia.edu
	[128.59.29.5]) by hazelnut (Postfix) with ESMTP id 247436D
	for <xen-users@lists.xen.org>; Sun,  7 Jun 2015 10:06:20 -0400 (EDT)
Received: from mail-ie0-f182.google.com (mail-ie0-f182.google.com
	[209.85.223.182])
	by rambutan.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id
	t57E6JGg025778
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <xen-users@lists.xen.org>; Sun, 7 Jun 2015 10:06:20 -0400 (EDT)
Received: by ieclw1 with SMTP id lw1so83656457iec.3
	for <xen-users@lists.xen.org>; Sun, 07 Jun 2015 07:06:19 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:date:message-id:subject:from:to
	:content-type;
	bh=p6MpUdGBd2jbSmvXKhE2BauqzKBuq+24QkAfMf6X8gA=;
	b=FX66J0ugT18wb8MHqnFUUkqc6LZy9Dm7f38e3mnCQGRi9FRs7LZZqEwiVuj+xw/NuO
	DLGyCOUp2DaW43a+2Mbfi4NDu8dVriQSIlmI+MkhSHAakIDYVK9xplvV9bU/0H8nGXKp
	+U4GGwRBpr+46h0n5wIZueEiuVVfe81B6am/HrKbHcAoAZaR7lRghzrBZqhiQE7y1rER
	T29jQX4YCJeiYXnOIIunDlFpgbqXGgAKAvlhgMLiGPz6sOwxxVX1eQHv+R6xF2GuZxPr
	8bm73+sdRnl6FpODOdULGuVLK/DolDvFhQ7U6W43Ox9e3XRl5ewnC4DK5+ZFolSCAN49
	bNiA==
X-Gm-Message-State: ALoCoQmyE38UeOh404pstTqc66zsJsI6QejQqGT/XCMhxJvnTZIXs9DCxx8P0aYAmhrb7wFDISoSHtLXbkfX6QGSE4iYZ347W6+njyCgop/HrHc5P/fFJVTXSiCWjiZ74Fdt41FkbVvP
X-Received: by 10.50.137.100 with SMTP id qh4mr8166758igb.1.1433685979433;
	Sun, 07 Jun 2015 07:06:19 -0700 (PDT)
X-Received: by 10.50.137.100 with SMTP id qh4mr8166734igb.1.1433685979159;
	Sun, 07 Jun 2015 07:06:19 -0700 (PDT)
Received: from mail-ig0-f182.google.com (mail-ig0-f182.google.com.
	[209.85.213.182])
	by mx.google.com with ESMTPSA id q10sm3040581ige.16.2015.06.07.07.06.15
	for <xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Sun, 07 Jun 2015 07:06:16 -0700 (PDT)
Received: by igbzc4 with SMTP id zc4so45166425igb.0
	for <xen-users@lists.xen.org>; Sun, 07 Jun 2015 07:06:15 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.42.226.8 with SMTP id iu8mr18997437icb.17.1433685975352;
	Sun, 07 Jun 2015 07:06:15 -0700 (PDT)
Received: by 10.36.32.5 with HTTP; Sun, 7 Jun 2015 07:06:15 -0700 (PDT)
Date: Sun, 7 Jun 2015 10:06:15 -0400
Message-ID: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
From: Jintack Lim <jintack@cs.columbia.edu>
To: xen-users@lists.xen.org
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.5
Subject: [Xen-users] Monitoring Xen's cpu utilization
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8892831243611700502=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============8892831243611700502==
Content-Type: multipart/alternative; boundary=001a11c30f9e47dcf20517ee0731

--001a11c30f9e47dcf20517ee0731
Content-Type: text/plain; charset=UTF-8

Hi,

I would like to monitor cpu utilization of every domain and Xen itself.
Xentop gives appropriate information for domains,
however it does not tell about Xen hypervisor.
I wonder there is a tool for getting these information.

I'm working on ARM64 platform, and using Xen 4.5.0

Thanks,
Jintack

--001a11c30f9e47dcf20517ee0731
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I would like to monitor cpu utiliza=
tion of every domain and Xen itself.</div><div>Xentop gives appropriate inf=
ormation for domains,</div><div>however it does not tell about Xen hypervis=
or.</div><div>I wonder there is a tool for getting these information.</div>=
<div><br></div><div>I&#39;m working on ARM64 platform, and using Xen 4.5.0<=
/div><div><br></div><div>Thanks,</div><div>Jintack</div></div>

--001a11c30f9e47dcf20517ee0731--



--===============8892831243611700502==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8892831243611700502==--



From xen-users-bounces@lists.xen.org Sun Jun 07 14:07:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 07 Jun 2015 14:07:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z1bDV-00077m-7L; Sun, 07 Jun 2015 14:06:25 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <jl4312@columbia.edu>) id 1Z1bDT-00076e-ED
	for xen-users@lists.xen.org; Sun, 07 Jun 2015 14:06:23 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	1F/81-03895-EDF44755; Sun, 07 Jun 2015 14:06:22 +0000
X-Env-Sender: jl4312@columbia.edu
X-Msg-Ref: server-4.tower-31.messagelabs.com!1433685980!12625061!1
X-Originating-IP: [128.59.72.251]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12475 invoked from network); 7 Jun 2015 14:06:21 -0000
Received: from buckwheat.cc.columbia.edu (HELO buckwheat.cc.columbia.edu)
	(128.59.72.251)
	by server-4.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 7 Jun 2015 14:06:21 -0000
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250])
	by buckwheat.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id
	t57E63q8010248
	for <xen-users@lists.xen.org>; Sun, 7 Jun 2015 10:06:20 -0400
Received: from hazelnut (localhost.localdomain [127.0.0.1])
	by hazelnut (Postfix) with ESMTP id 4ECA26D
	for <xen-users@lists.xen.org>; Sun,  7 Jun 2015 10:06:20 -0400 (EDT)
Received: from rambutan.cc.columbia.edu (rambutan.cc.columbia.edu
	[128.59.29.5]) by hazelnut (Postfix) with ESMTP id 247436D
	for <xen-users@lists.xen.org>; Sun,  7 Jun 2015 10:06:20 -0400 (EDT)
Received: from mail-ie0-f182.google.com (mail-ie0-f182.google.com
	[209.85.223.182])
	by rambutan.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id
	t57E6JGg025778
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <xen-users@lists.xen.org>; Sun, 7 Jun 2015 10:06:20 -0400 (EDT)
Received: by ieclw1 with SMTP id lw1so83656457iec.3
	for <xen-users@lists.xen.org>; Sun, 07 Jun 2015 07:06:19 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:date:message-id:subject:from:to
	:content-type;
	bh=p6MpUdGBd2jbSmvXKhE2BauqzKBuq+24QkAfMf6X8gA=;
	b=FX66J0ugT18wb8MHqnFUUkqc6LZy9Dm7f38e3mnCQGRi9FRs7LZZqEwiVuj+xw/NuO
	DLGyCOUp2DaW43a+2Mbfi4NDu8dVriQSIlmI+MkhSHAakIDYVK9xplvV9bU/0H8nGXKp
	+U4GGwRBpr+46h0n5wIZueEiuVVfe81B6am/HrKbHcAoAZaR7lRghzrBZqhiQE7y1rER
	T29jQX4YCJeiYXnOIIunDlFpgbqXGgAKAvlhgMLiGPz6sOwxxVX1eQHv+R6xF2GuZxPr
	8bm73+sdRnl6FpODOdULGuVLK/DolDvFhQ7U6W43Ox9e3XRl5ewnC4DK5+ZFolSCAN49
	bNiA==
X-Gm-Message-State: ALoCoQmyE38UeOh404pstTqc66zsJsI6QejQqGT/XCMhxJvnTZIXs9DCxx8P0aYAmhrb7wFDISoSHtLXbkfX6QGSE4iYZ347W6+njyCgop/HrHc5P/fFJVTXSiCWjiZ74Fdt41FkbVvP
X-Received: by 10.50.137.100 with SMTP id qh4mr8166758igb.1.1433685979433;
	Sun, 07 Jun 2015 07:06:19 -0700 (PDT)
X-Received: by 10.50.137.100 with SMTP id qh4mr8166734igb.1.1433685979159;
	Sun, 07 Jun 2015 07:06:19 -0700 (PDT)
Received: from mail-ig0-f182.google.com (mail-ig0-f182.google.com.
	[209.85.213.182])
	by mx.google.com with ESMTPSA id q10sm3040581ige.16.2015.06.07.07.06.15
	for <xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Sun, 07 Jun 2015 07:06:16 -0700 (PDT)
Received: by igbzc4 with SMTP id zc4so45166425igb.0
	for <xen-users@lists.xen.org>; Sun, 07 Jun 2015 07:06:15 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.42.226.8 with SMTP id iu8mr18997437icb.17.1433685975352;
	Sun, 07 Jun 2015 07:06:15 -0700 (PDT)
Received: by 10.36.32.5 with HTTP; Sun, 7 Jun 2015 07:06:15 -0700 (PDT)
Date: Sun, 7 Jun 2015 10:06:15 -0400
Message-ID: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
From: Jintack Lim <jintack@cs.columbia.edu>
To: xen-users@lists.xen.org
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.5
Subject: [Xen-users] Monitoring Xen's cpu utilization
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8892831243611700502=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============8892831243611700502==
Content-Type: multipart/alternative; boundary=001a11c30f9e47dcf20517ee0731

--001a11c30f9e47dcf20517ee0731
Content-Type: text/plain; charset=UTF-8

Hi,

I would like to monitor cpu utilization of every domain and Xen itself.
Xentop gives appropriate information for domains,
however it does not tell about Xen hypervisor.
I wonder there is a tool for getting these information.

I'm working on ARM64 platform, and using Xen 4.5.0

Thanks,
Jintack

--001a11c30f9e47dcf20517ee0731
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I would like to monitor cpu utiliza=
tion of every domain and Xen itself.</div><div>Xentop gives appropriate inf=
ormation for domains,</div><div>however it does not tell about Xen hypervis=
or.</div><div>I wonder there is a tool for getting these information.</div>=
<div><br></div><div>I&#39;m working on ARM64 platform, and using Xen 4.5.0<=
/div><div><br></div><div>Thanks,</div><div>Jintack</div></div>

--001a11c30f9e47dcf20517ee0731--



--===============8892831243611700502==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8892831243611700502==--



From xen-users-bounces@lists.xen.org Sun Jun 07 18:14:49 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 07 Jun 2015 18:14:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z1f4g-0003eh-QO; Sun, 07 Jun 2015 18:13:34 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <rafaelweingartner@gmail.com>) id 1Z1f4f-0003ec-EH
	for xen-users@lists.xen.org; Sun, 07 Jun 2015 18:13:33 +0000
Received: from [193.109.254.147] by server-12.bemta-14.messagelabs.com id
	1F/FC-18733-CC984755; Sun, 07 Jun 2015 18:13:32 +0000
X-Env-Sender: rafaelweingartner@gmail.com
X-Msg-Ref: server-8.tower-27.messagelabs.com!1433700811!21126814!1
X-Originating-IP: [209.85.212.170]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_40_50,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22436 invoked from network); 7 Jun 2015 18:13:31 -0000
Received: from mail-wi0-f170.google.com (HELO mail-wi0-f170.google.com)
	(209.85.212.170)
	by server-8.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	7 Jun 2015 18:13:31 -0000
Received: by wiwd19 with SMTP id d19so64743713wiw.0
	for <xen-users@lists.xen.org>; Sun, 07 Jun 2015 11:13:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=dmJYmTdOoU/uWXzjs2vdrRl+Y0v83WkrFiaaM8HRgRM=;
	b=iwQScrgc+ubxABJ9rX1+Yhk48Kym7gSrTM8KJqE4xsoloKKC+tyrSznqPdCVxcMdab
	oPuZ/SJLtLte2T5qB8tCKs+1yilVb/R/n5BGL5yAuouDbiydEnLTE6JFidiicmuNaQAZ
	7zWt9zxJQ1eBi8mN0VjUfaYhhnpIr0ztTucNLPKM8twsNMqRXblkevGXZhX852GFt3iN
	8SlrUxwvmmnZIloDSBd4ETxvLfmrU9dziF1EulpUhqTMClEpes3MBtqnviQ++heKCn2v
	ccFNQJHNWSEmkzNeY5pdsASi1HKjicveBD5Od9eHnm4ILeGARREnb3ui7rjp+F7zMtqa
	4I8w==
MIME-Version: 1.0
X-Received: by 10.194.5.135 with SMTP id s7mr25493518wjs.115.1433700811414;
	Sun, 07 Jun 2015 11:13:31 -0700 (PDT)
Received: by 10.28.153.151 with HTTP; Sun, 7 Jun 2015 11:13:31 -0700 (PDT)
In-Reply-To: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
References: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
Date: Sun, 7 Jun 2015 15:13:31 -0300
Message-ID: <CAG97rae5j_aeRSCdfQV84mpH==kARTffvXLKeuYPv7hYphiQ6g@mail.gmail.com>
From: =?UTF-8?Q?Rafael_Weing=C3=A4rtner?= <rafaelweingartner@gmail.com>
To: Jintack Lim <jintack@cs.columbia.edu>
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Monitoring Xen's cpu utilization
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1162796841555618889=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============1162796841555618889==
Content-Type: multipart/alternative; boundary=047d7b5d58969424520517f17b04

--047d7b5d58969424520517f17b04
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I believe that most of the resource used to management by Xen, it used by
Dom0. Xentop reports the Dom0 resource usage.

On Sun, Jun 7, 2015 at 11:06 AM, Jintack Lim <jintack@cs.columbia.edu>
wrote:

> Hi,
>
> I would like to monitor cpu utilization of every domain and Xen itself.
> Xentop gives appropriate information for domains,
> however it does not tell about Xen hypervisor.
> I wonder there is a tool for getting these information.
>
> I'm working on ARM64 platform, and using Xen 4.5.0
>
> Thanks,
> Jintack
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users
>



--=20
Rafael Weing=C3=A4rtner

--047d7b5d58969424520517f17b04
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I believe that most of the resource used to management by =
Xen, it used by Dom0. Xentop reports the Dom0 resource usage.=C2=A0</div><d=
iv class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Sun, Jun 7, 2015=
 at 11:06 AM, Jintack Lim <span dir=3D"ltr">&lt;<a href=3D"mailto:jintack@c=
s.columbia.edu" target=3D"_blank">jintack@cs.columbia.edu</a>&gt;</span> wr=
ote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border=
-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">Hi,<div><br></div><=
div>I would like to monitor cpu utilization of every domain and Xen itself.=
</div><div>Xentop gives appropriate information for domains,</div><div>howe=
ver it does not tell about Xen hypervisor.</div><div>I wonder there is a to=
ol for getting these information.</div><div><br></div><div>I&#39;m working =
on ARM64 platform, and using Xen 4.5.0</div><div><br></div><div>Thanks,</di=
v><div>Jintack</div></div>
<br>_______________________________________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists.xen.org</a><br>
<a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://lists.x=
en.org/xen-users</a><br></blockquote></div><br><br clear=3D"all"><div><br><=
/div>-- <br><div class=3D"gmail_signature"><div dir=3D"ltr">Rafael Weing=C3=
=A4rtner</div></div>
</div>

--047d7b5d58969424520517f17b04--


--===============1162796841555618889==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============1162796841555618889==--


From xen-users-bounces@lists.xen.org Sun Jun 07 18:14:49 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 07 Jun 2015 18:14:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z1f4g-0003eh-QO; Sun, 07 Jun 2015 18:13:34 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <rafaelweingartner@gmail.com>) id 1Z1f4f-0003ec-EH
	for xen-users@lists.xen.org; Sun, 07 Jun 2015 18:13:33 +0000
Received: from [193.109.254.147] by server-12.bemta-14.messagelabs.com id
	1F/FC-18733-CC984755; Sun, 07 Jun 2015 18:13:32 +0000
X-Env-Sender: rafaelweingartner@gmail.com
X-Msg-Ref: server-8.tower-27.messagelabs.com!1433700811!21126814!1
X-Originating-IP: [209.85.212.170]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_40_50,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22436 invoked from network); 7 Jun 2015 18:13:31 -0000
Received: from mail-wi0-f170.google.com (HELO mail-wi0-f170.google.com)
	(209.85.212.170)
	by server-8.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	7 Jun 2015 18:13:31 -0000
Received: by wiwd19 with SMTP id d19so64743713wiw.0
	for <xen-users@lists.xen.org>; Sun, 07 Jun 2015 11:13:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=dmJYmTdOoU/uWXzjs2vdrRl+Y0v83WkrFiaaM8HRgRM=;
	b=iwQScrgc+ubxABJ9rX1+Yhk48Kym7gSrTM8KJqE4xsoloKKC+tyrSznqPdCVxcMdab
	oPuZ/SJLtLte2T5qB8tCKs+1yilVb/R/n5BGL5yAuouDbiydEnLTE6JFidiicmuNaQAZ
	7zWt9zxJQ1eBi8mN0VjUfaYhhnpIr0ztTucNLPKM8twsNMqRXblkevGXZhX852GFt3iN
	8SlrUxwvmmnZIloDSBd4ETxvLfmrU9dziF1EulpUhqTMClEpes3MBtqnviQ++heKCn2v
	ccFNQJHNWSEmkzNeY5pdsASi1HKjicveBD5Od9eHnm4ILeGARREnb3ui7rjp+F7zMtqa
	4I8w==
MIME-Version: 1.0
X-Received: by 10.194.5.135 with SMTP id s7mr25493518wjs.115.1433700811414;
	Sun, 07 Jun 2015 11:13:31 -0700 (PDT)
Received: by 10.28.153.151 with HTTP; Sun, 7 Jun 2015 11:13:31 -0700 (PDT)
In-Reply-To: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
References: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
Date: Sun, 7 Jun 2015 15:13:31 -0300
Message-ID: <CAG97rae5j_aeRSCdfQV84mpH==kARTffvXLKeuYPv7hYphiQ6g@mail.gmail.com>
From: =?UTF-8?Q?Rafael_Weing=C3=A4rtner?= <rafaelweingartner@gmail.com>
To: Jintack Lim <jintack@cs.columbia.edu>
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Monitoring Xen's cpu utilization
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1162796841555618889=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============1162796841555618889==
Content-Type: multipart/alternative; boundary=047d7b5d58969424520517f17b04

--047d7b5d58969424520517f17b04
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I believe that most of the resource used to management by Xen, it used by
Dom0. Xentop reports the Dom0 resource usage.

On Sun, Jun 7, 2015 at 11:06 AM, Jintack Lim <jintack@cs.columbia.edu>
wrote:

> Hi,
>
> I would like to monitor cpu utilization of every domain and Xen itself.
> Xentop gives appropriate information for domains,
> however it does not tell about Xen hypervisor.
> I wonder there is a tool for getting these information.
>
> I'm working on ARM64 platform, and using Xen 4.5.0
>
> Thanks,
> Jintack
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users
>



--=20
Rafael Weing=C3=A4rtner

--047d7b5d58969424520517f17b04
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I believe that most of the resource used to management by =
Xen, it used by Dom0. Xentop reports the Dom0 resource usage.=C2=A0</div><d=
iv class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Sun, Jun 7, 2015=
 at 11:06 AM, Jintack Lim <span dir=3D"ltr">&lt;<a href=3D"mailto:jintack@c=
s.columbia.edu" target=3D"_blank">jintack@cs.columbia.edu</a>&gt;</span> wr=
ote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border=
-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">Hi,<div><br></div><=
div>I would like to monitor cpu utilization of every domain and Xen itself.=
</div><div>Xentop gives appropriate information for domains,</div><div>howe=
ver it does not tell about Xen hypervisor.</div><div>I wonder there is a to=
ol for getting these information.</div><div><br></div><div>I&#39;m working =
on ARM64 platform, and using Xen 4.5.0</div><div><br></div><div>Thanks,</di=
v><div>Jintack</div></div>
<br>_______________________________________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xen.org">Xen-users@lists.xen.org</a><br>
<a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://lists.x=
en.org/xen-users</a><br></blockquote></div><br><br clear=3D"all"><div><br><=
/div>-- <br><div class=3D"gmail_signature"><div dir=3D"ltr">Rafael Weing=C3=
=A4rtner</div></div>
</div>

--047d7b5d58969424520517f17b04--


--===============1162796841555618889==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============1162796841555618889==--


From xen-users-bounces@lists.xen.org Tue Jun 09 11:49:52 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2015 11:49:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2I1W-0002xQ-FK; Tue, 09 Jun 2015 11:48:54 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <nate.studer@gmail.com>) id 1Z2I1U-0002xL-Bw
	for xen-users@lists.xen.org; Tue, 09 Jun 2015 11:48:52 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	FE/99-23832-3A2D6755; Tue, 09 Jun 2015 11:48:51 +0000
X-Env-Sender: nate.studer@gmail.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1433850529!14547120!1
X-Originating-IP: [209.85.160.170]
X-SpamReason: No, hits=0.3 required=7.0 tests=RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13576 invoked from network); 9 Jun 2015 11:48:49 -0000
Received: from mail-yk0-f170.google.com (HELO mail-yk0-f170.google.com)
	(209.85.160.170)
	by server-11.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	9 Jun 2015 11:48:49 -0000
Received: by ykfr66 with SMTP id r66so6700666ykf.0
	for <xen-users@lists.xen.org>; Tue, 09 Jun 2015 04:48:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=JeG2VtpS3mMgqZbM93H/c+FMm0BItpDCsh5aHXLZAG4=;
	b=Vtp921VK3RDrtsDJF7C1e5XU9lQ+tmOLzFKO4NRyF8cc0/84NEZHgiZj+z6Wi9UCkK
	sMrWUji2Q4Hyuy+S+LVSOAuKHWFrWZkBMJHVe0tgDO24o+gBlZCJHqw7siKUQ/rrIgxD
	wBgYSh956OwDiH6F7XkF4vGiD3/I/tqr0ckx1cXQFTdQeu4ULewaZHj6Dkdcd/8odTK0
	KP9+5uQE07gMBcYtW6QmHgUBexAgXgaZ6Wo9/9Ycfg9WaeNma2Ityni3BC7yVkTo1mQb
	TNmGo+pF9g7KPTmlDkupDPuAOe5uBC+5vd/88RqyoJfPUSrsajGKo4ef3MXA0mb8TKdH
	spWA==
MIME-Version: 1.0
X-Received: by 10.170.138.134 with SMTP id f128mr24528488ykc.90.1433850528624; 
	Tue, 09 Jun 2015 04:48:48 -0700 (PDT)
Received: by 10.13.226.148 with HTTP; Tue, 9 Jun 2015 04:48:48 -0700 (PDT)
In-Reply-To: <CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
	<CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
	<CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
Date: Tue, 9 Jun 2015 07:48:48 -0400
Message-ID: <CAB+=bRGXhQ5i_=mVM6jNvUEoykXVXnYt+9D_rFvGqWdw2M4KAQ@mail.gmail.com>
From: Nathan Studer <nate.studer@gmail.com>
To: Mr Idris <mr@idris.web.id>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	josh.whitehead@dornerworks.com, Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, Jun 4, 2015 at 11:08 AM, Mr Idris <mr@idris.web.id> wrote:
> On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer <nate.studer@gmail.com> wrote:
>>
>> On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
>> > On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
>> >>
>> >> Hi all,
>> >>
>> >> I have managed to call arinc653_scheduler_set.c without error.  The
>> >> message when i run it like this
>> >>
>> >> not error
>> >> not error
>> >> hypercall bounce and schedule set finish *
>> >> true
>> >>
>> >> * this message because i set on xc_sched_arinc653_schedule_set().
>> >>
>> >>
>> >> but when i try 'xl list -v' still VM is not running
>> >
>> >
>> > I'm sorry accidentally i press send but i haven't finished.
>> >
>> > I continue, but when i try 'xl list -v' still VM is not running like
>> > this :
>> > Name                                        ID   Mem VCPUs      State
>> > Time(s)   UUID                            Reason-Code   Security Label
>> > Domain-0                                     0  6771     1     r-----
>> > 10.0 00000000-0000-0000-0000-000000000000        -                -
>> > Debian                                       1   512     1     ------
>> > 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
>> >
>> >
>> > Something weird after the small program run, the computer is becoming
>> > really
>> > slow. Is it something related to runtime?
>>
>> That's how you know it's working!  The arinc653 scheduler is not work
>> conserving or pre-emptive, so you should expect some performance
>> degradation.  It probably should not be that bad, so I think it is a
>> symptom of the problem below.
>>
>> > Does anyone have any idea what change I need to make to get the
>> > scheduler to
>> > run
>> > the VM?  I appreciate the help.
>>
>> From the attached program, which is similar to your previous program:
>>
>> sched.sched_entries[0].vcpu_id = 0;
>> sched.sched_entries[0].runtime = 30;
>> sched.major_frame += sched.sched_entries[0].runtime;
>>
>> The runtime field is in units of nanoseconds.  30 nanoseconds is
>> orders of magnitude shorter than the context switch time.  I'm not
>> sure what the scheduler would do with a runtime this small, but it
>> would not be pretty.  For most configurations, the slice runtimes
>> should be in the milliseconds range, so multiple your runtimes by
>> 1000000, and see if that fixes your issue.
>>
>> sched.sched_entries[*].runtime = 10000000;  /* 10 ms */
>>
>>      Nate
>>
>
> After i changed runtime value to 1000000 or greater and run again. It was
> suddenly hang with panic on CPU 0 with error message :

What are the exact runtimes you are using for Dom-0 and the VM?  The
default timeslice is 10ms (10000000), so that's usually a good value
to use for each.

>
> (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
> (XEN) ----[ Xen-4.4.1  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    e008:[<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> (XEN) RFLAGS: 0000000000010046   CONTEXT: hypervisor
> (XEN) rax: 0000000000000046   rbx: ffff82d08013a9c8   rcx: 0000000000000000
> (XEN) rdx: 0000000000000000   rsi: ffff82d08013a9c8   rdi: ffff82d0802d7c18
> (XEN) rbp: ffff82d0802d7c58   rsp: ffff82d0802d7c10   r8:  0000000000000004
> (XEN) r9:  000000000000003f   r10: 0000000000000000   r11: 0000000000000246
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: ffff82d0802d7d38
> (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000426f0
> (XEN) cr3: 00000000df888000   cr2: 0000000000989740
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
> (XEN) Xen stack trace from rsp=ffff82d0802d7c10:
> (XEN)    ffff82d08012984e 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000000 ffff82d0802735f0 0000000000000001 ffff82d0802f9200
> (XEN)    0000000000989740 ffff82d0802d7cc8 ffff82d08013af14 0000000000200e8c
> (XEN)    0000000000000000 00000002030bc067 000000000000000e 0000000000000092
> (XEN)    0000000000989740 ffff82d0802d7ce8 000000000000000e 0000000000000000
> (XEN)    0000000000989740 ffff8302154ff000 0000000000000000 ffff82d0802d7ce8
> (XEN)    ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38 ffff82d0802d7d28
> (XEN)    ffff82d080190631 0000000000000086 ffff8300dfb98000 0000000000989680
> (XEN)    0000003222af7456 ffff82d0802d7e68 0000000000000000 00007d2f7fd282a7
> (XEN)    ffff82d08022a33d 0000000000000000 ffff82d0802d7e68 0000003222af7456
> (XEN)    0000000000989680 ffff82d0802d7e20 ffff8302154fd010 0000000000000246
> (XEN)    0000003222b7f318 ffff8300df6fe060 0000000000000002 0000000000000086
> (XEN)    0000003226424461 0000000000000005 ffff82d080274620 0000000000000005
> (XEN)    0000000e00000000 ffff82d0801254ae 000000000000e008 0000000000010002
> (XEN)    ffff82d0802d7de0 000000000000e010 0000000000000003 00ff82d080319728
> (XEN)    80000000802fa2a0 ffff8300dfb98000 0000003222af7456 ffff82d0803196e0
> (XEN)    ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0 ffff82d08012616c
> (XEN)    ffff82d0802d7e60 ffff82d080319700 00000000002d7e60 ffff82d0803196e0
> (XEN)    ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 ffff82d08012c7b6
> (XEN)    ffff82d0802d0000 0000000000000246 0000003222aebd61 ffff82d0802eff00
> (XEN) Xen call trace:
> (XEN)    [<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> (XEN)    [<ffff82d08013af14>] __trap_to_gdb+0x130/0x9fc
> (XEN)    [<ffff82d0801892b7>] debugger_trap_fatal+0x15/0x2c
> (XEN)    [<ffff82d080190631>] do_page_fault+0x456/0x536
> (XEN)    [<ffff82d08022a33d>] handle_exception_saved+0x2e/0x6c
> (XEN)    [<ffff82d0801254ae>] a653sched_do_schedule+0x10a/0x1de
> (XEN)    [<ffff82d08012616c>] schedule+0x116/0x5df
> (XEN)    [<ffff82d080129359>] __do_softirq+0x81/0x8c
> (XEN)    [<ffff82d0801293b2>] do_softirq+0x13/0x15
> (XEN)    [<ffff82d08015f355>] idle_loop+0x64/0x74
> (XEN)
> (XEN)
> (XEN) ****************************************
> (XEN) Panic on CPU 0:
> (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> (XEN) ****************************************
> (XEN)
> (XEN) Reboot in five seconds...
> (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
>
> this is the output from 'xl info'
>
> host                   : boaman
> release                : 3.2.0-4-amd64
> version                : #1 SMP Debian 3.2.65-1+deb7u2
> machine                : x86_64
> nr_cpus                : 1
> max_cpu_id             : 0
> nr_nodes               : 1
> cores_per_socket       : 1
> threads_per_core       : 1
> cpu_mhz                : 2826
> hw_caps                :
> bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:00000000
> virt_caps              : hvm
> total_memory           : 8123
> free_memory            : 745
> sharing_freed_memory   : 0
> sharing_used_memory    : 0
> outstanding_claims     : 0
> free_cpus              : 0
> xen_major              : 4
> xen_minor              : 4
> xen_extra              : .1
> xen_version            : 4.4.1
> xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
> hvm-3.0-x86_32p hvm-3.0-x86_64
> xen_scheduler          : arinc653
> xen_pagesize           : 4096
> platform_params        : virt_start=0xffff800000000000
> xen_changeset          :
> xen_commandline        : placeholder loglvl=all guest_loglvl=all
> com1=115200,8n1,0x3f8,5 console=com1,vga gdb=com1 kgdboc=com1,115200
> sched=arinc653 maxcpus=1
> cc_compiler            : gcc (Debian 4.7.2-5) 4.7.2
> cc_compile_by          : manam
> cc_compile_domain      :
> cc_compile_date        : Wed Jun  3 11:55:42 CEST 2015
> xend_config_format     : 4

Are you using the arinc653 scheduler as is?  (I saw your earlier
e-mail thread about writing a scheduler based on the arinc653 one.)

     Nate

>
> Regards,
> Idris

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 09 11:49:52 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2015 11:49:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2I1W-0002xQ-FK; Tue, 09 Jun 2015 11:48:54 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <nate.studer@gmail.com>) id 1Z2I1U-0002xL-Bw
	for xen-users@lists.xen.org; Tue, 09 Jun 2015 11:48:52 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	FE/99-23832-3A2D6755; Tue, 09 Jun 2015 11:48:51 +0000
X-Env-Sender: nate.studer@gmail.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1433850529!14547120!1
X-Originating-IP: [209.85.160.170]
X-SpamReason: No, hits=0.3 required=7.0 tests=RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13576 invoked from network); 9 Jun 2015 11:48:49 -0000
Received: from mail-yk0-f170.google.com (HELO mail-yk0-f170.google.com)
	(209.85.160.170)
	by server-11.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	9 Jun 2015 11:48:49 -0000
Received: by ykfr66 with SMTP id r66so6700666ykf.0
	for <xen-users@lists.xen.org>; Tue, 09 Jun 2015 04:48:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=JeG2VtpS3mMgqZbM93H/c+FMm0BItpDCsh5aHXLZAG4=;
	b=Vtp921VK3RDrtsDJF7C1e5XU9lQ+tmOLzFKO4NRyF8cc0/84NEZHgiZj+z6Wi9UCkK
	sMrWUji2Q4Hyuy+S+LVSOAuKHWFrWZkBMJHVe0tgDO24o+gBlZCJHqw7siKUQ/rrIgxD
	wBgYSh956OwDiH6F7XkF4vGiD3/I/tqr0ckx1cXQFTdQeu4ULewaZHj6Dkdcd/8odTK0
	KP9+5uQE07gMBcYtW6QmHgUBexAgXgaZ6Wo9/9Ycfg9WaeNma2Ityni3BC7yVkTo1mQb
	TNmGo+pF9g7KPTmlDkupDPuAOe5uBC+5vd/88RqyoJfPUSrsajGKo4ef3MXA0mb8TKdH
	spWA==
MIME-Version: 1.0
X-Received: by 10.170.138.134 with SMTP id f128mr24528488ykc.90.1433850528624; 
	Tue, 09 Jun 2015 04:48:48 -0700 (PDT)
Received: by 10.13.226.148 with HTTP; Tue, 9 Jun 2015 04:48:48 -0700 (PDT)
In-Reply-To: <CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
	<CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
	<CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
Date: Tue, 9 Jun 2015 07:48:48 -0400
Message-ID: <CAB+=bRGXhQ5i_=mVM6jNvUEoykXVXnYt+9D_rFvGqWdw2M4KAQ@mail.gmail.com>
From: Nathan Studer <nate.studer@gmail.com>
To: Mr Idris <mr@idris.web.id>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	josh.whitehead@dornerworks.com, Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, Jun 4, 2015 at 11:08 AM, Mr Idris <mr@idris.web.id> wrote:
> On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer <nate.studer@gmail.com> wrote:
>>
>> On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
>> > On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
>> >>
>> >> Hi all,
>> >>
>> >> I have managed to call arinc653_scheduler_set.c without error.  The
>> >> message when i run it like this
>> >>
>> >> not error
>> >> not error
>> >> hypercall bounce and schedule set finish *
>> >> true
>> >>
>> >> * this message because i set on xc_sched_arinc653_schedule_set().
>> >>
>> >>
>> >> but when i try 'xl list -v' still VM is not running
>> >
>> >
>> > I'm sorry accidentally i press send but i haven't finished.
>> >
>> > I continue, but when i try 'xl list -v' still VM is not running like
>> > this :
>> > Name                                        ID   Mem VCPUs      State
>> > Time(s)   UUID                            Reason-Code   Security Label
>> > Domain-0                                     0  6771     1     r-----
>> > 10.0 00000000-0000-0000-0000-000000000000        -                -
>> > Debian                                       1   512     1     ------
>> > 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
>> >
>> >
>> > Something weird after the small program run, the computer is becoming
>> > really
>> > slow. Is it something related to runtime?
>>
>> That's how you know it's working!  The arinc653 scheduler is not work
>> conserving or pre-emptive, so you should expect some performance
>> degradation.  It probably should not be that bad, so I think it is a
>> symptom of the problem below.
>>
>> > Does anyone have any idea what change I need to make to get the
>> > scheduler to
>> > run
>> > the VM?  I appreciate the help.
>>
>> From the attached program, which is similar to your previous program:
>>
>> sched.sched_entries[0].vcpu_id = 0;
>> sched.sched_entries[0].runtime = 30;
>> sched.major_frame += sched.sched_entries[0].runtime;
>>
>> The runtime field is in units of nanoseconds.  30 nanoseconds is
>> orders of magnitude shorter than the context switch time.  I'm not
>> sure what the scheduler would do with a runtime this small, but it
>> would not be pretty.  For most configurations, the slice runtimes
>> should be in the milliseconds range, so multiple your runtimes by
>> 1000000, and see if that fixes your issue.
>>
>> sched.sched_entries[*].runtime = 10000000;  /* 10 ms */
>>
>>      Nate
>>
>
> After i changed runtime value to 1000000 or greater and run again. It was
> suddenly hang with panic on CPU 0 with error message :

What are the exact runtimes you are using for Dom-0 and the VM?  The
default timeslice is 10ms (10000000), so that's usually a good value
to use for each.

>
> (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
> (XEN) ----[ Xen-4.4.1  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    e008:[<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> (XEN) RFLAGS: 0000000000010046   CONTEXT: hypervisor
> (XEN) rax: 0000000000000046   rbx: ffff82d08013a9c8   rcx: 0000000000000000
> (XEN) rdx: 0000000000000000   rsi: ffff82d08013a9c8   rdi: ffff82d0802d7c18
> (XEN) rbp: ffff82d0802d7c58   rsp: ffff82d0802d7c10   r8:  0000000000000004
> (XEN) r9:  000000000000003f   r10: 0000000000000000   r11: 0000000000000246
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: ffff82d0802d7d38
> (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000426f0
> (XEN) cr3: 00000000df888000   cr2: 0000000000989740
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
> (XEN) Xen stack trace from rsp=ffff82d0802d7c10:
> (XEN)    ffff82d08012984e 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000000 ffff82d0802735f0 0000000000000001 ffff82d0802f9200
> (XEN)    0000000000989740 ffff82d0802d7cc8 ffff82d08013af14 0000000000200e8c
> (XEN)    0000000000000000 00000002030bc067 000000000000000e 0000000000000092
> (XEN)    0000000000989740 ffff82d0802d7ce8 000000000000000e 0000000000000000
> (XEN)    0000000000989740 ffff8302154ff000 0000000000000000 ffff82d0802d7ce8
> (XEN)    ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38 ffff82d0802d7d28
> (XEN)    ffff82d080190631 0000000000000086 ffff8300dfb98000 0000000000989680
> (XEN)    0000003222af7456 ffff82d0802d7e68 0000000000000000 00007d2f7fd282a7
> (XEN)    ffff82d08022a33d 0000000000000000 ffff82d0802d7e68 0000003222af7456
> (XEN)    0000000000989680 ffff82d0802d7e20 ffff8302154fd010 0000000000000246
> (XEN)    0000003222b7f318 ffff8300df6fe060 0000000000000002 0000000000000086
> (XEN)    0000003226424461 0000000000000005 ffff82d080274620 0000000000000005
> (XEN)    0000000e00000000 ffff82d0801254ae 000000000000e008 0000000000010002
> (XEN)    ffff82d0802d7de0 000000000000e010 0000000000000003 00ff82d080319728
> (XEN)    80000000802fa2a0 ffff8300dfb98000 0000003222af7456 ffff82d0803196e0
> (XEN)    ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0 ffff82d08012616c
> (XEN)    ffff82d0802d7e60 ffff82d080319700 00000000002d7e60 ffff82d0803196e0
> (XEN)    ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 ffff82d08012c7b6
> (XEN)    ffff82d0802d0000 0000000000000246 0000003222aebd61 ffff82d0802eff00
> (XEN) Xen call trace:
> (XEN)    [<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> (XEN)    [<ffff82d08013af14>] __trap_to_gdb+0x130/0x9fc
> (XEN)    [<ffff82d0801892b7>] debugger_trap_fatal+0x15/0x2c
> (XEN)    [<ffff82d080190631>] do_page_fault+0x456/0x536
> (XEN)    [<ffff82d08022a33d>] handle_exception_saved+0x2e/0x6c
> (XEN)    [<ffff82d0801254ae>] a653sched_do_schedule+0x10a/0x1de
> (XEN)    [<ffff82d08012616c>] schedule+0x116/0x5df
> (XEN)    [<ffff82d080129359>] __do_softirq+0x81/0x8c
> (XEN)    [<ffff82d0801293b2>] do_softirq+0x13/0x15
> (XEN)    [<ffff82d08015f355>] idle_loop+0x64/0x74
> (XEN)
> (XEN)
> (XEN) ****************************************
> (XEN) Panic on CPU 0:
> (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> (XEN) ****************************************
> (XEN)
> (XEN) Reboot in five seconds...
> (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
>
> this is the output from 'xl info'
>
> host                   : boaman
> release                : 3.2.0-4-amd64
> version                : #1 SMP Debian 3.2.65-1+deb7u2
> machine                : x86_64
> nr_cpus                : 1
> max_cpu_id             : 0
> nr_nodes               : 1
> cores_per_socket       : 1
> threads_per_core       : 1
> cpu_mhz                : 2826
> hw_caps                :
> bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:00000000
> virt_caps              : hvm
> total_memory           : 8123
> free_memory            : 745
> sharing_freed_memory   : 0
> sharing_used_memory    : 0
> outstanding_claims     : 0
> free_cpus              : 0
> xen_major              : 4
> xen_minor              : 4
> xen_extra              : .1
> xen_version            : 4.4.1
> xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
> hvm-3.0-x86_32p hvm-3.0-x86_64
> xen_scheduler          : arinc653
> xen_pagesize           : 4096
> platform_params        : virt_start=0xffff800000000000
> xen_changeset          :
> xen_commandline        : placeholder loglvl=all guest_loglvl=all
> com1=115200,8n1,0x3f8,5 console=com1,vga gdb=com1 kgdboc=com1,115200
> sched=arinc653 maxcpus=1
> cc_compiler            : gcc (Debian 4.7.2-5) 4.7.2
> cc_compile_by          : manam
> cc_compile_domain      :
> cc_compile_date        : Wed Jun  3 11:55:42 CEST 2015
> xend_config_format     : 4

Are you using the arinc653 scheduler as is?  (I saw your earlier
e-mail thread about writing a scheduler based on the arinc653 one.)

     Nate

>
> Regards,
> Idris

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 09 13:12:20 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2015 13:12:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2JJ8-0001rB-4p; Tue, 09 Jun 2015 13:11:10 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <jl4312@columbia.edu>) id 1Z2JJ6-0001r6-9a
	for xen-users@lists.xen.org; Tue, 09 Jun 2015 13:11:08 +0000
Received: from [85.158.139.211] by server-7.bemta-5.messagelabs.com id
	7E/B7-23096-BE5E6755; Tue, 09 Jun 2015 13:11:07 +0000
X-Env-Sender: jl4312@columbia.edu
X-Msg-Ref: server-9.tower-206.messagelabs.com!1433855465!12897159!1
X-Originating-IP: [128.59.72.250]
X-SpamReason: No, hits=0.6 required=7.0 tests=HTML_60_70,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29513 invoked from network); 9 Jun 2015 13:11:06 -0000
Received: from millet.cc.columbia.edu (HELO millet.cc.columbia.edu)
	(128.59.72.250)
	by server-9.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 9 Jun 2015 13:11:06 -0000
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250])
	by millet.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id t59D9A0D007750
	for <xen-users@lists.xen.org>; Tue, 9 Jun 2015 09:11:05 -0400
Received: from hazelnut (localhost.localdomain [127.0.0.1])
	by hazelnut (Postfix) with ESMTP id 5BDF180
	for <xen-users@lists.xen.org>; Tue,  9 Jun 2015 09:11:05 -0400 (EDT)
Received: from paneer.cc.columbia.edu (paneer.cc.columbia.edu [128.59.29.4])
	by hazelnut (Postfix) with ESMTP id E8FE480
	for <xen-users@lists.xen.org>; Tue,  9 Jun 2015 09:11:04 -0400 (EDT)
Received: from mail-ig0-f182.google.com (mail-ig0-f182.google.com
	[209.85.213.182])
	by paneer.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id t59DB4HH022682
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <xen-users@lists.xen.org>; Tue, 9 Jun 2015 09:11:04 -0400 (EDT)
Received: by igblz2 with SMTP id lz2so10792392igb.1
	for <xen-users@lists.xen.org>; Tue, 09 Jun 2015 06:11:04 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=xezknhOVz97KUv0dnZw1Tm5Iqfsd84WtC9T1j7dlWtY=;
	b=bDmAJQd5vW7et5sjO64AcZz2Wh95CRg4sN8TQJiJ8E9PzBPJ9jQIRwyv6JW+jrYrn7
	JSnG9F79ZtQMGskw7rcVLTnTF8HUl9sGLG8HJfw6Xb7b4M1LRb849Iph3bpEeYz9HURI
	65fYSK7KhEJkOzyZXa0ojfcXREXVvM/jIDyQTsNCRWa/jtBg10MCMTRYCeykSlRG5eqc
	FzUCepCQPLoJPw3QwcLPFfS8l8GBsklMj+u5C9TOuXwb2ip1TeXdz1U8xa9ED/qbNhxg
	cb3kb1xCFQjcTUKQIFDF5gmvJwExJ63UjYBya18RCyeJ83L1KB5K/tcRj26qLJMmVKRi
	xlsw==
X-Gm-Message-State: ALoCoQmKBCHHPi5uWP6TmPFO6SGuB0JKsYsp5sxqsXcGot13SnSegK+B3mlg72ybQsgT51zbMcFBB20cZd8gGS2ms2ZcgwKaMivPOHaWYbj17otyVY+1JAPByxGGUr0/eYr2KfzOU4fu
X-Received: by 10.107.167.73 with SMTP id q70mr26904529ioe.82.1433855464230;
	Tue, 09 Jun 2015 06:11:04 -0700 (PDT)
X-Received: by 10.107.167.73 with SMTP id q70mr26904515ioe.82.1433855464115;
	Tue, 09 Jun 2015 06:11:04 -0700 (PDT)
Received: from mail-ig0-f176.google.com (mail-ig0-f176.google.com.
	[209.85.213.176])
	by mx.google.com with ESMTPSA id 72sm3885590ioj.27.2015.06.09.06.10.59
	for <xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 09 Jun 2015 06:11:00 -0700 (PDT)
Received: by igbzc4 with SMTP id zc4so11520455igb.0
	for <xen-users@lists.xen.org>; Tue, 09 Jun 2015 06:10:59 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.107.167.73 with SMTP id q70mr26903839ioe.82.1433855459171;
	Tue, 09 Jun 2015 06:10:59 -0700 (PDT)
Received: by 10.36.32.5 with HTTP; Tue, 9 Jun 2015 06:10:59 -0700 (PDT)
In-Reply-To: <CAG97rae5j_aeRSCdfQV84mpH==kARTffvXLKeuYPv7hYphiQ6g@mail.gmail.com>
References: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
	<CAG97rae5j_aeRSCdfQV84mpH==kARTffvXLKeuYPv7hYphiQ6g@mail.gmail.com>
Date: Tue, 9 Jun 2015 09:10:59 -0400
Message-ID: <CAHyh4xhRu_WeXvNqm1Nx45xiqPMnH-m3WmtgKcum_TR2Czh8tw@mail.gmail.com>
From: Jintack Lim <jintack@cs.columbia.edu>
To: =?UTF-8?Q?Rafael_Weing=C3=A4rtner?= <rafaelweingartner@gmail.com>
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.4
Cc: xen-users@lists.xen.org,
	Christoffer Dall <christofferdall@christofferdall.dk>
Subject: Re: [Xen-users] Monitoring Xen's cpu utilization
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1725327604902955309=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============1725327604902955309==
Content-Type: multipart/alternative; boundary=001a1142a4804da94f0518157d33

--001a1142a4804da94f0518157d33
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Rafael,

On Sun, Jun 7, 2015 at 2:13 PM, Rafael Weing=C3=A4rtner <
rafaelweingartner@gmail.com> wrote:

> I believe that most of the resource used to management by Xen, it used by
> Dom0. Xentop reports the Dom0 resource usage.
>

Thanks a lot.
However, even though Xen hypervisor does not use much resource,
I want to quantify it.
I guess Xen hypervisor will spend some time to do domain
scheduling/switching, message passing between domains, etc.

Is there any existing tool for that?

Thanks!


>
> On Sun, Jun 7, 2015 at 11:06 AM, Jintack Lim <jintack@cs.columbia.edu>
> wrote:
>
>> Hi,
>>
>> I would like to monitor cpu utilization of every domain and Xen itself.
>> Xentop gives appropriate information for domains,
>> however it does not tell about Xen hypervisor.
>> I wonder there is a tool for getting these information.
>>
>> I'm working on ARM64 platform, and using Xen 4.5.0
>>
>> Thanks,
>> Jintack
>>
>> _______________________________________________
>> Xen-users mailing list
>> Xen-users@lists.xen.org
>> http://lists.xen.org/xen-users
>>
>
>
>
> --
> Rafael Weing=C3=A4rtner
>

--001a1142a4804da94f0518157d33
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Rafael,<br><div class=3D"gmail_extra"><br><div class=3D=
"gmail_quote">On Sun, Jun 7, 2015 at 2:13 PM, Rafael Weing=C3=A4rtner <span=
 dir=3D"ltr">&lt;<a href=3D"mailto:rafaelweingartner@gmail.com" target=3D"_=
blank" onclick=3D"window.open(&#39;https://mail.google.com/mail/?view=3Dcm&=
amp;tf=3D1&amp;to=3Drafaelweingartner@gmail.com&amp;cc=3D&amp;bcc=3D&amp;su=
=3D&amp;body=3D&#39;,&#39;_blank&#39;);return false;">rafaelweingartner@gma=
il.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"=
ltr">I believe that most of the resource used to management by Xen, it used=
 by Dom0. Xentop reports the Dom0 resource usage.=C2=A0</div></blockquote><=
div><br></div><div>Thanks a lot.</div><div>However, even though Xen hypervi=
sor does not use much resource,</div><div>I want to quantify it.</div><div>=
I guess Xen hypervisor will spend some time to do domain scheduling/switchi=
ng, message passing between domains, etc.</div><div><br></div><div>Is there=
 any existing tool for that?</div><div><br></div><div>Thanks!</div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><div class=3D"gmail_extra"><br><div=
 class=3D"gmail_quote"><div><div class=3D"h5">On Sun, Jun 7, 2015 at 11:06 =
AM, Jintack Lim <span dir=3D"ltr">&lt;<a href=3D"mailto:jintack@cs.columbia=
.edu" target=3D"_blank" onclick=3D"window.open(&#39;https://mail.google.com=
/mail/?view=3Dcm&amp;tf=3D1&amp;to=3Djintack@cs.columbia.edu&amp;cc=3D&amp;=
bcc=3D&amp;su=3D&amp;body=3D&#39;,&#39;_blank&#39;);return false;">jintack@=
cs.columbia.edu</a>&gt;</span> wrote:<br></div></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex"><div><div class=3D"h5"><div dir=3D"ltr">Hi,<div><br></div><div>I w=
ould like to monitor cpu utilization of every domain and Xen itself.</div><=
div>Xentop gives appropriate information for domains,</div><div>however it =
does not tell about Xen hypervisor.</div><div>I wonder there is a tool for =
getting these information.</div><div><br></div><div>I&#39;m working on ARM6=
4 platform, and using Xen 4.5.0</div><div><br></div><div>Thanks,</div><div>=
Jintack</div></div>
<br></div></div>_______________________________________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xen.org" target=3D"_blank" onclick=3D"win=
dow.open(&#39;https://mail.google.com/mail/?view=3Dcm&amp;tf=3D1&amp;to=3DX=
en-users@lists.xen.org&amp;cc=3D&amp;bcc=3D&amp;su=3D&amp;body=3D&#39;,&#39=
;_blank&#39;);return false;">Xen-users@lists.xen.org</a><br>
<a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://lists.x=
en.org/xen-users</a><span class=3D"HOEnZb"><font color=3D"#888888"><br></fo=
nt></span></blockquote></div><span class=3D"HOEnZb"><font color=3D"#888888"=
><br><br clear=3D"all"><div><br></div>-- <br><div><div dir=3D"ltr">Rafael W=
eing=C3=A4rtner</div></div>
</font></span></div>
</blockquote></div><br></div></div>

--001a1142a4804da94f0518157d33--



--===============1725327604902955309==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============1725327604902955309==--



From xen-users-bounces@lists.xen.org Tue Jun 09 13:12:20 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2015 13:12:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2JJ8-0001rB-4p; Tue, 09 Jun 2015 13:11:10 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <jl4312@columbia.edu>) id 1Z2JJ6-0001r6-9a
	for xen-users@lists.xen.org; Tue, 09 Jun 2015 13:11:08 +0000
Received: from [85.158.139.211] by server-7.bemta-5.messagelabs.com id
	7E/B7-23096-BE5E6755; Tue, 09 Jun 2015 13:11:07 +0000
X-Env-Sender: jl4312@columbia.edu
X-Msg-Ref: server-9.tower-206.messagelabs.com!1433855465!12897159!1
X-Originating-IP: [128.59.72.250]
X-SpamReason: No, hits=0.6 required=7.0 tests=HTML_60_70,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29513 invoked from network); 9 Jun 2015 13:11:06 -0000
Received: from millet.cc.columbia.edu (HELO millet.cc.columbia.edu)
	(128.59.72.250)
	by server-9.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 9 Jun 2015 13:11:06 -0000
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250])
	by millet.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id t59D9A0D007750
	for <xen-users@lists.xen.org>; Tue, 9 Jun 2015 09:11:05 -0400
Received: from hazelnut (localhost.localdomain [127.0.0.1])
	by hazelnut (Postfix) with ESMTP id 5BDF180
	for <xen-users@lists.xen.org>; Tue,  9 Jun 2015 09:11:05 -0400 (EDT)
Received: from paneer.cc.columbia.edu (paneer.cc.columbia.edu [128.59.29.4])
	by hazelnut (Postfix) with ESMTP id E8FE480
	for <xen-users@lists.xen.org>; Tue,  9 Jun 2015 09:11:04 -0400 (EDT)
Received: from mail-ig0-f182.google.com (mail-ig0-f182.google.com
	[209.85.213.182])
	by paneer.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id t59DB4HH022682
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <xen-users@lists.xen.org>; Tue, 9 Jun 2015 09:11:04 -0400 (EDT)
Received: by igblz2 with SMTP id lz2so10792392igb.1
	for <xen-users@lists.xen.org>; Tue, 09 Jun 2015 06:11:04 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=xezknhOVz97KUv0dnZw1Tm5Iqfsd84WtC9T1j7dlWtY=;
	b=bDmAJQd5vW7et5sjO64AcZz2Wh95CRg4sN8TQJiJ8E9PzBPJ9jQIRwyv6JW+jrYrn7
	JSnG9F79ZtQMGskw7rcVLTnTF8HUl9sGLG8HJfw6Xb7b4M1LRb849Iph3bpEeYz9HURI
	65fYSK7KhEJkOzyZXa0ojfcXREXVvM/jIDyQTsNCRWa/jtBg10MCMTRYCeykSlRG5eqc
	FzUCepCQPLoJPw3QwcLPFfS8l8GBsklMj+u5C9TOuXwb2ip1TeXdz1U8xa9ED/qbNhxg
	cb3kb1xCFQjcTUKQIFDF5gmvJwExJ63UjYBya18RCyeJ83L1KB5K/tcRj26qLJMmVKRi
	xlsw==
X-Gm-Message-State: ALoCoQmKBCHHPi5uWP6TmPFO6SGuB0JKsYsp5sxqsXcGot13SnSegK+B3mlg72ybQsgT51zbMcFBB20cZd8gGS2ms2ZcgwKaMivPOHaWYbj17otyVY+1JAPByxGGUr0/eYr2KfzOU4fu
X-Received: by 10.107.167.73 with SMTP id q70mr26904529ioe.82.1433855464230;
	Tue, 09 Jun 2015 06:11:04 -0700 (PDT)
X-Received: by 10.107.167.73 with SMTP id q70mr26904515ioe.82.1433855464115;
	Tue, 09 Jun 2015 06:11:04 -0700 (PDT)
Received: from mail-ig0-f176.google.com (mail-ig0-f176.google.com.
	[209.85.213.176])
	by mx.google.com with ESMTPSA id 72sm3885590ioj.27.2015.06.09.06.10.59
	for <xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 09 Jun 2015 06:11:00 -0700 (PDT)
Received: by igbzc4 with SMTP id zc4so11520455igb.0
	for <xen-users@lists.xen.org>; Tue, 09 Jun 2015 06:10:59 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.107.167.73 with SMTP id q70mr26903839ioe.82.1433855459171;
	Tue, 09 Jun 2015 06:10:59 -0700 (PDT)
Received: by 10.36.32.5 with HTTP; Tue, 9 Jun 2015 06:10:59 -0700 (PDT)
In-Reply-To: <CAG97rae5j_aeRSCdfQV84mpH==kARTffvXLKeuYPv7hYphiQ6g@mail.gmail.com>
References: <CAHyh4xhq9GE7zoEhZ+3SYe_5Uk8_aBhDiOym1geA+s6txs9zbg@mail.gmail.com>
	<CAG97rae5j_aeRSCdfQV84mpH==kARTffvXLKeuYPv7hYphiQ6g@mail.gmail.com>
Date: Tue, 9 Jun 2015 09:10:59 -0400
Message-ID: <CAHyh4xhRu_WeXvNqm1Nx45xiqPMnH-m3WmtgKcum_TR2Czh8tw@mail.gmail.com>
From: Jintack Lim <jintack@cs.columbia.edu>
To: =?UTF-8?Q?Rafael_Weing=C3=A4rtner?= <rafaelweingartner@gmail.com>
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.4
Cc: xen-users@lists.xen.org,
	Christoffer Dall <christofferdall@christofferdall.dk>
Subject: Re: [Xen-users] Monitoring Xen's cpu utilization
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1725327604902955309=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============1725327604902955309==
Content-Type: multipart/alternative; boundary=001a1142a4804da94f0518157d33

--001a1142a4804da94f0518157d33
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Rafael,

On Sun, Jun 7, 2015 at 2:13 PM, Rafael Weing=C3=A4rtner <
rafaelweingartner@gmail.com> wrote:

> I believe that most of the resource used to management by Xen, it used by
> Dom0. Xentop reports the Dom0 resource usage.
>

Thanks a lot.
However, even though Xen hypervisor does not use much resource,
I want to quantify it.
I guess Xen hypervisor will spend some time to do domain
scheduling/switching, message passing between domains, etc.

Is there any existing tool for that?

Thanks!


>
> On Sun, Jun 7, 2015 at 11:06 AM, Jintack Lim <jintack@cs.columbia.edu>
> wrote:
>
>> Hi,
>>
>> I would like to monitor cpu utilization of every domain and Xen itself.
>> Xentop gives appropriate information for domains,
>> however it does not tell about Xen hypervisor.
>> I wonder there is a tool for getting these information.
>>
>> I'm working on ARM64 platform, and using Xen 4.5.0
>>
>> Thanks,
>> Jintack
>>
>> _______________________________________________
>> Xen-users mailing list
>> Xen-users@lists.xen.org
>> http://lists.xen.org/xen-users
>>
>
>
>
> --
> Rafael Weing=C3=A4rtner
>

--001a1142a4804da94f0518157d33
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Rafael,<br><div class=3D"gmail_extra"><br><div class=3D=
"gmail_quote">On Sun, Jun 7, 2015 at 2:13 PM, Rafael Weing=C3=A4rtner <span=
 dir=3D"ltr">&lt;<a href=3D"mailto:rafaelweingartner@gmail.com" target=3D"_=
blank" onclick=3D"window.open(&#39;https://mail.google.com/mail/?view=3Dcm&=
amp;tf=3D1&amp;to=3Drafaelweingartner@gmail.com&amp;cc=3D&amp;bcc=3D&amp;su=
=3D&amp;body=3D&#39;,&#39;_blank&#39;);return false;">rafaelweingartner@gma=
il.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"=
ltr">I believe that most of the resource used to management by Xen, it used=
 by Dom0. Xentop reports the Dom0 resource usage.=C2=A0</div></blockquote><=
div><br></div><div>Thanks a lot.</div><div>However, even though Xen hypervi=
sor does not use much resource,</div><div>I want to quantify it.</div><div>=
I guess Xen hypervisor will spend some time to do domain scheduling/switchi=
ng, message passing between domains, etc.</div><div><br></div><div>Is there=
 any existing tool for that?</div><div><br></div><div>Thanks!</div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><div class=3D"gmail_extra"><br><div=
 class=3D"gmail_quote"><div><div class=3D"h5">On Sun, Jun 7, 2015 at 11:06 =
AM, Jintack Lim <span dir=3D"ltr">&lt;<a href=3D"mailto:jintack@cs.columbia=
.edu" target=3D"_blank" onclick=3D"window.open(&#39;https://mail.google.com=
/mail/?view=3Dcm&amp;tf=3D1&amp;to=3Djintack@cs.columbia.edu&amp;cc=3D&amp;=
bcc=3D&amp;su=3D&amp;body=3D&#39;,&#39;_blank&#39;);return false;">jintack@=
cs.columbia.edu</a>&gt;</span> wrote:<br></div></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex"><div><div class=3D"h5"><div dir=3D"ltr">Hi,<div><br></div><div>I w=
ould like to monitor cpu utilization of every domain and Xen itself.</div><=
div>Xentop gives appropriate information for domains,</div><div>however it =
does not tell about Xen hypervisor.</div><div>I wonder there is a tool for =
getting these information.</div><div><br></div><div>I&#39;m working on ARM6=
4 platform, and using Xen 4.5.0</div><div><br></div><div>Thanks,</div><div>=
Jintack</div></div>
<br></div></div>_______________________________________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xen.org" target=3D"_blank" onclick=3D"win=
dow.open(&#39;https://mail.google.com/mail/?view=3Dcm&amp;tf=3D1&amp;to=3DX=
en-users@lists.xen.org&amp;cc=3D&amp;bcc=3D&amp;su=3D&amp;body=3D&#39;,&#39=
;_blank&#39;);return false;">Xen-users@lists.xen.org</a><br>
<a href=3D"http://lists.xen.org/xen-users" target=3D"_blank">http://lists.x=
en.org/xen-users</a><span class=3D"HOEnZb"><font color=3D"#888888"><br></fo=
nt></span></blockquote></div><span class=3D"HOEnZb"><font color=3D"#888888"=
><br><br clear=3D"all"><div><br></div>-- <br><div><div dir=3D"ltr">Rafael W=
eing=C3=A4rtner</div></div>
</font></span></div>
</blockquote></div><br></div></div>

--001a1142a4804da94f0518157d33--



--===============1725327604902955309==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============1725327604902955309==--



From xen-users-bounces@lists.xen.org Wed Jun 10 11:10:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 11:10:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2dso-0007M3-0n; Wed, 10 Jun 2015 11:09:22 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mawalasek@googlemail.com>) id 1Z2dsm-0007Ly-2N
	for xen-users@lists.xen.org; Wed, 10 Jun 2015 11:09:20 +0000
Received: from [85.158.137.68] by server-1.bemta-3.messagelabs.com id
	E4/9C-10437-FDA18755; Wed, 10 Jun 2015 11:09:19 +0000
X-Env-Sender: mawalasek@googlemail.com
X-Msg-Ref: server-10.tower-31.messagelabs.com!1433934557!14881657!1
X-Originating-IP: [209.85.220.169]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_10_20,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27794 invoked from network); 10 Jun 2015 11:09:18 -0000
Received: from mail-qk0-f169.google.com (HELO mail-qk0-f169.google.com)
	(209.85.220.169)
	by server-10.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	10 Jun 2015 11:09:18 -0000
Received: by qkx62 with SMTP id 62so22985336qkx.3
	for <xen-users@lists.xen.org>; Wed, 10 Jun 2015 04:09:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=googlemail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=23JFICWYL/G87KDS8YzwU51SQUOBNYLs6UBKy4WHLro=;
	b=BYGVMrfcQUGyU68uPWDHG6/HEN/UN1XwFqyENzLNt8wUJ8D1N6OttBFjI1E7lpoljD
	RMcK3kiySzuTXHaWw79LpsWEoMLTbABGPpYU+Z3vegNcRQzhn2Pug40lS741KxwRkBOq
	FKCZ1Nq8Hpst5czvGOKfr6XO0rY1cYalfVnCEWl7s+b9mPLX16Dp8tul86/syy6k69Fo
	P7UB3ismhVa0oxeTggbNA+WMXJ7WTAV8wkhVhF+NP9IkiF4tH3obc9Dz6lI6kIPTfW8H
	MXNsBY65ni4t2Z2Jtk1+3/VVC9WIIWM4dlDq/HwBzcgHIJWJfPQmAlkv7p/iT9CYQ8mv
	smbA==
MIME-Version: 1.0
X-Received: by 10.55.26.86 with SMTP id a83mr4956379qka.83.1433934557143; Wed,
	10 Jun 2015 04:09:17 -0700 (PDT)
Received: by 10.140.21.105 with HTTP; Wed, 10 Jun 2015 04:09:17 -0700 (PDT)
Date: Wed, 10 Jun 2015 13:09:17 +0200
Message-ID: <CAPqEo3-mzs5dazVGQzWEUz73nLdM1dUFrC2RT=cJ27+Rvj1w-w@mail.gmail.com>
From: Janusz Kowal <mawalasek@googlemail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] Performance tools for Xen
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3955795089937032915=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============3955795089937032915==
Content-Type: multipart/alternative; boundary=001a11479b02e8ec41051827e750

--001a11479b02e8ec41051827e750
Content-Type: text/plain; charset=UTF-8

Hello,

I've tried a couple of performance measurement tools for Xen, such as
Xenoprof (Oprofile). None of these tools work properly, at least in my
current deployment, for reasons I don't fully understand or the respective
community doesn't appear to be interested in. I can only suppose that, in
the case of Oprofile, the problem lies in the discontinuity of support
(Opcontrol is deprecated and I don't even know whether the new tool Operf
is designed to support Xen deployments...).

That's why I would kindly ask you for your advice on which up-to-date
profiling tools could suit my needs. To be precise, the tool should:
1. Access the unique performance metrics of each DomU.
2. Allow passive profiling, i.e. running the profiler only in Dom0 instead
of running it in each of the profiled DomUs.
3. Be based on performance counters/events, i.e. storing the performance
metrics rather than just providing e.g. the current CPU utilisation, like
Xentop does.

In the long run, I want to use the data obtained so the estimate each
DomU's power consumption. Does a profiling tool for the above purpose exist
for Xen? Which tools do you use, if any?

Thank you!
Marek

P.S. I use Ubuntu 14.04 for Dom0 and PV guests running on Xen 4.4.3. I've
tried Oprofile 0.9.9. My processor is Intel Core i7 which Oprofile
identified as "Intel Haswell microarchitecture".

--001a11479b02e8ec41051827e750
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><div><div><div><div><div><div>Hello,<br><br></di=
v>I&#39;ve tried a couple of performance measurement tools for Xen, such as=
 Xenoprof (Oprofile). None of these tools work properly, at least in my cur=
rent deployment, for reasons I don&#39;t fully understand or the respective=
 community doesn&#39;t appear to be interested in. I can only suppose that,=
 in the case of Oprofile, the problem lies in the discontinuity of support =
(Opcontrol is deprecated and I don&#39;t even know whether the new tool Ope=
rf is designed to support Xen deployments...). <br><br></div>That&#39;s why=
 I would kindly ask you for your advice on which up-to-date profiling tools=
 could suit my needs. To be precise, the tool should:<br></div>1. Access th=
e unique performance metrics of each DomU.<br>2. Allow passive profiling, i=
.e. running the profiler only in Dom0 instead of running it in each of the =
profiled DomUs.<br></div>3. Be based on performance counters/events, i.e. s=
toring the performance metrics rather than just providing e.g. the current =
CPU utilisation, like Xentop does.<br><br></div>In the long run, I want to =
use the data obtained so the estimate each DomU&#39;s power consumption. Do=
es a profiling tool for the above purpose exist for Xen? Which tools do you=
 use, if any?<br><br></div>Thank you!<br></div>Marek<br><br></div>P.S. I us=
e Ubuntu 14.04 for Dom0 and PV guests running on Xen 4.4.3. I&#39;ve tried =
Oprofile 0.9.9. My processor is Intel Core i7 which Oprofile identified as =
&quot;Intel Haswell microarchitecture&quot;. <br><div><div><div><div><div><=
div><div><div><div>=C2=A0<br></div></div></div></div></div></div></div></di=
v></div></div>

--001a11479b02e8ec41051827e750--


--===============3955795089937032915==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3955795089937032915==--


From xen-users-bounces@lists.xen.org Wed Jun 10 11:10:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 11:10:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2dso-0007M3-0n; Wed, 10 Jun 2015 11:09:22 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mawalasek@googlemail.com>) id 1Z2dsm-0007Ly-2N
	for xen-users@lists.xen.org; Wed, 10 Jun 2015 11:09:20 +0000
Received: from [85.158.137.68] by server-1.bemta-3.messagelabs.com id
	E4/9C-10437-FDA18755; Wed, 10 Jun 2015 11:09:19 +0000
X-Env-Sender: mawalasek@googlemail.com
X-Msg-Ref: server-10.tower-31.messagelabs.com!1433934557!14881657!1
X-Originating-IP: [209.85.220.169]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_10_20,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27794 invoked from network); 10 Jun 2015 11:09:18 -0000
Received: from mail-qk0-f169.google.com (HELO mail-qk0-f169.google.com)
	(209.85.220.169)
	by server-10.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	10 Jun 2015 11:09:18 -0000
Received: by qkx62 with SMTP id 62so22985336qkx.3
	for <xen-users@lists.xen.org>; Wed, 10 Jun 2015 04:09:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=googlemail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=23JFICWYL/G87KDS8YzwU51SQUOBNYLs6UBKy4WHLro=;
	b=BYGVMrfcQUGyU68uPWDHG6/HEN/UN1XwFqyENzLNt8wUJ8D1N6OttBFjI1E7lpoljD
	RMcK3kiySzuTXHaWw79LpsWEoMLTbABGPpYU+Z3vegNcRQzhn2Pug40lS741KxwRkBOq
	FKCZ1Nq8Hpst5czvGOKfr6XO0rY1cYalfVnCEWl7s+b9mPLX16Dp8tul86/syy6k69Fo
	P7UB3ismhVa0oxeTggbNA+WMXJ7WTAV8wkhVhF+NP9IkiF4tH3obc9Dz6lI6kIPTfW8H
	MXNsBY65ni4t2Z2Jtk1+3/VVC9WIIWM4dlDq/HwBzcgHIJWJfPQmAlkv7p/iT9CYQ8mv
	smbA==
MIME-Version: 1.0
X-Received: by 10.55.26.86 with SMTP id a83mr4956379qka.83.1433934557143; Wed,
	10 Jun 2015 04:09:17 -0700 (PDT)
Received: by 10.140.21.105 with HTTP; Wed, 10 Jun 2015 04:09:17 -0700 (PDT)
Date: Wed, 10 Jun 2015 13:09:17 +0200
Message-ID: <CAPqEo3-mzs5dazVGQzWEUz73nLdM1dUFrC2RT=cJ27+Rvj1w-w@mail.gmail.com>
From: Janusz Kowal <mawalasek@googlemail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] Performance tools for Xen
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3955795089937032915=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============3955795089937032915==
Content-Type: multipart/alternative; boundary=001a11479b02e8ec41051827e750

--001a11479b02e8ec41051827e750
Content-Type: text/plain; charset=UTF-8

Hello,

I've tried a couple of performance measurement tools for Xen, such as
Xenoprof (Oprofile). None of these tools work properly, at least in my
current deployment, for reasons I don't fully understand or the respective
community doesn't appear to be interested in. I can only suppose that, in
the case of Oprofile, the problem lies in the discontinuity of support
(Opcontrol is deprecated and I don't even know whether the new tool Operf
is designed to support Xen deployments...).

That's why I would kindly ask you for your advice on which up-to-date
profiling tools could suit my needs. To be precise, the tool should:
1. Access the unique performance metrics of each DomU.
2. Allow passive profiling, i.e. running the profiler only in Dom0 instead
of running it in each of the profiled DomUs.
3. Be based on performance counters/events, i.e. storing the performance
metrics rather than just providing e.g. the current CPU utilisation, like
Xentop does.

In the long run, I want to use the data obtained so the estimate each
DomU's power consumption. Does a profiling tool for the above purpose exist
for Xen? Which tools do you use, if any?

Thank you!
Marek

P.S. I use Ubuntu 14.04 for Dom0 and PV guests running on Xen 4.4.3. I've
tried Oprofile 0.9.9. My processor is Intel Core i7 which Oprofile
identified as "Intel Haswell microarchitecture".

--001a11479b02e8ec41051827e750
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><div><div><div><div><div><div>Hello,<br><br></di=
v>I&#39;ve tried a couple of performance measurement tools for Xen, such as=
 Xenoprof (Oprofile). None of these tools work properly, at least in my cur=
rent deployment, for reasons I don&#39;t fully understand or the respective=
 community doesn&#39;t appear to be interested in. I can only suppose that,=
 in the case of Oprofile, the problem lies in the discontinuity of support =
(Opcontrol is deprecated and I don&#39;t even know whether the new tool Ope=
rf is designed to support Xen deployments...). <br><br></div>That&#39;s why=
 I would kindly ask you for your advice on which up-to-date profiling tools=
 could suit my needs. To be precise, the tool should:<br></div>1. Access th=
e unique performance metrics of each DomU.<br>2. Allow passive profiling, i=
.e. running the profiler only in Dom0 instead of running it in each of the =
profiled DomUs.<br></div>3. Be based on performance counters/events, i.e. s=
toring the performance metrics rather than just providing e.g. the current =
CPU utilisation, like Xentop does.<br><br></div>In the long run, I want to =
use the data obtained so the estimate each DomU&#39;s power consumption. Do=
es a profiling tool for the above purpose exist for Xen? Which tools do you=
 use, if any?<br><br></div>Thank you!<br></div>Marek<br><br></div>P.S. I us=
e Ubuntu 14.04 for Dom0 and PV guests running on Xen 4.4.3. I&#39;ve tried =
Oprofile 0.9.9. My processor is Intel Core i7 which Oprofile identified as =
&quot;Intel Haswell microarchitecture&quot;. <br><div><div><div><div><div><=
div><div><div><div>=C2=A0<br></div></div></div></div></div></div></div></di=
v></div></div>

--001a11479b02e8ec41051827e750--


--===============3955795089937032915==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3955795089937032915==--


From xen-users-bounces@lists.xen.org Wed Jun 10 14:11:45 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 14:11:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2giR-00063D-Go; Wed, 10 Jun 2015 14:10:51 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Z2giO-00062k-Ls; Wed, 10 Jun 2015 14:10:49 +0000
Received: from [85.158.137.68] by server-7.bemta-3.messagelabs.com id
	E3/F8-06457-76548755; Wed, 10 Jun 2015 14:10:47 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-7.tower-31.messagelabs.com!1433945445!14990300!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 618 invoked from network); 10 Jun 2015 14:10:46 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-7.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	10 Jun 2015 14:10:46 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Z2giE-00011C-5Z; Wed, 10 Jun 2015 14:10:38 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Z2giD-0007Hh-AZ; Wed, 10 Jun 2015 14:10:37 +0000
Date: Wed, 10 Jun 2015 14:10:37 +0000
Message-Id: <E1Z2giD-0007Hh-AZ@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 135 (CVE-2015-3209) - Heap
 overflow in QEMU PCNET controller, allowing guest->host escape
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-3209 / XSA-135
                              version 3

 Heap overflow in QEMU PCNET controller, allowing guest->host escape

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

The QEMU security team has predisclosed the following advisory:

    pcnet_transmit loads a transmit-frame descriptor from the guest into the
    /tmd/ local variable to recover a length field, a status field and a
    guest-physical location of the associated frame buffer. If the status
    field indicates that the frame buffer is ready to be sent out (i.e. by
    setting the TXSTATUS_DEVICEOWNS, TXSTATUS_STARTPACKET and
    TXSTATUS_ENDPACKET bits on the status field), the PCNET device
    controller pulls in the frame from the guest-physical location to
    s->buffer (which is 4096 bytes long), and then transmits the frame.

    Because of the layout of the transmit-frame descriptor, it is not
    possible to send the PCNET device controller a frame of length > 4096,
    but it /is/ possible to send the PCNET device controller a frame that is
    marked as TXSTATUS_STARTPACKET, but not TXSTATUS_ENDPACKET. If we do
    this - and the PCNET controller is configured via the XMTRL CSR to
    support split-frame processing - then the pcnet_transmit functions loops
    round, pulling a second transmit frame descriptor from the guest. If
    this second transmit frame descriptor sets the TXSTATUS_DEVICEOWNS and
    doesn't set the TXSTATUS_STARTPACKET bits, this frame is appended to
    the s->buffer field.

    An attacker can then exploit this vulnerability by sending a first
    packet of length 4096 to the device controller, and a second frame
    containing N-bytes to trigger an N-byte heap overflow.

    On 64-bit QEMU, a 24-byte overflow allows the guest to take control of
    the phys_mem_write function pointer in the PCNetState_st structure, and
    this is called when trying to flush the updated transmit frame
    descriptor back to the guest. By specifying the content of the second
    transmit frame, the attacker therefore gets reliable fully-chosen
    control of the host instruction pointer, allowing them to take control
    of the host.

IMPACT
======

A guest which has access to an emulated PCNET network device
(e.g. with "model=pcnet" in their VIF configuration) can exploit this
vulnerability to take over the qemu process elevating its privilege to
that of the qemu process.

VULNERABLE SYSTEMS
==================

All Xen systems running x86 HVM guests without stubdomains which have
been configured to use the PCNET emulated driver model are
vulnerable.

The default configuration is NOT vulnerable (because it does not
emulate PCNET NICs).

Systems running only PV guests are NOT vulnerable.

Systems using qemu-dm stubdomain device models (for example, by
specifying "device_model_stubdomain_override=1" in xl's domain
configuration files) are NOT vulnerable.

Both the traditional "qemu-xen" or upstream qemu device models are
potentially vulnerable.

ARM systems are NOT vulnerable.

MITIGATION
==========

Avoiding the use of emulated network devices altogether, by specifying
a PV only VIF in the domain configuration file will avoid this
issue.

Avoiding the use of the PCNET device in favour of other emulations
will also avoid this issue.

Enabling stubdomains will mitigate this issue, by reducing the
escalation to only those privileges accorded to the service domain.

qemu-dm stubdomains are only available with the traditional "qemu-xen"
version.

CREDITS
=======

This issue was discovered by Matt Tait of Google and reported to us
via the QEMU security team.

RESOLUTION
==========

Applying the appropriate attached patch(es) resolves this issue.

xsa135-qemuu-unstable.patch  qemu-upstream, Xen unstable
xsa135-qemuu-4.5-*.patch     qemu-upstream, Xen 4.5.x, Xen 4.4.x
xsa135-qemuu-4.3-*.patch     qemu-upstream, Xen 4.3.x
xsa135-qemuu-4.2-*.patch     qemu-upstream, Xen 4.2.x
xsa135-qemut-*.patch         qemu-xen-traditional, Xen unstable, 4.5.x, 4.4.x, 4.3.x, 4.2.x

Note that the second patch for qemu-xen-traditional (all versions),
and qemu-upstream 4.3.x and 4.2.x are identical. Likewise
xsa135-qemuu-unstable.patch is the same as
xsa135-qemuu-4.5-2.patch. They are presented separately for
convenience.

$ sha256sum xsa135*.patch
a40897166f5de84c11b5d547191cd0375c7052edb0f44940eec7b78d839e447b  xsa135-qemut-1.patch
d98452d4c42fae1f11e887537a4638694de8a4bf00835daac6e51801297e4091  xsa135-qemut-2.patch
099693483d468a7fdecbf825635d3595ebeecc91c496624cbe109dcb4dd235da  xsa135-qemuu-unstable.patch
12ca5521f6bb1227934a1711d8adee11138a84c080a217f250efe34b3cb25b10  xsa135-qemuu-4.2-1.patch
d98452d4c42fae1f11e887537a4638694de8a4bf00835daac6e51801297e4091  xsa135-qemuu-4.2-2.patch
ad32c0ac145bc02b901c061fcbef83965f443fe89fcae9efc3b1dfd1e1d70bc8  xsa135-qemuu-4.3-1.patch
d98452d4c42fae1f11e887537a4638694de8a4bf00835daac6e51801297e4091  xsa135-qemuu-4.3-2.patch
baf9e0a960693b246ff01bb6210c5fee7713999d1e1b00a5b4e29d9ebd3c0ce8  xsa135-qemuu-4.5-1.patch
099693483d468a7fdecbf825635d3595ebeecc91c496624cbe109dcb4dd235da  xsa135-qemuu-4.5-2.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of patches or mitigations is NOT permitted (except on
systems used and administered only by organisations which are members
of the Xen Project Security Issues Predisclosure List).  Specifically,
deployment on public cloud systems is NOT permitted.

The decision not to permit deployment was made by the group that, at
their discretion, disclosed the issue to the Xen Project Security
Team.

Deployment is permitted only AFTER the embargo ends.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVeDc3AAoJEIP+FMlX6CvZFBoIAJw/FxeABrdms6CzoxZxFQRp
It9eoMcmP+cxjMuAJyO771s+wYZy/X+ZDM2+CmzDWdBOzst3/YVw0ePbNH1T86y6
23Miqm5zupJ30xQGIXledrd/S23tmRlmzylytJcI9UQktuAOnL50l+wovKwhxVtO
x2Dg4P6RZ51twfbYLueIjBe2YSGGrck0kugpDtD6dH6kONNFgA+30i11Unwip18b
FzKm54b5HIvSoOkXCggCdgaCOmAuz3LpAt7FfB1324dPblxlfrDyRxWABxn47qoL
lgTJa7DPRTdxYM7EmnpMHKakgqzhD+Vu2Jnz8RELXt+AQH3TxRYXS2kT22QpfxY=
=cx83
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa135-qemut-1.patch"
Content-Disposition: attachment; filename="xsa135-qemut-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemut-2.patch"
Content-Disposition: attachment; filename="xsa135-qemut-2.patch"
Content-Transfer-Encoding: base64

RnJvbSAyNjMwNjcyYWIyMjI1NWRlMjUyZjg3NzcwOTg1MWMwNTU3YTFjNjQ3
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRyIE1hdG91c2Vr
IDxwbWF0b3VzZUByZWRoYXQuY29tPgpEYXRlOiBTdW4sIDI0IE1heSAyMDE1
IDEwOjUzOjQ0ICswMjAwClN1YmplY3Q6IFtQQVRDSF0gcGNuZXQ6IGZvcmNl
IHRoZSBidWZmZXIgYWNjZXNzIHRvIGJlIGluIGJvdW5kcyBkdXJpbmcgdHgK
CjQwOTYgaXMgdGhlIG1heGltdW0gbGVuZ3RoIHBlciBUTUQgYW5kIGl0IGlz
IGFsc28gY3VycmVudGx5IHRoZSBzaXplIG9mCnRoZSByZWxheSBidWZmZXIg
cGNuZXQgZHJpdmVyIHVzZXMgZm9yIHNlbmRpbmcgdGhlIHBhY2tldCBkYXRh
IHRvIFFFTVUKZm9yIGZ1cnRoZXIgcHJvY2Vzc2luZy4gV2l0aCBwYWNrZXQg
c3Bhbm5pbmcgbXVsdGlwbGUgVE1EcyBpdCBjYW4KaGFwcGVuIHRoYXQgdGhl
IG92ZXJhbGwgcGFja2V0IHNpemUgd2lsbCBiZSBiaWdnZXIgdGhhbiBzaXpl
b2YoYnVmZmVyKSwKd2hpY2ggcmVzdWx0cyBpbiBtZW1vcnkgY29ycnVwdGlv
bi4KCkZpeCB0aGlzIGJ5IG9ubHkgYWxsb3dpbmcgdG8gcXVldWUgbWF4aW11
bSBzaXplb2YoYnVmZmVyKSBieXRlcy4KClRoaXMgaXMgQ1ZFLTIwMTUtMzIw
OS4KClNpZ25lZC1vZmYtYnk6IFBldHIgTWF0b3VzZWsgPHBtYXRvdXNlQHJl
ZGhhdC5jb20+ClJlcG9ydGVkLWJ5OiBNYXR0IFRhaXQgPG1hdHR0YWl0QGdv
b2dsZS5jb20+ClJldmlld2VkLWJ5OiBQZXRlciBNYXlkZWxsIDxwZXRlci5t
YXlkZWxsQGxpbmFyby5vcmc+ClJldmlld2VkLWJ5OiBTdGVmYW4gSGFqbm9j
emkgPHN0ZWZhbmhhQHJlZGhhdC5jb20+Ci0tLQogaHcvcGNuZXQuYyB8IDgg
KysrKysrKysKIDEgZmlsZSBjaGFuZ2VkLCA4IGluc2VydGlvbnMoKykKCmRp
ZmYgLS1naXQgYS9ody9wY25ldC5jIGIvaHcvcGNuZXQuYwppbmRleCBiZGZk
MzhmLi42ZDMyZTRjIDEwMDY0NAotLS0gYS9ody9wY25ldC5jCisrKyBiL2h3
L3BjbmV0LmMKQEAgLTEyNDEsNiArMTI0MSwxNCBAQCBzdGF0aWMgdm9pZCBw
Y25ldF90cmFuc21pdChQQ05ldFN0YXRlICpzKQogICAgICAgICB9CgogICAg
ICAgICBiY250ID0gNDA5NiAtIEdFVF9GSUVMRCh0bWQubGVuZ3RoLCBUTURM
LCBCQ05UKTsKKworICAgICAgICAvKiBpZiBtdWx0aS10bWQgcGFja2V0IG91
dHNpemVzIHMtPmJ1ZmZlciB0aGVuIHNraXAgaXQgc2lsZW50bHkuCisgICAg
ICAgICAgIE5vdGU6IHRoaXMgaXMgbm90IHdoYXQgcmVhbCBodyBkb2VzICov
CisgICAgICAgIGlmIChzLT54bWl0X3BvcyArIGJjbnQgPiBzaXplb2Yocy0+
YnVmZmVyKSkgeworICAgICAgICAgICBzLT54bWl0X3BvcyA9IC0xOworICAg
ICAgICAgICBnb3RvIHR4ZG9uZTsKKyAgICAgICAgfQorCiAgICAgICAgIHMt
PnBoeXNfbWVtX3JlYWQocy0+ZG1hX29wYXF1ZSwgUEhZU0FERFIocywgdG1k
LnRiYWRyKSwKICAgICAgICAgICAgICAgICAgICAgICAgICBzLT5idWZmZXIg
KyBzLT54bWl0X3BvcywgYmNudCwgQ1NSX0JTV1AocykpOwogICAgICAgICBz
LT54bWl0X3BvcyArPSBiY250OwotLSAKMi4xLjAKCg==

--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-unstable.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-unstable.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.2-1.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.2-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.2-2.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.2-2.patch"
Content-Transfer-Encoding: base64

RnJvbSAyNjMwNjcyYWIyMjI1NWRlMjUyZjg3NzcwOTg1MWMwNTU3YTFjNjQ3
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRyIE1hdG91c2Vr
IDxwbWF0b3VzZUByZWRoYXQuY29tPgpEYXRlOiBTdW4sIDI0IE1heSAyMDE1
IDEwOjUzOjQ0ICswMjAwClN1YmplY3Q6IFtQQVRDSF0gcGNuZXQ6IGZvcmNl
IHRoZSBidWZmZXIgYWNjZXNzIHRvIGJlIGluIGJvdW5kcyBkdXJpbmcgdHgK
CjQwOTYgaXMgdGhlIG1heGltdW0gbGVuZ3RoIHBlciBUTUQgYW5kIGl0IGlz
IGFsc28gY3VycmVudGx5IHRoZSBzaXplIG9mCnRoZSByZWxheSBidWZmZXIg
cGNuZXQgZHJpdmVyIHVzZXMgZm9yIHNlbmRpbmcgdGhlIHBhY2tldCBkYXRh
IHRvIFFFTVUKZm9yIGZ1cnRoZXIgcHJvY2Vzc2luZy4gV2l0aCBwYWNrZXQg
c3Bhbm5pbmcgbXVsdGlwbGUgVE1EcyBpdCBjYW4KaGFwcGVuIHRoYXQgdGhl
IG92ZXJhbGwgcGFja2V0IHNpemUgd2lsbCBiZSBiaWdnZXIgdGhhbiBzaXpl
b2YoYnVmZmVyKSwKd2hpY2ggcmVzdWx0cyBpbiBtZW1vcnkgY29ycnVwdGlv
bi4KCkZpeCB0aGlzIGJ5IG9ubHkgYWxsb3dpbmcgdG8gcXVldWUgbWF4aW11
bSBzaXplb2YoYnVmZmVyKSBieXRlcy4KClRoaXMgaXMgQ1ZFLTIwMTUtMzIw
OS4KClNpZ25lZC1vZmYtYnk6IFBldHIgTWF0b3VzZWsgPHBtYXRvdXNlQHJl
ZGhhdC5jb20+ClJlcG9ydGVkLWJ5OiBNYXR0IFRhaXQgPG1hdHR0YWl0QGdv
b2dsZS5jb20+ClJldmlld2VkLWJ5OiBQZXRlciBNYXlkZWxsIDxwZXRlci5t
YXlkZWxsQGxpbmFyby5vcmc+ClJldmlld2VkLWJ5OiBTdGVmYW4gSGFqbm9j
emkgPHN0ZWZhbmhhQHJlZGhhdC5jb20+Ci0tLQogaHcvcGNuZXQuYyB8IDgg
KysrKysrKysKIDEgZmlsZSBjaGFuZ2VkLCA4IGluc2VydGlvbnMoKykKCmRp
ZmYgLS1naXQgYS9ody9wY25ldC5jIGIvaHcvcGNuZXQuYwppbmRleCBiZGZk
MzhmLi42ZDMyZTRjIDEwMDY0NAotLS0gYS9ody9wY25ldC5jCisrKyBiL2h3
L3BjbmV0LmMKQEAgLTEyNDEsNiArMTI0MSwxNCBAQCBzdGF0aWMgdm9pZCBw
Y25ldF90cmFuc21pdChQQ05ldFN0YXRlICpzKQogICAgICAgICB9CgogICAg
ICAgICBiY250ID0gNDA5NiAtIEdFVF9GSUVMRCh0bWQubGVuZ3RoLCBUTURM
LCBCQ05UKTsKKworICAgICAgICAvKiBpZiBtdWx0aS10bWQgcGFja2V0IG91
dHNpemVzIHMtPmJ1ZmZlciB0aGVuIHNraXAgaXQgc2lsZW50bHkuCisgICAg
ICAgICAgIE5vdGU6IHRoaXMgaXMgbm90IHdoYXQgcmVhbCBodyBkb2VzICov
CisgICAgICAgIGlmIChzLT54bWl0X3BvcyArIGJjbnQgPiBzaXplb2Yocy0+
YnVmZmVyKSkgeworICAgICAgICAgICBzLT54bWl0X3BvcyA9IC0xOworICAg
ICAgICAgICBnb3RvIHR4ZG9uZTsKKyAgICAgICAgfQorCiAgICAgICAgIHMt
PnBoeXNfbWVtX3JlYWQocy0+ZG1hX29wYXF1ZSwgUEhZU0FERFIocywgdG1k
LnRiYWRyKSwKICAgICAgICAgICAgICAgICAgICAgICAgICBzLT5idWZmZXIg
KyBzLT54bWl0X3BvcywgYmNudCwgQ1NSX0JTV1AocykpOwogICAgICAgICBz
LT54bWl0X3BvcyArPSBiY250OwotLSAKMi4xLjAKCg==

--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.3-1.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.3-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.3-2.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.3-2.patch"
Content-Transfer-Encoding: base64

RnJvbSAyNjMwNjcyYWIyMjI1NWRlMjUyZjg3NzcwOTg1MWMwNTU3YTFjNjQ3
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRyIE1hdG91c2Vr
IDxwbWF0b3VzZUByZWRoYXQuY29tPgpEYXRlOiBTdW4sIDI0IE1heSAyMDE1
IDEwOjUzOjQ0ICswMjAwClN1YmplY3Q6IFtQQVRDSF0gcGNuZXQ6IGZvcmNl
IHRoZSBidWZmZXIgYWNjZXNzIHRvIGJlIGluIGJvdW5kcyBkdXJpbmcgdHgK
CjQwOTYgaXMgdGhlIG1heGltdW0gbGVuZ3RoIHBlciBUTUQgYW5kIGl0IGlz
IGFsc28gY3VycmVudGx5IHRoZSBzaXplIG9mCnRoZSByZWxheSBidWZmZXIg
cGNuZXQgZHJpdmVyIHVzZXMgZm9yIHNlbmRpbmcgdGhlIHBhY2tldCBkYXRh
IHRvIFFFTVUKZm9yIGZ1cnRoZXIgcHJvY2Vzc2luZy4gV2l0aCBwYWNrZXQg
c3Bhbm5pbmcgbXVsdGlwbGUgVE1EcyBpdCBjYW4KaGFwcGVuIHRoYXQgdGhl
IG92ZXJhbGwgcGFja2V0IHNpemUgd2lsbCBiZSBiaWdnZXIgdGhhbiBzaXpl
b2YoYnVmZmVyKSwKd2hpY2ggcmVzdWx0cyBpbiBtZW1vcnkgY29ycnVwdGlv
bi4KCkZpeCB0aGlzIGJ5IG9ubHkgYWxsb3dpbmcgdG8gcXVldWUgbWF4aW11
bSBzaXplb2YoYnVmZmVyKSBieXRlcy4KClRoaXMgaXMgQ1ZFLTIwMTUtMzIw
OS4KClNpZ25lZC1vZmYtYnk6IFBldHIgTWF0b3VzZWsgPHBtYXRvdXNlQHJl
ZGhhdC5jb20+ClJlcG9ydGVkLWJ5OiBNYXR0IFRhaXQgPG1hdHR0YWl0QGdv
b2dsZS5jb20+ClJldmlld2VkLWJ5OiBQZXRlciBNYXlkZWxsIDxwZXRlci5t
YXlkZWxsQGxpbmFyby5vcmc+ClJldmlld2VkLWJ5OiBTdGVmYW4gSGFqbm9j
emkgPHN0ZWZhbmhhQHJlZGhhdC5jb20+Ci0tLQogaHcvcGNuZXQuYyB8IDgg
KysrKysrKysKIDEgZmlsZSBjaGFuZ2VkLCA4IGluc2VydGlvbnMoKykKCmRp
ZmYgLS1naXQgYS9ody9wY25ldC5jIGIvaHcvcGNuZXQuYwppbmRleCBiZGZk
MzhmLi42ZDMyZTRjIDEwMDY0NAotLS0gYS9ody9wY25ldC5jCisrKyBiL2h3
L3BjbmV0LmMKQEAgLTEyNDEsNiArMTI0MSwxNCBAQCBzdGF0aWMgdm9pZCBw
Y25ldF90cmFuc21pdChQQ05ldFN0YXRlICpzKQogICAgICAgICB9CgogICAg
ICAgICBiY250ID0gNDA5NiAtIEdFVF9GSUVMRCh0bWQubGVuZ3RoLCBUTURM
LCBCQ05UKTsKKworICAgICAgICAvKiBpZiBtdWx0aS10bWQgcGFja2V0IG91
dHNpemVzIHMtPmJ1ZmZlciB0aGVuIHNraXAgaXQgc2lsZW50bHkuCisgICAg
ICAgICAgIE5vdGU6IHRoaXMgaXMgbm90IHdoYXQgcmVhbCBodyBkb2VzICov
CisgICAgICAgIGlmIChzLT54bWl0X3BvcyArIGJjbnQgPiBzaXplb2Yocy0+
YnVmZmVyKSkgeworICAgICAgICAgICBzLT54bWl0X3BvcyA9IC0xOworICAg
ICAgICAgICBnb3RvIHR4ZG9uZTsKKyAgICAgICAgfQorCiAgICAgICAgIHMt
PnBoeXNfbWVtX3JlYWQocy0+ZG1hX29wYXF1ZSwgUEhZU0FERFIocywgdG1k
LnRiYWRyKSwKICAgICAgICAgICAgICAgICAgICAgICAgICBzLT5idWZmZXIg
KyBzLT54bWl0X3BvcywgYmNudCwgQ1NSX0JTV1AocykpOwogICAgICAgICBz
LT54bWl0X3BvcyArPSBiY250OwotLSAKMi4xLjAKCg==

--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.5-1.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.5-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.5-2.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.5-2.patch"
Content-Transfer-Encoding: base64

RnJvbSAyNjMwNjcyYWIyMjI1NWRlMjUyZjg3NzcwOTg1MWMwNTU3YTFjNjQ3
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRyIE1hdG91c2Vr
IDxwbWF0b3VzZUByZWRoYXQuY29tPgpEYXRlOiBTdW4sIDI0IE1heSAyMDE1
IDEwOjUzOjQ0ICswMjAwClN1YmplY3Q6IFtQQVRDSF0gcGNuZXQ6IGZvcmNl
IHRoZSBidWZmZXIgYWNjZXNzIHRvIGJlIGluIGJvdW5kcyBkdXJpbmcgdHgK
CjQwOTYgaXMgdGhlIG1heGltdW0gbGVuZ3RoIHBlciBUTUQgYW5kIGl0IGlz
IGFsc28gY3VycmVudGx5IHRoZSBzaXplIG9mCnRoZSByZWxheSBidWZmZXIg
cGNuZXQgZHJpdmVyIHVzZXMgZm9yIHNlbmRpbmcgdGhlIHBhY2tldCBkYXRh
IHRvIFFFTVUKZm9yIGZ1cnRoZXIgcHJvY2Vzc2luZy4gV2l0aCBwYWNrZXQg
c3Bhbm5pbmcgbXVsdGlwbGUgVE1EcyBpdCBjYW4KaGFwcGVuIHRoYXQgdGhl
IG92ZXJhbGwgcGFja2V0IHNpemUgd2lsbCBiZSBiaWdnZXIgdGhhbiBzaXpl
b2YoYnVmZmVyKSwKd2hpY2ggcmVzdWx0cyBpbiBtZW1vcnkgY29ycnVwdGlv
bi4KCkZpeCB0aGlzIGJ5IG9ubHkgYWxsb3dpbmcgdG8gcXVldWUgbWF4aW11
bSBzaXplb2YoYnVmZmVyKSBieXRlcy4KClRoaXMgaXMgQ1ZFLTIwMTUtMzIw
OS4KClNpZ25lZC1vZmYtYnk6IFBldHIgTWF0b3VzZWsgPHBtYXRvdXNlQHJl
ZGhhdC5jb20+ClJlcG9ydGVkLWJ5OiBNYXR0IFRhaXQgPG1hdHR0YWl0QGdv
b2dsZS5jb20+ClJldmlld2VkLWJ5OiBQZXRlciBNYXlkZWxsIDxwZXRlci5t
YXlkZWxsQGxpbmFyby5vcmc+ClJldmlld2VkLWJ5OiBTdGVmYW4gSGFqbm9j
emkgPHN0ZWZhbmhhQHJlZGhhdC5jb20+Ci0tLQogaHcvbmV0L3BjbmV0LmMg
fCA4ICsrKysrKysrCiAxIGZpbGUgY2hhbmdlZCwgOCBpbnNlcnRpb25zKCsp
CgpkaWZmIC0tZ2l0IGEvaHcvbmV0L3BjbmV0LmMgYi9ody9uZXQvcGNuZXQu
YwppbmRleCBiZGZkMzhmLi42ZDMyZTRjIDEwMDY0NAotLS0gYS9ody9uZXQv
cGNuZXQuYworKysgYi9ody9uZXQvcGNuZXQuYwpAQCAtMTI0MSw2ICsxMjQx
LDE0IEBAIHN0YXRpYyB2b2lkIHBjbmV0X3RyYW5zbWl0KFBDTmV0U3RhdGUg
KnMpCiAgICAgICAgIH0KCiAgICAgICAgIGJjbnQgPSA0MDk2IC0gR0VUX0ZJ
RUxEKHRtZC5sZW5ndGgsIFRNREwsIEJDTlQpOworCisgICAgICAgIC8qIGlm
IG11bHRpLXRtZCBwYWNrZXQgb3V0c2l6ZXMgcy0+YnVmZmVyIHRoZW4gc2tp
cCBpdCBzaWxlbnRseS4KKyAgICAgICAgICAgTm90ZTogdGhpcyBpcyBub3Qg
d2hhdCByZWFsIGh3IGRvZXMgKi8KKyAgICAgICAgaWYgKHMtPnhtaXRfcG9z
ICsgYmNudCA+IHNpemVvZihzLT5idWZmZXIpKSB7CisgICAgICAgICAgIHMt
PnhtaXRfcG9zID0gLTE7CisgICAgICAgICAgIGdvdG8gdHhkb25lOworICAg
ICAgICB9CisKICAgICAgICAgcy0+cGh5c19tZW1fcmVhZChzLT5kbWFfb3Bh
cXVlLCBQSFlTQUREUihzLCB0bWQudGJhZHIpLAogICAgICAgICAgICAgICAg
ICAgICAgICAgIHMtPmJ1ZmZlciArIHMtPnhtaXRfcG9zLCBiY250LCBDU1Jf
QlNXUChzKSk7CiAgICAgICAgIHMtPnhtaXRfcG9zICs9IGJjbnQ7Ci0tIAoy
LjEuMAoK

--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Wed Jun 10 14:11:45 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 14:11:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2giR-00063D-Go; Wed, 10 Jun 2015 14:10:51 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Z2giO-00062k-Ls; Wed, 10 Jun 2015 14:10:49 +0000
Received: from [85.158.137.68] by server-7.bemta-3.messagelabs.com id
	E3/F8-06457-76548755; Wed, 10 Jun 2015 14:10:47 +0000
X-Env-Sender: ianc@xenbits.xen.org
X-Msg-Ref: server-7.tower-31.messagelabs.com!1433945445!14990300!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 618 invoked from network); 10 Jun 2015 14:10:46 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-7.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	10 Jun 2015 14:10:46 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Z2giE-00011C-5Z; Wed, 10 Jun 2015 14:10:38 +0000
Received: from ianc by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <ianc@xenbits.xen.org>)
	id 1Z2giD-0007Hh-AZ; Wed, 10 Jun 2015 14:10:37 +0000
Date: Wed, 10 Jun 2015 14:10:37 +0000
Message-Id: <E1Z2giD-0007Hh-AZ@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 135 (CVE-2015-3209) - Heap
 overflow in QEMU PCNET controller, allowing guest->host escape
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-3209 / XSA-135
                              version 3

 Heap overflow in QEMU PCNET controller, allowing guest->host escape

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

The QEMU security team has predisclosed the following advisory:

    pcnet_transmit loads a transmit-frame descriptor from the guest into the
    /tmd/ local variable to recover a length field, a status field and a
    guest-physical location of the associated frame buffer. If the status
    field indicates that the frame buffer is ready to be sent out (i.e. by
    setting the TXSTATUS_DEVICEOWNS, TXSTATUS_STARTPACKET and
    TXSTATUS_ENDPACKET bits on the status field), the PCNET device
    controller pulls in the frame from the guest-physical location to
    s->buffer (which is 4096 bytes long), and then transmits the frame.

    Because of the layout of the transmit-frame descriptor, it is not
    possible to send the PCNET device controller a frame of length > 4096,
    but it /is/ possible to send the PCNET device controller a frame that is
    marked as TXSTATUS_STARTPACKET, but not TXSTATUS_ENDPACKET. If we do
    this - and the PCNET controller is configured via the XMTRL CSR to
    support split-frame processing - then the pcnet_transmit functions loops
    round, pulling a second transmit frame descriptor from the guest. If
    this second transmit frame descriptor sets the TXSTATUS_DEVICEOWNS and
    doesn't set the TXSTATUS_STARTPACKET bits, this frame is appended to
    the s->buffer field.

    An attacker can then exploit this vulnerability by sending a first
    packet of length 4096 to the device controller, and a second frame
    containing N-bytes to trigger an N-byte heap overflow.

    On 64-bit QEMU, a 24-byte overflow allows the guest to take control of
    the phys_mem_write function pointer in the PCNetState_st structure, and
    this is called when trying to flush the updated transmit frame
    descriptor back to the guest. By specifying the content of the second
    transmit frame, the attacker therefore gets reliable fully-chosen
    control of the host instruction pointer, allowing them to take control
    of the host.

IMPACT
======

A guest which has access to an emulated PCNET network device
(e.g. with "model=pcnet" in their VIF configuration) can exploit this
vulnerability to take over the qemu process elevating its privilege to
that of the qemu process.

VULNERABLE SYSTEMS
==================

All Xen systems running x86 HVM guests without stubdomains which have
been configured to use the PCNET emulated driver model are
vulnerable.

The default configuration is NOT vulnerable (because it does not
emulate PCNET NICs).

Systems running only PV guests are NOT vulnerable.

Systems using qemu-dm stubdomain device models (for example, by
specifying "device_model_stubdomain_override=1" in xl's domain
configuration files) are NOT vulnerable.

Both the traditional "qemu-xen" or upstream qemu device models are
potentially vulnerable.

ARM systems are NOT vulnerable.

MITIGATION
==========

Avoiding the use of emulated network devices altogether, by specifying
a PV only VIF in the domain configuration file will avoid this
issue.

Avoiding the use of the PCNET device in favour of other emulations
will also avoid this issue.

Enabling stubdomains will mitigate this issue, by reducing the
escalation to only those privileges accorded to the service domain.

qemu-dm stubdomains are only available with the traditional "qemu-xen"
version.

CREDITS
=======

This issue was discovered by Matt Tait of Google and reported to us
via the QEMU security team.

RESOLUTION
==========

Applying the appropriate attached patch(es) resolves this issue.

xsa135-qemuu-unstable.patch  qemu-upstream, Xen unstable
xsa135-qemuu-4.5-*.patch     qemu-upstream, Xen 4.5.x, Xen 4.4.x
xsa135-qemuu-4.3-*.patch     qemu-upstream, Xen 4.3.x
xsa135-qemuu-4.2-*.patch     qemu-upstream, Xen 4.2.x
xsa135-qemut-*.patch         qemu-xen-traditional, Xen unstable, 4.5.x, 4.4.x, 4.3.x, 4.2.x

Note that the second patch for qemu-xen-traditional (all versions),
and qemu-upstream 4.3.x and 4.2.x are identical. Likewise
xsa135-qemuu-unstable.patch is the same as
xsa135-qemuu-4.5-2.patch. They are presented separately for
convenience.

$ sha256sum xsa135*.patch
a40897166f5de84c11b5d547191cd0375c7052edb0f44940eec7b78d839e447b  xsa135-qemut-1.patch
d98452d4c42fae1f11e887537a4638694de8a4bf00835daac6e51801297e4091  xsa135-qemut-2.patch
099693483d468a7fdecbf825635d3595ebeecc91c496624cbe109dcb4dd235da  xsa135-qemuu-unstable.patch
12ca5521f6bb1227934a1711d8adee11138a84c080a217f250efe34b3cb25b10  xsa135-qemuu-4.2-1.patch
d98452d4c42fae1f11e887537a4638694de8a4bf00835daac6e51801297e4091  xsa135-qemuu-4.2-2.patch
ad32c0ac145bc02b901c061fcbef83965f443fe89fcae9efc3b1dfd1e1d70bc8  xsa135-qemuu-4.3-1.patch
d98452d4c42fae1f11e887537a4638694de8a4bf00835daac6e51801297e4091  xsa135-qemuu-4.3-2.patch
baf9e0a960693b246ff01bb6210c5fee7713999d1e1b00a5b4e29d9ebd3c0ce8  xsa135-qemuu-4.5-1.patch
099693483d468a7fdecbf825635d3595ebeecc91c496624cbe109dcb4dd235da  xsa135-qemuu-4.5-2.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of patches or mitigations is NOT permitted (except on
systems used and administered only by organisations which are members
of the Xen Project Security Issues Predisclosure List).  Specifically,
deployment on public cloud systems is NOT permitted.

The decision not to permit deployment was made by the group that, at
their discretion, disclosed the issue to the Xen Project Security
Team.

Deployment is permitted only AFTER the embargo ends.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVeDc3AAoJEIP+FMlX6CvZFBoIAJw/FxeABrdms6CzoxZxFQRp
It9eoMcmP+cxjMuAJyO771s+wYZy/X+ZDM2+CmzDWdBOzst3/YVw0ePbNH1T86y6
23Miqm5zupJ30xQGIXledrd/S23tmRlmzylytJcI9UQktuAOnL50l+wovKwhxVtO
x2Dg4P6RZ51twfbYLueIjBe2YSGGrck0kugpDtD6dH6kONNFgA+30i11Unwip18b
FzKm54b5HIvSoOkXCggCdgaCOmAuz3LpAt7FfB1324dPblxlfrDyRxWABxn47qoL
lgTJa7DPRTdxYM7EmnpMHKakgqzhD+Vu2Jnz8RELXt+AQH3TxRYXS2kT22QpfxY=
=cx83
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa135-qemut-1.patch"
Content-Disposition: attachment; filename="xsa135-qemut-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemut-2.patch"
Content-Disposition: attachment; filename="xsa135-qemut-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-unstable.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-unstable.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.2-1.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.2-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.2-2.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.2-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.3-1.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.3-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.3-2.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.3-2.patch"
Content-Transfer-Encoding: base64

RnJvbSAyNjMwNjcyYWIyMjI1NWRlMjUyZjg3NzcwOTg1MWMwNTU3YTFjNjQ3
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRyIE1hdG91c2Vr
IDxwbWF0b3VzZUByZWRoYXQuY29tPgpEYXRlOiBTdW4sIDI0IE1heSAyMDE1
IDEwOjUzOjQ0ICswMjAwClN1YmplY3Q6IFtQQVRDSF0gcGNuZXQ6IGZvcmNl
IHRoZSBidWZmZXIgYWNjZXNzIHRvIGJlIGluIGJvdW5kcyBkdXJpbmcgdHgK
CjQwOTYgaXMgdGhlIG1heGltdW0gbGVuZ3RoIHBlciBUTUQgYW5kIGl0IGlz
IGFsc28gY3VycmVudGx5IHRoZSBzaXplIG9mCnRoZSByZWxheSBidWZmZXIg
cGNuZXQgZHJpdmVyIHVzZXMgZm9yIHNlbmRpbmcgdGhlIHBhY2tldCBkYXRh
IHRvIFFFTVUKZm9yIGZ1cnRoZXIgcHJvY2Vzc2luZy4gV2l0aCBwYWNrZXQg
c3Bhbm5pbmcgbXVsdGlwbGUgVE1EcyBpdCBjYW4KaGFwcGVuIHRoYXQgdGhl
IG92ZXJhbGwgcGFja2V0IHNpemUgd2lsbCBiZSBiaWdnZXIgdGhhbiBzaXpl
b2YoYnVmZmVyKSwKd2hpY2ggcmVzdWx0cyBpbiBtZW1vcnkgY29ycnVwdGlv
bi4KCkZpeCB0aGlzIGJ5IG9ubHkgYWxsb3dpbmcgdG8gcXVldWUgbWF4aW11
bSBzaXplb2YoYnVmZmVyKSBieXRlcy4KClRoaXMgaXMgQ1ZFLTIwMTUtMzIw
OS4KClNpZ25lZC1vZmYtYnk6IFBldHIgTWF0b3VzZWsgPHBtYXRvdXNlQHJl
ZGhhdC5jb20+ClJlcG9ydGVkLWJ5OiBNYXR0IFRhaXQgPG1hdHR0YWl0QGdv
b2dsZS5jb20+ClJldmlld2VkLWJ5OiBQZXRlciBNYXlkZWxsIDxwZXRlci5t
YXlkZWxsQGxpbmFyby5vcmc+ClJldmlld2VkLWJ5OiBTdGVmYW4gSGFqbm9j
emkgPHN0ZWZhbmhhQHJlZGhhdC5jb20+Ci0tLQogaHcvcGNuZXQuYyB8IDgg
KysrKysrKysKIDEgZmlsZSBjaGFuZ2VkLCA4IGluc2VydGlvbnMoKykKCmRp
ZmYgLS1naXQgYS9ody9wY25ldC5jIGIvaHcvcGNuZXQuYwppbmRleCBiZGZk
MzhmLi42ZDMyZTRjIDEwMDY0NAotLS0gYS9ody9wY25ldC5jCisrKyBiL2h3
L3BjbmV0LmMKQEAgLTEyNDEsNiArMTI0MSwxNCBAQCBzdGF0aWMgdm9pZCBw
Y25ldF90cmFuc21pdChQQ05ldFN0YXRlICpzKQogICAgICAgICB9CgogICAg
ICAgICBiY250ID0gNDA5NiAtIEdFVF9GSUVMRCh0bWQubGVuZ3RoLCBUTURM
LCBCQ05UKTsKKworICAgICAgICAvKiBpZiBtdWx0aS10bWQgcGFja2V0IG91
dHNpemVzIHMtPmJ1ZmZlciB0aGVuIHNraXAgaXQgc2lsZW50bHkuCisgICAg
ICAgICAgIE5vdGU6IHRoaXMgaXMgbm90IHdoYXQgcmVhbCBodyBkb2VzICov
CisgICAgICAgIGlmIChzLT54bWl0X3BvcyArIGJjbnQgPiBzaXplb2Yocy0+
YnVmZmVyKSkgeworICAgICAgICAgICBzLT54bWl0X3BvcyA9IC0xOworICAg
ICAgICAgICBnb3RvIHR4ZG9uZTsKKyAgICAgICAgfQorCiAgICAgICAgIHMt
PnBoeXNfbWVtX3JlYWQocy0+ZG1hX29wYXF1ZSwgUEhZU0FERFIocywgdG1k
LnRiYWRyKSwKICAgICAgICAgICAgICAgICAgICAgICAgICBzLT5idWZmZXIg
KyBzLT54bWl0X3BvcywgYmNudCwgQ1NSX0JTV1AocykpOwogICAgICAgICBz
LT54bWl0X3BvcyArPSBiY250OwotLSAKMi4xLjAKCg==

--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.5-1.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.5-1.patch"
Content-Transfer-Encoding: base64

cGNuZXQ6IGZpeCBOZWdhdGl2ZSBhcnJheSBpbmRleCByZWFkCiAgICAKRnJv
bTogR29uZ2xlaSA8YXJlaS5nb25nbGVpQGh1YXdlaS5jb20+CgpzLT54bWl0
X3BvcyBtYXliZSBhc3NpZ25lZCB0byBhIG5lZ2F0aXZlIHZhbHVlICgtMSks
CmJ1dCBpbiB0aGlzIGJyYW5jaCB2YXJpYWJsZSBzLT54bWl0X3BvcyBhcyBh
biBpbmRleCB0bwphcnJheSBzLT5idWZmZXIuIExldCdzIGFkZCBhIGNoZWNr
IGZvciBzLT54bWl0X3Bvcy4KICAgIAp1cHN0cmVhbS1jb21taXQtaWQ6IDdi
NTBkMDA5MTFkZGQ2ZDU2YTc2NmFjNTY3MWU0NzMwNGMyMGEyMWIKClNpZ25l
ZC1vZmYtYnk6IEdvbmdsZWkgPGFyZWkuZ29uZ2xlaUBodWF3ZWkuY29tPgpT
aWduZWQtb2ZmLWJ5OiBQYW9sbyBCb256aW5pIDxwYm9uemluaUByZWRoYXQu
Y29tPgpSZXZpZXdlZC1ieTogSmFzb24gV2FuZyA8amFzb3dhbmdAcmVkaGF0
LmNvbT4KUmV2aWV3ZWQtYnk6IEphc29uIFdhbmcgPGphc293YW5nQHJlZGhh
dC5jb20+ClNpZ25lZC1vZmYtYnk6IFN0ZWZhbiBIYWpub2N6aSA8c3RlZmFu
aGFAcmVkaGF0LmNvbT4KCmRpZmYgLS1naXQgYS9ody9uZXQvcGNuZXQuYyBi
L2h3L25ldC9wY25ldC5jCmluZGV4IGQzNDRjMTUuLmY0MDliOTIgMTAwNjQ0
Ci0tLSBhL2h3L25ldC9wY25ldC5jCisrKyBiL2h3L25ldC9wY25ldC5jCkBA
IC0xMjEyLDcgKzEyMTIsNyBAQCBzdGF0aWMgdm9pZCBwY25ldF90cmFuc21p
dChQQ05ldFN0YXRlICpzKQogICAgIGh3YWRkciB4bWl0X2N4ZGEgPSAwOwog
ICAgIGludCBjb3VudCA9IENTUl9YTVRSTChzKS0xOwogICAgIGludCBhZGRf
Y3JjID0gMDsKLQorICAgIGludCBiY250OwogICAgIHMtPnhtaXRfcG9zID0g
LTE7CiAKICAgICBpZiAoIUNTUl9UWE9OKHMpKSB7CkBAIC0xMjQ3LDM1ICsx
MjQ3LDQwIEBAIHN0YXRpYyB2b2lkIHBjbmV0X3RyYW5zbWl0KFBDTmV0U3Rh
dGUgKnMpCiAgICAgICAgICAgICBzLT54bWl0X3BvcyA9IC0xOwogICAgICAg
ICAgICAgZ290byB0eGRvbmU7CiAgICAgICAgIH0KKworICAgICAgICBpZiAo
cy0+eG1pdF9wb3MgPCAwKSB7CisgICAgICAgICAgICBnb3RvIHR4ZG9uZTsK
KyAgICAgICAgfQorCisgICAgICAgIGJjbnQgPSA0MDk2IC0gR0VUX0ZJRUxE
KHRtZC5sZW5ndGgsIFRNREwsIEJDTlQpOworICAgICAgICBzLT5waHlzX21l
bV9yZWFkKHMtPmRtYV9vcGFxdWUsIFBIWVNBRERSKHMsIHRtZC50YmFkciks
CisgICAgICAgICAgICAgICAgICAgICAgICAgcy0+YnVmZmVyICsgcy0+eG1p
dF9wb3MsIGJjbnQsIENTUl9CU1dQKHMpKTsKKyAgICAgICAgcy0+eG1pdF9w
b3MgKz0gYmNudDsKKyAgICAgICAgCiAgICAgICAgIGlmICghR0VUX0ZJRUxE
KHRtZC5zdGF0dXMsIFRNRFMsIEVOUCkpIHsKLSAgICAgICAgICAgIGludCBi
Y250ID0gNDA5NiAtIEdFVF9GSUVMRCh0bWQubGVuZ3RoLCBUTURMLCBCQ05U
KTsKLSAgICAgICAgICAgIHMtPnBoeXNfbWVtX3JlYWQocy0+ZG1hX29wYXF1
ZSwgUEhZU0FERFIocywgdG1kLnRiYWRyKSwKLSAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgcy0+YnVmZmVyICsgcy0+eG1pdF9wb3MsIGJjbnQsIENT
Ul9CU1dQKHMpKTsKLSAgICAgICAgICAgIHMtPnhtaXRfcG9zICs9IGJjbnQ7
Ci0gICAgICAgIH0gZWxzZSBpZiAocy0+eG1pdF9wb3MgPj0gMCkgewotICAg
ICAgICAgICAgaW50IGJjbnQgPSA0MDk2IC0gR0VUX0ZJRUxEKHRtZC5sZW5n
dGgsIFRNREwsIEJDTlQpOwotICAgICAgICAgICAgcy0+cGh5c19tZW1fcmVh
ZChzLT5kbWFfb3BhcXVlLCBQSFlTQUREUihzLCB0bWQudGJhZHIpLAotICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICBzLT5idWZmZXIgKyBzLT54bWl0
X3BvcywgYmNudCwgQ1NSX0JTV1AocykpOwotICAgICAgICAgICAgcy0+eG1p
dF9wb3MgKz0gYmNudDsKKyAgICAgICAgICAgIGdvdG8gdHhkb25lOworICAg
ICAgICB9CisKICNpZmRlZiBQQ05FVF9ERUJVRwotICAgICAgICAgICAgcHJp
bnRmKCJwY25ldF90cmFuc21pdCBzaXplPSVkXG4iLCBzLT54bWl0X3Bvcyk7
CisgICAgICAgIHByaW50ZigicGNuZXRfdHJhbnNtaXQgc2l6ZT0lZFxuIiwg
cy0+eG1pdF9wb3MpOwogI2VuZGlmCi0gICAgICAgICAgICBpZiAoQ1NSX0xP
T1AocykpIHsKLSAgICAgICAgICAgICAgICBpZiAoQkNSX1NXU1RZTEUocykg
PT0gMSkKLSAgICAgICAgICAgICAgICAgICAgYWRkX2NyYyA9ICFHRVRfRklF
TEQodG1kLnN0YXR1cywgVE1EUywgTk9GQ1MpOwotICAgICAgICAgICAgICAg
IHMtPmxvb3B0ZXN0ID0gYWRkX2NyYyA/IFBDTkVUX0xPT1BURVNUX0NSQyA6
IFBDTkVUX0xPT1BURVNUX05PQ1JDOwotICAgICAgICAgICAgICAgIHBjbmV0
X3JlY2VpdmUocWVtdV9nZXRfcXVldWUocy0+bmljKSwgcy0+YnVmZmVyLCBz
LT54bWl0X3Bvcyk7Ci0gICAgICAgICAgICAgICAgcy0+bG9vcHRlc3QgPSAw
OwotICAgICAgICAgICAgfSBlbHNlCi0gICAgICAgICAgICAgICAgaWYgKHMt
Pm5pYykKLSAgICAgICAgICAgICAgICAgICAgcWVtdV9zZW5kX3BhY2tldChx
ZW11X2dldF9xdWV1ZShzLT5uaWMpLCBzLT5idWZmZXIsCi0gICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgcy0+eG1pdF9wb3MpOwotCi0g
ICAgICAgICAgICBzLT5jc3JbMF0gJj0gfjB4MDAwODsgICAvKiBjbGVhciBU
RE1EICovCi0gICAgICAgICAgICBzLT5jc3JbNF0gfD0gMHgwMDA0OyAgICAv
KiBzZXQgVFhTVFJUICovCi0gICAgICAgICAgICBzLT54bWl0X3BvcyA9IC0x
OworICAgICAgICBpZiAoQ1NSX0xPT1AocykpIHsKKyAgICAgICAgICAgIGlm
IChCQ1JfU1dTVFlMRShzKSA9PSAxKQorICAgICAgICAgICAgICAgIGFkZF9j
cmMgPSAhR0VUX0ZJRUxEKHRtZC5zdGF0dXMsIFRNRFMsIE5PRkNTKTsKKyAg
ICAgICAgICAgIHMtPmxvb3B0ZXN0ID0gYWRkX2NyYyA/IFBDTkVUX0xPT1BU
RVNUX0NSQyA6IFBDTkVUX0xPT1BURVNUX05PQ1JDOworICAgICAgICAgICAg
cGNuZXRfcmVjZWl2ZShxZW11X2dldF9xdWV1ZShzLT5uaWMpLCBzLT5idWZm
ZXIsIHMtPnhtaXRfcG9zKTsKKyAgICAgICAgICAgIHMtPmxvb3B0ZXN0ID0g
MDsKKyAgICAgICAgfSBlbHNlIHsKKyAgICAgICAgICAgIGlmIChzLT5uaWMp
IHsKKyAgICAgICAgICAgICAgICBxZW11X3NlbmRfcGFja2V0KHFlbXVfZ2V0
X3F1ZXVlKHMtPm5pYyksIHMtPmJ1ZmZlciwKKyAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgIHMtPnhtaXRfcG9zKTsKKyAgICAgICAgICAgIH0K
ICAgICAgICAgfQogCisgICAgICAgIHMtPmNzclswXSAmPSB+MHgwMDA4OyAg
IC8qIGNsZWFyIFRETUQgKi8KKyAgICAgICAgcy0+Y3NyWzRdIHw9IDB4MDAw
NDsgICAgLyogc2V0IFRYU1RSVCAqLworICAgICAgICBzLT54bWl0X3BvcyA9
IC0xOworCiAgICAgdHhkb25lOgogICAgICAgICBTRVRfRklFTEQoJnRtZC5z
dGF0dXMsIFRNRFMsIE9XTiwgMCk7CiAgICAgICAgIFRNRFNUT1JFKCZ0bWQs
IFBIWVNBRERSKHMsQ1NSX0NYREEocykpKTsK

--=separator
Content-Type: application/octet-stream; name="xsa135-qemuu-4.5-2.patch"
Content-Disposition: attachment; filename="xsa135-qemuu-4.5-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Wed Jun 10 19:45:39 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 19:45:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2lvV-000834-Bj; Wed, 10 Jun 2015 19:44:41 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <marcotte@panix.com>) id 1Z2izw-0004vE-MM
	for xen-users@lists.xen.org; Wed, 10 Jun 2015 16:37:04 +0000
Received: from [85.158.139.211] by server-15.bemta-5.messagelabs.com id
	1E/90-25881-0B768755; Wed, 10 Jun 2015 16:37:04 +0000
X-Env-Sender: marcotte@panix.com
X-Msg-Ref: server-12.tower-206.messagelabs.com!1433954222!13284267!1
X-Originating-IP: [166.84.1.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTY2Ljg0LjEuODkgPT4gMjc1MzI=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27303 invoked from network); 10 Jun 2015 16:37:03 -0000
Received: from mailbackend.panix.com (HELO mailbackend.panix.com) (166.84.1.89)
	by server-12.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 10 Jun 2015 16:37:03 -0000
Received: from panix5.panix.com (panix5.panix.com [166.84.1.5])
	by mailbackend.panix.com (Postfix) with ESMTP id B784113D91
	for <xen-users@lists.xen.org>; Wed, 10 Jun 2015 12:37:01 -0400 (EDT)
Received: by panix5.panix.com (Postfix, from userid 13564)
	id E52022432C; Wed, 10 Jun 2015 12:37:01 -0400 (EDT)
Date: Wed, 10 Jun 2015 12:37:01 -0400
To: xen-users@lists.xen.org
User-Agent: nail 11.25 7/29/05
MIME-Version: 1.0
Message-Id: <20150610163701.E52022432C@panix5.panix.com>
From: marcotte@panix.com (Brian Marcotte)
X-Mailman-Approved-At: Wed, 10 Jun 2015 19:44:40 +0000
Cc: marcotte@panix.com
Subject: [Xen-users] SCO OpenServer: i8254.c:PIT: read A1:A0=3!
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

We recently installed an old installation of SCO OpenServer in a Xen HVM.
When running, Xen constantly write this to the console:

    (XEN) i8254.c:494:d17 PIT: read A1:A0=3!
    (XEN) printk: 551 messages suppressed.

These appear every five seconds, so the condition it is complaining about
happen over 100 times per second.

SCO appears to be running okay, but the machine it's running on rebooted
spontaneously, though I don't know if the SCO guest had anything to do
with that.

Is this something to worry about?

Thanks.

--
- Brian

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 10 19:45:39 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 19:45:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2lvV-000834-Bj; Wed, 10 Jun 2015 19:44:41 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <marcotte@panix.com>) id 1Z2izw-0004vE-MM
	for xen-users@lists.xen.org; Wed, 10 Jun 2015 16:37:04 +0000
Received: from [85.158.139.211] by server-15.bemta-5.messagelabs.com id
	1E/90-25881-0B768755; Wed, 10 Jun 2015 16:37:04 +0000
X-Env-Sender: marcotte@panix.com
X-Msg-Ref: server-12.tower-206.messagelabs.com!1433954222!13284267!1
X-Originating-IP: [166.84.1.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTY2Ljg0LjEuODkgPT4gMjc1MzI=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27303 invoked from network); 10 Jun 2015 16:37:03 -0000
Received: from mailbackend.panix.com (HELO mailbackend.panix.com) (166.84.1.89)
	by server-12.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 10 Jun 2015 16:37:03 -0000
Received: from panix5.panix.com (panix5.panix.com [166.84.1.5])
	by mailbackend.panix.com (Postfix) with ESMTP id B784113D91
	for <xen-users@lists.xen.org>; Wed, 10 Jun 2015 12:37:01 -0400 (EDT)
Received: by panix5.panix.com (Postfix, from userid 13564)
	id E52022432C; Wed, 10 Jun 2015 12:37:01 -0400 (EDT)
Date: Wed, 10 Jun 2015 12:37:01 -0400
To: xen-users@lists.xen.org
User-Agent: nail 11.25 7/29/05
MIME-Version: 1.0
Message-Id: <20150610163701.E52022432C@panix5.panix.com>
From: marcotte@panix.com (Brian Marcotte)
X-Mailman-Approved-At: Wed, 10 Jun 2015 19:44:40 +0000
Cc: marcotte@panix.com
Subject: [Xen-users] SCO OpenServer: i8254.c:PIT: read A1:A0=3!
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

We recently installed an old installation of SCO OpenServer in a Xen HVM.
When running, Xen constantly write this to the console:

    (XEN) i8254.c:494:d17 PIT: read A1:A0=3!
    (XEN) printk: 551 messages suppressed.

These appear every five seconds, so the condition it is complaining about
happen over 100 times per second.

SCO appears to be running okay, but the machine it's running on rebooted
spontaneously, though I don't know if the SCO guest had anything to do
with that.

Is this something to worry about?

Thanks.

--
- Brian

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 10 22:59:16 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 22:59:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2owh-0003uH-AX; Wed, 10 Jun 2015 22:58:07 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <bimingery@gmail.com>) id 1Z2owf-0003uC-TS
	for xen-users@lists.xen.org; Wed, 10 Jun 2015 22:58:06 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	8F/26-08244-DF0C8755; Wed, 10 Jun 2015 22:58:05 +0000
X-Env-Sender: bimingery@gmail.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1433977083!9983498!1
X-Originating-IP: [209.85.218.65]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32526 invoked from network); 10 Jun 2015 22:58:04 -0000
Received: from mail-oi0-f65.google.com (HELO mail-oi0-f65.google.com)
	(209.85.218.65)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	10 Jun 2015 22:58:04 -0000
Received: by oiav1 with SMTP id v1so1327071oia.3
	for <xen-users@lists.xen.org>; Wed, 10 Jun 2015 15:58:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=JpPpO8Ol1clsHc+cX5RC9Nmqm34lRZmEGheWHv10oCQ=;
	b=Sm2n5CYCsaSzpdPiPDaETpPV3oKbzMHjn0PSOWpyHRTnX89b4/0RGfKUnxkuSq8YXE
	LSp34i+SRwiMLg1pZIp/GiIAQpaGvjQ91vJQugWAhBN2CwEic5bJX0ECDcTRdb9IwpOJ
	i2HPf81TCZN95QjVb44OJgGQ8+JpL52AvxkUaxIYHJI4+sFUu5rdEXdlMT8vqTRDAfLN
	uAdj6Lj5uJPzX6ZmZOYWmHqLtR9nUIMaT0MgHhzuUo+dJ4Lt71B4l0mE6lMcKNh2LdaV
	2q/xgzESsmGHOn4RUz3FJBYumuI0tprmguB07A9/3a1GJzeqEf7cYY4e8ll1wNMzGckS
	jI+Q==
MIME-Version: 1.0
X-Received: by 10.60.74.101 with SMTP id s5mr4839593oev.42.1433977083417; Wed,
	10 Jun 2015 15:58:03 -0700 (PDT)
Received: by 10.60.48.72 with HTTP; Wed, 10 Jun 2015 15:58:03 -0700 (PDT)
Date: Wed, 10 Jun 2015 16:58:03 -0600
Message-ID: <CAL3hBVprAwQ+UZ4ZLEg26BW_Yj+C-EZ8y8u9CNiGF6w8+nZnbA@mail.gmail.com>
From: Yun Wang <bimingery@gmail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] Qemu disk mode
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8545137100642102594=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============8545137100642102594==
Content-Type: multipart/alternative; boundary=001a1135fbdeac59a3051831cea6

--001a1135fbdeac59a3051831cea6
Content-Type: text/plain; charset=UTF-8

Is the Qemu used by Xen 4.5 using the "threads" or "native AIO" mode for
qdisk?
Is there a way to configure qemu in Xen to use a different mode?

Thanks in advance!

--001a1135fbdeac59a3051831cea6
Content-Type: text/html; charset=UTF-8

<div dir="ltr">Is the Qemu used by Xen 4.5 using the &quot;threads&quot; or &quot;native AIO&quot; mode for qdisk?<div>Is there a way to configure qemu in Xen to use a different mode?</div><div><br></div><div>Thanks in advance!</div></div>

--001a1135fbdeac59a3051831cea6--


--===============8545137100642102594==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8545137100642102594==--


From xen-users-bounces@lists.xen.org Wed Jun 10 22:59:16 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2015 22:59:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2owh-0003uH-AX; Wed, 10 Jun 2015 22:58:07 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <bimingery@gmail.com>) id 1Z2owf-0003uC-TS
	for xen-users@lists.xen.org; Wed, 10 Jun 2015 22:58:06 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	8F/26-08244-DF0C8755; Wed, 10 Jun 2015 22:58:05 +0000
X-Env-Sender: bimingery@gmail.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1433977083!9983498!1
X-Originating-IP: [209.85.218.65]
X-SpamReason: No, hits=0.4 required=7.0 tests=HTML_30_40,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32526 invoked from network); 10 Jun 2015 22:58:04 -0000
Received: from mail-oi0-f65.google.com (HELO mail-oi0-f65.google.com)
	(209.85.218.65)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	10 Jun 2015 22:58:04 -0000
Received: by oiav1 with SMTP id v1so1327071oia.3
	for <xen-users@lists.xen.org>; Wed, 10 Jun 2015 15:58:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=JpPpO8Ol1clsHc+cX5RC9Nmqm34lRZmEGheWHv10oCQ=;
	b=Sm2n5CYCsaSzpdPiPDaETpPV3oKbzMHjn0PSOWpyHRTnX89b4/0RGfKUnxkuSq8YXE
	LSp34i+SRwiMLg1pZIp/GiIAQpaGvjQ91vJQugWAhBN2CwEic5bJX0ECDcTRdb9IwpOJ
	i2HPf81TCZN95QjVb44OJgGQ8+JpL52AvxkUaxIYHJI4+sFUu5rdEXdlMT8vqTRDAfLN
	uAdj6Lj5uJPzX6ZmZOYWmHqLtR9nUIMaT0MgHhzuUo+dJ4Lt71B4l0mE6lMcKNh2LdaV
	2q/xgzESsmGHOn4RUz3FJBYumuI0tprmguB07A9/3a1GJzeqEf7cYY4e8ll1wNMzGckS
	jI+Q==
MIME-Version: 1.0
X-Received: by 10.60.74.101 with SMTP id s5mr4839593oev.42.1433977083417; Wed,
	10 Jun 2015 15:58:03 -0700 (PDT)
Received: by 10.60.48.72 with HTTP; Wed, 10 Jun 2015 15:58:03 -0700 (PDT)
Date: Wed, 10 Jun 2015 16:58:03 -0600
Message-ID: <CAL3hBVprAwQ+UZ4ZLEg26BW_Yj+C-EZ8y8u9CNiGF6w8+nZnbA@mail.gmail.com>
From: Yun Wang <bimingery@gmail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] Qemu disk mode
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8545137100642102594=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============8545137100642102594==
Content-Type: multipart/alternative; boundary=001a1135fbdeac59a3051831cea6

--001a1135fbdeac59a3051831cea6
Content-Type: text/plain; charset=UTF-8

Is the Qemu used by Xen 4.5 using the "threads" or "native AIO" mode for
qdisk?
Is there a way to configure qemu in Xen to use a different mode?

Thanks in advance!

--001a1135fbdeac59a3051831cea6
Content-Type: text/html; charset=UTF-8

<div dir="ltr">Is the Qemu used by Xen 4.5 using the &quot;threads&quot; or &quot;native AIO&quot; mode for qdisk?<div>Is there a way to configure qemu in Xen to use a different mode?</div><div><br></div><div>Thanks in advance!</div></div>

--001a1135fbdeac59a3051831cea6--


--===============8545137100642102594==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8545137100642102594==--


From xen-users-bounces@lists.xen.org Thu Jun 11 03:39:59 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 03:39:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2tKG-0001E1-NB; Thu, 11 Jun 2015 03:38:44 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <blackstn10@gmail.com>)
	id 1Z2tKE-0001Dk-SB; Thu, 11 Jun 2015 03:38:42 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	BC/02-16813-2C209755; Thu, 11 Jun 2015 03:38:42 +0000
X-Env-Sender: blackstn10@gmail.com
X-Msg-Ref: server-10.tower-27.messagelabs.com!1433993920!22208606!1
X-Originating-IP: [209.85.192.195]
X-SpamReason: No, hits=2.1 required=7.0 tests=HTML_60_70,
	HTML_FONT_LOW_CONTRAST, HTML_MESSAGE, MIME_BASE64_TEXT,
	MIME_BOUND_NEXTPART
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31998 invoked from network); 11 Jun 2015 03:38:41 -0000
Received: from mail-pd0-f195.google.com (HELO mail-pd0-f195.google.com)
	(209.85.192.195)
	by server-10.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	11 Jun 2015 03:38:41 -0000
Received: by pdev10 with SMTP id v10so12589418pde.0;
	Wed, 10 Jun 2015 20:38:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=date:from:to:cc:subject:mime-version:message-id:content-type;
	bh=rxD8N5IJsLX913Dynt34oOU9qHnrfrP/jL6gA01y1gQ=;
	b=Cz1ZROz9EIpcJnwmObPALm7dYQTDp7WpzVj4u+O5AlguwymQzYabaU1l+gXzHxOTUV
	5Fh452jniSTv6g0VJr4ir9J8YK+F4MhFGnymXx/ZUDBBnADBZP4CBnBx0qrWYo6KD+AD
	vfxvNHvtBGmR/8jODdIBlBjPE6ygo/X8hVtEgnTb1fKut0wf1ci5uBhurczIngUONZAs
	9YB4GTTLNiOPkKg4+6sp+727a3UFNme3uNo14JitrEIZWynPhByhMrou1G7RI0kSoxhK
	Fo24tkSL7LkjP6+Tz/mOeCxZQl5QeX/yAQT65izfD9VLZhEaeBHsNK8Qok1sOOe/JtWt
	/mmQ==
X-Received: by 10.70.91.206 with SMTP id cg14mr11310290pdb.158.1433993919518; 
	Wed, 10 Jun 2015 20:38:39 -0700 (PDT)
Received: from yunshan-ray ([124.205.174.146])
	by mx.google.com with ESMTPSA id z12sm9894658pbt.29.2015.06.10.20.38.36
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Wed, 10 Jun 2015 20:38:38 -0700 (PDT)
Date: Thu, 11 Jun 2015 11:38:36 +0800
From: "Ray Shi" <blackstn10@gmail.com>
To: xen-users <xen-users@lists.xen.org>
X-Priority: 3
X-Has-Attach: no
X-Mailer: Foxmail 7, 2, 5, 136[cn]
Mime-Version: 1.0
Message-ID: <2015061111383366312016@gmail.com>
Cc: xen-api <xen-api@lists.xen.org>
Subject: [Xen-users] Dose noVNC break qemu-dm in XenServer6.2?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3097429621611941239=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multi-part message in MIME format.

--===============3097429621611941239==
Content-Type: multipart/alternative;
	boundary="----=_001_NextPart438688403837_=----"

This is a multi-part message in MIME format.

------=_001_NextPart438688403837_=----
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: base64

SGVsbG8gRXhwZXJ0cywNCkJlZm9yZSBJIHBhdGNoIFhTNjJFU1AxMDE5LnhzdXBkYXRlLCBJIGNh
biB2aXNpdCB3aW5kb3dzMjAwOCB0aHJvdWdoIG5vVk5DIGFuZCBsb2dvZmYgaXMgb2sgZXZlcnkg
dGltZSwgaG93ZXZlciwgYWZ0ZXIgSSBwYXRjaCBpdCBhbmQgbG9nIG9mZiB0aGUgd2luZG93cyBh
dCB0aGUgc2Vjb25kIHRpbWUsIEkgY2FuJ3QgdmlzaXQgaXQgdGhyb3VnaCBub1ZOQyBhbnkgbW9y
ZSBhbHNvIGluY2x1ZGluZyBYZW5DZW50ZXIgYmVjYXVzZSB0aGUgbm9WTkMgYnJva2UgdGhlIHFl
bXUtZG0gcHJvY2Vzcy4NCkRvIHlvdSBldmVyIG1lZXQgdGhlIGlzc3VlPyBBbnkgc29sdXRpb24/
DQpUaGFua3MNCg0KDQpSYXkgU2hpDQo=

------=_001_NextPart438688403837_=----
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charse=
t=3Dus-ascii"><style>body { line-height: 1.5; }body { font-size: 10.5pt; f=
ont-family: ????; color: rgb(0, 0, 0); line-height: 1.5; }</style></head><=
body>=0A<div><span></span>Hello Experts,</div><div>Before I patch&nbsp;<sp=
an style=3D"font-size: 10.5pt; line-height: 1.5; background-color: window;=
">XS62ESP1019.xsupdate</span><span style=3D"font-size: 10.5pt; line-height=
: 1.5; background-color: window;">, I can visit windows2008 through noVNC =
and logoff is ok every time, however, after</span><span style=3D"font-size=
: 10.5pt; line-height: 1.5; background-color: window;">&nbsp;I patch it an=
d log off the windows at the second time, I can't visit it through noVNC a=
ny more also including XenCenter because the noVNC broke the qemu-dm proce=
ss.</span></div><div><span style=3D"font-size: 10.5pt; line-height: 1.5; b=
ackground-color: window;">Do you ever meet the issue? Any solution?</span>=
</div>=0A<div>Thanks</div><hr style=3D"width: 210px; height: 1px;" color=
=3D"#b5c4df" size=3D"1" align=3D"left">=0A<div><span>Ray Shi</span></div>=
=0A</body></html>
------=_001_NextPart438688403837_=------



--===============3097429621611941239==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3097429621611941239==--



From xen-users-bounces@lists.xen.org Thu Jun 11 03:39:59 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 03:39:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2tKG-0001E1-NB; Thu, 11 Jun 2015 03:38:44 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <blackstn10@gmail.com>)
	id 1Z2tKE-0001Dk-SB; Thu, 11 Jun 2015 03:38:42 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	BC/02-16813-2C209755; Thu, 11 Jun 2015 03:38:42 +0000
X-Env-Sender: blackstn10@gmail.com
X-Msg-Ref: server-10.tower-27.messagelabs.com!1433993920!22208606!1
X-Originating-IP: [209.85.192.195]
X-SpamReason: No, hits=2.1 required=7.0 tests=HTML_60_70,
	HTML_FONT_LOW_CONTRAST, HTML_MESSAGE, MIME_BASE64_TEXT,
	MIME_BOUND_NEXTPART
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31998 invoked from network); 11 Jun 2015 03:38:41 -0000
Received: from mail-pd0-f195.google.com (HELO mail-pd0-f195.google.com)
	(209.85.192.195)
	by server-10.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	11 Jun 2015 03:38:41 -0000
Received: by pdev10 with SMTP id v10so12589418pde.0;
	Wed, 10 Jun 2015 20:38:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=date:from:to:cc:subject:mime-version:message-id:content-type;
	bh=rxD8N5IJsLX913Dynt34oOU9qHnrfrP/jL6gA01y1gQ=;
	b=Cz1ZROz9EIpcJnwmObPALm7dYQTDp7WpzVj4u+O5AlguwymQzYabaU1l+gXzHxOTUV
	5Fh452jniSTv6g0VJr4ir9J8YK+F4MhFGnymXx/ZUDBBnADBZP4CBnBx0qrWYo6KD+AD
	vfxvNHvtBGmR/8jODdIBlBjPE6ygo/X8hVtEgnTb1fKut0wf1ci5uBhurczIngUONZAs
	9YB4GTTLNiOPkKg4+6sp+727a3UFNme3uNo14JitrEIZWynPhByhMrou1G7RI0kSoxhK
	Fo24tkSL7LkjP6+Tz/mOeCxZQl5QeX/yAQT65izfD9VLZhEaeBHsNK8Qok1sOOe/JtWt
	/mmQ==
X-Received: by 10.70.91.206 with SMTP id cg14mr11310290pdb.158.1433993919518; 
	Wed, 10 Jun 2015 20:38:39 -0700 (PDT)
Received: from yunshan-ray ([124.205.174.146])
	by mx.google.com with ESMTPSA id z12sm9894658pbt.29.2015.06.10.20.38.36
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Wed, 10 Jun 2015 20:38:38 -0700 (PDT)
Date: Thu, 11 Jun 2015 11:38:36 +0800
From: "Ray Shi" <blackstn10@gmail.com>
To: xen-users <xen-users@lists.xen.org>
X-Priority: 3
X-Has-Attach: no
X-Mailer: Foxmail 7, 2, 5, 136[cn]
Mime-Version: 1.0
Message-ID: <2015061111383366312016@gmail.com>
Cc: xen-api <xen-api@lists.xen.org>
Subject: [Xen-users] Dose noVNC break qemu-dm in XenServer6.2?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3097429621611941239=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multi-part message in MIME format.

--===============3097429621611941239==
Content-Type: multipart/alternative;
	boundary="----=_001_NextPart438688403837_=----"

This is a multi-part message in MIME format.

------=_001_NextPart438688403837_=----
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: base64

SGVsbG8gRXhwZXJ0cywNCkJlZm9yZSBJIHBhdGNoIFhTNjJFU1AxMDE5LnhzdXBkYXRlLCBJIGNh
biB2aXNpdCB3aW5kb3dzMjAwOCB0aHJvdWdoIG5vVk5DIGFuZCBsb2dvZmYgaXMgb2sgZXZlcnkg
dGltZSwgaG93ZXZlciwgYWZ0ZXIgSSBwYXRjaCBpdCBhbmQgbG9nIG9mZiB0aGUgd2luZG93cyBh
dCB0aGUgc2Vjb25kIHRpbWUsIEkgY2FuJ3QgdmlzaXQgaXQgdGhyb3VnaCBub1ZOQyBhbnkgbW9y
ZSBhbHNvIGluY2x1ZGluZyBYZW5DZW50ZXIgYmVjYXVzZSB0aGUgbm9WTkMgYnJva2UgdGhlIHFl
bXUtZG0gcHJvY2Vzcy4NCkRvIHlvdSBldmVyIG1lZXQgdGhlIGlzc3VlPyBBbnkgc29sdXRpb24/
DQpUaGFua3MNCg0KDQpSYXkgU2hpDQo=

------=_001_NextPart438688403837_=----
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charse=
t=3Dus-ascii"><style>body { line-height: 1.5; }body { font-size: 10.5pt; f=
ont-family: ????; color: rgb(0, 0, 0); line-height: 1.5; }</style></head><=
body>=0A<div><span></span>Hello Experts,</div><div>Before I patch&nbsp;<sp=
an style=3D"font-size: 10.5pt; line-height: 1.5; background-color: window;=
">XS62ESP1019.xsupdate</span><span style=3D"font-size: 10.5pt; line-height=
: 1.5; background-color: window;">, I can visit windows2008 through noVNC =
and logoff is ok every time, however, after</span><span style=3D"font-size=
: 10.5pt; line-height: 1.5; background-color: window;">&nbsp;I patch it an=
d log off the windows at the second time, I can't visit it through noVNC a=
ny more also including XenCenter because the noVNC broke the qemu-dm proce=
ss.</span></div><div><span style=3D"font-size: 10.5pt; line-height: 1.5; b=
ackground-color: window;">Do you ever meet the issue? Any solution?</span>=
</div>=0A<div>Thanks</div><hr style=3D"width: 210px; height: 1px;" color=
=3D"#b5c4df" size=3D"1" align=3D"left">=0A<div><span>Ray Shi</span></div>=
=0A</body></html>
------=_001_NextPart438688403837_=------



--===============3097429621611941239==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3097429621611941239==--



From xen-users-bounces@lists.xen.org Thu Jun 11 08:48:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 08:48:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2y8k-0007oC-JG; Thu, 11 Jun 2015 08:47:10 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=59762537e=Ian.Campbell@citrix.com>)
	id 1Z2y8i-0007nZ-Td; Thu, 11 Jun 2015 08:47:09 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	15/D9-13047-C0B49755; Thu, 11 Jun 2015 08:47:08 +0000
X-Env-Sender: prvs=59762537e=Ian.Campbell@citrix.com
X-Msg-Ref: server-15.tower-27.messagelabs.com!1434012425!22349533!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 18991 invoked from network); 11 Jun 2015 08:47:07 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	11 Jun 2015 08:47:07 -0000
X-IronPort-AV: E=Sophos;i="5.13,594,1427760000"; d="scan'208";a="270957556"
Message-ID: <1434012423.30003.123.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Ray Shi <blackstn10@gmail.com>
Date: Thu, 11 Jun 2015 09:47:03 +0100
In-Reply-To: <2015061111383366312016@gmail.com>
References: <2015061111383366312016@gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>, xen-api <xen-api@lists.xen.org>
Subject: Re: [Xen-users] Dose noVNC break qemu-dm in XenServer6.2?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, 2015-06-11 at 11:38 +0800, Ray Shi wrote:
> Hello Experts,
> Before I patch XS62ESP1019.xsupdate,

This list deals with things released by xenproject.org while xenserver
is a separate project.

So please direct xenserver questions to the lists and/or forums at
www.xenserver.org (or your Support person if you have one).

Thanks,
Ian.




_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 11 08:48:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 08:48:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z2y8k-0007oC-JG; Thu, 11 Jun 2015 08:47:10 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=59762537e=Ian.Campbell@citrix.com>)
	id 1Z2y8i-0007nZ-Td; Thu, 11 Jun 2015 08:47:09 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	15/D9-13047-C0B49755; Thu, 11 Jun 2015 08:47:08 +0000
X-Env-Sender: prvs=59762537e=Ian.Campbell@citrix.com
X-Msg-Ref: server-15.tower-27.messagelabs.com!1434012425!22349533!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 18991 invoked from network); 11 Jun 2015 08:47:07 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	11 Jun 2015 08:47:07 -0000
X-IronPort-AV: E=Sophos;i="5.13,594,1427760000"; d="scan'208";a="270957556"
Message-ID: <1434012423.30003.123.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Ray Shi <blackstn10@gmail.com>
Date: Thu, 11 Jun 2015 09:47:03 +0100
In-Reply-To: <2015061111383366312016@gmail.com>
References: <2015061111383366312016@gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>, xen-api <xen-api@lists.xen.org>
Subject: Re: [Xen-users] Dose noVNC break qemu-dm in XenServer6.2?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, 2015-06-11 at 11:38 +0800, Ray Shi wrote:
> Hello Experts,
> Before I patch XS62ESP1019.xsupdate,

This list deals with things released by xenproject.org while xenserver
is a separate project.

So please direct xenserver questions to the lists and/or forums at
www.xenserver.org (or your Support person if you have one).

Thanks,
Ian.




_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 11 12:30:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 12:30:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z31c5-0000UX-RM; Thu, 11 Jun 2015 12:29:41 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31c2-0000U8-UD; Thu, 11 Jun 2015 12:29:39 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	AE/E7-13517-23F79755; Thu, 11 Jun 2015 12:29:38 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-5.tower-31.messagelabs.com!1434025776!15363612!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 17968 invoked from network); 11 Jun 2015 12:29:37 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-5.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	11 Jun 2015 12:29:37 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31bt-00080v-A6; Thu, 11 Jun 2015 12:29:29 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31bs-0002MZ-TR; Thu, 11 Jun 2015 12:29:29 +0000
Date: Thu, 11 Jun 2015 12:29:29 +0000
Message-Id: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 134 (CVE-2015-4163) -
 GNTTABOP_swap_grant_ref operation misbehavior
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4163 / XSA-134
                              version 3

             GNTTABOP_swap_grant_ref operation misbehavior

UPDATES IN VERSION 3
====================

Public release.

Added email header syntax to patches, for e.g. git-am.

ISSUE DESCRIPTION
=================

With the introduction of version 2 grant table operations, a version
check became necessary for most grant table related hypercalls.  The
GNTTABOP_swap_grant_ref call was lacking such a check.  As a result,
the subsequent code behaved as if version 2 was in use, when a guest
issued this hypercall without a prior GNTTABOP_setup_table or
GNTTABOP_set_version.

The effect is a possible NULL pointer dereferences.  However, this
cannot be exploited to elevate privileges of the attacking domain, as
the maximum memory address that can be wrongly accessed this way is
bounded to far below the start of hypervisor memory.

IMPACT
======

Malicious or buggy guest domain kernels can mount a denial of service
attack which, if successful, can affect the whole system.

VULNERABLE SYSTEMS
==================

Xen versions from 4.2 onwards are vulnerable.

MITIGATION
==========

There is no mitigation available.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa134.patch        xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa134*.patch
fff911a994a5031831cabd574bcba281eff438559706414a1886502eaa05ee12  xsa134.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVeX71AAoJEIP+FMlX6CvZ67gIALM9l5JdS8BN9b1/CsXSr246
kwuTcDX/dmvVeoMMU5tYag5H6HbpFaI4GX5rvTIVS1fqHRygyRCGJmgQQQf2EmOh
E6PKeCzfYoUh6t8YoV5RtYFcUA8qPG6AmXjQGU5tbrCgM7kGYcHU+dFHUu7VEoBH
7Rjzwkht/u64nFRJOU7zBLiCc0/yB1K0JystM1m5przdcTTfawl1bdknG3wGxAuk
+jSQk6+rBATZgRY3r2mjvUnXvSJfsV/UklRhJCRXT0jz4O+gdgP4AU33RtGx8Evc
64wIORu50Imvo5ZR4yCwElw/TnIJeyY3Nbq6vltMvWhhqxhyNhG+a+t2BrsD8Sc=
=sqdZ
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa134.patch"
Content-Disposition: attachment; filename="xsa134.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiBnbnR0YWI6IGFkZCBtaXNzaW5nIHZlcnNpb24gY2hlY2sgdG8gR05UVEFC
T1Bfc3dhcF9ncmFudF9yZWYgaGFuZGxpbmcKCi4uLiBhdm9pZGluZyBOVUxM
IGRlcmVmcyB3aGVuIHRoZSB2ZXJzaW9uIHRvIHVzZSB3YXNuJ3Qgc2V0IHll
dCAodmlhCkdOVFRBQk9QX3NldHVwX3RhYmxlIG9yIEdOVFRBQk9QX3NldF92
ZXJzaW9uKS4KClRoaXMgaXMgWFNBLTEzNC4KClNpZ25lZC1vZmYtYnk6IEph
biBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNvbT4KQWNrZWQtYnk6IElhbiBD
YW1wYmVsbCA8aWFuLmNhbXBiZWxsQGNpdHJpeC5jb20+CgotLS0gYS94ZW4v
Y29tbW9uL2dyYW50X3RhYmxlLmMKKysrIGIveGVuL2NvbW1vbi9ncmFudF90
YWJsZS5jCkBAIC0yNTkyLDYgKzI1OTIsOSBAQCBfX2dudHRhYl9zd2FwX2dy
YW50X3JlZihncmFudF9yZWZfdCByZWZfCiAKICAgICBzcGluX2xvY2soJmd0
LT5sb2NrKTsKIAorICAgIGlmICggZ3QtPmd0X3ZlcnNpb24gPT0gMCApCisg
ICAgICAgIFBJTl9GQUlMKG91dCwgR05UU1RfZ2VuZXJhbF9lcnJvciwgImdy
YW50IHRhYmxlIG5vdCB5ZXQgc2V0IHVwXG4iKTsKKwogICAgIC8qIEJvdW5k
cyBjaGVjayBvbiB0aGUgZ3JhbnQgcmVmcyAqLwogICAgIGlmICggdW5saWtl
bHkocmVmX2EgPj0gbnJfZ3JhbnRfZW50cmllcyhkLT5ncmFudF90YWJsZSkp
KQogICAgICAgICBQSU5fRkFJTChvdXQsIEdOVFNUX2JhZF9nbnRyZWYsICJC
YWQgcmVmLWEgKCVkKS5cbiIsIHJlZl9hKTsK

--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Thu Jun 11 12:30:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 12:30:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z31cp-0000eu-SR; Thu, 11 Jun 2015 12:30:27 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31cm-0000d8-Ee; Thu, 11 Jun 2015 12:30:24 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	CF/27-23832-F5F79755; Thu, 11 Jun 2015 12:30:23 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-8.tower-31.messagelabs.com!1434025821!15342133!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14877 invoked from network); 11 Jun 2015 12:30:22 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-8.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	11 Jun 2015 12:30:22 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31cd-00082K-HH; Thu, 11 Jun 2015 12:30:15 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31cd-0002ro-EG; Thu, 11 Jun 2015 12:30:15 +0000
Date: Thu, 11 Jun 2015 12:30:15 +0000
Message-Id: <E1Z31cd-0002ro-EG@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 136 (CVE-2015-4164) -
 vulnerability in the iret hypercall handler
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4164 / XSA-136
                              version 3

              vulnerability in the iret hypercall handler

UPDATES IN VERSION 3
====================

Public release.

Added email header syntax to patches, for e.g. git-am.

ISSUE DESCRIPTION
=================

A buggy loop in Xen's compat_iret() function iterates the wrong way
around a 32-bit index.  Any 32-bit PV guest kernel can trigger this
vulnerability by attempting a hypercall_iret with EFLAGS.VM set.

Given the use of __get/put_user(), and that the virtual addresses in
question are contained within the lower canonical half, the guest
cannot clobber any hypervisor data.  Instead, Xen will take up to 2^33
pagefaults, in sequence, effectively hanging the host.

IMPACT
======

Malicious guest administrators can cause a denial of service affecting
the whole system.

VULNERABLE SYSTEMS
==================

Only 64-bit x86 (ARCH=x86_64) builds of Xen are vulnerable.  32-bit
builds (ARCH=x86_32) (necessarily of Xen 4.2 or earlier), are not
affected.

Xen versions 3.1 or later are vulnerable.

ARM systems are not vulnerable.

Only 32-bit PV guests can exploit the vulnerability.

MITIGATION
==========

Systems which only need to run 32-bit guests and are running Xen 4.2
or earlier can avoid the vulnerability by using a 32-bit build of Xen
instead of a 64-bit build.  (The dom0 operating system would have to
be 32-bit too.)

If the boot process and kernel for the guest can be controlled,
forcing it to use a 64-bit kernel will avoid the vulnerability.

CREDITS
=======

This issue was discovered by Andrew Cooper of Citrix.

RESOLUTION
==========

Applying the attached patch resolves this issue.

$ sha256sum xsa136*.patch
b54a71cf41d333345a9b8fd5f3f1aa644000a24e20343b54e5a41cd51d14af04  xsa136.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVeX73AAoJEIP+FMlX6CvZwMsIAIkHonCdvStKAJZ6WpWFaAeo
dgEBdQ0tHCkuEu3PNBNy0YPklBdATwQNOjt+XZj6qDJv0HvBykZNoam0E9UCqH85
BYS0ASvjxUQrd61PrTWGmdh9XKMj2FJRGmpumr4XnNzcOalwOLuwUmfIauEIQaMy
0yxrgcoWk2C3oWIO54m/vObwdttNlbGInrBK1bDyrOtAX0UrHByLU7dPCe0TlE5l
IIa7QH/FcKLp7+RhxIEOQGBvuMSnw2bcXSqCIwleGo1RpnzcA/N1P+8FNs9rWmm/
toGYLeaQus8h9fEe51zGKOTQrf+WWuKhSjwkxSFr/HEH6xHEl+oCYvwlyB5CviM=
=yJg0
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa136.patch"
Content-Disposition: attachment; filename="xsa136.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L3RyYXBzOiBsb29wIGluIHRoZSBjb3JyZWN0IGRp
cmVjdGlvbiBpbiBjb21wYXRfaXJldCgpCgpUaGlzIGlzIFhTQS0xMzYuCgpT
aWduZWQtb2ZmLWJ5OiBBbmRyZXcgQ29vcGVyIDxhbmRyZXcuY29vcGVyM0Bj
aXRyaXguY29tPgpSZXZpZXdlZC1ieTogSmFuIEJldWxpY2ggPGpiZXVsaWNo
QHN1c2UuY29tPgoKLS0tIGEveGVuL2FyY2gveDg2L3g4Nl82NC9jb21wYXQv
dHJhcHMuYworKysgYi94ZW4vYXJjaC94ODYveDg2XzY0L2NvbXBhdC90cmFw
cy5jCkBAIC0xMTksNyArMTE5LDcgQEAgdW5zaWduZWQgaW50IGNvbXBhdF9p
cmV0KHZvaWQpCiAgICAgICAgIH0KICAgICAgICAgZWxzZSBpZiAoIGtzcCA+
IHJlZ3MtPl9lc3AgKQogICAgICAgICB7Ci0gICAgICAgICAgICBmb3IgKGkg
PSA5OyBpID4gMDsgKytpKQorICAgICAgICAgICAgZm9yICggaSA9IDk7IGkg
PiAwOyAtLWkgKQogICAgICAgICAgICAgewogICAgICAgICAgICAgICAgIHJj
IHw9IF9fZ2V0X3VzZXIoeCwgKHUzMiAqKXJlZ3MtPnJzcCArIGkpOwogICAg
ICAgICAgICAgICAgIHJjIHw9IF9fcHV0X3VzZXIoeCwgKHUzMiAqKSh1bnNp
Z25lZCBsb25nKWtzcCArIGkpOwo=

--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Thu Jun 11 12:30:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 12:30:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z31cp-0000eu-SR; Thu, 11 Jun 2015 12:30:27 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31cm-0000d8-Ee; Thu, 11 Jun 2015 12:30:24 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	CF/27-23832-F5F79755; Thu, 11 Jun 2015 12:30:23 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-8.tower-31.messagelabs.com!1434025821!15342133!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14877 invoked from network); 11 Jun 2015 12:30:22 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-8.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	11 Jun 2015 12:30:22 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31cd-00082K-HH; Thu, 11 Jun 2015 12:30:15 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31cd-0002ro-EG; Thu, 11 Jun 2015 12:30:15 +0000
Date: Thu, 11 Jun 2015 12:30:15 +0000
Message-Id: <E1Z31cd-0002ro-EG@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 136 (CVE-2015-4164) -
 vulnerability in the iret hypercall handler
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4164 / XSA-136
                              version 3

              vulnerability in the iret hypercall handler

UPDATES IN VERSION 3
====================

Public release.

Added email header syntax to patches, for e.g. git-am.

ISSUE DESCRIPTION
=================

A buggy loop in Xen's compat_iret() function iterates the wrong way
around a 32-bit index.  Any 32-bit PV guest kernel can trigger this
vulnerability by attempting a hypercall_iret with EFLAGS.VM set.

Given the use of __get/put_user(), and that the virtual addresses in
question are contained within the lower canonical half, the guest
cannot clobber any hypervisor data.  Instead, Xen will take up to 2^33
pagefaults, in sequence, effectively hanging the host.

IMPACT
======

Malicious guest administrators can cause a denial of service affecting
the whole system.

VULNERABLE SYSTEMS
==================

Only 64-bit x86 (ARCH=x86_64) builds of Xen are vulnerable.  32-bit
builds (ARCH=x86_32) (necessarily of Xen 4.2 or earlier), are not
affected.

Xen versions 3.1 or later are vulnerable.

ARM systems are not vulnerable.

Only 32-bit PV guests can exploit the vulnerability.

MITIGATION
==========

Systems which only need to run 32-bit guests and are running Xen 4.2
or earlier can avoid the vulnerability by using a 32-bit build of Xen
instead of a 64-bit build.  (The dom0 operating system would have to
be 32-bit too.)

If the boot process and kernel for the guest can be controlled,
forcing it to use a 64-bit kernel will avoid the vulnerability.

CREDITS
=======

This issue was discovered by Andrew Cooper of Citrix.

RESOLUTION
==========

Applying the attached patch resolves this issue.

$ sha256sum xsa136*.patch
b54a71cf41d333345a9b8fd5f3f1aa644000a24e20343b54e5a41cd51d14af04  xsa136.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVeX73AAoJEIP+FMlX6CvZwMsIAIkHonCdvStKAJZ6WpWFaAeo
dgEBdQ0tHCkuEu3PNBNy0YPklBdATwQNOjt+XZj6qDJv0HvBykZNoam0E9UCqH85
BYS0ASvjxUQrd61PrTWGmdh9XKMj2FJRGmpumr4XnNzcOalwOLuwUmfIauEIQaMy
0yxrgcoWk2C3oWIO54m/vObwdttNlbGInrBK1bDyrOtAX0UrHByLU7dPCe0TlE5l
IIa7QH/FcKLp7+RhxIEOQGBvuMSnw2bcXSqCIwleGo1RpnzcA/N1P+8FNs9rWmm/
toGYLeaQus8h9fEe51zGKOTQrf+WWuKhSjwkxSFr/HEH6xHEl+oCYvwlyB5CviM=
=yJg0
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa136.patch"
Content-Disposition: attachment; filename="xsa136.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Thu Jun 11 12:30:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2015 12:30:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z31c5-0000UX-RM; Thu, 11 Jun 2015 12:29:41 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31c2-0000U8-UD; Thu, 11 Jun 2015 12:29:39 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	AE/E7-13517-23F79755; Thu, 11 Jun 2015 12:29:38 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-5.tower-31.messagelabs.com!1434025776!15363612!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 17968 invoked from network); 11 Jun 2015 12:29:37 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-5.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	11 Jun 2015 12:29:37 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31bt-00080v-A6; Thu, 11 Jun 2015 12:29:29 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1Z31bs-0002MZ-TR; Thu, 11 Jun 2015 12:29:29 +0000
Date: Thu, 11 Jun 2015 12:29:29 +0000
Message-Id: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-users] Xen Security Advisory 134 (CVE-2015-4163) -
 GNTTABOP_swap_grant_ref operation misbehavior
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

            Xen Security Advisory CVE-2015-4163 / XSA-134
                              version 3

             GNTTABOP_swap_grant_ref operation misbehavior

UPDATES IN VERSION 3
====================

Public release.

Added email header syntax to patches, for e.g. git-am.

ISSUE DESCRIPTION
=================

With the introduction of version 2 grant table operations, a version
check became necessary for most grant table related hypercalls.  The
GNTTABOP_swap_grant_ref call was lacking such a check.  As a result,
the subsequent code behaved as if version 2 was in use, when a guest
issued this hypercall without a prior GNTTABOP_setup_table or
GNTTABOP_set_version.

The effect is a possible NULL pointer dereferences.  However, this
cannot be exploited to elevate privileges of the attacking domain, as
the maximum memory address that can be wrongly accessed this way is
bounded to far below the start of hypervisor memory.

IMPACT
======

Malicious or buggy guest domain kernels can mount a denial of service
attack which, if successful, can affect the whole system.

VULNERABLE SYSTEMS
==================

Xen versions from 4.2 onwards are vulnerable.

MITIGATION
==========

There is no mitigation available.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa134.patch        xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x

$ sha256sum xsa134*.patch
fff911a994a5031831cabd574bcba281eff438559706414a1886502eaa05ee12  xsa134.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJVeX71AAoJEIP+FMlX6CvZ67gIALM9l5JdS8BN9b1/CsXSr246
kwuTcDX/dmvVeoMMU5tYag5H6HbpFaI4GX5rvTIVS1fqHRygyRCGJmgQQQf2EmOh
E6PKeCzfYoUh6t8YoV5RtYFcUA8qPG6AmXjQGU5tbrCgM7kGYcHU+dFHUu7VEoBH
7Rjzwkht/u64nFRJOU7zBLiCc0/yB1K0JystM1m5przdcTTfawl1bdknG3wGxAuk
+jSQk6+rBATZgRY3r2mjvUnXvSJfsV/UklRhJCRXT0jz4O+gdgP4AU33RtGx8Evc
64wIORu50Imvo5ZR4yCwElw/TnIJeyY3Nbq6vltMvWhhqxhyNhG+a+t2BrsD8Sc=
=sqdZ
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa134.patch"
Content-Disposition: attachment; filename="xsa134.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=separator--


From xen-users-bounces@lists.xen.org Fri Jun 12 15:06:29 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 15:06:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3QWT-0007pw-IH; Fri, 12 Jun 2015 15:05:33 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z3QWS-0007pn-8Z
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 15:05:32 +0000
Received: from [85.158.137.68] by server-9.bemta-3.messagelabs.com id
	44/6C-17050-B35FA755; Fri, 12 Jun 2015 15:05:31 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434121529!15765066!1
X-Originating-IP: [64.12.143.79]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31726 invoked from network); 12 Jun 2015 15:05:30 -0000
Received: from omr-m05.mx.aol.com (HELO omr-m05.mx.aol.com) (64.12.143.79)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 12 Jun 2015 15:05:30 -0000
Received: from mtaout-mbb01.mx.aol.com (mtaout-mbb01.mx.aol.com
	[172.26.254.109])
	by omr-m05.mx.aol.com (Outbound Mail Relay) with ESMTP id 9392C70542177
	for <xen-users@lists.xen.org>; Fri, 12 Jun 2015 11:05:29 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-mbb01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id 9919338000090
	for <xen-users@lists.xen.org>; Fri, 12 Jun 2015 11:05:28 -0400 (EDT)
Message-ID: <1434121543.32728.9.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Fri, 12 Jun 2015 16:05:43 +0100
In-Reply-To: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434121529;
	bh=HluYtelopuEknwuFQZr1zS14Iz9X1TEOA9oZTs/ydaQ=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=iI6hrpXZXCd4V8ms+5fig1MT3G6JPdlj4GRktuA7ssq/xCBV3AXaZnb0lm5G1wxul
	eJFjHOzYJmGeC0L2LkColpzUoJNSOYpCGttKOhyYNAr0Z6U3Q+LSX2Sw+4FaEobndE
	ggtYbVfiYQGash1EQ9JS1Gpyx2a31SGBA//nt/40=
x-aol-sid: 3039ac1afe6d557af5383614
X-AOL-IP: 185.25.64.249
Subject: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi all,

I am having trouble in configuring the size/resolution of my VNC monitor
when enabling the 

vfb = [ 'type=vnc' ] 

The monitor/window resulting from the vncviewer command it's 800x600, I
have tried to pass to the kernel the parameter 

extra = "xen-fbfront.video=16,1024,768"

But they do not result in any change, I have verified those parameters
get to the kernel checking the /proc/cmdline leaf, interestingly when
configuring the vncserver manually on the guest I can get what I want.

Have you any idea about what could be wrong here ? Both DOMU and DOM0
are a Debian8 amd64.

Cheers,
Pietro


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 12 15:06:29 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 15:06:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3QWT-0007pw-IH; Fri, 12 Jun 2015 15:05:33 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z3QWS-0007pn-8Z
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 15:05:32 +0000
Received: from [85.158.137.68] by server-9.bemta-3.messagelabs.com id
	44/6C-17050-B35FA755; Fri, 12 Jun 2015 15:05:31 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434121529!15765066!1
X-Originating-IP: [64.12.143.79]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31726 invoked from network); 12 Jun 2015 15:05:30 -0000
Received: from omr-m05.mx.aol.com (HELO omr-m05.mx.aol.com) (64.12.143.79)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 12 Jun 2015 15:05:30 -0000
Received: from mtaout-mbb01.mx.aol.com (mtaout-mbb01.mx.aol.com
	[172.26.254.109])
	by omr-m05.mx.aol.com (Outbound Mail Relay) with ESMTP id 9392C70542177
	for <xen-users@lists.xen.org>; Fri, 12 Jun 2015 11:05:29 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-mbb01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id 9919338000090
	for <xen-users@lists.xen.org>; Fri, 12 Jun 2015 11:05:28 -0400 (EDT)
Message-ID: <1434121543.32728.9.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Fri, 12 Jun 2015 16:05:43 +0100
In-Reply-To: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434121529;
	bh=HluYtelopuEknwuFQZr1zS14Iz9X1TEOA9oZTs/ydaQ=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=iI6hrpXZXCd4V8ms+5fig1MT3G6JPdlj4GRktuA7ssq/xCBV3AXaZnb0lm5G1wxul
	eJFjHOzYJmGeC0L2LkColpzUoJNSOYpCGttKOhyYNAr0Z6U3Q+LSX2Sw+4FaEobndE
	ggtYbVfiYQGash1EQ9JS1Gpyx2a31SGBA//nt/40=
x-aol-sid: 3039ac1afe6d557af5383614
X-AOL-IP: 185.25.64.249
Subject: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi all,

I am having trouble in configuring the size/resolution of my VNC monitor
when enabling the 

vfb = [ 'type=vnc' ] 

The monitor/window resulting from the vncviewer command it's 800x600, I
have tried to pass to the kernel the parameter 

extra = "xen-fbfront.video=16,1024,768"

But they do not result in any change, I have verified those parameters
get to the kernel checking the /proc/cmdline leaf, interestingly when
configuring the vncserver manually on the guest I can get what I want.

Have you any idea about what could be wrong here ? Both DOMU and DOM0
are a Debian8 amd64.

Cheers,
Pietro


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 12 15:19:34 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 15:19:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3Qjm-00019y-0l; Fri, 12 Jun 2015 15:19:18 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=59868e418=Ian.Campbell@citrix.com>)
	id 1Z3Qjk-00019S-RH
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 15:19:16 +0000
Received: from [85.158.139.211] by server-8.bemta-5.messagelabs.com id
	EA/41-29702-478FA755; Fri, 12 Jun 2015 15:19:16 +0000
X-Env-Sender: prvs=59868e418=Ian.Campbell@citrix.com
X-Msg-Ref: server-6.tower-206.messagelabs.com!1434122353!13837694!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32118 invoked from network); 12 Jun 2015 15:19:14 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-6.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	12 Jun 2015 15:19:14 -0000
X-IronPort-AV: E=Sophos;i="5.13,602,1427760000"; d="scan'208";a="274312390"
Message-ID: <1434122349.30003.229.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: pietrop <pulsarpietro@aol.com>
Date: Fri, 12 Jun 2015 16:19:09 +0100
In-Reply-To: <1434121543.32728.9.camel@aol.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-12 at 16:05 +0100, pietrop wrote:
> Hi all,
> 
> I am having trouble in configuring the size/resolution of my VNC monitor
> when enabling the 
> 
> vfb = [ 'type=vnc' ] 
> 
> The monitor/window resulting from the vncviewer command it's 800x600, I
> have tried to pass to the kernel the parameter 
> 
> extra = "xen-fbfront.video=16,1024,768"
> 
> But they do not result in any change, I have verified those parameters
> get to the kernel checking the /proc/cmdline leaf, interestingly when
> configuring the vncserver manually on the guest I can get what I want.

What do you mean by "configuring the vncserver manually on the guest"?

vncserver and xenfb are two completely orthogonal things. If you are
running vncserver in the guest then that is what you must configure,
xenfb settings have no impact on it.

xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
(often qemu), there is no vncserver in the guest associated with xenfb.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 12 15:19:34 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 15:19:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3Qjm-00019y-0l; Fri, 12 Jun 2015 15:19:18 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=59868e418=Ian.Campbell@citrix.com>)
	id 1Z3Qjk-00019S-RH
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 15:19:16 +0000
Received: from [85.158.139.211] by server-8.bemta-5.messagelabs.com id
	EA/41-29702-478FA755; Fri, 12 Jun 2015 15:19:16 +0000
X-Env-Sender: prvs=59868e418=Ian.Campbell@citrix.com
X-Msg-Ref: server-6.tower-206.messagelabs.com!1434122353!13837694!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32118 invoked from network); 12 Jun 2015 15:19:14 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-6.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	12 Jun 2015 15:19:14 -0000
X-IronPort-AV: E=Sophos;i="5.13,602,1427760000"; d="scan'208";a="274312390"
Message-ID: <1434122349.30003.229.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: pietrop <pulsarpietro@aol.com>
Date: Fri, 12 Jun 2015 16:19:09 +0100
In-Reply-To: <1434121543.32728.9.camel@aol.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-12 at 16:05 +0100, pietrop wrote:
> Hi all,
> 
> I am having trouble in configuring the size/resolution of my VNC monitor
> when enabling the 
> 
> vfb = [ 'type=vnc' ] 
> 
> The monitor/window resulting from the vncviewer command it's 800x600, I
> have tried to pass to the kernel the parameter 
> 
> extra = "xen-fbfront.video=16,1024,768"
> 
> But they do not result in any change, I have verified those parameters
> get to the kernel checking the /proc/cmdline leaf, interestingly when
> configuring the vncserver manually on the guest I can get what I want.

What do you mean by "configuring the vncserver manually on the guest"?

vncserver and xenfb are two completely orthogonal things. If you are
running vncserver in the guest then that is what you must configure,
xenfb settings have no impact on it.

xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
(often qemu), there is no vncserver in the guest associated with xenfb.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 12 16:21:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 16:21:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3Rhf-0007hC-S3; Fri, 12 Jun 2015 16:21:11 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z3Rhe-0007gj-Iu
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 16:21:10 +0000
Received: from [85.158.139.211] by server-2.bemta-5.messagelabs.com id
	7C/D6-31304-5F60B755; Fri, 12 Jun 2015 16:21:09 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1434126066!9733437!1
X-Originating-IP: [64.12.143.77]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4556 invoked from network); 12 Jun 2015 16:21:07 -0000
Received: from omr-m03.mx.aol.com (HELO omr-m03.mx.aol.com) (64.12.143.77)
	by server-11.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 12 Jun 2015 16:21:07 -0000
Received: from mtaout-mbd01.mx.aol.com (mtaout-mbd01.mx.aol.com
	[172.26.252.13])
	by omr-m03.mx.aol.com (Outbound Mail Relay) with ESMTP id 8C2C070036232;
	Fri, 12 Jun 2015 12:21:06 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-mbd01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id DB6B3380000AC; Fri, 12 Jun 2015 12:21:05 -0400 (EDT)
Message-ID: <1434126080.32728.16.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: Ian Campbell <ian.campbell@citrix.com>
Date: Fri, 12 Jun 2015 17:21:20 +0100
In-Reply-To: <1434122349.30003.229.camel@citrix.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
	<1434122349.30003.229.camel@citrix.com>
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434126066;
	bh=dp5dIkP9fKVvEDo3iv3JBPxXpjJ7aBsD/s4ZzPsF1DY=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=UiVTt2PN1TT6/+2RvrSVoPm2FSbs62UtEF45TRg1QvIssuzMTS3KiA3sO1mgFCvm0
	qBT83qlA/9pIHy9JwEqQ154LUZ5JfA9TzsYEydpvkHIIZfEOGqM6SROTj6Zp6lLJmF
	gjQYA2LAS93xm/X1EtQ8VvI0iDc0iQaMjp+LDixY=
x-aol-sid: 3039ac1afc0d557b06f14ca0
X-AOL-IP: 185.25.64.249
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


> What do you mean by "configuring the vncserver manually on the guest"?

I have installed the vncserver package and I have started it manually
configuring the desired geometry.


> vncserver and xenfb are two completely orthogonal things. If you are
> running vncserver in the guest then that is what you must configure,
> xenfb settings have no impact on it.
> 
> xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> (often qemu), there is no vncserver in the guest associated with xenfb.
> 

I did not know that, I'd rather prefer to go with xenfb but I am not
getting the desired resolution with it, how can I do that ?
 
P.




_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 12 16:21:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 16:21:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3Rhf-0007hC-S3; Fri, 12 Jun 2015 16:21:11 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z3Rhe-0007gj-Iu
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 16:21:10 +0000
Received: from [85.158.139.211] by server-2.bemta-5.messagelabs.com id
	7C/D6-31304-5F60B755; Fri, 12 Jun 2015 16:21:09 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1434126066!9733437!1
X-Originating-IP: [64.12.143.77]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4556 invoked from network); 12 Jun 2015 16:21:07 -0000
Received: from omr-m03.mx.aol.com (HELO omr-m03.mx.aol.com) (64.12.143.77)
	by server-11.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 12 Jun 2015 16:21:07 -0000
Received: from mtaout-mbd01.mx.aol.com (mtaout-mbd01.mx.aol.com
	[172.26.252.13])
	by omr-m03.mx.aol.com (Outbound Mail Relay) with ESMTP id 8C2C070036232;
	Fri, 12 Jun 2015 12:21:06 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-mbd01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id DB6B3380000AC; Fri, 12 Jun 2015 12:21:05 -0400 (EDT)
Message-ID: <1434126080.32728.16.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: Ian Campbell <ian.campbell@citrix.com>
Date: Fri, 12 Jun 2015 17:21:20 +0100
In-Reply-To: <1434122349.30003.229.camel@citrix.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
	<1434122349.30003.229.camel@citrix.com>
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434126066;
	bh=dp5dIkP9fKVvEDo3iv3JBPxXpjJ7aBsD/s4ZzPsF1DY=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=UiVTt2PN1TT6/+2RvrSVoPm2FSbs62UtEF45TRg1QvIssuzMTS3KiA3sO1mgFCvm0
	qBT83qlA/9pIHy9JwEqQ154LUZ5JfA9TzsYEydpvkHIIZfEOGqM6SROTj6Zp6lLJmF
	gjQYA2LAS93xm/X1EtQ8VvI0iDc0iQaMjp+LDixY=
x-aol-sid: 3039ac1afc0d557b06f14ca0
X-AOL-IP: 185.25.64.249
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


> What do you mean by "configuring the vncserver manually on the guest"?

I have installed the vncserver package and I have started it manually
configuring the desired geometry.


> vncserver and xenfb are two completely orthogonal things. If you are
> running vncserver in the guest then that is what you must configure,
> xenfb settings have no impact on it.
> 
> xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> (often qemu), there is no vncserver in the guest associated with xenfb.
> 

I did not know that, I'd rather prefer to go with xenfb but I am not
getting the desired resolution with it, how can I do that ?
 
P.




_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 12 16:38:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 16:38:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3Rxy-0001ni-Br; Fri, 12 Jun 2015 16:38:02 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=59868e418=Ian.Campbell@citrix.com>)
	id 1Z3Rxx-0001na-FS
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 16:38:01 +0000
Received: from [193.109.254.147] by server-2.bemta-14.messagelabs.com id
	45/72-31258-8EA0B755; Fri, 12 Jun 2015 16:38:00 +0000
X-Env-Sender: prvs=59868e418=Ian.Campbell@citrix.com
X-Msg-Ref: server-10.tower-27.messagelabs.com!1434127078!22798844!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12973 invoked from network); 12 Jun 2015 16:37:59 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-10.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	12 Jun 2015 16:37:59 -0000
X-IronPort-AV: E=Sophos;i="5.13,602,1427760000"; d="scan'208";a="274341551"
Message-ID: <1434127051.30003.233.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: pietrop <pulsarpietro@aol.com>
Date: Fri, 12 Jun 2015 17:37:31 +0100
In-Reply-To: <1434126080.32728.16.camel@aol.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
	<1434122349.30003.229.camel@citrix.com>
	<1434126080.32728.16.camel@aol.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-12 at 17:21 +0100, pietrop wrote:
> > What do you mean by "configuring the vncserver manually on the guest"?
> 
> I have installed the vncserver package and I have started it manually
> configuring the desired geometry.

Right, that's an aside to getting xenfb working then.

> > vncserver and xenfb are two completely orthogonal things. If you are
> > running vncserver in the guest then that is what you must configure,
> > xenfb settings have no impact on it.
> > 
> > xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> > (often qemu), there is no vncserver in the guest associated with xenfb.
> > 
> 
> I did not know that, I'd rather prefer to go with xenfb but I am not
> getting the desired resolution with it, how can I do that ?

What sort of guest is this? PV or HVM?

Can you post your config file and your in guest dmesg please as well as
any related log files from under /var/log/xen (in particular the qemu
one).

Lastly, is xen-fbfront a module or statically configured?

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 12 16:38:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2015 16:38:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z3Rxy-0001ni-Br; Fri, 12 Jun 2015 16:38:02 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=59868e418=Ian.Campbell@citrix.com>)
	id 1Z3Rxx-0001na-FS
	for xen-users@lists.xen.org; Fri, 12 Jun 2015 16:38:01 +0000
Received: from [193.109.254.147] by server-2.bemta-14.messagelabs.com id
	45/72-31258-8EA0B755; Fri, 12 Jun 2015 16:38:00 +0000
X-Env-Sender: prvs=59868e418=Ian.Campbell@citrix.com
X-Msg-Ref: server-10.tower-27.messagelabs.com!1434127078!22798844!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12973 invoked from network); 12 Jun 2015 16:37:59 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-10.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	12 Jun 2015 16:37:59 -0000
X-IronPort-AV: E=Sophos;i="5.13,602,1427760000"; d="scan'208";a="274341551"
Message-ID: <1434127051.30003.233.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: pietrop <pulsarpietro@aol.com>
Date: Fri, 12 Jun 2015 17:37:31 +0100
In-Reply-To: <1434126080.32728.16.camel@aol.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
	<1434122349.30003.229.camel@citrix.com>
	<1434126080.32728.16.camel@aol.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-12 at 17:21 +0100, pietrop wrote:
> > What do you mean by "configuring the vncserver manually on the guest"?
> 
> I have installed the vncserver package and I have started it manually
> configuring the desired geometry.

Right, that's an aside to getting xenfb working then.

> > vncserver and xenfb are two completely orthogonal things. If you are
> > running vncserver in the guest then that is what you must configure,
> > xenfb settings have no impact on it.
> > 
> > xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> > (often qemu), there is no vncserver in the guest associated with xenfb.
> > 
> 
> I did not know that, I'd rather prefer to go with xenfb but I am not
> getting the desired resolution with it, how can I do that ?

What sort of guest is this? PV or HVM?

Can you post your config file and your in guest dmesg please as well as
any related log files from under /var/log/xen (in particular the qemu
one).

Lastly, is xen-fbfront a module or statically configured?

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sun Jun 14 14:12:46 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Jun 2015 14:12:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z48d6-000313-2O; Sun, 14 Jun 2015 14:11:20 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <s.alireza.v@gmail.com>) id 1Z44Un-0006KP-El
	for xen-users@lists.xen.org; Sun, 14 Jun 2015 09:46:29 +0000
Received: from [85.158.139.211] by server-5.bemta-5.messagelabs.com id
	E1/0B-19215-47D4D755; Sun, 14 Jun 2015 09:46:28 +0000
X-Env-Sender: s.alireza.v@gmail.com
X-Msg-Ref: server-9.tower-206.messagelabs.com!1434275186!14029899!1
X-Originating-IP: [209.85.212.175]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_40_50,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27828 invoked from network); 14 Jun 2015 09:46:26 -0000
Received: from mail-wi0-f175.google.com (HELO mail-wi0-f175.google.com)
	(209.85.212.175)
	by server-9.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	14 Jun 2015 09:46:26 -0000
Received: by wicnd19 with SMTP id nd19so392443wic.1
	for <xen-users@lists.xen.org>; Sun, 14 Jun 2015 02:46:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=4wQVCQvqBiHS7JvHlArkl4Toah2buQ3M2wTCsRQnPY4=;
	b=JJyOw9TMCelAzFLfgk0l51QvYuZUo8ltxznhoYGJiYVE3PiwvwVzlmBmsZa/kD6xSB
	5eSHgjyEyJqFnsLxGc3EGthZK3JhZpWDMknQpNj9jb+N4aP832ii/C/6BBYZULFkFeow
	RJ8qJLOFvV1fAlBv8+kzq1U+3bClqbSbmAwNkrbIZeVzHdJhBVeXGleDNEVNeACZy+c/
	NH2Wl5SkQPpwBC+bMcZ4KlU5WOzCDVuKwCY24i+TwncVkjaN/GqDdk7biL+NN17MBtxH
	my9NZqXH9CQd9bDVuf4npTB4EtOF1FqvzfZzr0hOcUlSHmxNOHrHVuP9AQ0TE9T5VP4P
	OYew==
MIME-Version: 1.0
X-Received: by 10.194.97.196 with SMTP id ec4mr42558656wjb.3.1434275186662;
	Sun, 14 Jun 2015 02:46:26 -0700 (PDT)
Received: by 10.28.183.8 with HTTP; Sun, 14 Jun 2015 02:46:26 -0700 (PDT)
Date: Sun, 14 Jun 2015 14:16:26 +0430
Message-ID: <CAEZiW-rYLKjtgZTT6=aEo-FLWwcDWB4hduhAgK3xrn2zX8Ak=A@mail.gmail.com>
From: Alireza Vaezi <s.alireza.v@gmail.com>
To: xen-users@lists.xen.org
X-Mailman-Approved-At: Sun, 14 Jun 2015 14:11:19 +0000
Subject: [Xen-users] why is xentop cpu usage sometimes higher than 100%?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6360073369148686012=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============6360073369148686012==
Content-Type: multipart/alternative; boundary=047d7bf0ef1802e3100518773704

--047d7bf0ef1802e3100518773704
Content-Type: text/plain; charset=UTF-8

I get output from xentop using 'awk' in ubuntu to know how much cpu is used
by Domain-0.
sometimes it is higher than 100%. here is a part of my result:
66.5
55.0
63.4
123.3
137.6
123.1
126.3
118.2
102.5
70.7
133.9
123.4
207.6
149.5
98.0
62.0

why is it like this? and how could I get the proper cpu usage of Domain-0 ?

--047d7bf0ef1802e3100518773704
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I get output from xentop using &#39;awk&#39; in ubuntu to =
know how much cpu is used by Domain-0.<div>sometimes it is higher than 100%=
. here is a part of my result:</div><div><div>66.5</div><div>55.0</div><div=
>63.4</div><div>123.3</div><div>137.6</div><div>123.1</div><div>126.3</div>=
<div>118.2</div><div>102.5</div><div>70.7</div><div>133.9</div><div>123.4</=
div><div>207.6</div><div>149.5</div><div>98.0</div><div>62.0</div></div><di=
v><br></div><div>why is it like this? and how could I get the proper cpu us=
age of Domain-0 ?</div></div>

--047d7bf0ef1802e3100518773704--


--===============6360073369148686012==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6360073369148686012==--


From xen-users-bounces@lists.xen.org Sun Jun 14 14:12:46 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Jun 2015 14:12:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z48d6-000313-2O; Sun, 14 Jun 2015 14:11:20 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <s.alireza.v@gmail.com>) id 1Z44Un-0006KP-El
	for xen-users@lists.xen.org; Sun, 14 Jun 2015 09:46:29 +0000
Received: from [85.158.139.211] by server-5.bemta-5.messagelabs.com id
	E1/0B-19215-47D4D755; Sun, 14 Jun 2015 09:46:28 +0000
X-Env-Sender: s.alireza.v@gmail.com
X-Msg-Ref: server-9.tower-206.messagelabs.com!1434275186!14029899!1
X-Originating-IP: [209.85.212.175]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_40_50,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27828 invoked from network); 14 Jun 2015 09:46:26 -0000
Received: from mail-wi0-f175.google.com (HELO mail-wi0-f175.google.com)
	(209.85.212.175)
	by server-9.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	14 Jun 2015 09:46:26 -0000
Received: by wicnd19 with SMTP id nd19so392443wic.1
	for <xen-users@lists.xen.org>; Sun, 14 Jun 2015 02:46:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=4wQVCQvqBiHS7JvHlArkl4Toah2buQ3M2wTCsRQnPY4=;
	b=JJyOw9TMCelAzFLfgk0l51QvYuZUo8ltxznhoYGJiYVE3PiwvwVzlmBmsZa/kD6xSB
	5eSHgjyEyJqFnsLxGc3EGthZK3JhZpWDMknQpNj9jb+N4aP832ii/C/6BBYZULFkFeow
	RJ8qJLOFvV1fAlBv8+kzq1U+3bClqbSbmAwNkrbIZeVzHdJhBVeXGleDNEVNeACZy+c/
	NH2Wl5SkQPpwBC+bMcZ4KlU5WOzCDVuKwCY24i+TwncVkjaN/GqDdk7biL+NN17MBtxH
	my9NZqXH9CQd9bDVuf4npTB4EtOF1FqvzfZzr0hOcUlSHmxNOHrHVuP9AQ0TE9T5VP4P
	OYew==
MIME-Version: 1.0
X-Received: by 10.194.97.196 with SMTP id ec4mr42558656wjb.3.1434275186662;
	Sun, 14 Jun 2015 02:46:26 -0700 (PDT)
Received: by 10.28.183.8 with HTTP; Sun, 14 Jun 2015 02:46:26 -0700 (PDT)
Date: Sun, 14 Jun 2015 14:16:26 +0430
Message-ID: <CAEZiW-rYLKjtgZTT6=aEo-FLWwcDWB4hduhAgK3xrn2zX8Ak=A@mail.gmail.com>
From: Alireza Vaezi <s.alireza.v@gmail.com>
To: xen-users@lists.xen.org
X-Mailman-Approved-At: Sun, 14 Jun 2015 14:11:19 +0000
Subject: [Xen-users] why is xentop cpu usage sometimes higher than 100%?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6360073369148686012=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============6360073369148686012==
Content-Type: multipart/alternative; boundary=047d7bf0ef1802e3100518773704

--047d7bf0ef1802e3100518773704
Content-Type: text/plain; charset=UTF-8

I get output from xentop using 'awk' in ubuntu to know how much cpu is used
by Domain-0.
sometimes it is higher than 100%. here is a part of my result:
66.5
55.0
63.4
123.3
137.6
123.1
126.3
118.2
102.5
70.7
133.9
123.4
207.6
149.5
98.0
62.0

why is it like this? and how could I get the proper cpu usage of Domain-0 ?

--047d7bf0ef1802e3100518773704
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I get output from xentop using &#39;awk&#39; in ubuntu to =
know how much cpu is used by Domain-0.<div>sometimes it is higher than 100%=
. here is a part of my result:</div><div><div>66.5</div><div>55.0</div><div=
>63.4</div><div>123.3</div><div>137.6</div><div>123.1</div><div>126.3</div>=
<div>118.2</div><div>102.5</div><div>70.7</div><div>133.9</div><div>123.4</=
div><div>207.6</div><div>149.5</div><div>98.0</div><div>62.0</div></div><di=
v><br></div><div>why is it like this? and how could I get the proper cpu us=
age of Domain-0 ?</div></div>

--047d7bf0ef1802e3100518773704--


--===============6360073369148686012==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6360073369148686012==--


From xen-users-bounces@lists.xen.org Sun Jun 14 14:36:39 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Jun 2015 14:36:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z491F-0004G3-DG; Sun, 14 Jun 2015 14:36:17 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <sdawson@pa.metrocast.net>) id 1Z491D-0004Fy-M4
	for xen-users@lists.xen.org; Sun, 14 Jun 2015 14:36:15 +0000
Received: from [85.158.139.211] by server-8.bemta-5.messagelabs.com id
	15/0F-29702-E519D755; Sun, 14 Jun 2015 14:36:14 +0000
X-Env-Sender: sdawson@pa.metrocast.net
X-Msg-Ref: server-16.tower-206.messagelabs.com!1434292573!11184181!1
X-Originating-IP: [65.175.128.136]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjUuMTc1LjEyOC4xMzYgPT4gODE1MjE=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15265 invoked from network); 14 Jun 2015 14:36:14 -0000
Received: from proofpoint-cluster.metrocast.net (HELO
	proofpoint-cluster.metrocast.net) (65.175.128.136)
	by server-16.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 14 Jun 2015 14:36:14 -0000
Received: from [192.168.0.4] (d-24-153-46-7.cpe.metrocast.net [24.153.46.7])
	(authenticated bits=0)
	by plum.metrocast.net (8.14.7/8.14.7) with ESMTP id t5EEaB0Y004502
	for <xen-users@lists.xen.org>; Sun, 14 Jun 2015 14:36:11 GMT
Message-ID: <557D915B.9000706@pa.metrocast.net>
Date: Sun, 14 Jun 2015 10:36:11 -0400
From: Steve Dawson <sdawson@pa.metrocast.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:12.0) Gecko/20120523 Thunderbird/12.0
MIME-Version: 1.0
To: xen-users@lists.xen.org
References: <CAEZiW-rYLKjtgZTT6=aEo-FLWwcDWB4hduhAgK3xrn2zX8Ak=A@mail.gmail.com>
In-Reply-To: <CAEZiW-rYLKjtgZTT6=aEo-FLWwcDWB4hduhAgK3xrn2zX8Ak=A@mail.gmail.com>
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.14.151, 1.0.33,
	0.0.0000
	definitions=2015-06-14_02:2015-06-11, 2015-06-14,
	1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0
	suspectscore=1 phishscore=0
	adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx
	scancount=1
	engine=7.0.1-1402240000 definitions=main-1506140263
Subject: Re: [Xen-users] why is xentop cpu usage sometimes higher than 100%?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
Reply-To: sdawson@pa.metrocast.net
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/14/2015 05:46 AM, Alireza Vaezi wrote:
> I get output from xentop using 'awk' in ubuntu to know how much cpu is used by Domain-0.
> sometimes it is higher than 100%. here is a part of my result:
> 66.5
> 55.0
> 63.4
> 123.3
> 137.6
> 123.1
> 126.3
> 118.2
> 102.5
> 70.7
> 133.9
> 123.4
> 207.6
> 149.5
> 98.0
> 62.0
> 
> why is it like this? and how could I get the proper cpu usage of Domain-0 ?
> 
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users

How many CPUs does Dom0 have? usually cpu utilization is a maximum of 100% per cpu.

Regards.

Steve 

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sun Jun 14 14:36:39 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Jun 2015 14:36:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z491F-0004G3-DG; Sun, 14 Jun 2015 14:36:17 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <sdawson@pa.metrocast.net>) id 1Z491D-0004Fy-M4
	for xen-users@lists.xen.org; Sun, 14 Jun 2015 14:36:15 +0000
Received: from [85.158.139.211] by server-8.bemta-5.messagelabs.com id
	15/0F-29702-E519D755; Sun, 14 Jun 2015 14:36:14 +0000
X-Env-Sender: sdawson@pa.metrocast.net
X-Msg-Ref: server-16.tower-206.messagelabs.com!1434292573!11184181!1
X-Originating-IP: [65.175.128.136]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjUuMTc1LjEyOC4xMzYgPT4gODE1MjE=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15265 invoked from network); 14 Jun 2015 14:36:14 -0000
Received: from proofpoint-cluster.metrocast.net (HELO
	proofpoint-cluster.metrocast.net) (65.175.128.136)
	by server-16.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 14 Jun 2015 14:36:14 -0000
Received: from [192.168.0.4] (d-24-153-46-7.cpe.metrocast.net [24.153.46.7])
	(authenticated bits=0)
	by plum.metrocast.net (8.14.7/8.14.7) with ESMTP id t5EEaB0Y004502
	for <xen-users@lists.xen.org>; Sun, 14 Jun 2015 14:36:11 GMT
Message-ID: <557D915B.9000706@pa.metrocast.net>
Date: Sun, 14 Jun 2015 10:36:11 -0400
From: Steve Dawson <sdawson@pa.metrocast.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:12.0) Gecko/20120523 Thunderbird/12.0
MIME-Version: 1.0
To: xen-users@lists.xen.org
References: <CAEZiW-rYLKjtgZTT6=aEo-FLWwcDWB4hduhAgK3xrn2zX8Ak=A@mail.gmail.com>
In-Reply-To: <CAEZiW-rYLKjtgZTT6=aEo-FLWwcDWB4hduhAgK3xrn2zX8Ak=A@mail.gmail.com>
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.14.151, 1.0.33,
	0.0.0000
	definitions=2015-06-14_02:2015-06-11, 2015-06-14,
	1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0
	suspectscore=1 phishscore=0
	adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx
	scancount=1
	engine=7.0.1-1402240000 definitions=main-1506140263
Subject: Re: [Xen-users] why is xentop cpu usage sometimes higher than 100%?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
Reply-To: sdawson@pa.metrocast.net
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/14/2015 05:46 AM, Alireza Vaezi wrote:
> I get output from xentop using 'awk' in ubuntu to know how much cpu is used by Domain-0.
> sometimes it is higher than 100%. here is a part of my result:
> 66.5
> 55.0
> 63.4
> 123.3
> 137.6
> 123.1
> 126.3
> 118.2
> 102.5
> 70.7
> 133.9
> 123.4
> 207.6
> 149.5
> 98.0
> 62.0
> 
> why is it like this? and how could I get the proper cpu usage of Domain-0 ?
> 
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users

How many CPUs does Dom0 have? usually cpu utilization is a maximum of 100% per cpu.

Regards.

Steve 

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sun Jun 14 22:47:51 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Jun 2015 22:47:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4Gff-0004Pl-J1; Sun, 14 Jun 2015 22:46:31 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4Gfe-0004LG-DB
	for xen-users@lists.xen.org; Sun, 14 Jun 2015 22:46:30 +0000
Received: from [193.109.254.147] by server-9.bemta-14.messagelabs.com id
	57/AC-03371-5440E755; Sun, 14 Jun 2015 22:46:29 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-5.tower-27.messagelabs.com!1434321988!18594320!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2618 invoked from network); 14 Jun 2015 22:46:28 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-5.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 14 Jun 2015 22:46:28 -0000
Received: from joan.univie.ac.at ([131.130.3.110] helo=joan.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4Gfc-0001TR-6h
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 00:46:28 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by joan.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4Gfb-000802-GA
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 00:46:28 +0200
Message-ID: <557E0433.9070307@web2web.at>
Date: Mon, 15 Jun 2015 00:46:11 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: xen-users@lists.xen.org
Content-Type: multipart/mixed; boundary="------------020105020108040106080403"
X-Univie-Virus-Scan: scanned by ClamAV on joan.univie.ac.at
Subject: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0 /
	kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multi-part message in MIME format.
--------------020105020108040106080403
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi guys,
I recently switched from xen 4.4.2 to 4.5.0 after it became stable on 
gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0 
and domUs a spin - unfortunately with not too much success:


DOM0:
For dom0 I simply added dom0pvh=1 to the xen command line. The system 
booted up and I was also able to confirm that dom0 is running in the 
correct mode by checking with xen-detect.

What I however found out is that xen creates a bunch of error/warning 
messages some of which make it to xl's dmesg file (the majority seems to 
get dropped due to rate limits). None of these messages are there when 
started without dom0pvh=1. Please see the two attached files for a 
comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl 
dmesg in non-PVH mode ("dmesg.xl").

There are a few (most likely irrelevant) differences at line 109 to 111 
relating to messages about the "Start info", the "Page tables", and the 
"Boot stack". The main difference is in the additional lines in the file 
"dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines 
about suppressed messages totalling in excess of 236.000 (ignored) 
messages.  It's probably worth noteing that no further messages make it 
to xl's dmesg and also /var/log/messages does not have anything strange 
once the dom0 is up and running.

It, however, appears that the pvh dom0 compared to the standard dom0 
consumes _significantly_ more CPU time as shown by "xl info" from within 
dom0 - which to me seems counter-intuitive given my (limited) 
understanding of what pvh tries to achieve.


DOMU:
For a test domU I just added pvh=1 to it's (otherwise unchanged) 
configuration file and tried to start the domU by issuing
xl -v -v -v /path/to/config/file -c

The domU did not come up at all (but works flawlessly when commenting 
out the pvh=1 configuration line); details of the xl command output for 
the failed attempt can be found in the attached file xl.domU. I honestly 
can't make much sense out of the error message which in essence seems to 
complain about an unsupported feature and a missing file or directory 
before giving up.

I understand that pvh is pretty new and probably not yet ready for prime 
time, but I'd nevertheless appreciate any input/help on what's going on 
here or what I am doing wrong.

Clearly I am happy to provide more information if necessary.

Many thanks in advance

Atom2

--------------020105020108040106080403
Content-Type: text/plain; charset=windows-1252;
 name="dmesg.xl"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="dmesg.xl"

IFhlbiA0LjUuMAooWEVOKSBYZW4gdmVyc2lvbiA0LjUuMCAoQGhlcnJlbmhhdXNwYXJrLmNv
bSkgKHg4Nl82NC1wYy1saW51eC1nbnUtZ2NjIChHZW50b28gSGFyZGVuZWQgNC44LjQgcDEu
NiwgcGllLTAuNi4xKSA0LjguNCkgZGVidWc9biBTYXQgSnVuIDEzIDIxOjMyOjAzIENFU1Qg
MjAxNQooWEVOKSBMYXRlc3QgQ2hhbmdlU2V0OiAKKFhFTikgQm9vdGxvYWRlcjogR1JVQiAy
LjAwCihYRU4pIENvbW1hbmQgbGluZTogcGxhY2Vob2xkZXIgdWNvZGU9LTEgbG9nbHZsPXdh
cm5pbmcgZ3Vlc3RfbG9nbHZsPW5vbmUvd2FybmluZyBkb20wX21lbT00RyxtYXg6NEcgdG1l
bT0xIHRtZW1fY29tcHJlc3M9MSB0bWVtX2RlZHVwPTEgZG9tMF9tYXhfdmNwdXM9OCBkb20w
X3ZjcHVzX3Bpbj10cnVlIGNwdWZyZXE9eGVuIGNwdWlkbGUgY2xvY2tzb3VyY2U9aHBldCBp
b21tdT0xIHNjaGVkX2NyZWRpdF90c2xpY2VfbXM9NSBib290c2NydWI9MAooWEVOKSBWaWRl
byBpbmZvcm1hdGlvbjoKKFhFTikgIFZHQSBpcyB0ZXh0IG1vZGUgODB4MjUsIGZvbnQgOHgx
NgooWEVOKSAgVkJFL0REQyBtZXRob2RzOiBWMjsgRURJRCB0cmFuc2ZlciB0aW1lOiAxIHNl
Y29uZHMKKFhFTikgRGlzYyBpbmZvcm1hdGlvbjoKKFhFTikgIEZvdW5kIDIgTUJSIHNpZ25h
dHVyZXMKKFhFTikgIEZvdW5kIDIgRUREIGluZm9ybWF0aW9uIHN0cnVjdHVyZXMKKFhFTikg
WGVuLWU4MjAgUkFNIG1hcDoKKFhFTikgIDAwMDAwMDAwMDAwMDAwMDAgLSAwMDAwMDAwMDAw
MDlkODAwICh1c2FibGUpCihYRU4pICAwMDAwMDAwMDAwMDlkODAwIC0gMDAwMDAwMDAwMDBh
MDAwMCAocmVzZXJ2ZWQpCihYRU4pICAwMDAwMDAwMDAwMGUwMDAwIC0gMDAwMDAwMDAwMDEw
MDAwMCAocmVzZXJ2ZWQpCihYRU4pICAwMDAwMDAwMDAwMTAwMDAwIC0gMDAwMDAwMDAyMDAw
MDAwMCAodXNhYmxlKQooWEVOKSAgMDAwMDAwMDAyMDAwMDAwMCAtIDAwMDAwMDAwMjAyMDAw
MDAgKHJlc2VydmVkKQooWEVOKSAgMDAwMDAwMDAyMDIwMDAwMCAtIDAwMDAwMDAwNDAwMDAw
MDAgKHVzYWJsZSkKKFhFTikgIDAwMDAwMDAwNDAwMDAwMDAgLSAwMDAwMDAwMDQwMjAwMDAw
IChyZXNlcnZlZCkKKFhFTikgIDAwMDAwMDAwNDAyMDAwMDAgLSAwMDAwMDAwMGRiOWYwMDAw
ICh1c2FibGUpCihYRU4pICAwMDAwMDAwMGRiOWYwMDAwIC0gMDAwMDAwMDBkYzBkYTAwMCAo
cmVzZXJ2ZWQpCihYRU4pICAwMDAwMDAwMGRjMGRhMDAwIC0gMDAwMDAwMDBkYzFmOTAwMCAo
QUNQSSBOVlMpCihYRU4pICAwMDAwMDAwMGRjMWY5MDAwIC0gMDAwMDAwMDBkYzY1MTAwMCAo
cmVzZXJ2ZWQpCihYRU4pICAwMDAwMDAwMGRjNjUxMDAwIC0gMDAwMDAwMDBkYzY1MjAwMCAo
dXNhYmxlKQooWEVOKSAgMDAwMDAwMDBkYzY1MjAwMCAtIDAwMDAwMDAwZGM2OTUwMDAgKEFD
UEkgTlZTKQooWEVOKSAgMDAwMDAwMDBkYzY5NTAwMCAtIDAwMDAwMDAwZGNkYmEwMDAgKHVz
YWJsZSkKKFhFTikgIDAwMDAwMDAwZGNkYmEwMDAgLSAwMDAwMDAwMGRjZmYyMDAwIChyZXNl
cnZlZCkKKFhFTikgIDAwMDAwMDAwZGNmZjIwMDAgLSAwMDAwMDAwMGRkMDAwMDAwICh1c2Fi
bGUpCihYRU4pICAwMDAwMDAwMGRkODAwMDAwIC0gMDAwMDAwMDBkZmEwMDAwMCAocmVzZXJ2
ZWQpCihYRU4pICAwMDAwMDAwMGY4MDAwMDAwIC0gMDAwMDAwMDBmYzAwMDAwMCAocmVzZXJ2
ZWQpCihYRU4pICAwMDAwMDAwMGZlYzAwMDAwIC0gMDAwMDAwMDBmZWMwMTAwMCAocmVzZXJ2
ZWQpCihYRU4pICAwMDAwMDAwMGZlZDAwMDAwIC0gMDAwMDAwMDBmZWQwNDAwMCAocmVzZXJ2
ZWQpCihYRU4pICAwMDAwMDAwMGZlZDFjMDAwIC0gMDAwMDAwMDBmZWQyMDAwMCAocmVzZXJ2
ZWQpCihYRU4pICAwMDAwMDAwMGZlZTAwMDAwIC0gMDAwMDAwMDBmZWUwMTAwMCAocmVzZXJ2
ZWQpCihYRU4pICAwMDAwMDAwMGZmMDAwMDAwIC0gMDAwMDAwMDEwMDAwMDAwMCAocmVzZXJ2
ZWQpCihYRU4pICAwMDAwMDAwMTAwMDAwMDAwIC0gMDAwMDAwMDgxZTYwMDAwMCAodXNhYmxl
KQooWEVOKSBBQ1BJOiBSU0RQIDAwMEYwNDkwLCAwMDI0IChyMiBBTEFTS0EpCihYRU4pIEFD
UEk6IFhTRFQgREMxRTkwNzgsIDAwNzQgKHIxIEFMQVNLQSAgICBBIE0gSSAgMTA3MjAwOSBB
TUkgICAgIDEwMDEzKQooWEVOKSBBQ1BJOiBGQUNQIERDMUYzNzEwLCAwMEY0IChyNCBBTEFT
S0EgICAgQSBNIEkgIDEwNzIwMDkgQU1JICAgICAxMDAxMykKKFhFTikgQUNQSTogRFNEVCBE
QzFFOTE4OCwgQTU4NyAocjIgQUxBU0tBICAgIEEgTSBJICAgICAgICAxIElOVEwgMjAwNTEx
MTcpCihYRU4pIEFDUEk6IEZBQ1MgREMxRjdGODAsIDAwNDAKKFhFTikgQUNQSTogQVBJQyBE
QzFGMzgwOCwgMDA5MiAocjMgQUxBU0tBICAgIEEgTSBJICAxMDcyMDA5IEFNSSAgICAgMTAw
MTMpCihYRU4pIEFDUEk6IEZQRFQgREMxRjM4QTAsIDAwNDQgKHIxIEFMQVNLQSAgICBBIE0g
SSAgMTA3MjAwOSBBTUkgICAgIDEwMDEzKQooWEVOKSBBQ1BJOiBNQ0ZHIERDMUYzOEU4LCAw
MDNDIChyMSBBTEFTS0EgICAgQSBNIEkgIDEwNzIwMDkgTVNGVCAgICAgICA5NykKKFhFTikg
QUNQSTogSFBFVCBEQzFGMzkyOCwgMDAzOCAocjEgQUxBU0tBICAgIEEgTSBJICAxMDcyMDA5
IEFNSS4gICAgICAgIDUpCihYRU4pIEFDUEk6IFNTRFQgREMxRjM5NjAsIDAzNkQgKHIxIFNh
dGFSZSBTYXRhVGFibCAgICAgMTAwMCBJTlRMIDIwMDkxMTEyKQooWEVOKSBBQ1BJOiBTU0RU
IERDMUYzQ0QwLCAwODFFIChyMSAgUG1SZWYgIENwdTBJc3QgICAgIDMwMDAgSU5UTCAyMDA1
MTExNykKKFhFTikgQUNQSTogU1NEVCBEQzFGNDRGMCwgMEE5MiAocjEgIFBtUmVmICAgIENw
dVBtICAgICAzMDAwIElOVEwgMjAwNTExMTcpCihYRU4pIEFDUEk6IERNQVIgREMxRjRGODgs
IDAwQjAgKHIxIElOVEVMICAgICAgU05CICAgICAgICAgMSBJTlRMICAgICAgICAxKQooWEVO
KSBBQ1BJOiBBU0YhIERDMUY1MDM4LCAwMEE1IChyMzIgSU5URUwgICAgICAgSENHICAgICAg
ICAxIFRGU00gICAgRjQyNDApCihYRU4pIFN5c3RlbSBSQU06IDMyNjc0TUIgKDMzNDU4OTQ4
a0IpCihYRU4pIERvbWFpbiBoZWFwIGluaXRpYWxpc2VkCihYRU4pIEFDUEk6IDMyLzY0WCBG
QUNTIGFkZHJlc3MgbWlzbWF0Y2ggaW4gRkFEVCAtIGRjMWY3ZjgwLzAwMDAwMDAwMDAwMDAw
MDAsIHVzaW5nIDMyCihYRU4pIFByb2Nlc3NvciAjMCA2OjEwIEFQSUMgdmVyc2lvbiAyMQoo
WEVOKSBQcm9jZXNzb3IgIzIgNjoxMCBBUElDIHZlcnNpb24gMjEKKFhFTikgUHJvY2Vzc29y
ICM0IDY6MTAgQVBJQyB2ZXJzaW9uIDIxCihYRU4pIFByb2Nlc3NvciAjNiA2OjEwIEFQSUMg
dmVyc2lvbiAyMQooWEVOKSBQcm9jZXNzb3IgIzEgNjoxMCBBUElDIHZlcnNpb24gMjEKKFhF
TikgUHJvY2Vzc29yICMzIDY6MTAgQVBJQyB2ZXJzaW9uIDIxCihYRU4pIFByb2Nlc3NvciAj
NSA2OjEwIEFQSUMgdmVyc2lvbiAyMQooWEVOKSBQcm9jZXNzb3IgIzcgNjoxMCBBUElDIHZl
cnNpb24gMjEKKFhFTikgSU9BUElDWzBdOiBhcGljX2lkIDIsIHZlcnNpb24gMzIsIGFkZHJl
c3MgMHhmZWMwMDAwMCwgR1NJIDAtMjMKKFhFTikgRW5hYmxpbmcgQVBJQyBtb2RlOiAgRmxh
dC4gIFVzaW5nIDEgSS9PIEFQSUNzCihYRU4pIFN3aXRjaGVkIHRvIEFQSUMgZHJpdmVyIHgy
YXBpY19jbHVzdGVyLgooWEVOKSBVc2luZyBzY2hlZHVsZXI6IFNNUCBDcmVkaXQgU2NoZWR1
bGVyIChjcmVkaXQpCihYRU4pIERldGVjdGVkIDIzOTQuNjE1IE1IeiBwcm9jZXNzb3IuCihY
RU4pIEluaXRpbmcgbWVtb3J5IHNoYXJpbmcuCihYRU4pIHhzdGF0ZV9pbml0OiB1c2luZyBj
bnR4dF9zaXplOiAweDM0MCBhbmQgc3RhdGVzOiAweDcKKFhFTikgSW50ZWwgVlQtZCBpb21t
dSAwIHN1cHBvcnRlZCBwYWdlIHNpemVzOiA0a0IuCihYRU4pIEludGVsIFZULWQgaW9tbXUg
MSBzdXBwb3J0ZWQgcGFnZSBzaXplczogNGtCLgooWEVOKSBJbnRlbCBWVC1kIFNub29wIENv
bnRyb2wgbm90IGVuYWJsZWQuCihYRU4pIEludGVsIFZULWQgRG9tMCBETUEgUGFzc3Rocm91
Z2ggbm90IGVuYWJsZWQuCihYRU4pIEludGVsIFZULWQgUXVldWVkIEludmFsaWRhdGlvbiBl
bmFibGVkLgooWEVOKSBJbnRlbCBWVC1kIEludGVycnVwdCBSZW1hcHBpbmcgZW5hYmxlZC4K
KFhFTikgSW50ZWwgVlQtZCBTaGFyZWQgRVBUIHRhYmxlcyBub3QgZW5hYmxlZC4KKFhFTikg
SS9PIHZpcnR1YWxpc2F0aW9uIGVuYWJsZWQKKFhFTikgIC0gRG9tMCBtb2RlOiBSZWxheGVk
CihYRU4pIEludGVycnVwdCByZW1hcHBpbmcgZW5hYmxlZAooWEVOKSBFbmFibGVkIGRpcmVj
dGVkIEVPSSB3aXRoIGlvYXBpY19hY2tfb2xkIG9uIQooWEVOKSBFTkFCTElORyBJTy1BUElD
IElSUXMKKFhFTikgIC0+IFVzaW5nIG9sZCBBQ0sgbWV0aG9kCihYRU4pIFBsYXRmb3JtIHRp
bWVyIGlzIDE0LjMxOE1IeiBIUEVUCihYRU4pIEFsbG9jYXRlZCBjb25zb2xlIHJpbmcgb2Yg
MTYgS2lCLgooWEVOKSBWTVg6IFN1cHBvcnRlZCBhZHZhbmNlZCBmZWF0dXJlczoKKFhFTikg
IC0gQVBJQyBNTUlPIGFjY2VzcyB2aXJ0dWFsaXNhdGlvbgooWEVOKSAgLSBBUElDIFRQUiBz
aGFkb3cKKFhFTikgIC0gRXh0ZW5kZWQgUGFnZSBUYWJsZXMgKEVQVCkKKFhFTikgIC0gVmly
dHVhbC1Qcm9jZXNzb3IgSWRlbnRpZmllcnMgKFZQSUQpCihYRU4pICAtIFZpcnR1YWwgTk1J
CihYRU4pICAtIE1TUiBkaXJlY3QtYWNjZXNzIGJpdG1hcAooWEVOKSAgLSBVbnJlc3RyaWN0
ZWQgR3Vlc3QKKFhFTikgSFZNOiBBU0lEcyBlbmFibGVkLgooWEVOKSBIVk06IFZNWCBlbmFi
bGVkCihYRU4pIEhWTTogSGFyZHdhcmUgQXNzaXN0ZWQgUGFnaW5nIChIQVApIGRldGVjdGVk
CihYRU4pIEhWTTogSEFQIHBhZ2Ugc2l6ZXM6IDRrQiwgMk1CCihYRU4pIEJyb3VnaHQgdXAg
OCBDUFVzCihYRU4pIHRtZW06IGluaXRpYWxpemVkIGNvbXA9MSBkZWR1cD0xIHR6ZT0wCihY
RU4pIERvbTAgaGFzIG1heGltdW0gNzkyIFBJUlFzCihYRU4pICoqKiBMT0FESU5HIERPTUFJ
TiAwICoqKgooWEVOKSAgWGVuICBrZXJuZWw6IDY0LWJpdCwgbHNiLCBjb21wYXQzMgooWEVO
KSAgRG9tMCBrZXJuZWw6IDY0LWJpdCwgUEFFLCBsc2IsIHBhZGRyIDB4MTAwMDAwMCAtPiAw
eDFlMDAwMDAKKFhFTikgUEhZU0lDQUwgTUVNT1JZIEFSUkFOR0VNRU5UOgooWEVOKSAgRG9t
MCBhbGxvYy46ICAgMDAwMDAwMDgwMDAwMDAwMC0+MDAwMDAwMDgwNDAwMDAwMCAoMTAzMDA5
NSBwYWdlcyB0byBiZSBhbGxvY2F0ZWQpCihYRU4pICBJbml0LiByYW1kaXNrOiAwMDAwMDAw
ODFkZGNjMDAwLT4wMDAwMDAwODFlNWZjNDAwCihYRU4pIFZJUlRVQUwgTUVNT1JZIEFSUkFO
R0VNRU5UOgooWEVOKSAgTG9hZGVkIGtlcm5lbDogZmZmZmZmZmY4MTAwMDAwMC0+ZmZmZmZm
ZmY4MWUwMDAwMAooWEVOKSAgSW5pdC4gcmFtZGlzazogMDAwMDAwMDAwMDAwMDAwMC0+MDAw
MDAwMDAwMDAwMDAwMAooWEVOKSAgUGh5cy1NYWNoIG1hcDogZmZmZmZmZmY4MWUwMDAwMC0+
ZmZmZmZmZmY4MjYwMDAwMAooWEVOKSAgU3RhcnQgaW5mbzogICAgZmZmZmZmZmY4MjYwMDAw
MC0+ZmZmZmZmZmY4MjYwMDRiNAooWEVOKSAgUGFnZSB0YWJsZXM6ICAgZmZmZmZmZmY4MjYw
MTAwMC0+ZmZmZmZmZmY4MjYxODAwMAooWEVOKSAgQm9vdCBzdGFjazogICAgZmZmZmZmZmY4
MjYxODAwMC0+ZmZmZmZmZmY4MjYxOTAwMAooWEVOKSAgVE9UQUw6ICAgICAgICAgZmZmZmZm
ZmY4MDAwMDAwMC0+ZmZmZmZmZmY4MjgwMDAwMAooWEVOKSAgRU5UUlkgQUREUkVTUzogZmZm
ZmZmZmY4MTg5YjFmMAooWEVOKSBEb20wIGhhcyBtYXhpbXVtIDggVkNQVXMKKFhFTikgQm9n
dXMgRE1JQkFSIDB4ZmVkMTgwMDEgb24gMDAwMDowMDowMC4wCihYRU4pIFN0ZC4gTG9nbGV2
ZWw6IEVycm9ycyBhbmQgd2FybmluZ3MKKFhFTikgR3Vlc3QgTG9nbGV2ZWw6IE5vdGhpbmcg
KFJhdGUtbGltaXRlZDogRXJyb3JzIGFuZCB3YXJuaW5ncykKKFhFTikgWGVuIGlzIHJlbGlu
cXVpc2hpbmcgVkdBIGNvbnNvbGUuCihYRU4pICoqKiBTZXJpYWwgaW5wdXQgLT4gRE9NMCAo
dHlwZSAnQ1RSTC1hJyB0aHJlZSB0aW1lcyB0byBzd2l0Y2ggaW5wdXQgdG8gWGVuKQooWEVO
KSBGcmVlZCAzMDhrQiBpbml0IG1lbW9yeS4KKFhFTikgQm9ndXMgRE1JQkFSIDB4ZmVkMTgw
MDEgb24gMDAwMDowMDowMC4wCg==
--------------020105020108040106080403
Content-Type: text/plain; charset=windows-1252;
 name="dmesg.xl.pvh"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="dmesg.xl.pvh"
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--------------020105020108040106080403
Content-Type: text/plain; charset=windows-1252;
 name="xl.domU"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="xl.domU"
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--------------020105020108040106080403
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------020105020108040106080403--


From xen-users-bounces@lists.xen.org Sun Jun 14 22:47:51 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Jun 2015 22:47:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4Gff-0004Pl-J1; Sun, 14 Jun 2015 22:46:31 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4Gfe-0004LG-DB
	for xen-users@lists.xen.org; Sun, 14 Jun 2015 22:46:30 +0000
Received: from [193.109.254.147] by server-9.bemta-14.messagelabs.com id
	57/AC-03371-5440E755; Sun, 14 Jun 2015 22:46:29 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-5.tower-27.messagelabs.com!1434321988!18594320!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2618 invoked from network); 14 Jun 2015 22:46:28 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-5.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 14 Jun 2015 22:46:28 -0000
Received: from joan.univie.ac.at ([131.130.3.110] helo=joan.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4Gfc-0001TR-6h
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 00:46:28 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by joan.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4Gfb-000802-GA
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 00:46:28 +0200
Message-ID: <557E0433.9070307@web2web.at>
Date: Mon, 15 Jun 2015 00:46:11 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: xen-users@lists.xen.org
Content-Type: multipart/mixed; boundary="------------020105020108040106080403"
X-Univie-Virus-Scan: scanned by ClamAV on joan.univie.ac.at
Subject: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0 /
	kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multi-part message in MIME format.
--------------020105020108040106080403
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi guys,
I recently switched from xen 4.4.2 to 4.5.0 after it became stable on 
gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0 
and domUs a spin - unfortunately with not too much success:


DOM0:
For dom0 I simply added dom0pvh=1 to the xen command line. The system 
booted up and I was also able to confirm that dom0 is running in the 
correct mode by checking with xen-detect.

What I however found out is that xen creates a bunch of error/warning 
messages some of which make it to xl's dmesg file (the majority seems to 
get dropped due to rate limits). None of these messages are there when 
started without dom0pvh=1. Please see the two attached files for a 
comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl 
dmesg in non-PVH mode ("dmesg.xl").

There are a few (most likely irrelevant) differences at line 109 to 111 
relating to messages about the "Start info", the "Page tables", and the 
"Boot stack". The main difference is in the additional lines in the file 
"dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines 
about suppressed messages totalling in excess of 236.000 (ignored) 
messages.  It's probably worth noteing that no further messages make it 
to xl's dmesg and also /var/log/messages does not have anything strange 
once the dom0 is up and running.

It, however, appears that the pvh dom0 compared to the standard dom0 
consumes _significantly_ more CPU time as shown by "xl info" from within 
dom0 - which to me seems counter-intuitive given my (limited) 
understanding of what pvh tries to achieve.


DOMU:
For a test domU I just added pvh=1 to it's (otherwise unchanged) 
configuration file and tried to start the domU by issuing
xl -v -v -v /path/to/config/file -c

The domU did not come up at all (but works flawlessly when commenting 
out the pvh=1 configuration line); details of the xl command output for 
the failed attempt can be found in the attached file xl.domU. I honestly 
can't make much sense out of the error message which in essence seems to 
complain about an unsupported feature and a missing file or directory 
before giving up.

I understand that pvh is pretty new and probably not yet ready for prime 
time, but I'd nevertheless appreciate any input/help on what's going on 
here or what I am doing wrong.

Clearly I am happy to provide more information if necessary.

Many thanks in advance

Atom2

--------------020105020108040106080403
Content-Type: text/plain; charset=windows-1252;
 name="dmesg.xl"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="dmesg.xl"
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--------------020105020108040106080403
Content-Type: text/plain; charset=windows-1252;
 name="dmesg.xl.pvh"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="dmesg.xl.pvh"
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--------------020105020108040106080403
Content-Type: text/plain; charset=windows-1252;
 name="xl.domU"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="xl.domU"
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--------------020105020108040106080403
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------020105020108040106080403--


From xen-users-bounces@lists.xen.org Mon Jun 15 07:35:30 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 07:35:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4OuA-0005zG-4R; Mon, 15 Jun 2015 07:34:02 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=601e9ebe9=roger.pau@citrix.com>)
	id 1Z4Ou5-0005zA-P5
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 07:34:00 +0000
Received: from [85.158.139.211] by server-7.bemta-5.messagelabs.com id
	DF/66-23096-5EF7E755; Mon, 15 Jun 2015 07:33:57 +0000
X-Env-Sender: prvs=601e9ebe9=roger.pau@citrix.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1434353622!10033677!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21576 invoked from network); 15 Jun 2015 07:33:43 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-11.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	15 Jun 2015 07:33:43 -0000
X-IronPort-AV: E=Sophos;i="5.13,617,1427760000"; d="scan'208";a="274769595"
Message-ID: <557E7FD7.40103@citrix.com>
Date: Mon, 15 Jun 2015 09:33:43 +0200
From: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Atom2 <ariel.atom2@web2web.at>, <xen-users@lists.xen.org>
References: <557E0433.9070307@web2web.at>
In-Reply-To: <557E0433.9070307@web2web.at>
X-DLP: MIA2
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

El 15/06/15 a les 0.46, Atom2 ha escrit:
> Hi guys,
> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
> and domUs a spin - unfortunately with not too much success:
> 
> 
> DOM0:
> For dom0 I simply added dom0pvh=1 to the xen command line. The system
> booted up and I was also able to confirm that dom0 is running in the
> correct mode by checking with xen-detect.
> 
> What I however found out is that xen creates a bunch of error/warning
> messages some of which make it to xl's dmesg file (the majority seems to
> get dropped due to rate limits). None of these messages are there when
> started without dom0pvh=1. Please see the two attached files for a
> comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl
> dmesg in non-PVH mode ("dmesg.xl").
> 
> There are a few (most likely irrelevant) differences at line 109 to 111
> relating to messages about the "Start info", the "Page tables", and the
> "Boot stack". The main difference is in the additional lines in the file
> "dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines
> about suppressed messages totalling in excess of 236.000 (ignored)
> messages.  It's probably worth noteing that no further messages make it
> to xl's dmesg and also /var/log/messages does not have anything strange
> once the dom0 is up and running.

Those are errors from the IOMMU, your BIOS is probably missing some RMRR
regions. Do you know which devices are at 0000:00:1a.0 and 0000:00:02.0?

(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:1a.0] fault addr
dc086000, iommu reg = ffff82c000203000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set

The above error looks reasonable, this memory is between 3 and 4 GiB
which matches the MMIO hole.

(XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr
72c481000, iommu reg = ffff82c000201000
(XEN) [VT-D]DMAR: reason 05 - PTE Write access is not set

This however is very high address, and is within a region marked as
usable in the memory map:

(XEN)  0000000100000000 - 000000081e600000 (usable)

There are some patches on the list to add additional RMRR regions on the
command line, however they are not committed yet, so there's not much
you can try right now (apart from trying it on a different box).

> It, however, appears that the pvh dom0 compared to the standard dom0
> consumes _significantly_ more CPU time as shown by "xl info" from within
> dom0 - which to me seems counter-intuitive given my (limited)
> understanding of what pvh tries to achieve.
> 
> 
> DOMU:
> For a test domU I just added pvh=1 to it's (otherwise unchanged)
> configuration file and tried to start the domU by issuing
> xl -v -v -v /path/to/config/file -c
> 
> The domU did not come up at all (but works flawlessly when commenting
> out the pvh=1 configuration line); details of the xl command output for
> the failed attempt can be found in the attached file xl.domU. I honestly
> can't make much sense out of the error message which in essence seems to
> complain about an unsupported feature and a missing file or directory
> before giving up.

AFAICT from the log provided you seem to be trying to launch a MiniOS
based guest with pvh=1, which is not supported. MiniOS doesn't support
the PVH mode yet.

Roger.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 15 07:35:30 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 07:35:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4OuA-0005zG-4R; Mon, 15 Jun 2015 07:34:02 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=601e9ebe9=roger.pau@citrix.com>)
	id 1Z4Ou5-0005zA-P5
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 07:34:00 +0000
Received: from [85.158.139.211] by server-7.bemta-5.messagelabs.com id
	DF/66-23096-5EF7E755; Mon, 15 Jun 2015 07:33:57 +0000
X-Env-Sender: prvs=601e9ebe9=roger.pau@citrix.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1434353622!10033677!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21576 invoked from network); 15 Jun 2015 07:33:43 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-11.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	15 Jun 2015 07:33:43 -0000
X-IronPort-AV: E=Sophos;i="5.13,617,1427760000"; d="scan'208";a="274769595"
Message-ID: <557E7FD7.40103@citrix.com>
Date: Mon, 15 Jun 2015 09:33:43 +0200
From: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Atom2 <ariel.atom2@web2web.at>, <xen-users@lists.xen.org>
References: <557E0433.9070307@web2web.at>
In-Reply-To: <557E0433.9070307@web2web.at>
X-DLP: MIA2
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

El 15/06/15 a les 0.46, Atom2 ha escrit:
> Hi guys,
> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
> and domUs a spin - unfortunately with not too much success:
> 
> 
> DOM0:
> For dom0 I simply added dom0pvh=1 to the xen command line. The system
> booted up and I was also able to confirm that dom0 is running in the
> correct mode by checking with xen-detect.
> 
> What I however found out is that xen creates a bunch of error/warning
> messages some of which make it to xl's dmesg file (the majority seems to
> get dropped due to rate limits). None of these messages are there when
> started without dom0pvh=1. Please see the two attached files for a
> comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl
> dmesg in non-PVH mode ("dmesg.xl").
> 
> There are a few (most likely irrelevant) differences at line 109 to 111
> relating to messages about the "Start info", the "Page tables", and the
> "Boot stack". The main difference is in the additional lines in the file
> "dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines
> about suppressed messages totalling in excess of 236.000 (ignored)
> messages.  It's probably worth noteing that no further messages make it
> to xl's dmesg and also /var/log/messages does not have anything strange
> once the dom0 is up and running.

Those are errors from the IOMMU, your BIOS is probably missing some RMRR
regions. Do you know which devices are at 0000:00:1a.0 and 0000:00:02.0?

(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:1a.0] fault addr
dc086000, iommu reg = ffff82c000203000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set

The above error looks reasonable, this memory is between 3 and 4 GiB
which matches the MMIO hole.

(XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr
72c481000, iommu reg = ffff82c000201000
(XEN) [VT-D]DMAR: reason 05 - PTE Write access is not set

This however is very high address, and is within a region marked as
usable in the memory map:

(XEN)  0000000100000000 - 000000081e600000 (usable)

There are some patches on the list to add additional RMRR regions on the
command line, however they are not committed yet, so there's not much
you can try right now (apart from trying it on a different box).

> It, however, appears that the pvh dom0 compared to the standard dom0
> consumes _significantly_ more CPU time as shown by "xl info" from within
> dom0 - which to me seems counter-intuitive given my (limited)
> understanding of what pvh tries to achieve.
> 
> 
> DOMU:
> For a test domU I just added pvh=1 to it's (otherwise unchanged)
> configuration file and tried to start the domU by issuing
> xl -v -v -v /path/to/config/file -c
> 
> The domU did not come up at all (but works flawlessly when commenting
> out the pvh=1 configuration line); details of the xl command output for
> the failed attempt can be found in the attached file xl.domU. I honestly
> can't make much sense out of the error message which in essence seems to
> complain about an unsupported feature and a missing file or directory
> before giving up.

AFAICT from the log provided you seem to be trying to launch a MiniOS
based guest with pvh=1, which is not supported. MiniOS doesn't support
the PVH mode yet.

Roger.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 15 11:55:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 11:55:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4SyA-0007ih-CP; Mon, 15 Jun 2015 11:54:26 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z4Sy8-0007ic-5o
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 11:54:24 +0000
Received: from [193.109.254.147] by server-11.bemta-14.messagelabs.com id
	E1/15-30658-FECBE755; Mon, 15 Jun 2015 11:54:23 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1434369260!23400248!1
X-Originating-IP: [64.12.143.77]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29715 invoked from network); 15 Jun 2015 11:54:21 -0000
Received: from omr-m03.mx.aol.com (HELO omr-m03.mx.aol.com) (64.12.143.77)
	by server-2.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 15 Jun 2015 11:54:21 -0000
Received: from mtaout-aaj01.mx.aol.com (mtaout-aaj01.mx.aol.com [172.27.3.205])
	by omr-m03.mx.aol.com (Outbound Mail Relay) with ESMTP id 4F4AC70036230;
	Mon, 15 Jun 2015 07:54:20 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-aaj01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id A1F1438000094; Mon, 15 Jun 2015 07:54:19 -0400 (EDT)
Message-ID: <1434369268.32728.26.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: Ian Campbell <ian.campbell@citrix.com>
Date: Mon, 15 Jun 2015 12:54:28 +0100
In-Reply-To: <1434127051.30003.233.camel@citrix.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
	<1434122349.30003.229.camel@citrix.com>
	<1434126080.32728.16.camel@aol.com>
	<1434127051.30003.233.camel@citrix.com>
Content-Type: multipart/mixed; boundary="=-piSM+XLoeltd8GB+Yn5H"
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
X-AOL-VSS-INFO: 5700.7163/104464
X-AOL-VSS-CODE: clean
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434369260;
	bh=UGwtZypwmXqQ01nca2/XECN8CxD+HfOl6wpR4vD9k4M=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=1evb0XQVqnXNz6Hph+U6TQ2WqUCSirQhcyv7v9guAo64IgH2Cf2BWMpy0j7LqBD1Z
	ZDAT8uAOruMdvKrGyOXxlCIEf6aTcrAhXeTW7BspMbfJZ3pBZ55pPLC8ooaxBlZ7rQ
	pOx/lSdtwAUEXH6DjlUFl83Er5+NHolL4u47zZ6Y=
x-aol-sid: 3039ac1b03cd557ebceb4d0c
X-AOL-IP: 185.25.64.249
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=-piSM+XLoeltd8GB+Yn5H
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit

On Fri, 2015-06-12 at 17:37 +0100, Ian Campbell wrote:
> On Fri, 2015-06-12 at 17:21 +0100, pietrop wrote:
> > > What do you mean by "configuring the vncserver manually on the guest"?
> > 
> > I have installed the vncserver package and I have started it manually
> > configuring the desired geometry.
> 
> Right, that's an aside to getting xenfb working then.
> 
> > > vncserver and xenfb are two completely orthogonal things. If you are
> > > running vncserver in the guest then that is what you must configure,
> > > xenfb settings have no impact on it.
> > > 
> > > xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> > > (often qemu), there is no vncserver in the guest associated with xenfb.
> > > 
> > 
> > I did not know that, I'd rather prefer to go with xenfb but I am not
> > getting the desired resolution with it, how can I do that ?
> 
> What sort of guest is this? PV or HVM?

Following the link :

http://serverfault.com/questions/511923/determine-which-guest-is-running-on-xen-hvm-or-pv-guest




> 
> Can you post your config file and your in guest dmesg please as well as
> any related log files from under /var/log/xen (in particular the qemu
> one).
> 

This is my configuration file :


#
# Configuration file for the Xen instance pietrop-debian64, created
# by xen-tools 4.5 on Fri May 29 15:12:07 2015.
#

#
#  Kernel + memory size
#
kernel      = '/boot/vmlinuz-3.16.0-4-amd64'
extra       = 'xen-fbfront.video=16,1024,768'
ramdisk     = '/boot/initrd.img-3.16.0-4-amd64'

vcpus       = '4'
memory      = '2048'


#
#  Disk device(s).
#
root        = '/dev/xvda2 ro'
disk        = [
                  'phy:/dev/vg1/pietrop-debian64-disk,xvda2,w',
                  'phy:/dev/vg1/pietrop-debian64-swap,xvda1,w',
              ]


#
#  Physical volumes
#


#
#  Hostname
#
name        = 'pietrop-debian64RfL'

#
#  Networking
#
dhcp        = 'dhcp'
vif         = [ 'mac=00:16:3E:A1:96:3F' ]

#
#  Behaviour
#
on_poweroff = 'destroy'
on_reboot   = 'restart'
on_crash    = 'restart'

vfb = [ 'type=vnc' ]
stdvga=1
videoram=16 

You can find the dmesg and var/log/xen/* logs file as attachment of this
email, I have made an effort in grabbing the latest logs from there
since there are quite a few files in there.


> Lastly, is xen-fbfront a module or statically configured?
> 
I am not sure about that, kernel config file attached; nevertheless what
would it be the right CONFIG line to look at ?

Thanks,
Pietro.


--=-piSM+XLoeltd8GB+Yn5H
Content-Disposition: attachment; filename="dmesg"
Content-Type: text/plain; name="dmesg"; charset="UTF-8"
Content-Transfer-Encoding: base64

WyAgICAwLjAwMDAwMF0gSW5pdGlhbGl6aW5nIGNncm91cCBzdWJzeXMgY3B1c2V0ClsgICAgMC4w
MDAwMDBdIEluaXRpYWxpemluZyBjZ3JvdXAgc3Vic3lzIGNwdQpbICAgIDAuMDAwMDAwXSBJbml0
aWFsaXppbmcgY2dyb3VwIHN1YnN5cyBjcHVhY2N0ClsgICAgMC4wMDAwMDBdIExpbnV4IHZlcnNp
b24gMy4xNi4wLTQtYW1kNjQgKGRlYmlhbi1rZXJuZWxAbGlzdHMuZGViaWFuLm9yZykgKGdjYyB2
ZXJzaW9uIDQuOC40IChEZWJpYW4gNC44LjQtMSkgKSAjMSBTTVAgRGViaWFuIDMuMTYuNy1ja3Q5
LTN+ZGViOHUxICgyMDE1LTA0LTI0KQpbICAgIDAuMDAwMDAwXSBDb21tYW5kIGxpbmU6IHJvb3Q9
L2Rldi94dmRhMiBybyB4ZW4tZmJmcm9udC52aWRlbz0xNiwxMDI0LDc2OApbICAgIDAuMDAwMDAw
XSBBQ1BJIGluIHVucHJpdmlsZWdlZCBkb21haW4gZGlzYWJsZWQKWyAgICAwLjAwMDAwMF0gMS0x
IG1hcHBpbmcgb24gODAwMDAtPjgwMDAwMDAKWyAgICAwLjAwMDAwMF0gZTgyMDogQklPUy1wcm92
aWRlZCBwaHlzaWNhbCBSQU0gbWFwOgpbICAgIDAuMDAwMDAwXSBYZW46IFttZW0gMHgwMDAwMDAw
MDAwMDAwMDAwLTB4MDAwMDAwMDAwMDA5ZmZmZl0gdXNhYmxlClsgICAgMC4wMDAwMDBdIFhlbjog
W21lbSAweDAwMDAwMDAwMDAwYTAwMDAtMHgwMDAwMDAwMDAwMGZmZmZmXSByZXNlcnZlZApbICAg
IDAuMDAwMDAwXSBYZW46IFttZW0gMHgwMDAwMDAwMDAwMTAwMDAwLTB4MDAwMDAwMDA3ZmZmZmZm
Zl0gdXNhYmxlClsgICAgMC4wMDAwMDBdIE5YIChFeGVjdXRlIERpc2FibGUpIHByb3RlY3Rpb246
IGFjdGl2ZQpbICAgIDAuMDAwMDAwXSBETUkgbm90IHByZXNlbnQgb3IgaW52YWxpZC4KWyAgICAw
LjAwMDAwMF0gZTgyMDogdXBkYXRlIFttZW0gMHgwMDAwMDAwMC0weDAwMDAwZmZmXSB1c2FibGUg
PT0+IHJlc2VydmVkClsgICAgMC4wMDAwMDBdIGU4MjA6IHJlbW92ZSBbbWVtIDB4MDAwYTAwMDAt
MHgwMDBmZmZmZl0gdXNhYmxlClsgICAgMC4wMDAwMDBdIEFHUDogTm8gQUdQIGJyaWRnZSBmb3Vu
ZApbICAgIDAuMDAwMDAwXSBlODIwOiBsYXN0X3BmbiA9IDB4ODAwMDAgbWF4X2FyY2hfcGZuID0g
MHg0MDAwMDAwMDAKWyAgICAwLjAwMDAwMF0gQmFzZSBtZW1vcnkgdHJhbXBvbGluZSBhdCBbZmZm
Zjg4MDAwMDA5YTAwMF0gOWEwMDAgc2l6ZSAyNDU3NgpbICAgIDAuMDAwMDAwXSBpbml0X21lbW9y
eV9tYXBwaW5nOiBbbWVtIDB4MDAwMDAwMDAtMHgwMDBmZmZmZl0KWyAgICAwLjAwMDAwMF0gIFtt
ZW0gMHgwMDAwMDAwMC0weDAwMGZmZmZmXSBwYWdlIDRrClsgICAgMC4wMDAwMDBdIGluaXRfbWVt
b3J5X21hcHBpbmc6IFttZW0gMHg3ZmUwMDAwMC0weDdmZmZmZmZmXQpbICAgIDAuMDAwMDAwXSAg
W21lbSAweDdmZTAwMDAwLTB4N2ZmZmZmZmZdIHBhZ2UgNGsKWyAgICAwLjAwMDAwMF0gQlJLIFsw
eDAxYjA0MDAwLCAweDAxYjA0ZmZmXSBQR1RBQkxFClsgICAgMC4wMDAwMDBdIEJSSyBbMHgwMWIw
NTAwMCwgMHgwMWIwNWZmZl0gUEdUQUJMRQpbICAgIDAuMDAwMDAwXSBpbml0X21lbW9yeV9tYXBw
aW5nOiBbbWVtIDB4N2MwMDAwMDAtMHg3ZmRmZmZmZl0KWyAgICAwLjAwMDAwMF0gIFttZW0gMHg3
YzAwMDAwMC0weDdmZGZmZmZmXSBwYWdlIDRrClsgICAgMC4wMDAwMDBdIEJSSyBbMHgwMWIwNjAw
MCwgMHgwMWIwNmZmZl0gUEdUQUJMRQpbICAgIDAuMDAwMDAwXSBCUksgWzB4MDFiMDcwMDAsIDB4
MDFiMDdmZmZdIFBHVEFCTEUKWyAgICAwLjAwMDAwMF0gQlJLIFsweDAxYjA4MDAwLCAweDAxYjA4
ZmZmXSBQR1RBQkxFClsgICAgMC4wMDAwMDBdIEJSSyBbMHgwMWIwOTAwMCwgMHgwMWIwOWZmZl0g
UEdUQUJMRQpbICAgIDAuMDAwMDAwXSBpbml0X21lbW9yeV9tYXBwaW5nOiBbbWVtIDB4MDAxMDAw
MDAtMHg3YmZmZmZmZl0KWyAgICAwLjAwMDAwMF0gIFttZW0gMHgwMDEwMDAwMC0weDdiZmZmZmZm
XSBwYWdlIDRrClsgICAgMC4wMDAwMDBdIFJBTURJU0s6IFttZW0gMHgwMWYxODAwMC0weDA0ZGY3
ZmZmXQpbICAgIDAuMDAwMDAwXSBOVU1BIHR1cm5lZCBvZmYKWyAgICAwLjAwMDAwMF0gRmFraW5n
IGEgbm9kZSBhdCBbbWVtIDB4MDAwMDAwMDAwMDAwMDAwMC0weDAwMDAwMDAwN2ZmZmZmZmZdClsg
ICAgMC4wMDAwMDBdIEluaXRtZW0gc2V0dXAgbm9kZSAwIFttZW0gMHgwMDAwMDAwMC0weDdmZmZm
ZmZmXQpbICAgIDAuMDAwMDAwXSAgIE5PREVfREFUQSBbbWVtIDB4N2ZjMmEwMDAtMHg3ZmMyZWZm
Zl0KWyAgICAwLjAwMDAwMF0gWm9uZSByYW5nZXM6ClsgICAgMC4wMDAwMDBdICAgRE1BICAgICAg
W21lbSAweDAwMDAxMDAwLTB4MDBmZmZmZmZdClsgICAgMC4wMDAwMDBdICAgRE1BMzIgICAgW21l
bSAweDAxMDAwMDAwLTB4ZmZmZmZmZmZdClsgICAgMC4wMDAwMDBdICAgTm9ybWFsICAgZW1wdHkK
WyAgICAwLjAwMDAwMF0gTW92YWJsZSB6b25lIHN0YXJ0IGZvciBlYWNoIG5vZGUKWyAgICAwLjAw
MDAwMF0gRWFybHkgbWVtb3J5IG5vZGUgcmFuZ2VzClsgICAgMC4wMDAwMDBdICAgbm9kZSAgIDA6
IFttZW0gMHgwMDAwMTAwMC0weDAwMDlmZmZmXQpbICAgIDAuMDAwMDAwXSAgIG5vZGUgICAwOiBb
bWVtIDB4MDAxMDAwMDAtMHg3ZmZmZmZmZl0KWyAgICAwLjAwMDAwMF0gT24gbm9kZSAwIHRvdGFs
cGFnZXM6IDUyNDE5MQpbICAgIDAuMDAwMDAwXSAgIERNQSB6b25lOiA1NiBwYWdlcyB1c2VkIGZv
ciBtZW1tYXAKWyAgICAwLjAwMDAwMF0gICBETUEgem9uZTogMjEgcGFnZXMgcmVzZXJ2ZWQKWyAg
ICAwLjAwMDAwMF0gICBETUEgem9uZTogMzk5OSBwYWdlcywgTElGTyBiYXRjaDowClsgICAgMC4w
MDAwMDBdICAgRE1BMzIgem9uZTogNzExMiBwYWdlcyB1c2VkIGZvciBtZW1tYXAKWyAgICAwLjAw
MDAwMF0gICBETUEzMiB6b25lOiA1MjAxOTIgcGFnZXMsIExJRk8gYmF0Y2g6MzEKWyAgICAwLjAw
MDAwMF0gU0ZJOiBTaW1wbGUgRmlybXdhcmUgSW50ZXJmYWNlIHYwLjgxIGh0dHA6Ly9zaW1wbGVm
aXJtd2FyZS5vcmcKWyAgICAwLjAwMDAwMF0gc21wYm9vdDogQWxsb3dpbmcgNCBDUFVzLCAwIGhv
dHBsdWcgQ1BVcwpbICAgIDAuMDAwMDAwXSBucl9pcnFzX2dzaTogMTYKWyAgICAwLjAwMDAwMF0g
UE06IFJlZ2lzdGVyZWQgbm9zYXZlIG1lbW9yeTogW21lbSAweDAwMGEwMDAwLTB4MDAwZmZmZmZd
ClsgICAgMC4wMDAwMDBdIGU4MjA6IFttZW0gMHg4MDAwMDAwMC0weGZmZmZmZmZmXSBhdmFpbGFi
bGUgZm9yIFBDSSBkZXZpY2VzClsgICAgMC4wMDAwMDBdIEJvb3RpbmcgcGFyYXZpcnR1YWxpemVk
IGtlcm5lbCBvbiBYZW4KWyAgICAwLjAwMDAwMF0gWGVuIHZlcnNpb246IDQuNC4xIChwcmVzZXJ2
ZS1BRCkKWyAgICAwLjAwMDAwMF0gc2V0dXBfcGVyY3B1OiBOUl9DUFVTOjUxMiBucl9jcHVtYXNr
X2JpdHM6NTEyIG5yX2NwdV9pZHM6NCBucl9ub2RlX2lkczoxClsgICAgMC4wMDAwMDBdIFBFUkNQ
VTogRW1iZWRkZWQgMjcgcGFnZXMvY3B1IEBmZmZmODgwMDdmMjAwMDAwIHM4MDg5NiByODE5MiBk
MjE1MDQgdTUyNDI4OApbICAgIDAuMDAwMDAwXSBwY3B1LWFsbG9jOiBzODA4OTYgcjgxOTIgZDIx
NTA0IHU1MjQyODggYWxsb2M9MSoyMDk3MTUyClsgICAgMC4wMDAwMDBdIHBjcHUtYWxsb2M6IFsw
XSAwIDEgMiAzIApbICAgIDAuMDAwMDAwXSBCdWlsdCAxIHpvbmVsaXN0cyBpbiBOb2RlIG9yZGVy
LCBtb2JpbGl0eSBncm91cGluZyBvbi4gIFRvdGFsIHBhZ2VzOiA1MTcwMDIKWyAgICAwLjAwMDAw
MF0gUG9saWN5IHpvbmU6IERNQTMyClsgICAgMC4wMDAwMDBdIEtlcm5lbCBjb21tYW5kIGxpbmU6
IHJvb3Q9L2Rldi94dmRhMiBybyB4ZW4tZmJmcm9udC52aWRlbz0xNiwxMDI0LDc2OApbICAgIDAu
MDAwMDAwXSBQSUQgaGFzaCB0YWJsZSBlbnRyaWVzOiA0MDk2IChvcmRlcjogMywgMzI3NjggYnl0
ZXMpClsgICAgMC4wMDAwMDBdIHhzYXZlOiBlbmFibGVkIHhzdGF0ZV9idiAweDcsIGNudHh0IHNp
emUgMHgzNDAKWyAgICAwLjAwMDAwMF0gQUdQOiBDaGVja2luZyBhcGVydHVyZS4uLgpbICAgIDAu
MDAwMDAwXSBBR1A6IE5vIEFHUCBicmlkZ2UgZm91bmQKWyAgICAwLjAwMDAwMF0gQ2FsZ2FyeTog
ZGV0ZWN0aW5nIENhbGdhcnkgdmlhIEJJT1MgRUJEQSBhcmVhClsgICAgMC4wMDAwMDBdIENhbGdh
cnk6IFVuYWJsZSB0byBsb2NhdGUgUmlvIEdyYW5kZSB0YWJsZSBpbiBFQkRBIC0gYmFpbGluZyEK
WyAgICAwLjAwMDAwMF0gTWVtb3J5OiAxOTk5NzUySy8yMDk2NzY0SyBhdmFpbGFibGUgKDUyMDdL
IGtlcm5lbCBjb2RlLCA5NDZLIHJ3ZGF0YSwgMTgzMksgcm9kYXRhLCAxMjA0SyBpbml0LCA4NDBL
IGJzcywgOTcwMTJLIHJlc2VydmVkKQpbICAgIDAuMDAwMDAwXSBIaWVyYXJjaGljYWwgUkNVIGlt
cGxlbWVudGF0aW9uLgpbICAgIDAuMDAwMDAwXSAJUkNVIGR5bnRpY2staWRsZSBncmFjZS1wZXJp
b2QgYWNjZWxlcmF0aW9uIGlzIGVuYWJsZWQuClsgICAgMC4wMDAwMDBdIAlSQ1UgcmVzdHJpY3Rp
bmcgQ1BVcyBmcm9tIE5SX0NQVVM9NTEyIHRvIG5yX2NwdV9pZHM9NC4KWyAgICAwLjAwMDAwMF0g
UkNVOiBBZGp1c3RpbmcgZ2VvbWV0cnkgZm9yIHJjdV9mYW5vdXRfbGVhZj0xNiwgbnJfY3B1X2lk
cz00ClsgICAgMC4wMDAwMDBdIE5SX0lSUVM6MzMwMjQgbnJfaXJxczozMDQgMTYKWyAgICAwLjAw
MDAwMF0geGVuOmV2ZW50czogVXNpbmcgRklGTy1iYXNlZCBBQkkKWyAgICAwLjAwMDAwMF0gQ29u
c29sZTogY29sb3VyIGR1bW15IGRldmljZSA4MHgyNQpbICAgIDAuMDAwMDAwXSBjb25zb2xlIFt0
dHkwXSBlbmFibGVkClsgICAgMC4wMDAwMDBdIGNvbnNvbGUgW2h2YzBdIGVuYWJsZWQKWyAgICAw
LjAwMDAwMF0gWGVuOiB1c2luZyB2Y3B1b3AgdGltZXIgaW50ZXJmYWNlClsgICAgMC4wMDAwMDBd
IGluc3RhbGxpbmcgWGVuIHRpbWVyIGZvciBDUFUgMApbICAgIDAuMDAwMDAwXSB0c2M6IERldGVj
dGVkIDMzOTIuMTc4IE1IeiBwcm9jZXNzb3IKWyAgICAwLjAwNDAwMF0gQ2FsaWJyYXRpbmcgZGVs
YXkgbG9vcCAoc2tpcHBlZCksIHZhbHVlIGNhbGN1bGF0ZWQgdXNpbmcgdGltZXIgZnJlcXVlbmN5
Li4gNjc4NC4zNSBCb2dvTUlQUyAobHBqPTEzNTY4NzEyKQpbICAgIDAuMDA0MDAwXSBwaWRfbWF4
OiBkZWZhdWx0OiAzMjc2OCBtaW5pbXVtOiAzMDEKWyAgICAwLjAwNDAwMF0gU2VjdXJpdHkgRnJh
bWV3b3JrIGluaXRpYWxpemVkClsgICAgMC4wMDQwMDBdIEFwcEFybW9yOiBBcHBBcm1vciBkaXNh
YmxlZCBieSBib290IHRpbWUgcGFyYW1ldGVyClsgICAgMC4wMDQwMDBdIFlhbWE6IGRpc2FibGVk
IGJ5IGRlZmF1bHQ7IGVuYWJsZSB3aXRoIHN5c2N0bCBrZXJuZWwueWFtYS4qClsgICAgMC4wMDQw
MDBdIERlbnRyeSBjYWNoZSBoYXNoIHRhYmxlIGVudHJpZXM6IDI2MjE0NCAob3JkZXI6IDksIDIw
OTcxNTIgYnl0ZXMpClsgICAgMC4wMDQwMDBdIElub2RlLWNhY2hlIGhhc2ggdGFibGUgZW50cmll
czogMTMxMDcyIChvcmRlcjogOCwgMTA0ODU3NiBieXRlcykKWyAgICAwLjAwNDAwMF0gTW91bnQt
Y2FjaGUgaGFzaCB0YWJsZSBlbnRyaWVzOiA0MDk2IChvcmRlcjogMywgMzI3NjggYnl0ZXMpClsg
ICAgMC4wMDQwMDBdIE1vdW50cG9pbnQtY2FjaGUgaGFzaCB0YWJsZSBlbnRyaWVzOiA0MDk2IChv
cmRlcjogMywgMzI3NjggYnl0ZXMpClsgICAgMC4wMDQwMDBdIEluaXRpYWxpemluZyBjZ3JvdXAg
c3Vic3lzIG1lbW9yeQpbICAgIDAuMDA0MDAwXSBJbml0aWFsaXppbmcgY2dyb3VwIHN1YnN5cyBk
ZXZpY2VzClsgICAgMC4wMDQwMDBdIEluaXRpYWxpemluZyBjZ3JvdXAgc3Vic3lzIGZyZWV6ZXIK
WyAgICAwLjAwNDAwMF0gSW5pdGlhbGl6aW5nIGNncm91cCBzdWJzeXMgbmV0X2NscwpbICAgIDAu
MDA0MDAwXSBJbml0aWFsaXppbmcgY2dyb3VwIHN1YnN5cyBibGtpbwpbICAgIDAuMDA0MDAwXSBJ
bml0aWFsaXppbmcgY2dyb3VwIHN1YnN5cyBwZXJmX2V2ZW50ClsgICAgMC4wMDQwMDBdIEluaXRp
YWxpemluZyBjZ3JvdXAgc3Vic3lzIG5ldF9wcmlvClsgICAgMC4wMDQwMDBdIEVORVJHWV9QRVJG
X0JJQVM6IFNldCB0byAnbm9ybWFsJywgd2FzICdwZXJmb3JtYW5jZScKRU5FUkdZX1BFUkZfQklB
UzogVmlldyBhbmQgdXBkYXRlIHdpdGggeDg2X2VuZXJneV9wZXJmX3BvbGljeSg4KQpbICAgIDAu
MDA0MDAwXSBDUFU6IFBoeXNpY2FsIFByb2Nlc3NvciBJRDogMApbICAgIDAuMDA0MDAwXSBDUFU6
IFByb2Nlc3NvciBDb3JlIElEOiAzClsgICAgMC4wMDQwMDBdIExhc3QgbGV2ZWwgaVRMQiBlbnRy
aWVzOiA0S0IgMTAyNCwgMk1CIDEwMjQsIDRNQiAxMDI0Ckxhc3QgbGV2ZWwgZFRMQiBlbnRyaWVz
OiA0S0IgMTAyNCwgMk1CIDEwMjQsIDRNQiAxMDI0LCAxR0IgNAp0bGJfZmx1c2hhbGxfc2hpZnQ6
IDYKWyAgICAwLjAxNzY5OV0gZnRyYWNlOiBhbGxvY2F0aW5nIDIxNjE0IGVudHJpZXMgaW4gODUg
cGFnZXMKWyAgICAwLjAyNDA2Nl0gUGVyZm9ybWFuY2UgRXZlbnRzOiB1bnN1cHBvcnRlZCBwNiBD
UFUgbW9kZWwgNjAgbm8gUE1VIGRyaXZlciwgc29mdHdhcmUgZXZlbnRzIG9ubHkuClsgICAgMC4w
MjUwMzBdIE5NSSB3YXRjaGRvZzogZGlzYWJsZWQgKGNwdTApOiBoYXJkd2FyZSBldmVudHMgbm90
IGVuYWJsZWQKWyAgICAwLjAyNTA4NF0gaW5zdGFsbGluZyBYZW4gdGltZXIgZm9yIENQVSAxClsg
ICAgMC4wMjUxMzZdIFNNUCBhbHRlcm5hdGl2ZXM6IHN3aXRjaGluZyB0byBTTVAgY29kZQpbICAg
IDAuMDM5MzE1XSBpbnN0YWxsaW5nIFhlbiB0aW1lciBmb3IgQ1BVIDIKWyAgICAwLjA0MDIzOV0g
aW5zdGFsbGluZyBYZW4gdGltZXIgZm9yIENQVSAzClsgICAgMC4wNDExMTBdIHg4NjogQm9vdGVk
IHVwIDEgbm9kZSwgNCBDUFVzClsgICAgMC4wNDExNDhdIGRldnRtcGZzOiBpbml0aWFsaXplZApb
ICAgIDAuMDQxMjkwXSBwaW5jdHJsIGNvcmU6IGluaXRpYWxpemVkIHBpbmN0cmwgc3Vic3lzdGVt
ClsgICAgMC4wNDEyOTBdIE5FVDogUmVnaXN0ZXJlZCBwcm90b2NvbCBmYW1pbHkgMTYKWyAgICAw
LjA0MTI5MF0geGVuOmdyYW50X3RhYmxlOiBHcmFudCB0YWJsZXMgdXNpbmcgdmVyc2lvbiAxIGxh
eW91dApbICAgIDAuMDQxMjkwXSBHcmFudCB0YWJsZSBpbml0aWFsaXplZApbICAgIDAuMDQxMjkw
XSBQQ0k6IHNldHRpbmcgdXAgWGVuIFBDSSBmcm9udGVuZCBzdHViClsgICAgMC4wNDEyOTBdIFBD
STogcGNpX2NhY2hlX2xpbmVfc2l6ZSBzZXQgdG8gNjQgYnl0ZXMKWyAgICAwLjA1MjA4MF0gQUNQ
STogSW50ZXJwcmV0ZXIgZGlzYWJsZWQuClsgICAgMC4wNTIwODBdIHhlbjpiYWxsb29uOiBJbml0
aWFsaXNpbmcgYmFsbG9vbiBkcml2ZXIKWyAgICAwLjA1NjAxNF0geGVuX2JhbGxvb246IEluaXRp
YWxpc2luZyBiYWxsb29uIGRyaXZlcgpbICAgIDAuMDU2MDMwXSB2Z2FhcmI6IGxvYWRlZApbICAg
IDAuMDU2MDUxXSBQQ0k6IFN5c3RlbSBkb2VzIG5vdCBzdXBwb3J0IFBDSQpbICAgIDAuMDU2MDUz
XSBQQ0k6IFN5c3RlbSBkb2VzIG5vdCBzdXBwb3J0IFBDSQpbICAgIDAuMDU2MTQ1XSBTd2l0Y2hl
ZCB0byBjbG9ja3NvdXJjZSB4ZW4KWyAgICAwLjA1OTQwOF0gcG5wOiBQblAgQUNQSTogZGlzYWJs
ZWQKWyAgICAwLjA2MDg3N10gTkVUOiBSZWdpc3RlcmVkIHByb3RvY29sIGZhbWlseSAyClsgICAg
MC4wNjEwNDddIFRDUCBlc3RhYmxpc2hlZCBoYXNoIHRhYmxlIGVudHJpZXM6IDE2Mzg0IChvcmRl
cjogNSwgMTMxMDcyIGJ5dGVzKQpbICAgIDAuMDYxMDg5XSBUQ1AgYmluZCBoYXNoIHRhYmxlIGVu
dHJpZXM6IDE2Mzg0IChvcmRlcjogNiwgMjYyMTQ0IGJ5dGVzKQpbICAgIDAuMDYxMTE5XSBUQ1A6
IEhhc2ggdGFibGVzIGNvbmZpZ3VyZWQgKGVzdGFibGlzaGVkIDE2Mzg0IGJpbmQgMTYzODQpClsg
ICAgMC4wNjExMzFdIFRDUDogcmVubyByZWdpc3RlcmVkClsgICAgMC4wNjExMzddIFVEUCBoYXNo
IHRhYmxlIGVudHJpZXM6IDEwMjQgKG9yZGVyOiAzLCAzMjc2OCBieXRlcykKWyAgICAwLjA2MTE0
Nl0gVURQLUxpdGUgaGFzaCB0YWJsZSBlbnRyaWVzOiAxMDI0IChvcmRlcjogMywgMzI3NjggYnl0
ZXMpClsgICAgMC4wNjExOTJdIE5FVDogUmVnaXN0ZXJlZCBwcm90b2NvbCBmYW1pbHkgMQpbICAg
IDAuMDYxMjAxXSBQQ0k6IENMUyAwIGJ5dGVzLCBkZWZhdWx0IDY0ClsgICAgMC4wNjEyMjZdIFVu
cGFja2luZyBpbml0cmFtZnMuLi4KWyAgICAwLjA4NzEzNl0gRnJlZWluZyBpbml0cmQgbWVtb3J5
OiA0ODAwMEsgKGZmZmY4ODAwMDFmMTgwMDAgLSBmZmZmODgwMDA0ZGY4MDAwKQpbICAgIDAuMDg3
MjMyXSBwbGF0Zm9ybSBydGNfY21vczogcmVnaXN0ZXJlZCBwbGF0Zm9ybSBSVEMgZGV2aWNlIChu
byBQTlAgZGV2aWNlIGZvdW5kKQpbICAgIDAuMDg3Mzc2XSBSQVBMIFBNVSBkZXRlY3RlZCwgaHcg
dW5pdCAyXi0xNCBKb3VsZXMsIEFQSSB1bml0IGlzIDJeLTMyIEpvdWxlcywgNCBmaXhlZCBjb3Vu
dGVycyA2NTUzNjAgbXMgb3ZmbCB0aW1lcgpbICAgIDAuMDg3Mzk5XSBtaWNyb2NvZGU6IENQVTAg
c2lnPTB4MzA2YzMsIHBmPTB4MiwgcmV2aXNpb249MHg5ClsgICAgMC4wODc0MThdIG1pY3JvY29k
ZTogQ1BVMSBzaWc9MHgzMDZjMywgcGY9MHgyLCByZXZpc2lvbj0weDkKWyAgICAwLjA4NzQzMF0g
bWljcm9jb2RlOiBDUFUyIHNpZz0weDMwNmMzLCBwZj0weDIsIHJldmlzaW9uPTB4OQpbICAgIDAu
MDg3NDUwXSBtaWNyb2NvZGU6IENQVTMgc2lnPTB4MzA2YzMsIHBmPTB4MiwgcmV2aXNpb249MHg5
ClsgICAgMC4wODc1MjNdIG1pY3JvY29kZTogTWljcm9jb2RlIFVwZGF0ZSBEcml2ZXI6IHYyLjAw
IDx0aWdyYW5AYWl2YXppYW4uZnNuZXQuY28udWs+LCBQZXRlciBPcnViYQpbICAgIDAuMDg3NzMz
XSBmdXRleCBoYXNoIHRhYmxlIGVudHJpZXM6IDEwMjQgKG9yZGVyOiA0LCA2NTUzNiBieXRlcykK
WyAgICAwLjE5Mzg1N10gYXVkaXQ6IGluaXRpYWxpemluZyBuZXRsaW5rIHN1YnN5cyAoZGlzYWJs
ZWQpClsgICAgMC4xOTM4NzVdIGF1ZGl0OiB0eXBlPTIwMDAgYXVkaXQoMTQzNDEyMDExOC45Njk6
MSk6IGluaXRpYWxpemVkClsgICAgMC4xOTQxNDRdIEh1Z2VUTEIgcmVnaXN0ZXJlZCAyIE1CIHBh
Z2Ugc2l6ZSwgcHJlLWFsbG9jYXRlZCAwIHBhZ2VzClsgICAgMC4xOTQxNjFdIHpidWQ6IGxvYWRl
ZApbICAgIDAuMTk0MzcxXSBWRlM6IERpc2sgcXVvdGFzIGRxdW90XzYuNS4yClsgICAgMC4xOTQz
ODZdIERxdW90LWNhY2hlIGhhc2ggdGFibGUgZW50cmllczogNTEyIChvcmRlciAwLCA0MDk2IGJ5
dGVzKQpbICAgIDAuMTk0NDI1XSBtc2dtbmkgaGFzIGJlZW4gc2V0IHRvIDM5NjcKWyAgICAwLjE5
NDcwMV0gYWxnOiBObyB0ZXN0IGZvciBzdGRybmcgKGtybmcpClsgICAgMC4xOTQ3MjldIEJsb2Nr
IGxheWVyIFNDU0kgZ2VuZXJpYyAoYnNnKSBkcml2ZXIgdmVyc2lvbiAwLjQgbG9hZGVkIChtYWpv
ciAyNTIpClsgICAgMC4xOTQ3ODZdIGlvIHNjaGVkdWxlciBub29wIHJlZ2lzdGVyZWQKWyAgICAw
LjE5NDc5M10gaW8gc2NoZWR1bGVyIGRlYWRsaW5lIHJlZ2lzdGVyZWQKWyAgICAwLjE5NDgzMV0g
aW8gc2NoZWR1bGVyIGNmcSByZWdpc3RlcmVkIChkZWZhdWx0KQpbICAgIDAuMTk0ODgzXSBwY2lf
aG90cGx1ZzogUENJIEhvdCBQbHVnIFBDSSBDb3JlIHZlcnNpb246IDAuNQpbICAgIDAuMTk0ODk5
XSBwY2llaHA6IFBDSSBFeHByZXNzIEhvdCBQbHVnIENvbnRyb2xsZXIgRHJpdmVyIHZlcnNpb246
IDAuNApbICAgIDAuMTk5ODM0XSBDb25zb2xlOiBzd2l0Y2hpbmcgdG8gY29sb3VyIGZyYW1lIGJ1
ZmZlciBkZXZpY2UgMTI4eDQ4ClsgICAgMC4yMDEwOTVdIGNvbnNvbGUgW3R0eTBdIGRpc2FibGVk
ClsgICAgMC4yMDExMTldIGNvbnNvbGUgW3R0eTBdIGVuYWJsZWQKWyAgICAwLjIwMTIxN10gaW50
ZWxfaWRsZTogZG9lcyBub3QgcnVuIG9uIGZhbWlseSA2IG1vZGVsIDYwClsgICAgMC4yMDE1OTBd
IFNlcmlhbDogODI1MC8xNjU1MCBkcml2ZXIsIDQgcG9ydHMsIElSUSBzaGFyaW5nIGVuYWJsZWQK
WyAgICAwLjIwMTg5M10gTGludXggYWdwZ2FydCBpbnRlcmZhY2UgdjAuMTAzClsgICAgMC4yMDE5
OTJdIGk4MDQyOiBQTlA6IE5vIFBTLzIgY29udHJvbGxlciBmb3VuZC4gUHJvYmluZyBwb3J0cyBk
aXJlY3RseS4KWyAgICAxLjIwMjAzM10gaTgwNDI6IE5vIGNvbnRyb2xsZXIgZm91bmQKWyAgICAx
LjIwMjE3MF0gbW91c2VkZXY6IFBTLzIgbW91c2UgZGV2aWNlIGNvbW1vbiBmb3IgYWxsIG1pY2UK
WyAgICAxLjIwMjYxMV0gaW5wdXQ6IFhlbiBWaXJ0dWFsIEtleWJvYXJkIGFzIC9kZXZpY2VzL3Zp
cnR1YWwvaW5wdXQvaW5wdXQwClsgICAgMS4yMDI2NzhdIGlucHV0OiBYZW4gVmlydHVhbCBQb2lu
dGVyIGFzIC9kZXZpY2VzL3ZpcnR1YWwvaW5wdXQvaW5wdXQxClsgICAgMS4yNjMyMDRdIHJ0Y19j
bW9zIHJ0Y19jbW9zOiBydGMgY29yZTogcmVnaXN0ZXJlZCBydGNfY21vcyBhcyBydGMwClsgICAg
MS4yNjMzMTNdIHJ0Y19jbW9zOiBwcm9iZSBvZiBydGNfY21vcyBmYWlsZWQgd2l0aCBlcnJvciAt
MzgKWyAgICAxLjI2MzM1Ml0gbGVkdHJpZy1jcHU6IHJlZ2lzdGVyZWQgdG8gaW5kaWNhdGUgYWN0
aXZpdHkgb24gQ1BVcwpbICAgIDEuMjYzMzgxXSBBTUQgSU9NTVV2MiBkcml2ZXIgYnkgSm9lcmcg
Um9lZGVsIDxqb2VyZy5yb2VkZWxAYW1kLmNvbT4KWyAgICAxLjI2MzQxMV0gQU1EIElPTU1VdjIg
ZnVuY3Rpb25hbGl0eSBub3QgYXZhaWxhYmxlIG9uIHRoaXMgc3lzdGVtClsgICAgMS4yNjM1MTJd
IFRDUDogY3ViaWMgcmVnaXN0ZXJlZApbICAgIDEuMjYzNTk0XSBORVQ6IFJlZ2lzdGVyZWQgcHJv
dG9jb2wgZmFtaWx5IDEwClsgICAgMS4yNjM3NzhdIG1pcDY6IE1vYmlsZSBJUHY2ClsgICAgMS4y
NjM3OTJdIE5FVDogUmVnaXN0ZXJlZCBwcm90b2NvbCBmYW1pbHkgMTcKWyAgICAxLjI2MzgxMF0g
bXBsc19nc286IE1QTFMgR1NPIHN1cHBvcnQKWyAgICAxLjI2MzgyNF0gbWNlOiBVbmFibGUgdG8g
aW5pdCBkZXZpY2UgL2Rldi9tY2Vsb2cgKHJjOiAtNSkKWyAgICAxLjI2Mzk3OV0gcmVnaXN0ZXJl
ZCB0YXNrc3RhdHMgdmVyc2lvbiAxClsgICAgMS4yNjQwMzldIHhlbmJ1c19wcm9iZV9mcm9udGVu
ZDogRGV2aWNlIHdpdGggbm8gZHJpdmVyOiBkZXZpY2UvdmJkLzUxNzE0ClsgICAgMS4yNjQwNjld
IHhlbmJ1c19wcm9iZV9mcm9udGVuZDogRGV2aWNlIHdpdGggbm8gZHJpdmVyOiBkZXZpY2UvdmJk
LzUxNzEzClsgICAgMS4yNjQ2NTRdIHhlbmJ1c19wcm9iZV9mcm9udGVuZDogRGV2aWNlIHdpdGgg
bm8gZHJpdmVyOiBkZXZpY2UvdmlmLzAKWyAgICAxLjI2NTI5OV0gL2J1aWxkL2xpbnV4LVJHTV9F
ZC9saW51eC0zLjE2LjctY2t0OS9kcml2ZXJzL3J0Yy9oY3Rvc3lzLmM6IHVuYWJsZSB0byBvcGVu
IHJ0YyBkZXZpY2UgKHJ0YzApClsgICAgMS4yNjU4OTJdIFBNOiBIaWJlcm5hdGlvbiBpbWFnZSBu
b3QgcHJlc2VudCBvciBjb3VsZCBub3QgYmUgbG9hZGVkLgpbICAgIDEuMjY2MjA0XSBGcmVlaW5n
IHVudXNlZCBrZXJuZWwgbWVtb3J5OiAxMjA0SyAoZmZmZmZmZmY4MThlZTAwMCAtIGZmZmZmZmZm
ODFhMWIwMDApClsgICAgMS4yNjY3ODRdIFdyaXRlIHByb3RlY3RpbmcgdGhlIGtlcm5lbCByZWFk
LW9ubHkgZGF0YTogODE5MmsKWyAgICAxLjI2ODk5MF0gRnJlZWluZyB1bnVzZWQga2VybmVsIG1l
bW9yeTogOTI0SyAoZmZmZjg4MDAwMTUxOTAwMCAtIGZmZmY4ODAwMDE2MDAwMDApClsgICAgMS4y
Njk2ODRdIEZyZWVpbmcgdW51c2VkIGtlcm5lbCBtZW1vcnk6IDIxNksgKGZmZmY4ODAwMDE3Y2Ew
MDAgLSBmZmZmODgwMDAxODAwMDAwKQpbICAgIDEuMjg0NjA4XSBzeXN0ZW1kLXVkZXZkWzczXTog
c3RhcnRpbmcgdmVyc2lvbiAyMTUKWyAgICAxLjI4NTYzMl0gcmFuZG9tOiBzeXN0ZW1kLXVkZXZk
IHVyYW5kb20gcmVhZCB3aXRoIDM4IGJpdHMgb2YgZW50cm9weSBhdmFpbGFibGUKWyAgICAxLjI5
MjU2NV0geGVuX25ldGZyb250OiBJbml0aWFsaXNpbmcgWGVuIHZpcnR1YWwgZXRoZXJuZXQgZHJp
dmVyClsgICAgMS4zMTUyMTJdIGJsa2Zyb250OiB4dmRhMjogZmx1c2ggZGlza2NhY2hlOiBlbmFi
bGVkOyBwZXJzaXN0ZW50IGdyYW50czogZW5hYmxlZDsgaW5kaXJlY3QgZGVzY3JpcHRvcnM6IGVu
YWJsZWQ7ClsgICAgMS4zMTY4NTddIGJsa2Zyb250OiB4dmRhMTogZmx1c2ggZGlza2NhY2hlOiBl
bmFibGVkOyBwZXJzaXN0ZW50IGdyYW50czogZW5hYmxlZDsgaW5kaXJlY3QgZGVzY3JpcHRvcnM6
IGVuYWJsZWQ7ClsgICAgMS40OTc3NjFdIGRldmljZS1tYXBwZXI6IHVldmVudDogdmVyc2lvbiAx
LjAuMwpbICAgIDEuNDk4NDQzXSBkZXZpY2UtbWFwcGVyOiBpb2N0bDogNC4yNy4wLWlvY3RsICgy
MDEzLTEwLTMwKSBpbml0aWFsaXNlZDogZG0tZGV2ZWxAcmVkaGF0LmNvbQpbICAgIDYuNTI4Mzgx
XSBFWFQ0LWZzICh4dmRhMik6IG1vdW50aW5nIGV4dDMgZmlsZSBzeXN0ZW0gdXNpbmcgdGhlIGV4
dDQgc3Vic3lzdGVtClsgICAgNi41NDU4MTJdIHJhbmRvbTogbm9uYmxvY2tpbmcgcG9vbCBpcyBp
bml0aWFsaXplZApbICAgIDYuNTYyNzM0XSBFWFQ0LWZzICh4dmRhMik6IG1vdW50ZWQgZmlsZXN5
c3RlbSB3aXRoIG9yZGVyZWQgZGF0YSBtb2RlLiBPcHRzOiAobnVsbCkKWyAgICA3LjEwNjU4Nl0g
c3lzdGVtZFsxXTogc3lzdGVtZCAyMTUgcnVubmluZyBpbiBzeXN0ZW0gbW9kZS4gKCtQQU0gK0FV
RElUICtTRUxJTlVYICtJTUEgK1NZU1ZJTklUICtMSUJDUllQVFNFVFVQICtHQ1JZUFQgK0FDTCAr
WFogLVNFQ0NPTVAgLUFQUEFSTU9SKQpbICAgIDcuMTA4MDMxXSBzeXN0ZW1kWzFdOiBEZXRlY3Rl
ZCB2aXJ0dWFsaXphdGlvbiAneGVuJy4KWyAgICA3LjEwODczMl0gc3lzdGVtZFsxXTogRGV0ZWN0
ZWQgYXJjaGl0ZWN0dXJlICd4ODYtNjQnLgpbICAgIDcuMzE1MDIyXSBzeXN0ZW1kWzFdOiBJbnNl
cnRlZCBtb2R1bGUgJ2F1dG9mczQnClsgICAgNy4zMjUwMzFdIHN5c3RlbWRbMV06IFNldCBob3N0
bmFtZSB0byA8cGlldHJvcC1kZWJpYW42NFJmTD4uClsgICAgNy43MDE2MzhdIHN5c3RlbWRbMV06
IENhbm5vdCBhZGQgZGVwZW5kZW5jeSBqb2IgZm9yIHVuaXQgZGlzcGxheS1tYW5hZ2VyLnNlcnZp
Y2UsIGlnbm9yaW5nOiBVbml0IGRpc3BsYXktbWFuYWdlci5zZXJ2aWNlIGZhaWxlZCB0byBsb2Fk
OiBObyBzdWNoIGZpbGUgb3IgZGlyZWN0b3J5LgpbICAgIDcuNzAzMzM5XSBzeXN0ZW1kWzFdOiBF
eHBlY3RpbmcgZGV2aWNlIGRldi1odmMwLmRldmljZS4uLgpbICAgIDcuNzA0OTMxXSBzeXN0ZW1k
WzFdOiBTdGFydGluZyBGb3J3YXJkIFBhc3N3b3JkIFJlcXVlc3RzIHRvIFdhbGwgRGlyZWN0b3J5
IFdhdGNoLgpbICAgIDcuNzA1NzIwXSBzeXN0ZW1kWzFdOiBTdGFydGVkIEZvcndhcmQgUGFzc3dv
cmQgUmVxdWVzdHMgdG8gV2FsbCBEaXJlY3RvcnkgV2F0Y2guClsgICAgNy43MDY0ODddIHN5c3Rl
bWRbMV06IFN0YXJ0aW5nIFJlbW90ZSBGaWxlIFN5c3RlbXMgKFByZSkuClsgICAgNy43MDgwNTFd
IHN5c3RlbWRbMV06IFJlYWNoZWQgdGFyZ2V0IFJlbW90ZSBGaWxlIFN5c3RlbXMgKFByZSkuClsg
ICAgNy43MDg4MzBdIHN5c3RlbWRbMV06IFN0YXJ0aW5nIEVuY3J5cHRlZCBWb2x1bWVzLgpbICAg
IDcuNzEwNDIxXSBzeXN0ZW1kWzFdOiBSZWFjaGVkIHRhcmdldCBFbmNyeXB0ZWQgVm9sdW1lcy4K
WyAgICA3LjcxMTE5MV0gc3lzdGVtZFsxXTogU3RhcnRpbmcgRGlzcGF0Y2ggUGFzc3dvcmQgUmVx
dWVzdHMgdG8gQ29uc29sZSBEaXJlY3RvcnkgV2F0Y2guClsgICAgNy43MTE5ODBdIHN5c3RlbWRb
MV06IFN0YXJ0ZWQgRGlzcGF0Y2ggUGFzc3dvcmQgUmVxdWVzdHMgdG8gQ29uc29sZSBEaXJlY3Rv
cnkgV2F0Y2guClsgICAgNy43MTI3NTBdIHN5c3RlbWRbMV06IFN0YXJ0aW5nIFBhdGhzLgpbICAg
IDcuNzE0Mjk1XSBzeXN0ZW1kWzFdOiBSZWFjaGVkIHRhcmdldCBQYXRocy4KWyAgICA3LjcxNTA1
NV0gc3lzdGVtZFsxXTogU3RhcnRpbmcgQXJiaXRyYXJ5IEV4ZWN1dGFibGUgRmlsZSBGb3JtYXRz
IEZpbGUgU3lzdGVtIEF1dG9tb3VudCBQb2ludC4KWyAgICA3LjcxNjY4N10gc3lzdGVtZFsxXTog
U2V0IHVwIGF1dG9tb3VudCBBcmJpdHJhcnkgRXhlY3V0YWJsZSBGaWxlIEZvcm1hdHMgRmlsZSBT
eXN0ZW0gQXV0b21vdW50IFBvaW50LgpbICAgIDcuNzE3NDYzXSBzeXN0ZW1kWzFdOiBFeHBlY3Rp
bmcgZGV2aWNlIGRldi14dmRhMS5kZXZpY2UuLi4KWyAgICA3LjcxOTAzMF0gc3lzdGVtZFsxXTog
U3RhcnRpbmcgUm9vdCBTbGljZS4KWyAgICA3LjcyMDYwMl0gc3lzdGVtZFsxXTogQ3JlYXRlZCBz
bGljZSBSb290IFNsaWNlLgpbICAgIDcuNzIxMzQ2XSBzeXN0ZW1kWzFdOiBTdGFydGluZyBVc2Vy
IGFuZCBTZXNzaW9uIFNsaWNlLgpbICAgIDcuNzIzMzI0XSBzeXN0ZW1kWzFdOiBDcmVhdGVkIHNs
aWNlIFVzZXIgYW5kIFNlc3Npb24gU2xpY2UuClsgICAgNy43MjQxMzFdIHN5c3RlbWRbMV06IFN0
YXJ0aW5nIERlbGF5ZWQgU2h1dGRvd24gU29ja2V0LgpbICAgIDcuNzI1NTk1XSBzeXN0ZW1kWzFd
OiBMaXN0ZW5pbmcgb24gRGVsYXllZCBTaHV0ZG93biBTb2NrZXQuClsgICAgNy43MjYzMTBdIHN5
c3RlbWRbMV06IFN0YXJ0aW5nIC9kZXYvaW5pdGN0bCBDb21wYXRpYmlsaXR5IE5hbWVkIFBpcGUu
ClsgICAgNy43Mjc3ODldIHN5c3RlbWRbMV06IExpc3RlbmluZyBvbiAvZGV2L2luaXRjdGwgQ29t
cGF0aWJpbGl0eSBOYW1lZCBQaXBlLgpbICAgIDcuNzI4NTEyXSBzeXN0ZW1kWzFdOiBTdGFydGlu
ZyBKb3VybmFsIFNvY2tldCAoL2Rldi9sb2cpLgpbICAgIDcuNzI5OTYzXSBzeXN0ZW1kWzFdOiBM
aXN0ZW5pbmcgb24gSm91cm5hbCBTb2NrZXQgKC9kZXYvbG9nKS4KWyAgICA3LjczMDY2Nl0gc3lz
dGVtZFsxXTogU3RhcnRpbmcgdWRldiBDb250cm9sIFNvY2tldC4KWyAgICA3LjczMjExOV0gc3lz
dGVtZFsxXTogTGlzdGVuaW5nIG9uIHVkZXYgQ29udHJvbCBTb2NrZXQuClsgICAgNy43MzI4MDNd
IHN5c3RlbWRbMV06IFN0YXJ0aW5nIHVkZXYgS2VybmVsIFNvY2tldC4KWyAgICA3LjczNDE5Ml0g
c3lzdGVtZFsxXTogTGlzdGVuaW5nIG9uIHVkZXYgS2VybmVsIFNvY2tldC4KWyAgICA3LjczNDg3
MV0gc3lzdGVtZFsxXTogU3RhcnRpbmcgSm91cm5hbCBTb2NrZXQuClsgICAgNy43MzYyODJdIHN5
c3RlbWRbMV06IExpc3RlbmluZyBvbiBKb3VybmFsIFNvY2tldC4KWyAgICA3LjczNjk3NF0gc3lz
dGVtZFsxXTogU3RhcnRpbmcgU3lzdGVtIFNsaWNlLgpbICAgIDcuNzM4MzYzXSBzeXN0ZW1kWzFd
OiBDcmVhdGVkIHNsaWNlIFN5c3RlbSBTbGljZS4KWyAgICA3LjczOTAyM10gc3lzdGVtZFsxXTog
U3RhcnRpbmcgRmlsZSBTeXN0ZW0gQ2hlY2sgb24gUm9vdCBEZXZpY2UuLi4KWyAgICA3Ljc0MTA2
M10gc3lzdGVtZFsxXTogU3RhcnRpbmcgc3lzdGVtLWdldHR5LnNsaWNlLgpbICAgIDcuNzQyNjI5
XSBzeXN0ZW1kWzFdOiBDcmVhdGVkIHNsaWNlIHN5c3RlbS1nZXR0eS5zbGljZS4KWyAgICA3Ljc0
MzI5MF0gc3lzdGVtZFsxXTogU3RhcnRpbmcgc3lzdGVtLXNlcmlhbFx4MmRnZXR0eS5zbGljZS4K
WyAgICA3Ljc0NDYyNV0gc3lzdGVtZFsxXTogQ3JlYXRlZCBzbGljZSBzeXN0ZW0tc2VyaWFsXHgy
ZGdldHR5LnNsaWNlLgpbICAgIDcuNzQ1MjkzXSBzeXN0ZW1kWzFdOiBTdGFydGluZyBJbmNyZWFz
ZSBkYXRhZ3JhbSBxdWV1ZSBsZW5ndGguLi4KWyAgICA3Ljc2Mjg1MF0gc3lzdGVtZFsxXTogU3Rh
cnRlZCBTZXQgVXAgQWRkaXRpb25hbCBCaW5hcnkgRm9ybWF0cy4KWyAgICA3Ljc2MzU0N10gc3lz
dGVtZFsxXTogU3RhcnRpbmcgdWRldiBDb2xkcGx1ZyBhbGwgRGV2aWNlcy4uLgpbICAgIDcuNzY1
NTQzXSBzeXN0ZW1kWzFdOiBNb3VudGluZyBQT1NJWCBNZXNzYWdlIFF1ZXVlIEZpbGUgU3lzdGVt
Li4uClsgICAgNy43Njc3MzJdIHN5c3RlbWRbMV06IE1vdW50aW5nIERlYnVnIEZpbGUgU3lzdGVt
Li4uClsgICAgNy43Njk2NzBdIHN5c3RlbWRbMV06IE1vdW50aW5nIEh1Z2UgUGFnZXMgRmlsZSBT
eXN0ZW0uLi4KWyAgICA3LjgzMDkwN10gc3lzdGVtZFsxXTogU3RhcnRpbmcgTG9hZCBLZXJuZWwg
TW9kdWxlcy4uLgpbICAgIDcuODMyOTg3XSBzeXN0ZW1kWzFdOiBTdGFydGluZyBDcmVhdGUgbGlz
dCBvZiByZXF1aXJlZCBzdGF0aWMgZGV2aWNlIG5vZGVzIGZvciB0aGUgY3VycmVudCBrZXJuZWwu
Li4KWyAgICA3LjgzNDk2OV0gc3lzdGVtZFsxXTogU3RhcnRpbmcgU2xpY2VzLgpbICAgIDcuODM2
NDkwXSBzeXN0ZW1kWzFdOiBSZWFjaGVkIHRhcmdldCBTbGljZXMuClsgICAgNy45MjQwMzZdIHN5
c3RlbWRbMV06IFN0YXJ0ZWQgQ3JlYXRlIGxpc3Qgb2YgcmVxdWlyZWQgc3RhdGljIGRldmljZSBu
b2RlcyBmb3IgdGhlIGN1cnJlbnQga2VybmVsLgpbICAgIDcuOTI1OTI3XSBzeXN0ZW1kWzFdOiBT
dGFydGluZyBDcmVhdGUgU3RhdGljIERldmljZSBOb2RlcyBpbiAvZGV2Li4uClsgICAgNy45MzA0
NjhdIHN5c3RlbWRbMV06IFN0YXJ0ZWQgdWRldiBDb2xkcGx1ZyBhbGwgRGV2aWNlcy4KWyAgICA3
LjkzMjE1M10gc3lzdGVtZFsxXTogTW91bnRlZCBQT1NJWCBNZXNzYWdlIFF1ZXVlIEZpbGUgU3lz
dGVtLgpbICAgIDcuOTMzNTcxXSBzeXN0ZW1kWzFdOiBNb3VudGVkIERlYnVnIEZpbGUgU3lzdGVt
LgpbICAgIDcuOTM0OTg5XSBzeXN0ZW1kWzFdOiBNb3VudGVkIEh1Z2UgUGFnZXMgRmlsZSBTeXN0
ZW0uClsgICAgNy45NDkyNTldIHN5c3RlbWRbMV06IFN0YXJ0ZWQgSW5jcmVhc2UgZGF0YWdyYW0g
cXVldWUgbGVuZ3RoLgpbICAgIDcuOTQ5OTkzXSBzeXN0ZW1kWzFdOiBTdGFydGluZyBTeXNsb2cg
U29ja2V0LgpbICAgIDcuOTUxMzU2XSBzeXN0ZW1kWzFdOiBMaXN0ZW5pbmcgb24gU3lzbG9nIFNv
Y2tldC4KWyAgICA3Ljk1MjAzMF0gc3lzdGVtZFsxXTogU3RhcnRpbmcgSm91cm5hbCBTZXJ2aWNl
Li4uClsgICAgNy45NTQ5NDFdIHN5c3RlbWRbMV06IFN0YXJ0ZWQgSm91cm5hbCBTZXJ2aWNlLgpb
ICAgIDcuOTc0NDE1XSBmdXNlIGluaXQgKEFQSSB2ZXJzaW9uIDcuMjMpClsgICAgOC42NDI4MTJd
IHN5c3RlbWQtdWRldmRbMTYwXTogc3RhcnRpbmcgdmVyc2lvbiAyMTUKWyAgICA5LjE5OTk2OF0g
RVhUNC1mcyAoeHZkYTIpOiByZS1tb3VudGVkLiBPcHRzOiBlcnJvcnM9cmVtb3VudC1ybwpbICAg
IDkuMzQ5NjM5XSBzeXN0ZW1kLWpvdXJuYWxkWzE0N106IFJlY2VpdmVkIHJlcXVlc3QgdG8gZmx1
c2ggcnVudGltZSBqb3VybmFsIGZyb20gUElEIDEKWyAgICA5Ljg1NTI2M10gaW5wdXQ6IFBDIFNw
ZWFrZXIgYXMgL2RldmljZXMvcGxhdGZvcm0vcGNzcGtyL2lucHV0L2lucHV0MgpbICAgMTAuMTMz
MTYxXSBBVlgyIHZlcnNpb24gb2YgZ2NtX2VuYy9kZWMgZW5nYWdlZC4KWyAgIDEwLjEzNTgyMl0g
YWxnOiBObyB0ZXN0IGZvciBfX2djbS1hZXMtYWVzbmkgKF9fZHJpdmVyLWdjbS1hZXMtYWVzbmkp
ClsgICAxMC4xNzI0OTRdIGFsZzogTm8gdGVzdCBmb3IgY3JjMzIgKGNyYzMyLXBjbG11bCkKWyAg
IDEwLjIxOTEzNl0gQWRkaW5nIDI2MjE0MGsgc3dhcCBvbiAvZGV2L3h2ZGExLiAgUHJpb3JpdHk6
LTEgZXh0ZW50czoxIGFjcm9zczoyNjIxNDBrIFNTRlMKWyAgIDEwLjI2NjAwMF0gaW50ZWxfcmFw
bDogRm91bmQgUkFQTCBkb21haW4gcGFja2FnZQpbICAgMTAuMjY2NjM5XSBpbnRlbF9yYXBsOiBG
b3VuZCBSQVBMIGRvbWFpbiBjb3JlClsgICAxMC4yNjcyMjFdIGludGVsX3JhcGw6IEZvdW5kIFJB
UEwgZG9tYWluIGRyYW0K


--=-piSM+XLoeltd8GB+Yn5H
Content-Disposition: attachment; filename="qemu-dm-pietrop-debian64RfL.log"
Content-Type: text/x-log; name="qemu-dm-pietrop-debian64RfL.log"; charset="us-ascii"
Content-Transfer-Encoding: 7bit


--=-piSM+XLoeltd8GB+Yn5H
Content-Disposition: attachment; filename="xl-pietrop-debian64RfL.log"
Content-Type: text/x-log; name="xl-pietrop-debian64RfL.log"; charset="UTF-8"
Content-Transfer-Encoding: base64

V2FpdGluZyBmb3IgZG9tYWluIHBpZXRyb3AtZGViaWFuNjRSZkwgKGRvbWlkIDE5MjIxKSB0byBk
aWUgW3BpZCAzMjM0N10K


--=-piSM+XLoeltd8GB+Yn5H
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=-piSM+XLoeltd8GB+Yn5H--



From xen-users-bounces@lists.xen.org Mon Jun 15 11:55:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 11:55:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4SyA-0007ih-CP; Mon, 15 Jun 2015 11:54:26 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z4Sy8-0007ic-5o
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 11:54:24 +0000
Received: from [193.109.254.147] by server-11.bemta-14.messagelabs.com id
	E1/15-30658-FECBE755; Mon, 15 Jun 2015 11:54:23 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1434369260!23400248!1
X-Originating-IP: [64.12.143.77]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29715 invoked from network); 15 Jun 2015 11:54:21 -0000
Received: from omr-m03.mx.aol.com (HELO omr-m03.mx.aol.com) (64.12.143.77)
	by server-2.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 15 Jun 2015 11:54:21 -0000
Received: from mtaout-aaj01.mx.aol.com (mtaout-aaj01.mx.aol.com [172.27.3.205])
	by omr-m03.mx.aol.com (Outbound Mail Relay) with ESMTP id 4F4AC70036230;
	Mon, 15 Jun 2015 07:54:20 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-aaj01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id A1F1438000094; Mon, 15 Jun 2015 07:54:19 -0400 (EDT)
Message-ID: <1434369268.32728.26.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: Ian Campbell <ian.campbell@citrix.com>
Date: Mon, 15 Jun 2015 12:54:28 +0100
In-Reply-To: <1434127051.30003.233.camel@citrix.com>
References: <E1Z31bs-0002MZ-TR@xenbits.xen.org>
	<1434121543.32728.9.camel@aol.com>
	<1434122349.30003.229.camel@citrix.com>
	<1434126080.32728.16.camel@aol.com>
	<1434127051.30003.233.camel@citrix.com>
Content-Type: multipart/mixed; boundary="=-piSM+XLoeltd8GB+Yn5H"
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
X-AOL-VSS-INFO: 5700.7163/104464
X-AOL-VSS-CODE: clean
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434369260;
	bh=UGwtZypwmXqQ01nca2/XECN8CxD+HfOl6wpR4vD9k4M=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=1evb0XQVqnXNz6Hph+U6TQ2WqUCSirQhcyv7v9guAo64IgH2Cf2BWMpy0j7LqBD1Z
	ZDAT8uAOruMdvKrGyOXxlCIEf6aTcrAhXeTW7BspMbfJZ3pBZ55pPLC8ooaxBlZ7rQ
	pOx/lSdtwAUEXH6DjlUFl83Er5+NHolL4u47zZ6Y=
x-aol-sid: 3039ac1b03cd557ebceb4d0c
X-AOL-IP: 185.25.64.249
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] vfb size
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=-piSM+XLoeltd8GB+Yn5H
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit

On Fri, 2015-06-12 at 17:37 +0100, Ian Campbell wrote:
> On Fri, 2015-06-12 at 17:21 +0100, pietrop wrote:
> > > What do you mean by "configuring the vncserver manually on the guest"?
> > 
> > I have installed the vncserver package and I have started it manually
> > configuring the desired geometry.
> 
> Right, that's an aside to getting xenfb working then.
> 
> > > vncserver and xenfb are two completely orthogonal things. If you are
> > > running vncserver in the guest then that is what you must configure,
> > > xenfb settings have no impact on it.
> > > 
> > > xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> > > (often qemu), there is no vncserver in the guest associated with xenfb.
> > > 
> > 
> > I did not know that, I'd rather prefer to go with xenfb but I am not
> > getting the desired resolution with it, how can I do that ?
> 
> What sort of guest is this? PV or HVM?

Following the link :

http://serverfault.com/questions/511923/determine-which-guest-is-running-on-xen-hvm-or-pv-guest




> 
> Can you post your config file and your in guest dmesg please as well as
> any related log files from under /var/log/xen (in particular the qemu
> one).
> 

This is my configuration file :


#
# Configuration file for the Xen instance pietrop-debian64, created
# by xen-tools 4.5 on Fri May 29 15:12:07 2015.
#

#
#  Kernel + memory size
#
kernel      = '/boot/vmlinuz-3.16.0-4-amd64'
extra       = 'xen-fbfront.video=16,1024,768'
ramdisk     = '/boot/initrd.img-3.16.0-4-amd64'

vcpus       = '4'
memory      = '2048'


#
#  Disk device(s).
#
root        = '/dev/xvda2 ro'
disk        = [
                  'phy:/dev/vg1/pietrop-debian64-disk,xvda2,w',
                  'phy:/dev/vg1/pietrop-debian64-swap,xvda1,w',
              ]


#
#  Physical volumes
#


#
#  Hostname
#
name        = 'pietrop-debian64RfL'

#
#  Networking
#
dhcp        = 'dhcp'
vif         = [ 'mac=00:16:3E:A1:96:3F' ]

#
#  Behaviour
#
on_poweroff = 'destroy'
on_reboot   = 'restart'
on_crash    = 'restart'

vfb = [ 'type=vnc' ]
stdvga=1
videoram=16 

You can find the dmesg and var/log/xen/* logs file as attachment of this
email, I have made an effort in grabbing the latest logs from there
since there are quite a few files in there.


> Lastly, is xen-fbfront a module or statically configured?
> 
I am not sure about that, kernel config file attached; nevertheless what
would it be the right CONFIG line to look at ?

Thanks,
Pietro.


--=-piSM+XLoeltd8GB+Yn5H
Content-Disposition: attachment; filename="dmesg"
Content-Type: text/plain; name="dmesg"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-piSM+XLoeltd8GB+Yn5H
Content-Disposition: attachment; filename="qemu-dm-pietrop-debian64RfL.log"
Content-Type: text/x-log; name="qemu-dm-pietrop-debian64RfL.log"; charset="us-ascii"
Content-Transfer-Encoding: 7bit


--=-piSM+XLoeltd8GB+Yn5H
Content-Disposition: attachment; filename="xl-pietrop-debian64RfL.log"
Content-Type: text/x-log; name="xl-pietrop-debian64RfL.log"; charset="UTF-8"
Content-Transfer-Encoding: base64

V2FpdGluZyBmb3IgZG9tYWluIHBpZXRyb3AtZGViaWFuNjRSZkwgKGRvbWlkIDE5MjIxKSB0byBk
aWUgW3BpZCAzMjM0N10K


--=-piSM+XLoeltd8GB+Yn5H
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=-piSM+XLoeltd8GB+Yn5H--



From xen-users-bounces@lists.xen.org Mon Jun 15 13:06:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 13:06:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4U5L-0005lR-IN; Mon, 15 Jun 2015 13:05:55 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4U5J-0005lL-HI
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 13:05:53 +0000
Received: from [85.158.137.68] by server-13.bemta-3.messagelabs.com id
	BE/65-11060-0BDCE755; Mon, 15 Jun 2015 13:05:52 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-10.tower-31.messagelabs.com!1434373552!16326969!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 23088 invoked from network); 15 Jun 2015 13:05:52 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-10.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 15 Jun 2015 13:05:52 -0000
Received: from joan.univie.ac.at ([131.130.3.110] helo=joan.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z4U5F-0005xi-Bk; Mon, 15 Jun 2015 15:05:49 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by joan.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z4U5F-0006Iy-05; Mon, 15 Jun 2015 15:05:49 +0200
Message-ID: <557ECDAB.2050206@web2web.at>
Date: Mon, 15 Jun 2015 15:05:47 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>, 
	xen-users@lists.xen.org
References: <557E0433.9070307@web2web.at> <557E7FD7.40103@citrix.com>
In-Reply-To: <557E7FD7.40103@citrix.com>
Content-Length: 5210
X-Univie-Virus-Scan: scanned by ClamAV on joan.univie.ac.at
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="windows-1252"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Am 15.06.15 um 09:33 schrieb Roger Pau Monn=E9:
> Hello,
Roger, thanks for your reply.
>
> El 15/06/15 a les 0.46, Atom2 ha escrit:
>> Hi guys,
>> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
>> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
>> and domUs a spin - unfortunately with not too much success:
>>
>>
>> DOM0:
>> For dom0 I simply added dom0pvh=3D1 to the xen command line. The system
>> booted up and I was also able to confirm that dom0 is running in the
>> correct mode by checking with xen-detect.
>>
>> What I however found out is that xen creates a bunch of error/warning
>> messages some of which make it to xl's dmesg file (the majority seems to
>> get dropped due to rate limits). None of these messages are there when
>> started without dom0pvh=3D1. Please see the two attached files for a
>> comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl
>> dmesg in non-PVH mode ("dmesg.xl").
>>
>> There are a few (most likely irrelevant) differences at line 109 to 111
>> relating to messages about the "Start info", the "Page tables", and the
>> "Boot stack". The main difference is in the additional lines in the file
>> "dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines
>> about suppressed messages totalling in excess of 236.000 (ignored)
>> messages.  It's probably worth noteing that no further messages make it
>> to xl's dmesg and also /var/log/messages does not have anything strange
>> once the dom0 is up and running.
> Those are errors from the IOMMU, your BIOS is probably missing some RMRR
> regions. Do you know which devices are at 0000:00:1a.0 and 0000:00:02.0?
Sure:
0000:00:1a.0 is one of the two USB controllers as part of the chipset;
lspci output for this device is as follows:
00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset =

Family USB Enhanced Host Controller #2 (rev 05)

0000:00:02.0 is the integrated graphics chip (IGD) in the XEON processor;
lspci output for this device is as follows:
00:02.0 VGA compatible controller: Intel Corporation Xeon E3-1200 =

Processor Family Integrated Graphics Controller (rev 09)

For reference: The system is a C206 chipset motherboard with a XEON =

E3-1260L processor
The system has 32GB ECC memory installed

>
> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:1a.0] fault addr
> dc086000, iommu reg =3D ffff82c000203000
> (XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
>
> The above error looks reasonable, this memory is between 3 and 4 GiB
> which matches the MMIO hole.
>
> (XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr
> 72c481000, iommu reg =3D ffff82c000201000
> (XEN) [VT-D]DMAR: reason 05 - PTE Write access is not set
>
> This however is very high address, and is within a region marked as
> usable in the memory map:
>
> (XEN)  0000000100000000 - 000000081e600000 (usable)
>
> There are some patches on the list to add additional RMRR regions on the
> command line, however they are not committed yet, so there's not much
> you can try right now (apart from trying it on a different box).
That probably means I'll have to wait and see for further developments, =

most likely in 4.6
I guess there's also nothing for you guys to be gained from this report ...
>
>> It, however, appears that the pvh dom0 compared to the standard dom0
>> consumes _significantly_ more CPU time as shown by "xl info" from within
>> dom0 - which to me seems counter-intuitive given my (limited)
>> understanding of what pvh tries to achieve.
Any idea about that ...
>>
>>
>> DOMU:
>> For a test domU I just added pvh=3D1 to it's (otherwise unchanged)
>> configuration file and tried to start the domU by issuing
>> xl -v -v -v /path/to/config/file -c
>>
>> The domU did not come up at all (but works flawlessly when commenting
>> out the pvh=3D1 configuration line); details of the xl command output for
>> the failed attempt can be found in the attached file xl.domU. I honestly
>> can't make much sense out of the error message which in essence seems to
>> complain about an unsupported feature and a missing file or directory
>> before giving up.
> AFAICT from the log provided you seem to be trying to launch a MiniOS
> based guest with pvh=3D1, which is not supported. MiniOS doesn't support
> the PVH mode yet.
Well, I am using pvgrub to fire up the domUs and provide the grub =

configuration via a ramdisk:

=3D=3D=3D relevant part of my config file =3D=3D=3D
kernel                  =3D '/usr/libexec/xen/boot/pv-grub-x86_64.gz'
ramdisk                 =3D '/etc/xen/guests/grub.d/mysql.grub'
=3D=3D=3D end relevant part of config file =3D=3D=3D

I suppose pvgrub is then what you refer to with the term MiniOS.
Because other than this it's just a standard linux kernel w/ an =

initramfs that get's booted within the domU.

In other words: pvh currently does not work with pvgrub at all?
Any plans to change this - pvgrub IMHO is the most flexible tool to =

start a domU.
Once you get used to that, there's no way back ...
>
> Roger.
Thanks again Atom2

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 15 13:06:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 13:06:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4U5L-0005lR-IN; Mon, 15 Jun 2015 13:05:55 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z4U5J-0005lL-HI
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 13:05:53 +0000
Received: from [85.158.137.68] by server-13.bemta-3.messagelabs.com id
	BE/65-11060-0BDCE755; Mon, 15 Jun 2015 13:05:52 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-10.tower-31.messagelabs.com!1434373552!16326969!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 23088 invoked from network); 15 Jun 2015 13:05:52 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-10.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 15 Jun 2015 13:05:52 -0000
Received: from joan.univie.ac.at ([131.130.3.110] helo=joan.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z4U5F-0005xi-Bk; Mon, 15 Jun 2015 15:05:49 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by joan.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z4U5F-0006Iy-05; Mon, 15 Jun 2015 15:05:49 +0200
Message-ID: <557ECDAB.2050206@web2web.at>
Date: Mon, 15 Jun 2015 15:05:47 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>, 
	xen-users@lists.xen.org
References: <557E0433.9070307@web2web.at> <557E7FD7.40103@citrix.com>
In-Reply-To: <557E7FD7.40103@citrix.com>
Content-Length: 5210
X-Univie-Virus-Scan: scanned by ClamAV on joan.univie.ac.at
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="windows-1252"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Am 15.06.15 um 09:33 schrieb Roger Pau Monn=E9:
> Hello,
Roger, thanks for your reply.
>
> El 15/06/15 a les 0.46, Atom2 ha escrit:
>> Hi guys,
>> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
>> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
>> and domUs a spin - unfortunately with not too much success:
>>
>>
>> DOM0:
>> For dom0 I simply added dom0pvh=3D1 to the xen command line. The system
>> booted up and I was also able to confirm that dom0 is running in the
>> correct mode by checking with xen-detect.
>>
>> What I however found out is that xen creates a bunch of error/warning
>> messages some of which make it to xl's dmesg file (the majority seems to
>> get dropped due to rate limits). None of these messages are there when
>> started without dom0pvh=3D1. Please see the two attached files for a
>> comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl
>> dmesg in non-PVH mode ("dmesg.xl").
>>
>> There are a few (most likely irrelevant) differences at line 109 to 111
>> relating to messages about the "Start info", the "Page tables", and the
>> "Boot stack". The main difference is in the additional lines in the file
>> "dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines
>> about suppressed messages totalling in excess of 236.000 (ignored)
>> messages.  It's probably worth noteing that no further messages make it
>> to xl's dmesg and also /var/log/messages does not have anything strange
>> once the dom0 is up and running.
> Those are errors from the IOMMU, your BIOS is probably missing some RMRR
> regions. Do you know which devices are at 0000:00:1a.0 and 0000:00:02.0?
Sure:
0000:00:1a.0 is one of the two USB controllers as part of the chipset;
lspci output for this device is as follows:
00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset =

Family USB Enhanced Host Controller #2 (rev 05)

0000:00:02.0 is the integrated graphics chip (IGD) in the XEON processor;
lspci output for this device is as follows:
00:02.0 VGA compatible controller: Intel Corporation Xeon E3-1200 =

Processor Family Integrated Graphics Controller (rev 09)

For reference: The system is a C206 chipset motherboard with a XEON =

E3-1260L processor
The system has 32GB ECC memory installed

>
> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:1a.0] fault addr
> dc086000, iommu reg =3D ffff82c000203000
> (XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
>
> The above error looks reasonable, this memory is between 3 and 4 GiB
> which matches the MMIO hole.
>
> (XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr
> 72c481000, iommu reg =3D ffff82c000201000
> (XEN) [VT-D]DMAR: reason 05 - PTE Write access is not set
>
> This however is very high address, and is within a region marked as
> usable in the memory map:
>
> (XEN)  0000000100000000 - 000000081e600000 (usable)
>
> There are some patches on the list to add additional RMRR regions on the
> command line, however they are not committed yet, so there's not much
> you can try right now (apart from trying it on a different box).
That probably means I'll have to wait and see for further developments, =

most likely in 4.6
I guess there's also nothing for you guys to be gained from this report ...
>
>> It, however, appears that the pvh dom0 compared to the standard dom0
>> consumes _significantly_ more CPU time as shown by "xl info" from within
>> dom0 - which to me seems counter-intuitive given my (limited)
>> understanding of what pvh tries to achieve.
Any idea about that ...
>>
>>
>> DOMU:
>> For a test domU I just added pvh=3D1 to it's (otherwise unchanged)
>> configuration file and tried to start the domU by issuing
>> xl -v -v -v /path/to/config/file -c
>>
>> The domU did not come up at all (but works flawlessly when commenting
>> out the pvh=3D1 configuration line); details of the xl command output for
>> the failed attempt can be found in the attached file xl.domU. I honestly
>> can't make much sense out of the error message which in essence seems to
>> complain about an unsupported feature and a missing file or directory
>> before giving up.
> AFAICT from the log provided you seem to be trying to launch a MiniOS
> based guest with pvh=3D1, which is not supported. MiniOS doesn't support
> the PVH mode yet.
Well, I am using pvgrub to fire up the domUs and provide the grub =

configuration via a ramdisk:

=3D=3D=3D relevant part of my config file =3D=3D=3D
kernel                  =3D '/usr/libexec/xen/boot/pv-grub-x86_64.gz'
ramdisk                 =3D '/etc/xen/guests/grub.d/mysql.grub'
=3D=3D=3D end relevant part of config file =3D=3D=3D

I suppose pvgrub is then what you refer to with the term MiniOS.
Because other than this it's just a standard linux kernel w/ an =

initramfs that get's booted within the domU.

In other words: pvh currently does not work with pvgrub at all?
Any plans to change this - pvgrub IMHO is the most flexible tool to =

start a domU.
Once you get used to that, there's no way back ...
>
> Roger.
Thanks again Atom2

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 15 13:24:24 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 13:24:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4UMw-0007jb-Bq; Mon, 15 Jun 2015 13:24:06 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z4UMu-0007jV-NP
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 13:24:05 +0000
Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id
	BC/24-31880-4F1DE755; Mon, 15 Jun 2015 13:24:04 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-12.tower-206.messagelabs.com!1434374641!14281399!1
X-Originating-IP: [209.85.217.170]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_20_30,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21363 invoked from network); 15 Jun 2015 13:24:01 -0000
Received: from mail-lb0-f170.google.com (HELO mail-lb0-f170.google.com)
	(209.85.217.170)
	by server-12.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	15 Jun 2015 13:24:01 -0000
Received: by lblr1 with SMTP id r1so26932122lbl.0
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 06:24:00 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=LamDhy1sLR2kfW2Z7i6MwA2XWz9p2EtErjmPRs+m7s0=;
	b=DMahK8PwgAmdcaT3vVl4H6NDw9wtq+VQVK3s61USek8vbXWLWgvnQWFWOHUOn9lGYz
	uZMcl1WBKj9MRDy0t57FCRXT9Lhq349BJnvEZ1tKqGucB9JJpS7E96cN2Tv+wghm3RRn
	z1qIHURNJrgeRSTMO9OKdfA4+h8PwvOPeFhjVBHe9kmFY9wAHrPJHeRceHXmVYOOvl55
	E95Nx/ehKBvJkXblkyMskf6E4ZdRmAafkAvAmDF01e48K2srWKDpjhIyjDRK3pgLbIEr
	olriEddN9QPtzYCWHw8MGOWGy33Of2GfAsfIUDsUOzqBwHS7YFm/0fnBDDuLMTQGuThr
	b54A==
X-Gm-Message-State: ALoCoQmEnkynrhjMG7OBrPDqj9v381KQOF5HYxTn3qp1cHRMzMV+TIzVoponLycn2bWOtSbARwag
MIME-Version: 1.0
X-Received: by 10.112.93.37 with SMTP id cr5mr245338lbb.106.1434374640676;
	Mon, 15 Jun 2015 06:24:00 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Mon, 15 Jun 2015 06:24:00 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:d85e:888f:8907:1ff0]
In-Reply-To: <CAB+=bRGXhQ5i_=mVM6jNvUEoykXVXnYt+9D_rFvGqWdw2M4KAQ@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
	<CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
	<CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
	<CAB+=bRGXhQ5i_=mVM6jNvUEoykXVXnYt+9D_rFvGqWdw2M4KAQ@mail.gmail.com>
Date: Mon, 15 Jun 2015 15:24:00 +0200
Message-ID: <CAH5abAU50V+MyhVD1UoBUwzxP0c+OOGyxXYQ2+T0SARQrssmrg@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	Josh Whitehead <josh.whitehead@dornerworks.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7491081045072643601=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============7491081045072643601==
Content-Type: multipart/alternative; boundary=001a1134de94eec59705188e5e33

--001a1134de94eec59705188e5e33
Content-Type: text/plain; charset=UTF-8

On Tue, Jun 9, 2015 at 1:48 PM, Nathan Studer <nate.studer@gmail.com> wrote:

> On Thu, Jun 4, 2015 at 11:08 AM, Mr Idris <mr@idris.web.id> wrote:
> > On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer <nate.studer@gmail.com>
> wrote:
> >>
> >> On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
> >> > On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
> >> >>
> >> >> Hi all,
> >> >>
> >> >> I have managed to call arinc653_scheduler_set.c without error.  The
> >> >> message when i run it like this
> >> >>
> >> >> not error
> >> >> not error
> >> >> hypercall bounce and schedule set finish *
> >> >> true
> >> >>
> >> >> * this message because i set on xc_sched_arinc653_schedule_set().
> >> >>
> >> >>
> >> >> but when i try 'xl list -v' still VM is not running
> >> >
> >> >
> >> > I'm sorry accidentally i press send but i haven't finished.
> >> >
> >> > I continue, but when i try 'xl list -v' still VM is not running like
> >> > this :
> >> > Name                                        ID   Mem VCPUs      State
> >> > Time(s)   UUID                            Reason-Code   Security Label
> >> > Domain-0                                     0  6771     1     r-----
> >> > 10.0 00000000-0000-0000-0000-000000000000        -                -
> >> > Debian                                       1   512     1     ------
> >> > 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
> >> >
> >> >
> >> > Something weird after the small program run, the computer is becoming
> >> > really
> >> > slow. Is it something related to runtime?
> >>
> >> That's how you know it's working!  The arinc653 scheduler is not work
> >> conserving or pre-emptive, so you should expect some performance
> >> degradation.  It probably should not be that bad, so I think it is a
> >> symptom of the problem below.
> >>
> >> > Does anyone have any idea what change I need to make to get the
> >> > scheduler to
> >> > run
> >> > the VM?  I appreciate the help.
> >>
> >> From the attached program, which is similar to your previous program:
> >>
> >> sched.sched_entries[0].vcpu_id = 0;
> >> sched.sched_entries[0].runtime = 30;
> >> sched.major_frame += sched.sched_entries[0].runtime;
> >>
> >> The runtime field is in units of nanoseconds.  30 nanoseconds is
> >> orders of magnitude shorter than the context switch time.  I'm not
> >> sure what the scheduler would do with a runtime this small, but it
> >> would not be pretty.  For most configurations, the slice runtimes
> >> should be in the milliseconds range, so multiple your runtimes by
> >> 1000000, and see if that fixes your issue.
> >>
> >> sched.sched_entries[*].runtime = 10000000;  /* 10 ms */
> >>
> >>      Nate
> >>
> >
> > After i changed runtime value to 1000000 or greater and run again. It was
> > suddenly hang with panic on CPU 0 with error message :
>
> What are the exact runtimes you are using for Dom-0 and the VM?  The
> default timeslice is 10ms (10000000), so that's usually a good value
> to use for each.
>
> >
> > (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> > (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
> > (XEN) ----[ Xen-4.4.1  x86_64  debug=y  Not tainted ]----
> > (XEN) CPU:    0
> > (XEN) RIP:    e008:[<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> > (XEN) RFLAGS: 0000000000010046   CONTEXT: hypervisor
> > (XEN) rax: 0000000000000046   rbx: ffff82d08013a9c8   rcx:
> 0000000000000000
> > (XEN) rdx: 0000000000000000   rsi: ffff82d08013a9c8   rdi:
> ffff82d0802d7c18
> > (XEN) rbp: ffff82d0802d7c58   rsp: ffff82d0802d7c10   r8:
> 0000000000000004
> > (XEN) r9:  000000000000003f   r10: 0000000000000000   r11:
> 0000000000000246
> > (XEN) r12: 0000000000000000   r13: 0000000000000000   r14:
> ffff82d0802d7d38
> > (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4:
> 00000000000426f0
> > (XEN) cr3: 00000000df888000   cr2: 0000000000989740
> > (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
> > (XEN) Xen stack trace from rsp=ffff82d0802d7c10:
> > (XEN)    ffff82d08012984e 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 ffff82d0802735f0 0000000000000001
> ffff82d0802f9200
> > (XEN)    0000000000989740 ffff82d0802d7cc8 ffff82d08013af14
> 0000000000200e8c
> > (XEN)    0000000000000000 00000002030bc067 000000000000000e
> 0000000000000092
> > (XEN)    0000000000989740 ffff82d0802d7ce8 000000000000000e
> 0000000000000000
> > (XEN)    0000000000989740 ffff8302154ff000 0000000000000000
> ffff82d0802d7ce8
> > (XEN)    ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38
> ffff82d0802d7d28
> > (XEN)    ffff82d080190631 0000000000000086 ffff8300dfb98000
> 0000000000989680
> > (XEN)    0000003222af7456 ffff82d0802d7e68 0000000000000000
> 00007d2f7fd282a7
> > (XEN)    ffff82d08022a33d 0000000000000000 ffff82d0802d7e68
> 0000003222af7456
> > (XEN)    0000000000989680 ffff82d0802d7e20 ffff8302154fd010
> 0000000000000246
> > (XEN)    0000003222b7f318 ffff8300df6fe060 0000000000000002
> 0000000000000086
> > (XEN)    0000003226424461 0000000000000005 ffff82d080274620
> 0000000000000005
> > (XEN)    0000000e00000000 ffff82d0801254ae 000000000000e008
> 0000000000010002
> > (XEN)    ffff82d0802d7de0 000000000000e010 0000000000000003
> 00ff82d080319728
> > (XEN)    80000000802fa2a0 ffff8300dfb98000 0000003222af7456
> ffff82d0803196e0
> > (XEN)    ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0
> ffff82d08012616c
> > (XEN)    ffff82d0802d7e60 ffff82d080319700 00000000002d7e60
> ffff82d0803196e0
> > (XEN)    ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0
> ffff82d08012c7b6
> > (XEN)    ffff82d0802d0000 0000000000000246 0000003222aebd61
> ffff82d0802eff00
> > (XEN) Xen call trace:
> > (XEN)    [<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> > (XEN)    [<ffff82d08013af14>] __trap_to_gdb+0x130/0x9fc
> > (XEN)    [<ffff82d0801892b7>] debugger_trap_fatal+0x15/0x2c
> > (XEN)    [<ffff82d080190631>] do_page_fault+0x456/0x536
> > (XEN)    [<ffff82d08022a33d>] handle_exception_saved+0x2e/0x6c
> > (XEN)    [<ffff82d0801254ae>] a653sched_do_schedule+0x10a/0x1de
> > (XEN)    [<ffff82d08012616c>] schedule+0x116/0x5df
> > (XEN)    [<ffff82d080129359>] __do_softirq+0x81/0x8c
> > (XEN)    [<ffff82d0801293b2>] do_softirq+0x13/0x15
> > (XEN)    [<ffff82d08015f355>] idle_loop+0x64/0x74
> > (XEN)
> > (XEN)
> > (XEN) ****************************************
> > (XEN) Panic on CPU 0:
> > (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> > (XEN) ****************************************
> > (XEN)
> > (XEN) Reboot in five seconds...
> > (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
> >
> > this is the output from 'xl info'
> >
> > host                   : boaman
> > release                : 3.2.0-4-amd64
> > version                : #1 SMP Debian 3.2.65-1+deb7u2
> > machine                : x86_64
> > nr_cpus                : 1
> > max_cpu_id             : 0
> > nr_nodes               : 1
> > cores_per_socket       : 1
> > threads_per_core       : 1
> > cpu_mhz                : 2826
> > hw_caps                :
> > bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:00000000
> > virt_caps              : hvm
> > total_memory           : 8123
> > free_memory            : 745
> > sharing_freed_memory   : 0
> > sharing_used_memory    : 0
> > outstanding_claims     : 0
> > free_cpus              : 0
> > xen_major              : 4
> > xen_minor              : 4
> > xen_extra              : .1
> > xen_version            : 4.4.1
> > xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
> > hvm-3.0-x86_32p hvm-3.0-x86_64
> > xen_scheduler          : arinc653
> > xen_pagesize           : 4096
> > platform_params        : virt_start=0xffff800000000000
> > xen_changeset          :
> > xen_commandline        : placeholder loglvl=all guest_loglvl=all
> > com1=115200,8n1,0x3f8,5 console=com1,vga gdb=com1 kgdboc=com1,115200
> > sched=arinc653 maxcpus=1
> > cc_compiler            : gcc (Debian 4.7.2-5) 4.7.2
> > cc_compile_by          : manam
> > cc_compile_domain      :
> > cc_compile_date        : Wed Jun  3 11:55:42 CEST 2015
> > xend_config_format     : 4
>
> Are you using the arinc653 scheduler as is?  (I saw your earlier
> e-mail thread about writing a scheduler based on the arinc653 one.)
>
>      Nate
>
> >
> > Regards,
> > Idris
>

Hi Nathan,

Thank you. Now i can run arinc653 scheduler with fresh install of xen.

I use the script that i wrote.

Regards,
Idris

--001a1134de94eec59705188e5e33
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On T=
ue, Jun 9, 2015 at 1:48 PM, Nathan Studer <span dir=3D"ltr">&lt;<a href=3D"=
mailto:nate.studer@gmail.com" target=3D"_blank">nate.studer@gmail.com</a>&g=
t;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div =
class=3D""><div class=3D"h5">On Thu, Jun 4, 2015 at 11:08 AM, Mr Idris &lt;=
<a href=3D"mailto:mr@idris.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt; On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer &lt;<a href=3D"mailto:na=
te.studer@gmail.com">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt;&gt;<br>
&gt;&gt; On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris &lt;<a href=3D"mailto:mr=
@idris.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; &gt; On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris &lt;<a href=3D"mailt=
o:mr@idris.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; Hi all,<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; I have managed to call arinc653_scheduler_set.c without e=
rror.=C2=A0 The<br>
&gt;&gt; &gt;&gt; message when i run it like this<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; not error<br>
&gt;&gt; &gt;&gt; not error<br>
&gt;&gt; &gt;&gt; hypercall bounce and schedule set finish *<br>
&gt;&gt; &gt;&gt; true<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; * this message because i set on xc_sched_arinc653_schedul=
e_set().<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; but when i try &#39;xl list -v&#39; still VM is not runni=
ng<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt; I&#39;m sorry accidentally i press send but i haven&#39;t fin=
ished.<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt; I continue, but when i try &#39;xl list -v&#39; still VM is n=
ot running like<br>
&gt;&gt; &gt; this :<br>
&gt;&gt; &gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt; &gt; Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=
=C2=A0 =C2=A0Security Label<br>
&gt;&gt; &gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A00=C2=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt; &gt; 10.0 00000000-0000-0000-0000-000000000000=C2=A0 =C2=A0 =C2=A0=
 =C2=A0 -=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; &gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A01=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<=
br>
&gt;&gt; &gt; 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0 =C2=A0 =C2=A0 =
=C2=A0 -=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt; Something weird after the small program run, the computer is =
becoming<br>
&gt;&gt; &gt; really<br>
&gt;&gt; &gt; slow. Is it something related to runtime?<br>
&gt;&gt;<br>
&gt;&gt; That&#39;s how you know it&#39;s working!=C2=A0 The arinc653 sched=
uler is not work<br>
&gt;&gt; conserving or pre-emptive, so you should expect some performance<b=
r>
&gt;&gt; degradation.=C2=A0 It probably should not be that bad, so I think =
it is a<br>
&gt;&gt; symptom of the problem below.<br>
&gt;&gt;<br>
&gt;&gt; &gt; Does anyone have any idea what change I need to make to get t=
he<br>
&gt;&gt; &gt; scheduler to<br>
&gt;&gt; &gt; run<br>
&gt;&gt; &gt; the VM?=C2=A0 I appreciate the help.<br>
&gt;&gt;<br>
&gt;&gt; From the attached program, which is similar to your previous progr=
am:<br>
&gt;&gt;<br>
&gt;&gt; sched.sched_entries[0].vcpu_id =3D 0;<br>
&gt;&gt; sched.sched_entries[0].runtime =3D 30;<br>
&gt;&gt; sched.major_frame +=3D sched.sched_entries[0].runtime;<br>
&gt;&gt;<br>
&gt;&gt; The runtime field is in units of nanoseconds.=C2=A0 30 nanoseconds=
 is<br>
&gt;&gt; orders of magnitude shorter than the context switch time.=C2=A0 I&=
#39;m not<br>
&gt;&gt; sure what the scheduler would do with a runtime this small, but it=
<br>
&gt;&gt; would not be pretty.=C2=A0 For most configurations, the slice runt=
imes<br>
&gt;&gt; should be in the milliseconds range, so multiple your runtimes by<=
br>
&gt;&gt; 1000000, and see if that fixes your issue.<br>
&gt;&gt;<br>
&gt;&gt; sched.sched_entries[*].runtime =3D 10000000;=C2=A0 /* 10 ms */<br>
&gt;&gt;<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
&gt;&gt;<br>
&gt;<br>
&gt; After i changed runtime value to 1000000 or greater and run again. It =
was<br>
&gt; suddenly hang with panic on CPU 0 with error message :<br>
<br>
</div></div>What are the exact runtimes you are using for Dom-0 and the VM?=
=C2=A0 The<br>
default timeslice is 10ms (10000000), so that&#39;s usually a good value<br=
>
to use for each.<br>
<div><div class=3D"h5"><br>
&gt;<br>
&gt; (XEN) Assertion &#39;local_irq_is_enabled()&#39; failed at smp.c:55<br=
>
&gt; (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.<br>
&gt; (XEN) ----[ Xen-4.4.1=C2=A0 x86_64=C2=A0 debug=3Dy=C2=A0 Not tainted ]=
----<br>
&gt; (XEN) CPU:=C2=A0 =C2=A0 0<br>
&gt; (XEN) RIP:=C2=A0 =C2=A0 e008:[&lt;ffff82d080129707&gt;] on_selected_cp=
us+0x7/0xd6<br>
&gt; (XEN) RFLAGS: 0000000000010046=C2=A0 =C2=A0CONTEXT: hypervisor<br>
&gt; (XEN) rax: 0000000000000046=C2=A0 =C2=A0rbx: ffff82d08013a9c8=C2=A0 =
=C2=A0rcx: 0000000000000000<br>
&gt; (XEN) rdx: 0000000000000000=C2=A0 =C2=A0rsi: ffff82d08013a9c8=C2=A0 =
=C2=A0rdi: ffff82d0802d7c18<br>
&gt; (XEN) rbp: ffff82d0802d7c58=C2=A0 =C2=A0rsp: ffff82d0802d7c10=C2=A0 =
=C2=A0r8:=C2=A0 0000000000000004<br>
&gt; (XEN) r9:=C2=A0 000000000000003f=C2=A0 =C2=A0r10: 0000000000000000=C2=
=A0 =C2=A0r11: 0000000000000246<br>
&gt; (XEN) r12: 0000000000000000=C2=A0 =C2=A0r13: 0000000000000000=C2=A0 =
=C2=A0r14: ffff82d0802d7d38<br>
&gt; (XEN) r15: 0000000000000000=C2=A0 =C2=A0cr0: 000000008005003b=C2=A0 =
=C2=A0cr4: 00000000000426f0<br>
&gt; (XEN) cr3: 00000000df888000=C2=A0 =C2=A0cr2: 0000000000989740<br>
&gt; (XEN) ds: 0000=C2=A0 =C2=A0es: 0000=C2=A0 =C2=A0fs: 0000=C2=A0 =C2=A0g=
s: 0000=C2=A0 =C2=A0ss: e010=C2=A0 =C2=A0cs: e008<br>
&gt; (XEN) Xen stack trace from rsp=3Dffff82d0802d7c10:<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d08012984e 0000000000000000 0000000000000000 =
0000000000000000<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000000000 ffff82d0802735f0 0000000000000001 =
ffff82d0802f9200<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989740 ffff82d0802d7cc8 ffff82d08013af14 =
0000000000200e8c<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000000000 00000002030bc067 000000000000000e =
0000000000000092<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989740 ffff82d0802d7ce8 000000000000000e =
0000000000000000<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989740 ffff8302154ff000 0000000000000000 =
ffff82d0802d7ce8<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38 =
ffff82d0802d7d28<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d080190631 0000000000000086 ffff8300dfb98000 =
0000000000989680<br>
&gt; (XEN)=C2=A0 =C2=A0 0000003222af7456 ffff82d0802d7e68 0000000000000000 =
00007d2f7fd282a7<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d08022a33d 0000000000000000 ffff82d0802d7e68 =
0000003222af7456<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989680 ffff82d0802d7e20 ffff8302154fd010 =
0000000000000246<br>
&gt; (XEN)=C2=A0 =C2=A0 0000003222b7f318 ffff8300df6fe060 0000000000000002 =
0000000000000086<br>
&gt; (XEN)=C2=A0 =C2=A0 0000003226424461 0000000000000005 ffff82d080274620 =
0000000000000005<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000e00000000 ffff82d0801254ae 000000000000e008 =
0000000000010002<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0802d7de0 000000000000e010 0000000000000003 =
00ff82d080319728<br>
&gt; (XEN)=C2=A0 =C2=A0 80000000802fa2a0 ffff8300dfb98000 0000003222af7456 =
ffff82d0803196e0<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0 =
ffff82d08012616c<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0802d7e60 ffff82d080319700 00000000002d7e60 =
ffff82d0803196e0<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 =
ffff82d08012c7b6<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0802d0000 0000000000000246 0000003222aebd61 =
ffff82d0802eff00<br>
&gt; (XEN) Xen call trace:<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d080129707&gt;] on_selected_cpus+0x7/0xd=
6<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08013af14&gt;] __trap_to_gdb+0x130/0x9f=
c<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d0801892b7&gt;] debugger_trap_fatal+0x15=
/0x2c<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d080190631&gt;] do_page_fault+0x456/0x53=
6<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08022a33d&gt;] handle_exception_saved+0=
x2e/0x6c<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d0801254ae&gt;] a653sched_do_schedule+0x=
10a/0x1de<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08012616c&gt;] schedule+0x116/0x5df<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d080129359&gt;] __do_softirq+0x81/0x8c<b=
r>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d0801293b2&gt;] do_softirq+0x13/0x15<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08015f355&gt;] idle_loop+0x64/0x74<br>
&gt; (XEN)<br>
&gt; (XEN)<br>
&gt; (XEN) ****************************************<br>
&gt; (XEN) Panic on CPU 0:<br>
&gt; (XEN) Assertion &#39;local_irq_is_enabled()&#39; failed at smp.c:55<br=
>
&gt; (XEN) ****************************************<br>
&gt; (XEN)<br>
&gt; (XEN) Reboot in five seconds...<br>
&gt; (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.<br>
&gt;<br>
&gt; this is the output from &#39;xl info&#39;<br>
&gt;<br>
&gt; host=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: boaman<br>
&gt; release=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 3.2.0=
-4-amd64<br>
&gt; version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : #1 SM=
P Debian 3.2.65-1+deb7u2<br>
&gt; machine=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : x86_6=
4<br>
&gt; nr_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 1<br>
&gt; max_cpu_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 0<br>
&gt; nr_nodes=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt; cores_per_socket=C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt; threads_per_core=C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt; cpu_mhz=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 2826<=
br>
&gt; hw_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :<br>
&gt; bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:0000000=
0<br>
&gt; virt_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : hvm<br>
&gt; total_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 8123<br>
&gt; free_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 745<br>
&gt; sharing_freed_memory=C2=A0 =C2=A0: 0<br>
&gt; sharing_used_memory=C2=A0 =C2=A0 : 0<br>
&gt; outstanding_claims=C2=A0 =C2=A0 =C2=A0: 0<br>
&gt; free_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 0<br>
&gt; xen_major=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4<br>
&gt; xen_minor=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4<br>
&gt; xen_extra=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : .1<br>
&gt; xen_version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4.4.1<br>
&gt; xen_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: xen-3=
.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32<br>
&gt; hvm-3.0-x86_32p hvm-3.0-x86_64<br>
&gt; xen_scheduler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : arinc653<br>
&gt; xen_pagesize=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 4096<br>
&gt; platform_params=C2=A0 =C2=A0 =C2=A0 =C2=A0 : virt_start=3D0xffff800000=
000000<br>
&gt; xen_changeset=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :<br>
&gt; xen_commandline=C2=A0 =C2=A0 =C2=A0 =C2=A0 : placeholder loglvl=3Dall =
guest_loglvl=3Dall<br>
&gt; com1=3D115200,8n1,0x3f8,5 console=3Dcom1,vga gdb=3Dcom1 kgdboc=3Dcom1,=
115200<br>
&gt; sched=3Darinc653 maxcpus=3D1<br>
&gt; cc_compiler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : gcc (Debian 4.7=
.2-5) 4.7.2<br>
&gt; cc_compile_by=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : manam<br>
&gt; cc_compile_domain=C2=A0 =C2=A0 =C2=A0 :<br>
&gt; cc_compile_date=C2=A0 =C2=A0 =C2=A0 =C2=A0 : Wed Jun=C2=A0 3 11:55:42 =
CEST 2015<br>
&gt; xend_config_format=C2=A0 =C2=A0 =C2=A0: 4<br>
<br>
</div></div>Are you using the arinc653 scheduler as is?=C2=A0 (I saw your e=
arlier<br>
e-mail thread about writing a scheduler based on the arinc653 one.)<br>
<br>
=C2=A0 =C2=A0 =C2=A0Nate<br>
<br>
&gt;<br>
&gt; Regards,<br>
&gt; Idris<br>
</blockquote></div><br><div><div>Hi Nathan, <br><br></div>Thank you. Now i =
can run arinc653 scheduler with fresh install of xen.<br><br></div><div>I u=
se the script that i wrote. <br><br></div>Regards,<br>Idris</div></div>

--001a1134de94eec59705188e5e33--


--===============7491081045072643601==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============7491081045072643601==--


From xen-users-bounces@lists.xen.org Mon Jun 15 13:24:24 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 13:24:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4UMw-0007jb-Bq; Mon, 15 Jun 2015 13:24:06 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <mr@idris.web.id>) id 1Z4UMu-0007jV-NP
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 13:24:05 +0000
Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id
	BC/24-31880-4F1DE755; Mon, 15 Jun 2015 13:24:04 +0000
X-Env-Sender: mr@idris.web.id
X-Msg-Ref: server-12.tower-206.messagelabs.com!1434374641!14281399!1
X-Originating-IP: [209.85.217.170]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_20_30,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21363 invoked from network); 15 Jun 2015 13:24:01 -0000
Received: from mail-lb0-f170.google.com (HELO mail-lb0-f170.google.com)
	(209.85.217.170)
	by server-12.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	15 Jun 2015 13:24:01 -0000
Received: by lblr1 with SMTP id r1so26932122lbl.0
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 06:24:00 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:date
	:message-id:subject:from:to:cc:content-type;
	bh=LamDhy1sLR2kfW2Z7i6MwA2XWz9p2EtErjmPRs+m7s0=;
	b=DMahK8PwgAmdcaT3vVl4H6NDw9wtq+VQVK3s61USek8vbXWLWgvnQWFWOHUOn9lGYz
	uZMcl1WBKj9MRDy0t57FCRXT9Lhq349BJnvEZ1tKqGucB9JJpS7E96cN2Tv+wghm3RRn
	z1qIHURNJrgeRSTMO9OKdfA4+h8PwvOPeFhjVBHe9kmFY9wAHrPJHeRceHXmVYOOvl55
	E95Nx/ehKBvJkXblkyMskf6E4ZdRmAafkAvAmDF01e48K2srWKDpjhIyjDRK3pgLbIEr
	olriEddN9QPtzYCWHw8MGOWGy33Of2GfAsfIUDsUOzqBwHS7YFm/0fnBDDuLMTQGuThr
	b54A==
X-Gm-Message-State: ALoCoQmEnkynrhjMG7OBrPDqj9v381KQOF5HYxTn3qp1cHRMzMV+TIzVoponLycn2bWOtSbARwag
MIME-Version: 1.0
X-Received: by 10.112.93.37 with SMTP id cr5mr245338lbb.106.1434374640676;
	Mon, 15 Jun 2015 06:24:00 -0700 (PDT)
Received: by 10.152.1.227 with HTTP; Mon, 15 Jun 2015 06:24:00 -0700 (PDT)
X-Originating-IP: [2001:7c0:1300:880:d85e:888f:8907:1ff0]
In-Reply-To: <CAB+=bRGXhQ5i_=mVM6jNvUEoykXVXnYt+9D_rFvGqWdw2M4KAQ@mail.gmail.com>
References: <CAH5abAWyQP3N6WtYTHeEe4avCChLK6RkcMTU2rF3prUc-mAT5g@mail.gmail.com>
	<1430918286.2660.292.camel@citrix.com>
	<554A1F8C.4090803@dornerworks.com>
	<CAH5abAU9QkEqx9aQtku0=GLpbiO88ju+pnM7Jhu8gmmGf19_Mg@mail.gmail.com>
	<CAH5abAWP8Cr_=3xKUakGFWKuhgmT5L6B0Q8ZfdE1p++4gcn_TA@mail.gmail.com>
	<CAB+=bREtsVFcyq++NVMEmdJs=bXbrKY6hZj-gQUWakeuDrqHPw@mail.gmail.com>
	<CAH5abAU8jpTuWcnrp17vZ+vOeoJ7qbCD6_yCxvkqiq5OVgs02A@mail.gmail.com>
	<CAB+=bRFfH4jA-W=PubZhix_G9hj8Z=AvBW-R+t0HAGoKKw917g@mail.gmail.com>
	<CAH5abAVZo=RMjBgMhMffHkd7bkAmkRhjUDyaY3pKH_aW0GQg6w@mail.gmail.com>
	<CAH5abAVTLsE50PtuQxfFkg-F9Mdrb5rq0aUtbsE_AxXChzM19w@mail.gmail.com>
	<CAH5abAVvn1cUz6hnTUCVYWO=wF1E_FeiP1yNJwjF=KUxQSvQqw@mail.gmail.com>
	<CAB+=bRH9ML6OV=C45ShGLUZ47wiJHjisYvCAfGEa9tZWiSV0Mg@mail.gmail.com>
	<CAH5abAUfZfmb086XAOpLjJ=rxzVKCJfY7AsDsMdTA2n6X3XLqQ@mail.gmail.com>
	<CAB+=bRGXhQ5i_=mVM6jNvUEoykXVXnYt+9D_rFvGqWdw2M4KAQ@mail.gmail.com>
Date: Mon, 15 Jun 2015 15:24:00 +0200
Message-ID: <CAH5abAU50V+MyhVD1UoBUwzxP0c+OOGyxXYQ2+T0SARQrssmrg@mail.gmail.com>
From: Mr Idris <mr@idris.web.id>
To: Nathan Studer <nate.studer@gmail.com>
Cc: xen-users@lists.xen.org, Kathy Hadley <kathy.hadley@dornerworks.com>,
	Josh Whitehead <josh.whitehead@dornerworks.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	Robert VanVossen <robert.vanvossen@dornerworks.com>
Subject: Re: [Xen-users] Call schedule set on arinc653 scheduler?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7491081045072643601=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============7491081045072643601==
Content-Type: multipart/alternative; boundary=001a1134de94eec59705188e5e33

--001a1134de94eec59705188e5e33
Content-Type: text/plain; charset=UTF-8

On Tue, Jun 9, 2015 at 1:48 PM, Nathan Studer <nate.studer@gmail.com> wrote:

> On Thu, Jun 4, 2015 at 11:08 AM, Mr Idris <mr@idris.web.id> wrote:
> > On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer <nate.studer@gmail.com>
> wrote:
> >>
> >> On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris <mr@idris.web.id> wrote:
> >> > On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris <mr@idris.web.id> wrote:
> >> >>
> >> >> Hi all,
> >> >>
> >> >> I have managed to call arinc653_scheduler_set.c without error.  The
> >> >> message when i run it like this
> >> >>
> >> >> not error
> >> >> not error
> >> >> hypercall bounce and schedule set finish *
> >> >> true
> >> >>
> >> >> * this message because i set on xc_sched_arinc653_schedule_set().
> >> >>
> >> >>
> >> >> but when i try 'xl list -v' still VM is not running
> >> >
> >> >
> >> > I'm sorry accidentally i press send but i haven't finished.
> >> >
> >> > I continue, but when i try 'xl list -v' still VM is not running like
> >> > this :
> >> > Name                                        ID   Mem VCPUs      State
> >> > Time(s)   UUID                            Reason-Code   Security Label
> >> > Domain-0                                     0  6771     1     r-----
> >> > 10.0 00000000-0000-0000-0000-000000000000        -                -
> >> > Debian                                       1   512     1     ------
> >> > 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc        -                -
> >> >
> >> >
> >> > Something weird after the small program run, the computer is becoming
> >> > really
> >> > slow. Is it something related to runtime?
> >>
> >> That's how you know it's working!  The arinc653 scheduler is not work
> >> conserving or pre-emptive, so you should expect some performance
> >> degradation.  It probably should not be that bad, so I think it is a
> >> symptom of the problem below.
> >>
> >> > Does anyone have any idea what change I need to make to get the
> >> > scheduler to
> >> > run
> >> > the VM?  I appreciate the help.
> >>
> >> From the attached program, which is similar to your previous program:
> >>
> >> sched.sched_entries[0].vcpu_id = 0;
> >> sched.sched_entries[0].runtime = 30;
> >> sched.major_frame += sched.sched_entries[0].runtime;
> >>
> >> The runtime field is in units of nanoseconds.  30 nanoseconds is
> >> orders of magnitude shorter than the context switch time.  I'm not
> >> sure what the scheduler would do with a runtime this small, but it
> >> would not be pretty.  For most configurations, the slice runtimes
> >> should be in the milliseconds range, so multiple your runtimes by
> >> 1000000, and see if that fixes your issue.
> >>
> >> sched.sched_entries[*].runtime = 10000000;  /* 10 ms */
> >>
> >>      Nate
> >>
> >
> > After i changed runtime value to 1000000 or greater and run again. It was
> > suddenly hang with panic on CPU 0 with error message :
>
> What are the exact runtimes you are using for Dom-0 and the VM?  The
> default timeslice is 10ms (10000000), so that's usually a good value
> to use for each.
>
> >
> > (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> > (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
> > (XEN) ----[ Xen-4.4.1  x86_64  debug=y  Not tainted ]----
> > (XEN) CPU:    0
> > (XEN) RIP:    e008:[<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> > (XEN) RFLAGS: 0000000000010046   CONTEXT: hypervisor
> > (XEN) rax: 0000000000000046   rbx: ffff82d08013a9c8   rcx:
> 0000000000000000
> > (XEN) rdx: 0000000000000000   rsi: ffff82d08013a9c8   rdi:
> ffff82d0802d7c18
> > (XEN) rbp: ffff82d0802d7c58   rsp: ffff82d0802d7c10   r8:
> 0000000000000004
> > (XEN) r9:  000000000000003f   r10: 0000000000000000   r11:
> 0000000000000246
> > (XEN) r12: 0000000000000000   r13: 0000000000000000   r14:
> ffff82d0802d7d38
> > (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4:
> 00000000000426f0
> > (XEN) cr3: 00000000df888000   cr2: 0000000000989740
> > (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
> > (XEN) Xen stack trace from rsp=ffff82d0802d7c10:
> > (XEN)    ffff82d08012984e 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 ffff82d0802735f0 0000000000000001
> ffff82d0802f9200
> > (XEN)    0000000000989740 ffff82d0802d7cc8 ffff82d08013af14
> 0000000000200e8c
> > (XEN)    0000000000000000 00000002030bc067 000000000000000e
> 0000000000000092
> > (XEN)    0000000000989740 ffff82d0802d7ce8 000000000000000e
> 0000000000000000
> > (XEN)    0000000000989740 ffff8302154ff000 0000000000000000
> ffff82d0802d7ce8
> > (XEN)    ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38
> ffff82d0802d7d28
> > (XEN)    ffff82d080190631 0000000000000086 ffff8300dfb98000
> 0000000000989680
> > (XEN)    0000003222af7456 ffff82d0802d7e68 0000000000000000
> 00007d2f7fd282a7
> > (XEN)    ffff82d08022a33d 0000000000000000 ffff82d0802d7e68
> 0000003222af7456
> > (XEN)    0000000000989680 ffff82d0802d7e20 ffff8302154fd010
> 0000000000000246
> > (XEN)    0000003222b7f318 ffff8300df6fe060 0000000000000002
> 0000000000000086
> > (XEN)    0000003226424461 0000000000000005 ffff82d080274620
> 0000000000000005
> > (XEN)    0000000e00000000 ffff82d0801254ae 000000000000e008
> 0000000000010002
> > (XEN)    ffff82d0802d7de0 000000000000e010 0000000000000003
> 00ff82d080319728
> > (XEN)    80000000802fa2a0 ffff8300dfb98000 0000003222af7456
> ffff82d0803196e0
> > (XEN)    ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0
> ffff82d08012616c
> > (XEN)    ffff82d0802d7e60 ffff82d080319700 00000000002d7e60
> ffff82d0803196e0
> > (XEN)    ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0
> ffff82d08012c7b6
> > (XEN)    ffff82d0802d0000 0000000000000246 0000003222aebd61
> ffff82d0802eff00
> > (XEN) Xen call trace:
> > (XEN)    [<ffff82d080129707>] on_selected_cpus+0x7/0xd6
> > (XEN)    [<ffff82d08013af14>] __trap_to_gdb+0x130/0x9fc
> > (XEN)    [<ffff82d0801892b7>] debugger_trap_fatal+0x15/0x2c
> > (XEN)    [<ffff82d080190631>] do_page_fault+0x456/0x536
> > (XEN)    [<ffff82d08022a33d>] handle_exception_saved+0x2e/0x6c
> > (XEN)    [<ffff82d0801254ae>] a653sched_do_schedule+0x10a/0x1de
> > (XEN)    [<ffff82d08012616c>] schedule+0x116/0x5df
> > (XEN)    [<ffff82d080129359>] __do_softirq+0x81/0x8c
> > (XEN)    [<ffff82d0801293b2>] do_softirq+0x13/0x15
> > (XEN)    [<ffff82d08015f355>] idle_loop+0x64/0x74
> > (XEN)
> > (XEN)
> > (XEN) ****************************************
> > (XEN) Panic on CPU 0:
> > (XEN) Assertion 'local_irq_is_enabled()' failed at smp.c:55
> > (XEN) ****************************************
> > (XEN)
> > (XEN) Reboot in five seconds...
> > (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.
> >
> > this is the output from 'xl info'
> >
> > host                   : boaman
> > release                : 3.2.0-4-amd64
> > version                : #1 SMP Debian 3.2.65-1+deb7u2
> > machine                : x86_64
> > nr_cpus                : 1
> > max_cpu_id             : 0
> > nr_nodes               : 1
> > cores_per_socket       : 1
> > threads_per_core       : 1
> > cpu_mhz                : 2826
> > hw_caps                :
> > bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:00000000
> > virt_caps              : hvm
> > total_memory           : 8123
> > free_memory            : 745
> > sharing_freed_memory   : 0
> > sharing_used_memory    : 0
> > outstanding_claims     : 0
> > free_cpus              : 0
> > xen_major              : 4
> > xen_minor              : 4
> > xen_extra              : .1
> > xen_version            : 4.4.1
> > xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
> > hvm-3.0-x86_32p hvm-3.0-x86_64
> > xen_scheduler          : arinc653
> > xen_pagesize           : 4096
> > platform_params        : virt_start=0xffff800000000000
> > xen_changeset          :
> > xen_commandline        : placeholder loglvl=all guest_loglvl=all
> > com1=115200,8n1,0x3f8,5 console=com1,vga gdb=com1 kgdboc=com1,115200
> > sched=arinc653 maxcpus=1
> > cc_compiler            : gcc (Debian 4.7.2-5) 4.7.2
> > cc_compile_by          : manam
> > cc_compile_domain      :
> > cc_compile_date        : Wed Jun  3 11:55:42 CEST 2015
> > xend_config_format     : 4
>
> Are you using the arinc653 scheduler as is?  (I saw your earlier
> e-mail thread about writing a scheduler based on the arinc653 one.)
>
>      Nate
>
> >
> > Regards,
> > Idris
>

Hi Nathan,

Thank you. Now i can run arinc653 scheduler with fresh install of xen.

I use the script that i wrote.

Regards,
Idris

--001a1134de94eec59705188e5e33
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On T=
ue, Jun 9, 2015 at 1:48 PM, Nathan Studer <span dir=3D"ltr">&lt;<a href=3D"=
mailto:nate.studer@gmail.com" target=3D"_blank">nate.studer@gmail.com</a>&g=
t;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div =
class=3D""><div class=3D"h5">On Thu, Jun 4, 2015 at 11:08 AM, Mr Idris &lt;=
<a href=3D"mailto:mr@idris.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt; On Thu, Jun 4, 2015 at 3:14 PM, Nathan Studer &lt;<a href=3D"mailto:na=
te.studer@gmail.com">nate.studer@gmail.com</a>&gt; wrote:<br>
&gt;&gt;<br>
&gt;&gt; On Wed, Jun 3, 2015 at 10:34 AM, Mr Idris &lt;<a href=3D"mailto:mr=
@idris.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; &gt; On Wed, Jun 3, 2015 at 4:28 PM, Mr Idris &lt;<a href=3D"mailt=
o:mr@idris.web.id">mr@idris.web.id</a>&gt; wrote:<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; Hi all,<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; I have managed to call arinc653_scheduler_set.c without e=
rror.=C2=A0 The<br>
&gt;&gt; &gt;&gt; message when i run it like this<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; not error<br>
&gt;&gt; &gt;&gt; not error<br>
&gt;&gt; &gt;&gt; hypercall bounce and schedule set finish *<br>
&gt;&gt; &gt;&gt; true<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; * this message because i set on xc_sched_arinc653_schedul=
e_set().<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt;<br>
&gt;&gt; &gt;&gt; but when i try &#39;xl list -v&#39; still VM is not runni=
ng<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt; I&#39;m sorry accidentally i press send but i haven&#39;t fin=
ished.<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt; I continue, but when i try &#39;xl list -v&#39; still VM is n=
ot running like<br>
&gt;&gt; &gt; this :<br>
&gt;&gt; &gt; Name=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 ID=C2=A0 =C2=A0Mem VCPUs=C2=A0 =C2=A0 =C2=A0 State<br>
&gt;&gt; &gt; Time(s)=C2=A0 =C2=A0UUID=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Reason-Code=
=C2=A0 =C2=A0Security Label<br>
&gt;&gt; &gt; Domain-0=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A00=C2=A0 6771=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0r-----<br>
&gt;&gt; &gt; 10.0 00000000-0000-0000-0000-000000000000=C2=A0 =C2=A0 =C2=A0=
 =C2=A0 -=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; &gt; Debian=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A01=C2=A0 =C2=A0512=C2=A0 =C2=A0 =C2=A01=C2=A0 =C2=A0 =C2=A0------<=
br>
&gt;&gt; &gt; 0.0 938b9c5b-8d9d-402a-9be0-0e0cc4cf67dc=C2=A0 =C2=A0 =C2=A0 =
=C2=A0 -=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt;<br>
&gt;&gt; &gt; Something weird after the small program run, the computer is =
becoming<br>
&gt;&gt; &gt; really<br>
&gt;&gt; &gt; slow. Is it something related to runtime?<br>
&gt;&gt;<br>
&gt;&gt; That&#39;s how you know it&#39;s working!=C2=A0 The arinc653 sched=
uler is not work<br>
&gt;&gt; conserving or pre-emptive, so you should expect some performance<b=
r>
&gt;&gt; degradation.=C2=A0 It probably should not be that bad, so I think =
it is a<br>
&gt;&gt; symptom of the problem below.<br>
&gt;&gt;<br>
&gt;&gt; &gt; Does anyone have any idea what change I need to make to get t=
he<br>
&gt;&gt; &gt; scheduler to<br>
&gt;&gt; &gt; run<br>
&gt;&gt; &gt; the VM?=C2=A0 I appreciate the help.<br>
&gt;&gt;<br>
&gt;&gt; From the attached program, which is similar to your previous progr=
am:<br>
&gt;&gt;<br>
&gt;&gt; sched.sched_entries[0].vcpu_id =3D 0;<br>
&gt;&gt; sched.sched_entries[0].runtime =3D 30;<br>
&gt;&gt; sched.major_frame +=3D sched.sched_entries[0].runtime;<br>
&gt;&gt;<br>
&gt;&gt; The runtime field is in units of nanoseconds.=C2=A0 30 nanoseconds=
 is<br>
&gt;&gt; orders of magnitude shorter than the context switch time.=C2=A0 I&=
#39;m not<br>
&gt;&gt; sure what the scheduler would do with a runtime this small, but it=
<br>
&gt;&gt; would not be pretty.=C2=A0 For most configurations, the slice runt=
imes<br>
&gt;&gt; should be in the milliseconds range, so multiple your runtimes by<=
br>
&gt;&gt; 1000000, and see if that fixes your issue.<br>
&gt;&gt;<br>
&gt;&gt; sched.sched_entries[*].runtime =3D 10000000;=C2=A0 /* 10 ms */<br>
&gt;&gt;<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 Nate<br>
&gt;&gt;<br>
&gt;<br>
&gt; After i changed runtime value to 1000000 or greater and run again. It =
was<br>
&gt; suddenly hang with panic on CPU 0 with error message :<br>
<br>
</div></div>What are the exact runtimes you are using for Dom-0 and the VM?=
=C2=A0 The<br>
default timeslice is 10ms (10000000), so that&#39;s usually a good value<br=
>
to use for each.<br>
<div><div class=3D"h5"><br>
&gt;<br>
&gt; (XEN) Assertion &#39;local_irq_is_enabled()&#39; failed at smp.c:55<br=
>
&gt; (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.<br>
&gt; (XEN) ----[ Xen-4.4.1=C2=A0 x86_64=C2=A0 debug=3Dy=C2=A0 Not tainted ]=
----<br>
&gt; (XEN) CPU:=C2=A0 =C2=A0 0<br>
&gt; (XEN) RIP:=C2=A0 =C2=A0 e008:[&lt;ffff82d080129707&gt;] on_selected_cp=
us+0x7/0xd6<br>
&gt; (XEN) RFLAGS: 0000000000010046=C2=A0 =C2=A0CONTEXT: hypervisor<br>
&gt; (XEN) rax: 0000000000000046=C2=A0 =C2=A0rbx: ffff82d08013a9c8=C2=A0 =
=C2=A0rcx: 0000000000000000<br>
&gt; (XEN) rdx: 0000000000000000=C2=A0 =C2=A0rsi: ffff82d08013a9c8=C2=A0 =
=C2=A0rdi: ffff82d0802d7c18<br>
&gt; (XEN) rbp: ffff82d0802d7c58=C2=A0 =C2=A0rsp: ffff82d0802d7c10=C2=A0 =
=C2=A0r8:=C2=A0 0000000000000004<br>
&gt; (XEN) r9:=C2=A0 000000000000003f=C2=A0 =C2=A0r10: 0000000000000000=C2=
=A0 =C2=A0r11: 0000000000000246<br>
&gt; (XEN) r12: 0000000000000000=C2=A0 =C2=A0r13: 0000000000000000=C2=A0 =
=C2=A0r14: ffff82d0802d7d38<br>
&gt; (XEN) r15: 0000000000000000=C2=A0 =C2=A0cr0: 000000008005003b=C2=A0 =
=C2=A0cr4: 00000000000426f0<br>
&gt; (XEN) cr3: 00000000df888000=C2=A0 =C2=A0cr2: 0000000000989740<br>
&gt; (XEN) ds: 0000=C2=A0 =C2=A0es: 0000=C2=A0 =C2=A0fs: 0000=C2=A0 =C2=A0g=
s: 0000=C2=A0 =C2=A0ss: e010=C2=A0 =C2=A0cs: e008<br>
&gt; (XEN) Xen stack trace from rsp=3Dffff82d0802d7c10:<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d08012984e 0000000000000000 0000000000000000 =
0000000000000000<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000000000 ffff82d0802735f0 0000000000000001 =
ffff82d0802f9200<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989740 ffff82d0802d7cc8 ffff82d08013af14 =
0000000000200e8c<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000000000 00000002030bc067 000000000000000e =
0000000000000092<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989740 ffff82d0802d7ce8 000000000000000e =
0000000000000000<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989740 ffff8302154ff000 0000000000000000 =
ffff82d0802d7ce8<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0801892b7 ffff8302154ff000 ffff82d0802d7d38 =
ffff82d0802d7d28<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d080190631 0000000000000086 ffff8300dfb98000 =
0000000000989680<br>
&gt; (XEN)=C2=A0 =C2=A0 0000003222af7456 ffff82d0802d7e68 0000000000000000 =
00007d2f7fd282a7<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d08022a33d 0000000000000000 ffff82d0802d7e68 =
0000003222af7456<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000000989680 ffff82d0802d7e20 ffff8302154fd010 =
0000000000000246<br>
&gt; (XEN)=C2=A0 =C2=A0 0000003222b7f318 ffff8300df6fe060 0000000000000002 =
0000000000000086<br>
&gt; (XEN)=C2=A0 =C2=A0 0000003226424461 0000000000000005 ffff82d080274620 =
0000000000000005<br>
&gt; (XEN)=C2=A0 =C2=A0 0000000e00000000 ffff82d0801254ae 000000000000e008 =
0000000000010002<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0802d7de0 000000000000e010 0000000000000003 =
00ff82d080319728<br>
&gt; (XEN)=C2=A0 =C2=A0 80000000802fa2a0 ffff8300dfb98000 0000003222af7456 =
ffff82d0803196e0<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0803196e8 0000000000000000 ffff82d0802d7eb0 =
ffff82d08012616c<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0802d7e60 ffff82d080319700 00000000002d7e60 =
ffff82d0803196e0<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff8302154d3f70 ffff82d080319880 ffff82d0802d7eb0 =
ffff82d08012c7b6<br>
&gt; (XEN)=C2=A0 =C2=A0 ffff82d0802d0000 0000000000000246 0000003222aebd61 =
ffff82d0802eff00<br>
&gt; (XEN) Xen call trace:<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d080129707&gt;] on_selected_cpus+0x7/0xd=
6<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08013af14&gt;] __trap_to_gdb+0x130/0x9f=
c<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d0801892b7&gt;] debugger_trap_fatal+0x15=
/0x2c<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d080190631&gt;] do_page_fault+0x456/0x53=
6<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08022a33d&gt;] handle_exception_saved+0=
x2e/0x6c<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d0801254ae&gt;] a653sched_do_schedule+0x=
10a/0x1de<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08012616c&gt;] schedule+0x116/0x5df<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d080129359&gt;] __do_softirq+0x81/0x8c<b=
r>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d0801293b2&gt;] do_softirq+0x13/0x15<br>
&gt; (XEN)=C2=A0 =C2=A0 [&lt;ffff82d08015f355&gt;] idle_loop+0x64/0x74<br>
&gt; (XEN)<br>
&gt; (XEN)<br>
&gt; (XEN) ****************************************<br>
&gt; (XEN) Panic on CPU 0:<br>
&gt; (XEN) Assertion &#39;local_irq_is_enabled()&#39; failed at smp.c:55<br=
>
&gt; (XEN) ****************************************<br>
&gt; (XEN)<br>
&gt; (XEN) Reboot in five seconds...<br>
&gt; (XEN) WARNING WARNING WARNING: Avoiding recursive gdb.<br>
&gt;<br>
&gt; this is the output from &#39;xl info&#39;<br>
&gt;<br>
&gt; host=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: boaman<br>
&gt; release=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 3.2.0=
-4-amd64<br>
&gt; version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : #1 SM=
P Debian 3.2.65-1+deb7u2<br>
&gt; machine=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : x86_6=
4<br>
&gt; nr_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 1<br>
&gt; max_cpu_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 0<br>
&gt; nr_nodes=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt; cores_per_socket=C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt; threads_per_core=C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt; cpu_mhz=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 2826<=
br>
&gt; hw_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :<br>
&gt; bfebfbff:20100800:00000000:00000900:0408e3fd:00000000:00000001:0000000=
0<br>
&gt; virt_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : hvm<br>
&gt; total_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 8123<br>
&gt; free_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 745<br>
&gt; sharing_freed_memory=C2=A0 =C2=A0: 0<br>
&gt; sharing_used_memory=C2=A0 =C2=A0 : 0<br>
&gt; outstanding_claims=C2=A0 =C2=A0 =C2=A0: 0<br>
&gt; free_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 0<br>
&gt; xen_major=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4<br>
&gt; xen_minor=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4<br>
&gt; xen_extra=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : .1<br>
&gt; xen_version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4.4.1<br>
&gt; xen_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: xen-3=
.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32<br>
&gt; hvm-3.0-x86_32p hvm-3.0-x86_64<br>
&gt; xen_scheduler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : arinc653<br>
&gt; xen_pagesize=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 4096<br>
&gt; platform_params=C2=A0 =C2=A0 =C2=A0 =C2=A0 : virt_start=3D0xffff800000=
000000<br>
&gt; xen_changeset=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :<br>
&gt; xen_commandline=C2=A0 =C2=A0 =C2=A0 =C2=A0 : placeholder loglvl=3Dall =
guest_loglvl=3Dall<br>
&gt; com1=3D115200,8n1,0x3f8,5 console=3Dcom1,vga gdb=3Dcom1 kgdboc=3Dcom1,=
115200<br>
&gt; sched=3Darinc653 maxcpus=3D1<br>
&gt; cc_compiler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : gcc (Debian 4.7=
.2-5) 4.7.2<br>
&gt; cc_compile_by=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : manam<br>
&gt; cc_compile_domain=C2=A0 =C2=A0 =C2=A0 :<br>
&gt; cc_compile_date=C2=A0 =C2=A0 =C2=A0 =C2=A0 : Wed Jun=C2=A0 3 11:55:42 =
CEST 2015<br>
&gt; xend_config_format=C2=A0 =C2=A0 =C2=A0: 4<br>
<br>
</div></div>Are you using the arinc653 scheduler as is?=C2=A0 (I saw your e=
arlier<br>
e-mail thread about writing a scheduler based on the arinc653 one.)<br>
<br>
=C2=A0 =C2=A0 =C2=A0Nate<br>
<br>
&gt;<br>
&gt; Regards,<br>
&gt; Idris<br>
</blockquote></div><br><div><div>Hi Nathan, <br><br></div>Thank you. Now i =
can run arinc653 scheduler with fresh install of xen.<br><br></div><div>I u=
se the script that i wrote. <br><br></div>Regards,<br>Idris</div></div>

--001a1134de94eec59705188e5e33--


--===============7491081045072643601==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============7491081045072643601==--


From xen-users-bounces@lists.xen.org Mon Jun 15 22:57:17 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 22:57:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4dIU-0002H4-8d; Mon, 15 Jun 2015 22:56:06 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4cPn-0006lL-Iq
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 21:59:35 +0000
Received: from [85.158.137.68] by server-17.bemta-3.messagelabs.com id
	FA/C2-16276-6CA4F755; Mon, 15 Jun 2015 21:59:34 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434405572!16510173!1
X-Originating-IP: [198.47.26.153]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MyA9PiAxNjk4NDE=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 8450 invoked from network); 15 Jun 2015 21:59:34 -0000
Received: from devils.ext.ti.com (HELO devils.ext.ti.com) (198.47.26.153)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 15 Jun 2015 21:59:34 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by devils.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5FLxV2K014118
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 16:59:31 -0500
Received: from DLEE70.ent.ti.com (dlemailx.itg.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5FLxVP2026119
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 16:59:31 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Mon, 15 Jun 2015 16:59:30 -0500
Message-ID: <557F3CB3.90908@ti.com>
Date: Mon, 15 Jun 2015 16:59:31 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: <xen-users@lists.xen.org>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Mon, 15 Jun 2015 22:56:05 +0000
Subject: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello All,

    I'm experiencing some issues with booting into a Dom0 Linux Kernel 
on a embedded ARM Cortex A15 processor. Tracing through the code has 
shown me that the code is stuck in the idle_loop() function
(xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and 
there are no scheduled tasklets to run.

    A little about my setup to start. I'm using uBoot to boot Xen, which 
is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
where the Xen version is 4.6-unstable. The commit I'm operating at has 
the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.

    After looking through the Xen code, I was unable to find a place 
where it explicitly jumps into the Dom0 kernel, which was what I was 
expecting to see. Is there somewhere in the source code where this is 
the case that I just missed? Or, is the initial jump into the kernel 
scheduled as a tasklet? If the latter is the case, then the kernel is 
never scheduled as a tasklet in the source code.

    Any tips on getting out the idle_loop() would be appreciated. Thanks 
in advance for your assistance.

Regards,

     Brandon Perez

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 15 22:57:17 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2015 22:57:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4dIU-0002H4-8d; Mon, 15 Jun 2015 22:56:06 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4cPn-0006lL-Iq
	for xen-users@lists.xen.org; Mon, 15 Jun 2015 21:59:35 +0000
Received: from [85.158.137.68] by server-17.bemta-3.messagelabs.com id
	FA/C2-16276-6CA4F755; Mon, 15 Jun 2015 21:59:34 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434405572!16510173!1
X-Originating-IP: [198.47.26.153]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MyA9PiAxNjk4NDE=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 8450 invoked from network); 15 Jun 2015 21:59:34 -0000
Received: from devils.ext.ti.com (HELO devils.ext.ti.com) (198.47.26.153)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 15 Jun 2015 21:59:34 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by devils.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5FLxV2K014118
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 16:59:31 -0500
Received: from DLEE70.ent.ti.com (dlemailx.itg.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5FLxVP2026119
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 16:59:31 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Mon, 15 Jun 2015 16:59:30 -0500
Message-ID: <557F3CB3.90908@ti.com>
Date: Mon, 15 Jun 2015 16:59:31 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: <xen-users@lists.xen.org>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Mon, 15 Jun 2015 22:56:05 +0000
Subject: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello All,

    I'm experiencing some issues with booting into a Dom0 Linux Kernel 
on a embedded ARM Cortex A15 processor. Tracing through the code has 
shown me that the code is stuck in the idle_loop() function
(xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and 
there are no scheduled tasklets to run.

    A little about my setup to start. I'm using uBoot to boot Xen, which 
is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
where the Xen version is 4.6-unstable. The commit I'm operating at has 
the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.

    After looking through the Xen code, I was unable to find a place 
where it explicitly jumps into the Dom0 kernel, which was what I was 
expecting to see. Is there somewhere in the source code where this is 
the case that I just missed? Or, is the initial jump into the kernel 
scheduled as a tasklet? If the latter is the case, then the kernel is 
never scheduled as a tasklet in the source code.

    Any tips on getting out the idle_loop() would be appreciated. Thanks 
in advance for your assistance.

Regards,

     Brandon Perez

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 03:44:20 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 03:44:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4hmP-00018g-SU; Tue, 16 Jun 2015 03:43:17 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <zir_blazer@hotmail.com>) id 1Z4hmO-00018Y-C3
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 03:43:16 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	56/02-01068-35B9F755; Tue, 16 Jun 2015 03:43:15 +0000
X-Env-Sender: zir_blazer@hotmail.com
X-Msg-Ref: server-4.tower-31.messagelabs.com!1434426193!15274156!1
X-Originating-IP: [65.54.61.99]
X-SpamReason: No, hits=0.1 required=7.0 tests=FORGED_HOTMAIL_RCVD
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30297 invoked from network); 16 Jun 2015 03:43:14 -0000
Received: from snt004-omc2s48.hotmail.com (HELO SNT004-OMC2S48.hotmail.com)
	(65.54.61.99)
	by server-4.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	16 Jun 2015 03:43:14 -0000
Received: from SNT151-W77 ([65.55.90.73]) by SNT004-OMC2S48.hotmail.com over
	TLS secured channel with Microsoft SMTPSVC(7.5.7601.22751); 
	Mon, 15 Jun 2015 20:43:12 -0700
X-TMN: [w7TN3SjgXgO4Od4lJ2NAj/F1jWioqk72UTx7kZBYE7g=]
X-Originating-Email: [zir_blazer@hotmail.com]
Message-ID: <SNT151-W77F220DF0CC65E2839ACE8F3A70@phx.gbl>
From: Zir Blazer <zir_blazer@hotmail.com>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Date: Tue, 16 Jun 2015 00:43:12 -0300
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 16 Jun 2015 03:43:12.0868 (UTC)
	FILETIME=[92117A40:01D0A7E6]
Subject: [Xen-users] Mouse in a DomU suddently dying during high CPU usage
 of Dom0/other DomUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

The problem is pretty much what is stated on the title. When there is heavy CPU Usage anywhere else but the DomU that I mainly use for gaming, and simultaneously, I do something CPU (And maybe I/O too) intensive in my DomU, the Mouse suddently dies, having no chance to recover but restarting the DomU.

I'm starting a home cloud hosted in my computer which has a fully working Xen install, and other home members may use a VM I'm providing so they can access it, install some heavy applications which are too slow in their computers, and do their work there. In practice, this is extremely disruptive for me since when they put their VM at full load, everytime that I'm also doing some duty here (Which may be playing a game), I have ocassional minifreezes. During the minifreezes, the Mouse cursor may get stuck in one direction (Notorious in First Person Shooter games like Doom, with the zDoom port) which after some seconds and moving the cursor around recovers, but, if the minifreeze last more than what appears to be a timeout, the Mouse simply dies in my DomU. I see the cursor at the last position, but it is totally unmovable. If I Ctrl + Alt to Dom0 X.org or another DomU with GUI and mouse, things are working fine there.
I have consistently noticed this behaviator since a year ago or so, as I recall that when compiling packages in Dom0 (With only one DomU running, my gaming one) I also had this same issue, just that I workarounded it by doing very gentle cursor movements when I loaded my DomU simultaneously, as it seems that simultaneous load and hard turning Mouse movements is what causes the Mouse to die.

After asking several times in IRC with no good response, I found no way to do a soft reset of the Mouse, forcing me to have to shut down and start again the DomU. This is pretty much the only reason why I have to restart that DomU at all.


Reelevant info:

HARDWARE
Processor: Xeon E3-1245V3 (4C/8T, but I have Hyper Threading disabled)
Storage: Seagate HDD.15 4 TB Hard Disk with LVM volumes for each DomU

SOFTWARE
Arch Linux as Dom0
Xen 4.5, Linux Kernel 4.0.1


Dom0 sees all 4 Cores but is limited to 2 GiB RAM. Most of the Mouse dying issues when using a single DomU but a loaded Dom0 started to appear after I enabled the compiler makeflags=-j4 to compile using 4 Threads. I don't recall it happened at all with only a single Thread.
Affected DomU runs WXP x64 SP2, but it happened too in WXP SP3 IIRC. It also has 4 Cores (vcpus = 4), and has affinity just to pin them (cpus = "0,1,2,3"). For interacting with it, I use sdl = 1. Oh, and also has VGA Passthrough, but I don't think than that is involved, even through I didn't tried in a test VM just to check if it happens on others. I'm NOT using usbdevice = "tablet".
The new DomU that generates this condition has only 2 Cores, pinned down (cpu = "2,3"). It also has sdl = 1, but also simultaneously has SPICE enabled, this way, I can see (And even interact if needed) with the VM while they remotely use them with a SPICE client.


Any ideas? Yes, I know that it would be better if I only use Core 0 and 1 in my VM while the other one is working, but since CPU hotplugging is not a Windows friendly feature, it means that I would have to restart it anyways, so I'm looking for a way to merely do a soft reset of the Mouse when things go wrong. 		 	   		  
_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 03:44:20 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 03:44:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4hmP-00018g-SU; Tue, 16 Jun 2015 03:43:17 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <zir_blazer@hotmail.com>) id 1Z4hmO-00018Y-C3
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 03:43:16 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	56/02-01068-35B9F755; Tue, 16 Jun 2015 03:43:15 +0000
X-Env-Sender: zir_blazer@hotmail.com
X-Msg-Ref: server-4.tower-31.messagelabs.com!1434426193!15274156!1
X-Originating-IP: [65.54.61.99]
X-SpamReason: No, hits=0.1 required=7.0 tests=FORGED_HOTMAIL_RCVD
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30297 invoked from network); 16 Jun 2015 03:43:14 -0000
Received: from snt004-omc2s48.hotmail.com (HELO SNT004-OMC2S48.hotmail.com)
	(65.54.61.99)
	by server-4.tower-31.messagelabs.com with AES256-SHA encrypted SMTP;
	16 Jun 2015 03:43:14 -0000
Received: from SNT151-W77 ([65.55.90.73]) by SNT004-OMC2S48.hotmail.com over
	TLS secured channel with Microsoft SMTPSVC(7.5.7601.22751); 
	Mon, 15 Jun 2015 20:43:12 -0700
X-TMN: [w7TN3SjgXgO4Od4lJ2NAj/F1jWioqk72UTx7kZBYE7g=]
X-Originating-Email: [zir_blazer@hotmail.com]
Message-ID: <SNT151-W77F220DF0CC65E2839ACE8F3A70@phx.gbl>
From: Zir Blazer <zir_blazer@hotmail.com>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Date: Tue, 16 Jun 2015 00:43:12 -0300
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 16 Jun 2015 03:43:12.0868 (UTC)
	FILETIME=[92117A40:01D0A7E6]
Subject: [Xen-users] Mouse in a DomU suddently dying during high CPU usage
 of Dom0/other DomUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

The problem is pretty much what is stated on the title. When there is heavy CPU Usage anywhere else but the DomU that I mainly use for gaming, and simultaneously, I do something CPU (And maybe I/O too) intensive in my DomU, the Mouse suddently dies, having no chance to recover but restarting the DomU.

I'm starting a home cloud hosted in my computer which has a fully working Xen install, and other home members may use a VM I'm providing so they can access it, install some heavy applications which are too slow in their computers, and do their work there. In practice, this is extremely disruptive for me since when they put their VM at full load, everytime that I'm also doing some duty here (Which may be playing a game), I have ocassional minifreezes. During the minifreezes, the Mouse cursor may get stuck in one direction (Notorious in First Person Shooter games like Doom, with the zDoom port) which after some seconds and moving the cursor around recovers, but, if the minifreeze last more than what appears to be a timeout, the Mouse simply dies in my DomU. I see the cursor at the last position, but it is totally unmovable. If I Ctrl + Alt to Dom0 X.org or another DomU with GUI and mouse, things are working fine there.
I have consistently noticed this behaviator since a year ago or so, as I recall that when compiling packages in Dom0 (With only one DomU running, my gaming one) I also had this same issue, just that I workarounded it by doing very gentle cursor movements when I loaded my DomU simultaneously, as it seems that simultaneous load and hard turning Mouse movements is what causes the Mouse to die.

After asking several times in IRC with no good response, I found no way to do a soft reset of the Mouse, forcing me to have to shut down and start again the DomU. This is pretty much the only reason why I have to restart that DomU at all.


Reelevant info:

HARDWARE
Processor: Xeon E3-1245V3 (4C/8T, but I have Hyper Threading disabled)
Storage: Seagate HDD.15 4 TB Hard Disk with LVM volumes for each DomU

SOFTWARE
Arch Linux as Dom0
Xen 4.5, Linux Kernel 4.0.1


Dom0 sees all 4 Cores but is limited to 2 GiB RAM. Most of the Mouse dying issues when using a single DomU but a loaded Dom0 started to appear after I enabled the compiler makeflags=-j4 to compile using 4 Threads. I don't recall it happened at all with only a single Thread.
Affected DomU runs WXP x64 SP2, but it happened too in WXP SP3 IIRC. It also has 4 Cores (vcpus = 4), and has affinity just to pin them (cpus = "0,1,2,3"). For interacting with it, I use sdl = 1. Oh, and also has VGA Passthrough, but I don't think than that is involved, even through I didn't tried in a test VM just to check if it happens on others. I'm NOT using usbdevice = "tablet".
The new DomU that generates this condition has only 2 Cores, pinned down (cpu = "2,3"). It also has sdl = 1, but also simultaneously has SPICE enabled, this way, I can see (And even interact if needed) with the VM while they remotely use them with a SPICE client.


Any ideas? Yes, I know that it would be better if I only use Core 0 and 1 in my VM while the other one is working, but since CPU hotplugging is not a Windows friendly feature, it means that I would have to restart it anyways, so I'm looking for a way to merely do a soft reset of the Mouse when things go wrong. 		 	   		  
_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 03:54:01 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 03:54:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4hwZ-0001uQ-8F; Tue, 16 Jun 2015 03:53:47 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <juanrossi@gmail.com>) id 1Z4hwY-0001uK-64
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 03:53:46 +0000
Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id
	23/D0-25925-9CD9F755; Tue, 16 Jun 2015 03:53:45 +0000
X-Env-Sender: juanrossi@gmail.com
X-Msg-Ref: server-4.tower-206.messagelabs.com!1434426816!14435779!1
X-Originating-IP: [74.125.82.53]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_40_50,HTML_MESSAGE,
	ML_RADAR_SPEW_LINKS_8,RCVD_BY_IP,spamassassin: ,async_handler: 
	YXN5bmNfZGVsYXk6IDAgKHRpbWVvdXQp\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1673 invoked from network); 16 Jun 2015 03:53:36 -0000
Received: from mail-wg0-f53.google.com (HELO mail-wg0-f53.google.com)
	(74.125.82.53)
	by server-4.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	16 Jun 2015 03:53:36 -0000
Received: by wgez8 with SMTP id z8so2977885wge.0
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 20:53:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=rb9fZmrg6dD7zBGcReDKU/tgN1waw99WbYiuY1cHfwI=;
	b=Y4QpzN1dUbIkCEIJejA36wqKHTvftC2rBjuYeyOB5g1faLRXhmGM56dDdVUthwLCit
	ixdzNM6CmghOUYLdtjDwlt6sS6Ud+n8Mc272hxFZvdmr1IiLSUZxX3dXKUS9sL85r0ny
	3oRDOjIKwZ0SVD3EP1Xhz4qNmlDbqddb/FotSxHld6wQflnkn4F8eMBb6htkSKyADaFu
	aDJuSH9uPOJ62uXlzUP3yF92smVCnFur7EPQxVka3XdonltrX1cXe3SCYxw4X5CtxEXJ
	SIk2ngde8dinsdY3oTL27Dr9zMWJCeqswJ+2iOVlCwFzEdMg187TUNi9WqWwvnBfS1W9
	IjZw==
MIME-Version: 1.0
X-Received: by 10.180.205.168 with SMTP id lh8mr1784225wic.95.1434426815953;
	Mon, 15 Jun 2015 20:53:35 -0700 (PDT)
Received: by 10.27.26.202 with HTTP; Mon, 15 Jun 2015 20:53:35 -0700 (PDT)
Date: Tue, 16 Jun 2015 15:53:35 +1200
Message-ID: <CAMNpGYO+dpKbBmMkjm0M4K_L1HbBFODb3CPUF6gxj1=U0fh=Sg@mail.gmail.com>
From: Juan Augusto Rossi <juanrossi@gmail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] page allocation failures
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7632220235462650385=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============7632220235462650385==
Content-Type: multipart/alternative; boundary=001a11c38aced23e3105189a84ab

--001a11c38aced23e3105189a84ab
Content-Type: text/plain; charset=UTF-8

HI

We are seeing some fairly similar issues involving the network stack and
driver at the dom0 and some failures to allocate pages, sometimes it is the
swapper, some other times ksoftirqd or even rsyslogd

In many hosts we have seen this issue, seems to happen shortly after the
hosts starts and there is some network heavy load, does not seem to bring
the server down or repeat once it is happened. Sadly we cannot encounter at
the moment exact steps to reproduce the issue.

We are running 3.14.33-1.el6xen.x86_64 and xrn 4.2.5 in centos 6.

We have found some old issue at https://access.redhat.com/solutions/90883 and
that describes the problem, issues look like they have been patched ages
ago, but we wonder is there is some kind of regression, unsure how to track
the exact patch to check if the kernel we have has it or not.

We have been toying with the vm settings but there are mix feelings about
changing vm.zone_reclaim_mode

http://rhaas.blogspot.co.nz/2014/06/linux-disables-vmzonereclaimmode-by.html

http://www.poempelfox.de/blog/2010/03/19/

Documentation about the parameters:
https://www.kernel.org/doc/Documentation/sysctl/vm.txt


Any of you have you seen this issue before?

Regards

Juan.-

HOST 1####################################################

2015-04-20T20:59:04+00:00 kernel  - -  swapper/0: page allocation failure:
order:0, mode:0x120
2015-04-20T20:59:04+00:00 kernel  - -  CPU: 0 PID: 0 Comm: swapper/0
Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-04-20T20:59:04+00:00 kernel  - -  Hardware name: Supermicro
X9DR3-F/X9DR3-F, BIOS 4.6.5 02/08/2012
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000000 ffff88003c603968
ffffffff8161e672 0000000000000010
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000120 ffff88003c6039f8
ffffffff811415db ffff8800020366e2
2015-04-20T20:59:04+00:00 kernel  - -  ffff88003d2ebb38 00ff880015a0ea68
ffff880027291e58 0000000000000000
2015-04-20T20:59:04+00:00 kernel  - -  Call Trace:
2015-04-20T20:59:04+00:00 kernel  - -  <IRQ>  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff816226d6>] ?
_raw_spin_unlock_irqrestore+0x16/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810afe83>] ?
__wake_up+0x53/0x70
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa03c9a9a>]
xenvif_tx_build_gops+0x59a/0xf40 [xen_netback]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045e678>] ?
br_forward_finish+0x58/0x60 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045e588>] ?
__br_forward+0x98/0xc0 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f470>] ?
br_handle_frame+0x260/0x260 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045e60d>] ?
br_forward+0x5d/0x70 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f5c5>] ?
br_handle_frame_finish+0x155/0x370 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f3c0>] ?
br_handle_frame+0x1b0/0x260 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f210>] ?
br_handle_local_finish+0x50/0x50 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff815586e1>] ?
__netif_receive_skb_core+0x271/0x7a0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100abb0>] ?
xen_clocksource_read+0x20/0x30
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100acaf>] ?
xen_pvclock_gtod_notify+0x1f/0xc0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81558ebd>] ?
netif_receive_skb_internal+0x2d/0x90
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa03ca49e>]
xenvif_tx_action+0x5e/0x730 [xen_netback]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa03cc85c>]
xenvif_poll+0x3c/0xec [xen_netback]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810727fd>]
irq_exit+0xbd/0xd0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff813b88e5>]
xen_evtchn_do_upcall+0x35/0x50
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8162d0be>]
xen_do_hypervisor_callback+0x1e/0x30
2015-04-20T20:59:04+00:00 kernel  - -  <EOI>  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100a5b0>] ?
xen_safe_halt+0x10/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e844>] ?
default_idle+0x24/0xc0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e1e6>] ?
arch_cpu_idle+0x26/0x30
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810bfa7e>] ?
cpu_startup_entry+0xae/0x260
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81613dc7>] ?
rest_init+0x77/0x80
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff819332c0>] ?
start_kernel+0x43b/0x448
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932ca3>] ?
repair_env_string+0x5b/0x5b
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932603>] ?
x86_64_start_reservations+0x2a/0x2c
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81936688>] ?
xen_start_kernel+0x5bd/0x5bf
2015-04-20T20:59:04+00:00 kernel  - -  CPU: 0 PID: 0 Comm: swapper/0
Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-04-20T20:59:04+00:00 kernel  - -  Hardware name: Supermicro
X9DR3-F/X9DR3-F, BIOS 4.6.5 02/08/2012
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000000 ffff88003c603b08
ffffffff8161e672 0000000000000010
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000020 ffff88003c603b98
ffffffff811415db ffffffff816226d6
2015-04-20T20:59:04+00:00 kernel  - -  ffff88003d2ebb38 01ffffff810afe83
ffffffff815b8196 ffffffff81879a70
2015-04-20T20:59:04+00:00 kernel  - -  Call Trace:
2015-04-20T20:59:04+00:00 kernel  - -  <IRQ>  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff816226d6>] ?
_raw_spin_unlock_irqrestore+0x16/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff815b8196>] ?
tcp_v4_rcv+0x696/0x700
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff815bbe32>] ?
tcp4_gro_receive+0xf2/0x140
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81545d67>]
__netdev_alloc_frag+0x97/0x150
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8154a496>]
__netdev_alloc_skb+0x96/0x120
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81559b31>] ?
napi_gro_receive+0x31/0x100
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa00edf4d>]
igb_poll+0x3dd/0x1040 [igb]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810727fd>]
irq_exit+0xbd/0xd0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff813b88e5>]
xen_evtchn_do_upcall+0x35/0x50
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8162d0be>]
xen_do_hypervisor_callback+0x1e/0x30
2015-04-20T20:59:04+00:00 kernel  - -  <EOI>  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100a5b0>] ?
xen_safe_halt+0x10/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e844>] ?
default_idle+0x24/0xc0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e1e6>] ?
arch_cpu_idle+0x26/0x30
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810bfa7e>] ?
cpu_startup_entry+0xae/0x260
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81613dc7>] ?
rest_init+0x77/0x80
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff819332c0>] ?
start_kernel+0x43b/0x448
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932ca3>] ?
repair_env_string+0x5b/0x5b
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932603>] ?
x86_64_start_reservations+0x2a/0x2c
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81936688>] ?
xen_start_kernel+0x5bd/0x5bf


HOST 2####################################################

2015-03-06T01:12:42.134210+00:00 kernel  - - ksoftirqd/0: page allocation
failure: order:0, mode:0x20
2015-03-06T01:12:42.134542+00:00 kernel  - - CPU: 0 PID: 3 Comm:
ksoftirqd/0 Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-03-06T01:12:42.134549+00:00 kernel  - - Hardware name: Supermicro
X8DT3/X8DT3, BIOS 2.1     03/17/2012
2015-03-06T01:12:42.135167+00:00 kernel  - -  0000000000000000
ffff88005c2d99e8 ffffffff8161e672 0000000000000010
2015-03-06T01:12:42.135176+00:00 kernel  - -  0000000000000020
ffff88005c2d9a78 ffffffff811415db ffff88005a690080
2015-03-06T01:12:42.135181+00:00 kernel  - -  ffff88007d45ab38
01ff88005c2d9a98 ffffffff815b8196 ffff88005c2d9af0
2015-03-06T01:12:42.135184+00:00 kernel  - - Call Trace:
2015-03-06T01:12:42.135191+00:00 kernel  - -  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-03-06T01:12:42.135195+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-03-06T01:12:42.135200+00:00 kernel  - -  [<ffffffff815b8196>] ?
tcp_v4_rcv+0x696/0x700
2015-03-06T01:12:42.135214+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-03-06T01:12:42.135220+00:00 kernel  - -  [<ffffffff81592ae8>] ?
ip_local_deliver_finish+0xa8/0x230
2015-03-06T01:12:42.135225+00:00 kernel  - -  [<ffffffff815bbe32>] ?
tcp4_gro_receive+0xf2/0x140
2015-03-06T01:12:42.135229+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-03-06T01:12:42.135234+00:00 kernel  - -  [<ffffffff81545d67>]
__netdev_alloc_frag+0x97/0x150
2015-03-06T01:12:42.135238+00:00 kernel  - -  [<ffffffff8154a496>]
__netdev_alloc_skb+0x96/0x120
2015-03-06T01:12:42.135242+00:00 kernel  - -  [<ffffffff81559b31>] ?
napi_gro_receive+0x31/0x100
2015-03-06T01:12:42.135246+00:00 kernel  - -  [<ffffffffa00b3f4d>]
igb_poll+0x3dd/0x1040 [igb]
2015-03-06T01:12:42.135462+00:00 kernel  - -  [<ffffffff81004f20>] ?
xen_mc_flush+0xb0/0x1b0
2015-03-06T01:12:42.135472+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-03-06T01:12:42.135476+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-03-06T01:12:42.135480+00:00 kernel  - -  [<ffffffff81072728>]
run_ksoftirqd+0x38/0x50
2015-03-06T01:12:42.135484+00:00 kernel  - -  [<ffffffff8109766d>]
smpboot_thread_fn+0xfd/0x190
2015-03-06T01:12:42.135519+00:00 kernel  - - swapper/0: page allocation
failure: order:0, mode:0x20
2015-03-06T01:12:42.135523+00:00 kernel  - - CPU: 0 PID: 0 Comm: swapper/0
Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-03-06T01:12:42.135527+00:00 kernel  - - Hardware name: Supermicro
X8DT3/X8DT3, BIOS 2.1     03/17/2012
2015-03-06T01:12:42.135531+00:00 kernel  - -  0000000000000000
ffff88007c803b08 ffffffff8161e672 0000000000000010
2015-03-06T01:12:42.135534+00:00 kernel  - -  0000000000000020
ffff88007c803b98 ffffffff811415db 0000000025194c00
2015-03-06T01:12:42.135734+00:00 kernel  - -  ffff88007d45ab38
01ff88007c803b38 ffffffff81085e94 ffff88007c803b78
2015-03-06T01:12:42.135742+00:00 kernel  - - Call Trace:
2015-03-06T01:12:42.135747+00:00 kernel  - -  <IRQ>  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-03-06T01:12:42.135752+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-03-06T01:12:42.135756+00:00 kernel  - -  [<ffffffff81085e94>] ?
wake_up_worker+0x24/0x30
2015-03-06T01:12:42.135760+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-03-06T01:12:42.135764+00:00 kernel  - -  [<ffffffff8108832a>] ?
queue_work_on+0x3a/0x50
2015-03-06T01:12:42.135768+00:00 kernel  - -  [<ffffffff813f9b5e>] ?
credit_entropy_bits+0x22e/0x2e0
2015-03-06T01:12:42.135783+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-03-06T01:12:42.135789+00:00 kernel  - -  [<ffffffff81545d67>]
__netdev_alloc_frag+0x97/0x150
2015-03-06T01:12:42.135793+00:00 kernel  - -  [<ffffffff8154a496>]
__netdev_alloc_skb+0x96/0x120
2015-03-06T01:12:42.135798+00:00 kernel  - -  [<ffffffffa00b3f4d>]
igb_poll+0x3dd/0x1040 [igb]
2015-03-06T01:12:42.135802+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-03-06T01:12:42.135804+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-03-06T01:12:42.135807+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-03-06T01:12:42.135817+00:00 kernel  - -  [<ffffffff810727fd>]
irq_exit+0xbd/0xd0
2015-03-06T01:12:42.135820+00:00 kernel  - -  [<ffffffff813b88e5>]
xen_evtchn_do_upcall+0x35/0x50
2015-03-06T01:12:42.135823+00:00 kernel  - -  [<ffffffff8162d0be>]
xen_do_hypervisor_callback+0x1e/0x30
2015-03-06T01:12:42.135826+00:00 kernel  - -  <EOI>  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-03-06T01:12:42.135828+00:00 kernel  - -  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-03-06T01:12:42.135831+00:00 kernel  - -  [<ffffffff8100a5b0>] ?
xen_safe_halt+0x10/0x20
2015-03-06T01:12:42.135833+00:00 kernel  - -  [<ffffffff8101e844>] ?
default_idle+0x24/0xc0
2015-03-06T01:12:42.135836+00:00 kernel  - -  [<ffffffff8101e1e6>] ?
arch_cpu_idle+0x26/0x30
2015-03-06T01:12:42.135844+00:00 kernel  - -  [<ffffffff810bfa7e>] ?
cpu_startup_entry+0xae/0x260
2015-03-06T01:12:42.135848+00:00 kernel  - -  [<ffffffff81613dc7>] ?
rest_init+0x77/0x80
2015-03-06T01:12:42.135850+00:00 kernel  - -  [<ffffffff819332c0>] ?
start_kernel+0x43b/0x448
2015-03-06T01:12:42.135853+00:00 kernel  - -  [<ffffffff81932ca3>] ?
repair_env_string+0x5b/0x5b
2015-03-06T01:12:42.135856+00:00 kernel  - -  [<ffffffff81932603>] ?
x86_64_start_reservations+0x2a/0x2c
2015-03-06T01:12:42.135860+00:00 kernel  - -  [<ffffffff81936688>] ?
xen_start_kernel+0x5bd/0x5bf
2015-03-06T01:12:42.135488+00:00 kernel  - -  [<ffffffff81097570>] ?
smpboot_create_threads+0x80/0x80
2015-03-06T01:12:42.135492+00:00 kernel  - -  [<ffffffff8109047e>]
kthread+0xce/0xf0
2015-03-06T01:12:42.135496+00:00 kernel  - -  [<ffffffff810903b0>] ?
kthread_freezable_should_stop+0x70/0x70
2015-03-06T01:12:42.135510+00:00 kernel  - -  [<ffffffff8162b6fc>]
ret_from_fork+0x7c/0xb0
2015-03-06T01:12:42.135514+00:00 kernel  - -  [<ffffffff810903b0>] ?
kthread_freezable_should_stop+0x70/0x70

--001a11c38aced23e3105189a84ab
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>HI</div><div><br></div><div>We are seeing some fairly=
 similar issues involving the network stack and driver at the dom0 and some=
 failures to allocate pages, sometimes it is the swapper, some other times=
=C2=A0ksoftirqd or even=C2=A0rsyslogd</div><div><br></div><div>In many host=
s we have seen this issue, seems to happen shortly after the hosts starts a=
nd there is some network heavy load, does not seem to bring the server down=
 or repeat once it is happened. Sadly we cannot encounter at the moment exa=
ct steps to reproduce the issue.</div><div><br></div><div>We are running 3.=
14.33-1.el6xen.x86_64 and xrn 4.2.5 in centos 6.<br></div><div><br></div><d=
iv>We have found some old issue at=C2=A0<a class=3D"" href=3D"https://acces=
s.redhat.com/solutions/90883">https://access.redhat.com/solutions/90883</a>=
=C2=A0and that describes the problem, issues look like they have been patch=
ed ages ago, but we wonder is there is some kind of regression, unsure how =
to track the exact patch to check if the kernel we have has it or not.</div=
><div><br></div><div>We have been toying with the vm settings but there are=
 mix feelings about changing vm.zone_reclaim_mode=C2=A0</div><div>
<br><a class=3D"" href=3D"http://rhaas.blogspot.co.nz/2014/06/linux-disable=
s-vmzonereclaimmode-by.html">http://rhaas.blogspot.co.nz/2014/06/linux-disa=
bles-vmzonereclaimmode-by.html</a>
<br><br><a class=3D"" href=3D"http://www.poempelfox.de/blog/2010/03/19/">ht=
tp://www.poempelfox.de/blog/2010/03/19/</a>
<br>
<br>Documentation about the parameters:
<br><a class=3D"" href=3D"https://www.kernel.org/doc/Documentation/sysctl/v=
m.txt">https://www.kernel.org/doc/Documentation/sysctl/vm.txt</a>=C2=A0<br>=
</div><div><br></div><div><br></div><div>Any of you have you seen this issu=
e before?<br></div><div><br></div><div>Regards<br></div><div><br></div><div=
>Juan.-</div><div><br></div><div><span style=3D"font-size:12.8000001907349p=
x">HOST 1####################################################</span></div><=
div><span style=3D"font-size:12.8000001907349px"><br></span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0swapper/0: page allocation failure: order:0, mode:0x120</sp=
an></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59=
:04+00:00 kernel =C2=A0- - =C2=A0CPU: 0 PID: 0 Comm: swapper/0 Tainted: GF =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span><=
/div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+=
00:00 kernel =C2=A0- - =C2=A0Hardware name: Supermicro X9DR3-F/X9DR3-F, BIO=
S 4.6.5 02/08/2012</span></div><div><span style=3D"font-size:12.80000019073=
49px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A00000000000000000 fff=
f88003c603968 ffffffff8161e672 0000000000000010</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0-=
 - =C2=A00000000000000120 ffff88003c6039f8 ffffffff811415db ffff8800020366e=
2</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T=
20:59:04+00:00 kernel =C2=A0- - =C2=A0ffff88003d2ebb38 00ff880015a0ea68 fff=
f880027291e58 0000000000000000</span></div><div><span style=3D"font-size:12=
.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0Call Tra=
ce:</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-2=
0T20:59:04+00:00 kernel =C2=A0- - =C2=A0&lt;IRQ&gt; =C2=A0[&lt;ffffffff8161=
e672&gt;] dump_stack+0x49/0x5f</span></div><div><span style=3D"font-size:12=
.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fff=
fffff811415db&gt;] warn_alloc_failed+0xeb/0x150</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0-=
 - =C2=A0[&lt;ffffffff811447bb&gt;] __alloc_pages_nodemask+0x74b/0xaa0</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:=
04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff816226d6&gt;] ? _raw_spin_unlo=
ck_irqrestore+0x16/0x20</span></div><div><span style=3D"font-size:12.800000=
1907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81=
0afe83&gt;] ? __wake_up+0x53/0x70</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff811897a6&gt;] alloc_pages_current+0xb6/0x170</span></div><div><span=
 style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffffa03c9a9a&gt;] xenvif_tx_build_gops+0x59a/0xf40=
 [xen_netback]</span></div><div><span style=3D"font-size:12.8000001907349px=
">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045e678&gt=
;] ? br_forward_finish+0x58/0x60 [bridge]</span></div><div><span style=3D"f=
ont-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffffa045e588&gt;] ? __br_forward+0x98/0xc0 [bridge]</span></div=
><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045f470&gt;] ? br_handle_frame+0x260=
/0x260 [bridge]</span></div><div><span style=3D"font-size:12.8000001907349p=
x">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045e60d&g=
t;] ? br_forward+0x5d/0x70 [bridge]</span></div><div><span style=3D"font-si=
ze:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&l=
t;ffffffffa045f5c5&gt;] ? br_handle_frame_finish+0x155/0x370 [bridge]</span=
></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:0=
4+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045f3c0&gt;] ? br_handle_frame=
+0x1b0/0x260 [bridge]</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045=
f210&gt;] ? br_handle_local_finish+0x50/0x50 [bridge]</span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff815586e1&gt;] ? __netif_receive_skb_core+0x271=
/0x7a0</span></div><div><span style=3D"font-size:12.8000001907349px">2015-0=
4-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8100abb0&gt;] ? xen=
_clocksource_read+0x20/0x30</span></div><div><span style=3D"font-size:12.80=
00001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffff=
ff8100acaf&gt;] ? xen_pvclock_gtod_notify+0x1f/0xc0</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff81558ebd&gt;] ? netif_receive_skb_internal+0x2d/0=
x90</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-2=
0T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa03ca49e&gt;] xenvif_t=
x_action+0x5e/0x730 [xen_netback]</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff810c0429&gt;] ? handle_irq_event_percpu+0xc9/0x200</span></div><div=
><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 ker=
nel =C2=A0- - =C2=A0[&lt;ffffffffa03cc85c&gt;] xenvif_poll+0x3c/0xec [xen_n=
etback]</span></div><div><span style=3D"font-size:12.8000001907349px">2015-=
04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81559271&gt;] net_=
rx_action+0x111/0x2a0</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8107=
253c&gt;] __do_softirq+0xfc/0x2b0</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff810727fd&gt;] irq_exit+0xbd/0xd0</span></div><div><span style=3D"fo=
nt-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff813b88e5&gt;] xen_evtchn_do_upcall+0x35/0x50</span></div><d=
iv><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 k=
ernel =C2=A0- - =C2=A0[&lt;ffffffff8162d0be&gt;] xen_do_hypervisor_callback=
+0x1e/0x30</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0&lt;EOI&gt; =C2=A0[&lt;fffff=
fff810013aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</span></div><div><span s=
tyle=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff810013aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</=
span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:=
59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8100a5b0&gt;] ? xen_safe_ha=
lt+0x10/0x20</span></div><div><span style=3D"font-size:12.8000001907349px">=
2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8101e844&gt;]=
 ? default_idle+0x24/0xc0</span></div><div><span style=3D"font-size:12.8000=
001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff=
8101e1e6&gt;] ? arch_cpu_idle+0x26/0x30</span></div><div><span style=3D"fon=
t-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff810bfa7e&gt;] ? cpu_startup_entry+0xae/0x260</span></div><d=
iv><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 k=
ernel =C2=A0- - =C2=A0[&lt;ffffffff81613dc7&gt;] ? rest_init+0x77/0x80</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:=
04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff819332c0&gt;] ? start_kernel+0=
x43b/0x448</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81932ca3&gt;] ?=
 repair_env_string+0x5b/0x5b</span></div><div><span style=3D"font-size:12.8=
000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff81932603&gt;] ? x86_64_start_reservations+0x2a/0x2c</span></div><div><sp=
an style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff81936688&gt;] ? xen_start_kernel+0x5bd/0x5bf</=
span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:=
59:04+00:00 kernel =C2=A0- - =C2=A0CPU: 0 PID: 0 Comm: swapper/0 Tainted: G=
F =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span=
></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:0=
4+00:00 kernel =C2=A0- - =C2=A0Hardware name: Supermicro X9DR3-F/X9DR3-F, B=
IOS 4.6.5 02/08/2012</span></div><div><span style=3D"font-size:12.800000190=
7349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A00000000000000000 f=
fff88003c603b08 ffffffff8161e672 0000000000000010</span></div><div><span st=
yle=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A00000000000000020 ffff88003c603b98 ffffffff811415db ffffffff816=
226d6</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04=
-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0ffff88003d2ebb38 01ffffff810afe83=
 ffffffff815b8196 ffffffff81879a70</span></div><div><span style=3D"font-siz=
e:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0Call=
 Trace:</span></div><div><span style=3D"font-size:12.8000001907349px">2015-=
04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0&lt;IRQ&gt; =C2=A0[&lt;ffffffff=
8161e672&gt;] dump_stack+0x49/0x5f</span></div><div><span style=3D"font-siz=
e:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt=
;ffffffff811415db&gt;] warn_alloc_failed+0xeb/0x150</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff816226d6&gt;] ? _raw_spin_unlock_irqrestore+0x16/=
0x20</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-=
20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815b8196&gt;] ? tcp_v=
4_rcv+0x696/0x700</span></div><div><span style=3D"font-size:12.800000190734=
9px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff811447bb=
&gt;] __alloc_pages_nodemask+0x74b/0xaa0</span></div><div><span style=3D"fo=
nt-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff810c0429&gt;] ? handle_irq_event_percpu+0xc9/0x200</span></=
div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+0=
0:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815bbe32&gt;] ? tcp4_gro_receive+0=
xf2/0x140</span></div><div><span style=3D"font-size:12.8000001907349px">201=
5-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff811897a6&gt;] al=
loc_pages_current+0xb6/0x170</span></div><div><span style=3D"font-size:12.8=
000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff81545d67&gt;] __netdev_alloc_frag+0x97/0x150</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0-=
 - =C2=A0[&lt;ffffffff8154a496&gt;] __netdev_alloc_skb+0x96/0x120</span></d=
iv><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00=
:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81559b31&gt;] ? napi_gro_receive+0x=
31/0x100</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa00edf4d&gt;] igb=
_poll+0x3dd/0x1040 [igb]</span></div><div><span style=3D"font-size:12.80000=
01907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8=
10c0429&gt;] ? handle_irq_event_percpu+0xc9/0x200</span></div><div><span st=
yle=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff81559271&gt;] net_rx_action+0x111/0x2a0</span></d=
iv><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00=
:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8107253c&gt;] __do_softirq+0xfc/0x2=
b0</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20=
T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810727fd&gt;] irq_exit+=
0xbd/0xd0</span></div><div><span style=3D"font-size:12.8000001907349px">201=
5-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff813b88e5&gt;] xe=
n_evtchn_do_upcall+0x35/0x50</span></div><div><span style=3D"font-size:12.8=
000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff8162d0be&gt;] xen_do_hypervisor_callback+0x1e/0x30</span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0&lt;EOI&gt; =C2=A0[&lt;ffffffff810013aa&gt;] ? xen_hypercal=
l_sched_op+0xa/0x20</span></div><div><span style=3D"font-size:12.8000001907=
349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810013=
aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</span></div><div><span style=3D"f=
ont-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff8100a5b0&gt;] ? xen_safe_halt+0x10/0x20</span></div><div><s=
pan style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel=
 =C2=A0- - =C2=A0[&lt;ffffffff8101e844&gt;] ? default_idle+0x24/0xc0</span>=
</div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04=
+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8101e1e6&gt;] ? arch_cpu_idle+0x=
26/0x30</span></div><div><span style=3D"font-size:12.8000001907349px">2015-=
04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810bfa7e&gt;] ? cp=
u_startup_entry+0xae/0x260</span></div><div><span style=3D"font-size:12.800=
0001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffffff=
f81613dc7&gt;] ? rest_init+0x77/0x80</span></div><div><span style=3D"font-s=
ize:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&=
lt;ffffffff819332c0&gt;] ? start_kernel+0x43b/0x448</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff81932ca3&gt;] ? repair_env_string+0x5b/0x5b</span=
></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:0=
4+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81932603&gt;] ? x86_64_start_re=
servations+0x2a/0x2c</span></div><div><span style=3D"font-size:12.800000190=
7349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81936=
688&gt;] ? xen_start_kernel+0x5bd/0x5bf</span></div><div><span style=3D"fon=
t-size:12.8000001907349px"><br></span></div><div><span style=3D"font-size:1=
2.8000001907349px"><br></span></div><div><span style=3D"font-size:12.800000=
1907349px">HOST 2</span><span style=3D"font-size:12.8000001907349px">######=
##############################################</span><br></div><div><span s=
tyle=3D"font-size:12.8000001907349px"><br></span></div><div><span style=3D"=
font-size:12.8000001907349px">2015-03-06T01:12:42.134210+00:00 kernel =C2=
=A0- - ksoftirqd/0: page allocation failure: order:0, mode:0x20</span></div=
><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.1345=
42+00:00 kernel =C2=A0- - CPU: 0 PID: 3 Comm: ksoftirqd/0 Tainted: GF =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span></di=
v><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.134=
549+00:00 kernel =C2=A0- - Hardware name: Supermicro X8DT3/X8DT3, BIOS 2.1 =
=C2=A0 =C2=A0 03/17/2012</span></div><div><span style=3D"font-size:12.80000=
01907349px">2015-03-06T01:12:42.135167+00:00 kernel =C2=A0- - =C2=A00000000=
000000000 ffff88005c2d99e8 ffffffff8161e672 0000000000000010</span></div><d=
iv><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135176+=
00:00 kernel =C2=A0- - =C2=A00000000000000020 ffff88005c2d9a78 ffffffff8114=
15db ffff88005a690080</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-03-06T01:12:42.135181+00:00 kernel =C2=A0- - =C2=A0ffff88007d=
45ab38 01ff88005c2d9a98 ffffffff815b8196 ffff88005c2d9af0</span></div><div>=
<span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135184+00:=
00 kernel =C2=A0- - Call Trace:</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135191+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff8161e672&gt;] dump_stack+0x49/0x5f</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135195+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff811415db&gt;] warn_alloc_failed+0xeb/0x150</sp=
an></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12=
:42.135200+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815b8196&gt;] ? tcp_v4=
_rcv+0x696/0x700</span></div><div><span style=3D"font-size:12.8000001907349=
px">2015-03-06T01:12:42.135214+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81=
1447bb&gt;] __alloc_pages_nodemask+0x74b/0xaa0</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135220+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff81592ae8&gt;] ? ip_local_deliver_finish+0xa8/0=
x230</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-=
06T01:12:42.135225+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815bbe32&gt;] =
? tcp4_gro_receive+0xf2/0x140</span></div><div><span style=3D"font-size:12.=
8000001907349px">2015-03-06T01:12:42.135229+00:00 kernel =C2=A0- - =C2=A0[&=
lt;ffffffff811897a6&gt;] alloc_pages_current+0xb6/0x170</span></div><div><s=
pan style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135234+00:00=
 kernel =C2=A0- - =C2=A0[&lt;ffffffff81545d67&gt;] __netdev_alloc_frag+0x97=
/0x150</span></div><div><span style=3D"font-size:12.8000001907349px">2015-0=
3-06T01:12:42.135238+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8154a496&gt;=
] __netdev_alloc_skb+0x96/0x120</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135242+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff81559b31&gt;] ? napi_gro_receive+0x31/0x100</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135246+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffffa00b3f4d&gt;] igb_poll+0x3dd/0x1040 [=
igb]</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-=
06T01:12:42.135462+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81004f20&gt;] =
? xen_mc_flush+0xb0/0x1b0</span></div><div><span style=3D"font-size:12.8000=
001907349px">2015-03-06T01:12:42.135472+00:00 kernel =C2=A0- - =C2=A0[&lt;f=
fffffff81559271&gt;] net_rx_action+0x111/0x2a0</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135476+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff8107253c&gt;] __do_softirq+0xfc/0x2b0</span></=
div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.1=
35480+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81072728&gt;] run_ksoftirqd=
+0x38/0x50</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-03-06T01:12:42.135484+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8109766d=
&gt;] smpboot_thread_fn+0xfd/0x190</span></div><div><span style=3D"font-siz=
e:12.8000001907349px">2015-03-06T01:12:42.135519+00:00 kernel =C2=A0- - swa=
pper/0: page allocation failure: order:0, mode:0x20</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135523+00:00 ker=
nel =C2=A0- - CPU: 0 PID: 0 Comm: swapper/0 Tainted: GF =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span></div><div><span s=
tyle=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135527+00:00 kern=
el =C2=A0- - Hardware name: Supermicro X8DT3/X8DT3, BIOS 2.1 =C2=A0 =C2=A0 =
03/17/2012</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-03-06T01:12:42.135531+00:00 kernel =C2=A0- - =C2=A00000000000000000 ffff=
88007c803b08 ffffffff8161e672 0000000000000010</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135534+00:00 kernel =
=C2=A0- - =C2=A00000000000000020 ffff88007c803b98 ffffffff811415db 00000000=
25194c00</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-03-06T01:12:42.135734+00:00 kernel =C2=A0- - =C2=A0ffff88007d45ab38 01ff88=
007c803b38 ffffffff81085e94 ffff88007c803b78</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135742+00:00 kernel =
=C2=A0- - Call Trace:</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-03-06T01:12:42.135747+00:00 kernel =C2=A0- - =C2=A0&lt;IRQ&gt=
; =C2=A0[&lt;ffffffff8161e672&gt;] dump_stack+0x49/0x5f</span></div><div><s=
pan style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135752+00:00=
 kernel =C2=A0- - =C2=A0[&lt;ffffffff811415db&gt;] warn_alloc_failed+0xeb/0=
x150</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-=
06T01:12:42.135756+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81085e94&gt;] =
? wake_up_worker+0x24/0x30</span></div><div><span style=3D"font-size:12.800=
0001907349px">2015-03-06T01:12:42.135760+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff811447bb&gt;] __alloc_pages_nodemask+0x74b/0xaa0</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135764+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffff8108832a&gt;] ? queue_work_on+0x3a/0x=
50</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06=
T01:12:42.135768+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff813f9b5e&gt;] ? =
credit_entropy_bits+0x22e/0x2e0</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135783+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff811897a6&gt;] alloc_pages_current+0xb6/0x170</span></div><div>=
<span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135789+00:=
00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81545d67&gt;] __netdev_alloc_frag+0x=
97/0x150</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-03-06T01:12:42.135793+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8154a496&g=
t;] __netdev_alloc_skb+0x96/0x120</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-03-06T01:12:42.135798+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffffa00b3f4d&gt;] igb_poll+0x3dd/0x1040 [igb]</span></div><div>=
<span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135802+00:=
00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810c0429&gt;] ? handle_irq_event_per=
cpu+0xc9/0x200</span></div><div><span style=3D"font-size:12.8000001907349px=
">2015-03-06T01:12:42.135804+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8155=
9271&gt;] net_rx_action+0x111/0x2a0</span></div><div><span style=3D"font-si=
ze:12.8000001907349px">2015-03-06T01:12:42.135807+00:00 kernel =C2=A0- - =
=C2=A0[&lt;ffffffff8107253c&gt;] __do_softirq+0xfc/0x2b0</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135817+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffff810727fd&gt;] irq_exit+0xbd/0xd0</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:=
42.135820+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff813b88e5&gt;] xen_evtch=
n_do_upcall+0x35/0x50</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-03-06T01:12:42.135823+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff8162d0be&gt;] xen_do_hypervisor_callback+0x1e/0x30</span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135826+00:00 k=
ernel =C2=A0- - =C2=A0&lt;EOI&gt; =C2=A0[&lt;ffffffff810013aa&gt;] ? xen_hy=
percall_sched_op+0xa/0x20</span></div><div><span style=3D"font-size:12.8000=
001907349px">2015-03-06T01:12:42.135828+00:00 kernel =C2=A0- - =C2=A0[&lt;f=
fffffff810013aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</span></div><div><sp=
an style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135831+00:00 =
kernel =C2=A0- - =C2=A0[&lt;ffffffff8100a5b0&gt;] ? xen_safe_halt+0x10/0x20=
</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T0=
1:12:42.135833+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8101e844&gt;] ? de=
fault_idle+0x24/0xc0</span></div><div><span style=3D"font-size:12.800000190=
7349px">2015-03-06T01:12:42.135836+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffff=
ff8101e1e6&gt;] ? arch_cpu_idle+0x26/0x30</span></div><div><span style=3D"f=
ont-size:12.8000001907349px">2015-03-06T01:12:42.135844+00:00 kernel =C2=A0=
- - =C2=A0[&lt;ffffffff810bfa7e&gt;] ? cpu_startup_entry+0xae/0x260</span><=
/div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.=
135848+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81613dc7&gt;] ? rest_init+=
0x77/0x80</span></div><div><span style=3D"font-size:12.8000001907349px">201=
5-03-06T01:12:42.135850+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff819332c0&=
gt;] ? start_kernel+0x43b/0x448</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135853+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff81932ca3&gt;] ? repair_env_string+0x5b/0x5b</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135856+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffff81932603&gt;] ? x86_64_start_reservat=
ions+0x2a/0x2c</span></div><div><span style=3D"font-size:12.8000001907349px=
">2015-03-06T01:12:42.135860+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8193=
6688&gt;] ? xen_start_kernel+0x5bd/0x5bf</span></div><div><span style=3D"fo=
nt-size:12.8000001907349px">2015-03-06T01:12:42.135488+00:00 kernel =C2=A0-=
 - =C2=A0[&lt;ffffffff81097570&gt;] ? smpboot_create_threads+0x80/0x80</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:=
42.135492+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8109047e&gt;] kthread+0=
xce/0xf0</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-03-06T01:12:42.135496+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810903b0&g=
t;] ? kthread_freezable_should_stop+0x70/0x70</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135510+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff8162b6fc&gt;] ret_from_fork+0x7c/0xb0</span></=
div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.1=
35514+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810903b0&gt;] ? kthread_fre=
ezable_should_stop+0x70/0x70</span></div><div><br></div></div>

--001a11c38aced23e3105189a84ab--


--===============7632220235462650385==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============7632220235462650385==--


From xen-users-bounces@lists.xen.org Tue Jun 16 03:54:01 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 03:54:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4hwZ-0001uQ-8F; Tue, 16 Jun 2015 03:53:47 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <juanrossi@gmail.com>) id 1Z4hwY-0001uK-64
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 03:53:46 +0000
Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id
	23/D0-25925-9CD9F755; Tue, 16 Jun 2015 03:53:45 +0000
X-Env-Sender: juanrossi@gmail.com
X-Msg-Ref: server-4.tower-206.messagelabs.com!1434426816!14435779!1
X-Originating-IP: [74.125.82.53]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_40_50,HTML_MESSAGE,
	ML_RADAR_SPEW_LINKS_8,RCVD_BY_IP,spamassassin: ,async_handler: 
	YXN5bmNfZGVsYXk6IDAgKHRpbWVvdXQp\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1673 invoked from network); 16 Jun 2015 03:53:36 -0000
Received: from mail-wg0-f53.google.com (HELO mail-wg0-f53.google.com)
	(74.125.82.53)
	by server-4.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	16 Jun 2015 03:53:36 -0000
Received: by wgez8 with SMTP id z8so2977885wge.0
	for <xen-users@lists.xen.org>; Mon, 15 Jun 2015 20:53:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=rb9fZmrg6dD7zBGcReDKU/tgN1waw99WbYiuY1cHfwI=;
	b=Y4QpzN1dUbIkCEIJejA36wqKHTvftC2rBjuYeyOB5g1faLRXhmGM56dDdVUthwLCit
	ixdzNM6CmghOUYLdtjDwlt6sS6Ud+n8Mc272hxFZvdmr1IiLSUZxX3dXKUS9sL85r0ny
	3oRDOjIKwZ0SVD3EP1Xhz4qNmlDbqddb/FotSxHld6wQflnkn4F8eMBb6htkSKyADaFu
	aDJuSH9uPOJ62uXlzUP3yF92smVCnFur7EPQxVka3XdonltrX1cXe3SCYxw4X5CtxEXJ
	SIk2ngde8dinsdY3oTL27Dr9zMWJCeqswJ+2iOVlCwFzEdMg187TUNi9WqWwvnBfS1W9
	IjZw==
MIME-Version: 1.0
X-Received: by 10.180.205.168 with SMTP id lh8mr1784225wic.95.1434426815953;
	Mon, 15 Jun 2015 20:53:35 -0700 (PDT)
Received: by 10.27.26.202 with HTTP; Mon, 15 Jun 2015 20:53:35 -0700 (PDT)
Date: Tue, 16 Jun 2015 15:53:35 +1200
Message-ID: <CAMNpGYO+dpKbBmMkjm0M4K_L1HbBFODb3CPUF6gxj1=U0fh=Sg@mail.gmail.com>
From: Juan Augusto Rossi <juanrossi@gmail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] page allocation failures
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7632220235462650385=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============7632220235462650385==
Content-Type: multipart/alternative; boundary=001a11c38aced23e3105189a84ab

--001a11c38aced23e3105189a84ab
Content-Type: text/plain; charset=UTF-8

HI

We are seeing some fairly similar issues involving the network stack and
driver at the dom0 and some failures to allocate pages, sometimes it is the
swapper, some other times ksoftirqd or even rsyslogd

In many hosts we have seen this issue, seems to happen shortly after the
hosts starts and there is some network heavy load, does not seem to bring
the server down or repeat once it is happened. Sadly we cannot encounter at
the moment exact steps to reproduce the issue.

We are running 3.14.33-1.el6xen.x86_64 and xrn 4.2.5 in centos 6.

We have found some old issue at https://access.redhat.com/solutions/90883 and
that describes the problem, issues look like they have been patched ages
ago, but we wonder is there is some kind of regression, unsure how to track
the exact patch to check if the kernel we have has it or not.

We have been toying with the vm settings but there are mix feelings about
changing vm.zone_reclaim_mode

http://rhaas.blogspot.co.nz/2014/06/linux-disables-vmzonereclaimmode-by.html

http://www.poempelfox.de/blog/2010/03/19/

Documentation about the parameters:
https://www.kernel.org/doc/Documentation/sysctl/vm.txt


Any of you have you seen this issue before?

Regards

Juan.-

HOST 1####################################################

2015-04-20T20:59:04+00:00 kernel  - -  swapper/0: page allocation failure:
order:0, mode:0x120
2015-04-20T20:59:04+00:00 kernel  - -  CPU: 0 PID: 0 Comm: swapper/0
Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-04-20T20:59:04+00:00 kernel  - -  Hardware name: Supermicro
X9DR3-F/X9DR3-F, BIOS 4.6.5 02/08/2012
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000000 ffff88003c603968
ffffffff8161e672 0000000000000010
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000120 ffff88003c6039f8
ffffffff811415db ffff8800020366e2
2015-04-20T20:59:04+00:00 kernel  - -  ffff88003d2ebb38 00ff880015a0ea68
ffff880027291e58 0000000000000000
2015-04-20T20:59:04+00:00 kernel  - -  Call Trace:
2015-04-20T20:59:04+00:00 kernel  - -  <IRQ>  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff816226d6>] ?
_raw_spin_unlock_irqrestore+0x16/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810afe83>] ?
__wake_up+0x53/0x70
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa03c9a9a>]
xenvif_tx_build_gops+0x59a/0xf40 [xen_netback]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045e678>] ?
br_forward_finish+0x58/0x60 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045e588>] ?
__br_forward+0x98/0xc0 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f470>] ?
br_handle_frame+0x260/0x260 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045e60d>] ?
br_forward+0x5d/0x70 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f5c5>] ?
br_handle_frame_finish+0x155/0x370 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f3c0>] ?
br_handle_frame+0x1b0/0x260 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa045f210>] ?
br_handle_local_finish+0x50/0x50 [bridge]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff815586e1>] ?
__netif_receive_skb_core+0x271/0x7a0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100abb0>] ?
xen_clocksource_read+0x20/0x30
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100acaf>] ?
xen_pvclock_gtod_notify+0x1f/0xc0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81558ebd>] ?
netif_receive_skb_internal+0x2d/0x90
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa03ca49e>]
xenvif_tx_action+0x5e/0x730 [xen_netback]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa03cc85c>]
xenvif_poll+0x3c/0xec [xen_netback]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810727fd>]
irq_exit+0xbd/0xd0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff813b88e5>]
xen_evtchn_do_upcall+0x35/0x50
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8162d0be>]
xen_do_hypervisor_callback+0x1e/0x30
2015-04-20T20:59:04+00:00 kernel  - -  <EOI>  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100a5b0>] ?
xen_safe_halt+0x10/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e844>] ?
default_idle+0x24/0xc0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e1e6>] ?
arch_cpu_idle+0x26/0x30
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810bfa7e>] ?
cpu_startup_entry+0xae/0x260
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81613dc7>] ?
rest_init+0x77/0x80
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff819332c0>] ?
start_kernel+0x43b/0x448
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932ca3>] ?
repair_env_string+0x5b/0x5b
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932603>] ?
x86_64_start_reservations+0x2a/0x2c
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81936688>] ?
xen_start_kernel+0x5bd/0x5bf
2015-04-20T20:59:04+00:00 kernel  - -  CPU: 0 PID: 0 Comm: swapper/0
Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-04-20T20:59:04+00:00 kernel  - -  Hardware name: Supermicro
X9DR3-F/X9DR3-F, BIOS 4.6.5 02/08/2012
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000000 ffff88003c603b08
ffffffff8161e672 0000000000000010
2015-04-20T20:59:04+00:00 kernel  - -  0000000000000020 ffff88003c603b98
ffffffff811415db ffffffff816226d6
2015-04-20T20:59:04+00:00 kernel  - -  ffff88003d2ebb38 01ffffff810afe83
ffffffff815b8196 ffffffff81879a70
2015-04-20T20:59:04+00:00 kernel  - -  Call Trace:
2015-04-20T20:59:04+00:00 kernel  - -  <IRQ>  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff816226d6>] ?
_raw_spin_unlock_irqrestore+0x16/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff815b8196>] ?
tcp_v4_rcv+0x696/0x700
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff815bbe32>] ?
tcp4_gro_receive+0xf2/0x140
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81545d67>]
__netdev_alloc_frag+0x97/0x150
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8154a496>]
__netdev_alloc_skb+0x96/0x120
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81559b31>] ?
napi_gro_receive+0x31/0x100
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffffa00edf4d>]
igb_poll+0x3dd/0x1040 [igb]
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810727fd>]
irq_exit+0xbd/0xd0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff813b88e5>]
xen_evtchn_do_upcall+0x35/0x50
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8162d0be>]
xen_do_hypervisor_callback+0x1e/0x30
2015-04-20T20:59:04+00:00 kernel  - -  <EOI>  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8100a5b0>] ?
xen_safe_halt+0x10/0x20
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e844>] ?
default_idle+0x24/0xc0
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff8101e1e6>] ?
arch_cpu_idle+0x26/0x30
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff810bfa7e>] ?
cpu_startup_entry+0xae/0x260
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81613dc7>] ?
rest_init+0x77/0x80
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff819332c0>] ?
start_kernel+0x43b/0x448
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932ca3>] ?
repair_env_string+0x5b/0x5b
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81932603>] ?
x86_64_start_reservations+0x2a/0x2c
2015-04-20T20:59:04+00:00 kernel  - -  [<ffffffff81936688>] ?
xen_start_kernel+0x5bd/0x5bf


HOST 2####################################################

2015-03-06T01:12:42.134210+00:00 kernel  - - ksoftirqd/0: page allocation
failure: order:0, mode:0x20
2015-03-06T01:12:42.134542+00:00 kernel  - - CPU: 0 PID: 3 Comm:
ksoftirqd/0 Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-03-06T01:12:42.134549+00:00 kernel  - - Hardware name: Supermicro
X8DT3/X8DT3, BIOS 2.1     03/17/2012
2015-03-06T01:12:42.135167+00:00 kernel  - -  0000000000000000
ffff88005c2d99e8 ffffffff8161e672 0000000000000010
2015-03-06T01:12:42.135176+00:00 kernel  - -  0000000000000020
ffff88005c2d9a78 ffffffff811415db ffff88005a690080
2015-03-06T01:12:42.135181+00:00 kernel  - -  ffff88007d45ab38
01ff88005c2d9a98 ffffffff815b8196 ffff88005c2d9af0
2015-03-06T01:12:42.135184+00:00 kernel  - - Call Trace:
2015-03-06T01:12:42.135191+00:00 kernel  - -  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-03-06T01:12:42.135195+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-03-06T01:12:42.135200+00:00 kernel  - -  [<ffffffff815b8196>] ?
tcp_v4_rcv+0x696/0x700
2015-03-06T01:12:42.135214+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-03-06T01:12:42.135220+00:00 kernel  - -  [<ffffffff81592ae8>] ?
ip_local_deliver_finish+0xa8/0x230
2015-03-06T01:12:42.135225+00:00 kernel  - -  [<ffffffff815bbe32>] ?
tcp4_gro_receive+0xf2/0x140
2015-03-06T01:12:42.135229+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-03-06T01:12:42.135234+00:00 kernel  - -  [<ffffffff81545d67>]
__netdev_alloc_frag+0x97/0x150
2015-03-06T01:12:42.135238+00:00 kernel  - -  [<ffffffff8154a496>]
__netdev_alloc_skb+0x96/0x120
2015-03-06T01:12:42.135242+00:00 kernel  - -  [<ffffffff81559b31>] ?
napi_gro_receive+0x31/0x100
2015-03-06T01:12:42.135246+00:00 kernel  - -  [<ffffffffa00b3f4d>]
igb_poll+0x3dd/0x1040 [igb]
2015-03-06T01:12:42.135462+00:00 kernel  - -  [<ffffffff81004f20>] ?
xen_mc_flush+0xb0/0x1b0
2015-03-06T01:12:42.135472+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-03-06T01:12:42.135476+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-03-06T01:12:42.135480+00:00 kernel  - -  [<ffffffff81072728>]
run_ksoftirqd+0x38/0x50
2015-03-06T01:12:42.135484+00:00 kernel  - -  [<ffffffff8109766d>]
smpboot_thread_fn+0xfd/0x190
2015-03-06T01:12:42.135519+00:00 kernel  - - swapper/0: page allocation
failure: order:0, mode:0x20
2015-03-06T01:12:42.135523+00:00 kernel  - - CPU: 0 PID: 0 Comm: swapper/0
Tainted: GF            3.14.33-1.el6xen.x86_64 #1
2015-03-06T01:12:42.135527+00:00 kernel  - - Hardware name: Supermicro
X8DT3/X8DT3, BIOS 2.1     03/17/2012
2015-03-06T01:12:42.135531+00:00 kernel  - -  0000000000000000
ffff88007c803b08 ffffffff8161e672 0000000000000010
2015-03-06T01:12:42.135534+00:00 kernel  - -  0000000000000020
ffff88007c803b98 ffffffff811415db 0000000025194c00
2015-03-06T01:12:42.135734+00:00 kernel  - -  ffff88007d45ab38
01ff88007c803b38 ffffffff81085e94 ffff88007c803b78
2015-03-06T01:12:42.135742+00:00 kernel  - - Call Trace:
2015-03-06T01:12:42.135747+00:00 kernel  - -  <IRQ>  [<ffffffff8161e672>]
dump_stack+0x49/0x5f
2015-03-06T01:12:42.135752+00:00 kernel  - -  [<ffffffff811415db>]
warn_alloc_failed+0xeb/0x150
2015-03-06T01:12:42.135756+00:00 kernel  - -  [<ffffffff81085e94>] ?
wake_up_worker+0x24/0x30
2015-03-06T01:12:42.135760+00:00 kernel  - -  [<ffffffff811447bb>]
__alloc_pages_nodemask+0x74b/0xaa0
2015-03-06T01:12:42.135764+00:00 kernel  - -  [<ffffffff8108832a>] ?
queue_work_on+0x3a/0x50
2015-03-06T01:12:42.135768+00:00 kernel  - -  [<ffffffff813f9b5e>] ?
credit_entropy_bits+0x22e/0x2e0
2015-03-06T01:12:42.135783+00:00 kernel  - -  [<ffffffff811897a6>]
alloc_pages_current+0xb6/0x170
2015-03-06T01:12:42.135789+00:00 kernel  - -  [<ffffffff81545d67>]
__netdev_alloc_frag+0x97/0x150
2015-03-06T01:12:42.135793+00:00 kernel  - -  [<ffffffff8154a496>]
__netdev_alloc_skb+0x96/0x120
2015-03-06T01:12:42.135798+00:00 kernel  - -  [<ffffffffa00b3f4d>]
igb_poll+0x3dd/0x1040 [igb]
2015-03-06T01:12:42.135802+00:00 kernel  - -  [<ffffffff810c0429>] ?
handle_irq_event_percpu+0xc9/0x200
2015-03-06T01:12:42.135804+00:00 kernel  - -  [<ffffffff81559271>]
net_rx_action+0x111/0x2a0
2015-03-06T01:12:42.135807+00:00 kernel  - -  [<ffffffff8107253c>]
__do_softirq+0xfc/0x2b0
2015-03-06T01:12:42.135817+00:00 kernel  - -  [<ffffffff810727fd>]
irq_exit+0xbd/0xd0
2015-03-06T01:12:42.135820+00:00 kernel  - -  [<ffffffff813b88e5>]
xen_evtchn_do_upcall+0x35/0x50
2015-03-06T01:12:42.135823+00:00 kernel  - -  [<ffffffff8162d0be>]
xen_do_hypervisor_callback+0x1e/0x30
2015-03-06T01:12:42.135826+00:00 kernel  - -  <EOI>  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-03-06T01:12:42.135828+00:00 kernel  - -  [<ffffffff810013aa>] ?
xen_hypercall_sched_op+0xa/0x20
2015-03-06T01:12:42.135831+00:00 kernel  - -  [<ffffffff8100a5b0>] ?
xen_safe_halt+0x10/0x20
2015-03-06T01:12:42.135833+00:00 kernel  - -  [<ffffffff8101e844>] ?
default_idle+0x24/0xc0
2015-03-06T01:12:42.135836+00:00 kernel  - -  [<ffffffff8101e1e6>] ?
arch_cpu_idle+0x26/0x30
2015-03-06T01:12:42.135844+00:00 kernel  - -  [<ffffffff810bfa7e>] ?
cpu_startup_entry+0xae/0x260
2015-03-06T01:12:42.135848+00:00 kernel  - -  [<ffffffff81613dc7>] ?
rest_init+0x77/0x80
2015-03-06T01:12:42.135850+00:00 kernel  - -  [<ffffffff819332c0>] ?
start_kernel+0x43b/0x448
2015-03-06T01:12:42.135853+00:00 kernel  - -  [<ffffffff81932ca3>] ?
repair_env_string+0x5b/0x5b
2015-03-06T01:12:42.135856+00:00 kernel  - -  [<ffffffff81932603>] ?
x86_64_start_reservations+0x2a/0x2c
2015-03-06T01:12:42.135860+00:00 kernel  - -  [<ffffffff81936688>] ?
xen_start_kernel+0x5bd/0x5bf
2015-03-06T01:12:42.135488+00:00 kernel  - -  [<ffffffff81097570>] ?
smpboot_create_threads+0x80/0x80
2015-03-06T01:12:42.135492+00:00 kernel  - -  [<ffffffff8109047e>]
kthread+0xce/0xf0
2015-03-06T01:12:42.135496+00:00 kernel  - -  [<ffffffff810903b0>] ?
kthread_freezable_should_stop+0x70/0x70
2015-03-06T01:12:42.135510+00:00 kernel  - -  [<ffffffff8162b6fc>]
ret_from_fork+0x7c/0xb0
2015-03-06T01:12:42.135514+00:00 kernel  - -  [<ffffffff810903b0>] ?
kthread_freezable_should_stop+0x70/0x70

--001a11c38aced23e3105189a84ab
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>HI</div><div><br></div><div>We are seeing some fairly=
 similar issues involving the network stack and driver at the dom0 and some=
 failures to allocate pages, sometimes it is the swapper, some other times=
=C2=A0ksoftirqd or even=C2=A0rsyslogd</div><div><br></div><div>In many host=
s we have seen this issue, seems to happen shortly after the hosts starts a=
nd there is some network heavy load, does not seem to bring the server down=
 or repeat once it is happened. Sadly we cannot encounter at the moment exa=
ct steps to reproduce the issue.</div><div><br></div><div>We are running 3.=
14.33-1.el6xen.x86_64 and xrn 4.2.5 in centos 6.<br></div><div><br></div><d=
iv>We have found some old issue at=C2=A0<a class=3D"" href=3D"https://acces=
s.redhat.com/solutions/90883">https://access.redhat.com/solutions/90883</a>=
=C2=A0and that describes the problem, issues look like they have been patch=
ed ages ago, but we wonder is there is some kind of regression, unsure how =
to track the exact patch to check if the kernel we have has it or not.</div=
><div><br></div><div>We have been toying with the vm settings but there are=
 mix feelings about changing vm.zone_reclaim_mode=C2=A0</div><div>
<br><a class=3D"" href=3D"http://rhaas.blogspot.co.nz/2014/06/linux-disable=
s-vmzonereclaimmode-by.html">http://rhaas.blogspot.co.nz/2014/06/linux-disa=
bles-vmzonereclaimmode-by.html</a>
<br><br><a class=3D"" href=3D"http://www.poempelfox.de/blog/2010/03/19/">ht=
tp://www.poempelfox.de/blog/2010/03/19/</a>
<br>
<br>Documentation about the parameters:
<br><a class=3D"" href=3D"https://www.kernel.org/doc/Documentation/sysctl/v=
m.txt">https://www.kernel.org/doc/Documentation/sysctl/vm.txt</a>=C2=A0<br>=
</div><div><br></div><div><br></div><div>Any of you have you seen this issu=
e before?<br></div><div><br></div><div>Regards<br></div><div><br></div><div=
>Juan.-</div><div><br></div><div><span style=3D"font-size:12.8000001907349p=
x">HOST 1####################################################</span></div><=
div><span style=3D"font-size:12.8000001907349px"><br></span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0swapper/0: page allocation failure: order:0, mode:0x120</sp=
an></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59=
:04+00:00 kernel =C2=A0- - =C2=A0CPU: 0 PID: 0 Comm: swapper/0 Tainted: GF =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span><=
/div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+=
00:00 kernel =C2=A0- - =C2=A0Hardware name: Supermicro X9DR3-F/X9DR3-F, BIO=
S 4.6.5 02/08/2012</span></div><div><span style=3D"font-size:12.80000019073=
49px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A00000000000000000 fff=
f88003c603968 ffffffff8161e672 0000000000000010</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0-=
 - =C2=A00000000000000120 ffff88003c6039f8 ffffffff811415db ffff8800020366e=
2</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T=
20:59:04+00:00 kernel =C2=A0- - =C2=A0ffff88003d2ebb38 00ff880015a0ea68 fff=
f880027291e58 0000000000000000</span></div><div><span style=3D"font-size:12=
.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0Call Tra=
ce:</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-2=
0T20:59:04+00:00 kernel =C2=A0- - =C2=A0&lt;IRQ&gt; =C2=A0[&lt;ffffffff8161=
e672&gt;] dump_stack+0x49/0x5f</span></div><div><span style=3D"font-size:12=
.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fff=
fffff811415db&gt;] warn_alloc_failed+0xeb/0x150</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0-=
 - =C2=A0[&lt;ffffffff811447bb&gt;] __alloc_pages_nodemask+0x74b/0xaa0</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:=
04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff816226d6&gt;] ? _raw_spin_unlo=
ck_irqrestore+0x16/0x20</span></div><div><span style=3D"font-size:12.800000=
1907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81=
0afe83&gt;] ? __wake_up+0x53/0x70</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff811897a6&gt;] alloc_pages_current+0xb6/0x170</span></div><div><span=
 style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffffa03c9a9a&gt;] xenvif_tx_build_gops+0x59a/0xf40=
 [xen_netback]</span></div><div><span style=3D"font-size:12.8000001907349px=
">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045e678&gt=
;] ? br_forward_finish+0x58/0x60 [bridge]</span></div><div><span style=3D"f=
ont-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffffa045e588&gt;] ? __br_forward+0x98/0xc0 [bridge]</span></div=
><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045f470&gt;] ? br_handle_frame+0x260=
/0x260 [bridge]</span></div><div><span style=3D"font-size:12.8000001907349p=
x">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045e60d&g=
t;] ? br_forward+0x5d/0x70 [bridge]</span></div><div><span style=3D"font-si=
ze:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&l=
t;ffffffffa045f5c5&gt;] ? br_handle_frame_finish+0x155/0x370 [bridge]</span=
></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:0=
4+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045f3c0&gt;] ? br_handle_frame=
+0x1b0/0x260 [bridge]</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa045=
f210&gt;] ? br_handle_local_finish+0x50/0x50 [bridge]</span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff815586e1&gt;] ? __netif_receive_skb_core+0x271=
/0x7a0</span></div><div><span style=3D"font-size:12.8000001907349px">2015-0=
4-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8100abb0&gt;] ? xen=
_clocksource_read+0x20/0x30</span></div><div><span style=3D"font-size:12.80=
00001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffff=
ff8100acaf&gt;] ? xen_pvclock_gtod_notify+0x1f/0xc0</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff81558ebd&gt;] ? netif_receive_skb_internal+0x2d/0=
x90</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-2=
0T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa03ca49e&gt;] xenvif_t=
x_action+0x5e/0x730 [xen_netback]</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff810c0429&gt;] ? handle_irq_event_percpu+0xc9/0x200</span></div><div=
><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 ker=
nel =C2=A0- - =C2=A0[&lt;ffffffffa03cc85c&gt;] xenvif_poll+0x3c/0xec [xen_n=
etback]</span></div><div><span style=3D"font-size:12.8000001907349px">2015-=
04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81559271&gt;] net_=
rx_action+0x111/0x2a0</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8107=
253c&gt;] __do_softirq+0xfc/0x2b0</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff810727fd&gt;] irq_exit+0xbd/0xd0</span></div><div><span style=3D"fo=
nt-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff813b88e5&gt;] xen_evtchn_do_upcall+0x35/0x50</span></div><d=
iv><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 k=
ernel =C2=A0- - =C2=A0[&lt;ffffffff8162d0be&gt;] xen_do_hypervisor_callback=
+0x1e/0x30</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0&lt;EOI&gt; =C2=A0[&lt;fffff=
fff810013aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</span></div><div><span s=
tyle=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff810013aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</=
span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:=
59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8100a5b0&gt;] ? xen_safe_ha=
lt+0x10/0x20</span></div><div><span style=3D"font-size:12.8000001907349px">=
2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8101e844&gt;]=
 ? default_idle+0x24/0xc0</span></div><div><span style=3D"font-size:12.8000=
001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff=
8101e1e6&gt;] ? arch_cpu_idle+0x26/0x30</span></div><div><span style=3D"fon=
t-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff810bfa7e&gt;] ? cpu_startup_entry+0xae/0x260</span></div><d=
iv><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 k=
ernel =C2=A0- - =C2=A0[&lt;ffffffff81613dc7&gt;] ? rest_init+0x77/0x80</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:=
04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff819332c0&gt;] ? start_kernel+0=
x43b/0x448</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81932ca3&gt;] ?=
 repair_env_string+0x5b/0x5b</span></div><div><span style=3D"font-size:12.8=
000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff81932603&gt;] ? x86_64_start_reservations+0x2a/0x2c</span></div><div><sp=
an style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff81936688&gt;] ? xen_start_kernel+0x5bd/0x5bf</=
span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:=
59:04+00:00 kernel =C2=A0- - =C2=A0CPU: 0 PID: 0 Comm: swapper/0 Tainted: G=
F =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span=
></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:0=
4+00:00 kernel =C2=A0- - =C2=A0Hardware name: Supermicro X9DR3-F/X9DR3-F, B=
IOS 4.6.5 02/08/2012</span></div><div><span style=3D"font-size:12.800000190=
7349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A00000000000000000 f=
fff88003c603b08 ffffffff8161e672 0000000000000010</span></div><div><span st=
yle=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A00000000000000020 ffff88003c603b98 ffffffff811415db ffffffff816=
226d6</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04=
-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0ffff88003d2ebb38 01ffffff810afe83=
 ffffffff815b8196 ffffffff81879a70</span></div><div><span style=3D"font-siz=
e:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0Call=
 Trace:</span></div><div><span style=3D"font-size:12.8000001907349px">2015-=
04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0&lt;IRQ&gt; =C2=A0[&lt;ffffffff=
8161e672&gt;] dump_stack+0x49/0x5f</span></div><div><span style=3D"font-siz=
e:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt=
;ffffffff811415db&gt;] warn_alloc_failed+0xeb/0x150</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff816226d6&gt;] ? _raw_spin_unlock_irqrestore+0x16/=
0x20</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-=
20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815b8196&gt;] ? tcp_v=
4_rcv+0x696/0x700</span></div><div><span style=3D"font-size:12.800000190734=
9px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff811447bb=
&gt;] __alloc_pages_nodemask+0x74b/0xaa0</span></div><div><span style=3D"fo=
nt-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff810c0429&gt;] ? handle_irq_event_percpu+0xc9/0x200</span></=
div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+0=
0:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815bbe32&gt;] ? tcp4_gro_receive+0=
xf2/0x140</span></div><div><span style=3D"font-size:12.8000001907349px">201=
5-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff811897a6&gt;] al=
loc_pages_current+0xb6/0x170</span></div><div><span style=3D"font-size:12.8=
000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff81545d67&gt;] __netdev_alloc_frag+0x97/0x150</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0-=
 - =C2=A0[&lt;ffffffff8154a496&gt;] __netdev_alloc_skb+0x96/0x120</span></d=
iv><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00=
:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81559b31&gt;] ? napi_gro_receive+0x=
31/0x100</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffffa00edf4d&gt;] igb=
_poll+0x3dd/0x1040 [igb]</span></div><div><span style=3D"font-size:12.80000=
01907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8=
10c0429&gt;] ? handle_irq_event_percpu+0xc9/0x200</span></div><div><span st=
yle=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff81559271&gt;] net_rx_action+0x111/0x2a0</span></d=
iv><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00=
:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8107253c&gt;] __do_softirq+0xfc/0x2=
b0</span></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20=
T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810727fd&gt;] irq_exit+=
0xbd/0xd0</span></div><div><span style=3D"font-size:12.8000001907349px">201=
5-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff813b88e5&gt;] xe=
n_evtchn_do_upcall+0x35/0x50</span></div><div><span style=3D"font-size:12.8=
000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff8162d0be&gt;] xen_do_hypervisor_callback+0x1e/0x30</span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =
=C2=A0- - =C2=A0&lt;EOI&gt; =C2=A0[&lt;ffffffff810013aa&gt;] ? xen_hypercal=
l_sched_op+0xa/0x20</span></div><div><span style=3D"font-size:12.8000001907=
349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810013=
aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</span></div><div><span style=3D"f=
ont-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffff8100a5b0&gt;] ? xen_safe_halt+0x10/0x20</span></div><div><s=
pan style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel=
 =C2=A0- - =C2=A0[&lt;ffffffff8101e844&gt;] ? default_idle+0x24/0xc0</span>=
</div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04=
+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8101e1e6&gt;] ? arch_cpu_idle+0x=
26/0x30</span></div><div><span style=3D"font-size:12.8000001907349px">2015-=
04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810bfa7e&gt;] ? cp=
u_startup_entry+0xae/0x260</span></div><div><span style=3D"font-size:12.800=
0001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;fffffff=
f81613dc7&gt;] ? rest_init+0x77/0x80</span></div><div><span style=3D"font-s=
ize:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&=
lt;ffffffff819332c0&gt;] ? start_kernel+0x43b/0x448</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-04-20T20:59:04+00:00 kernel =C2=
=A0- - =C2=A0[&lt;ffffffff81932ca3&gt;] ? repair_env_string+0x5b/0x5b</span=
></div><div><span style=3D"font-size:12.8000001907349px">2015-04-20T20:59:0=
4+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81932603&gt;] ? x86_64_start_re=
servations+0x2a/0x2c</span></div><div><span style=3D"font-size:12.800000190=
7349px">2015-04-20T20:59:04+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81936=
688&gt;] ? xen_start_kernel+0x5bd/0x5bf</span></div><div><span style=3D"fon=
t-size:12.8000001907349px"><br></span></div><div><span style=3D"font-size:1=
2.8000001907349px"><br></span></div><div><span style=3D"font-size:12.800000=
1907349px">HOST 2</span><span style=3D"font-size:12.8000001907349px">######=
##############################################</span><br></div><div><span s=
tyle=3D"font-size:12.8000001907349px"><br></span></div><div><span style=3D"=
font-size:12.8000001907349px">2015-03-06T01:12:42.134210+00:00 kernel =C2=
=A0- - ksoftirqd/0: page allocation failure: order:0, mode:0x20</span></div=
><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.1345=
42+00:00 kernel =C2=A0- - CPU: 0 PID: 3 Comm: ksoftirqd/0 Tainted: GF =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span></di=
v><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.134=
549+00:00 kernel =C2=A0- - Hardware name: Supermicro X8DT3/X8DT3, BIOS 2.1 =
=C2=A0 =C2=A0 03/17/2012</span></div><div><span style=3D"font-size:12.80000=
01907349px">2015-03-06T01:12:42.135167+00:00 kernel =C2=A0- - =C2=A00000000=
000000000 ffff88005c2d99e8 ffffffff8161e672 0000000000000010</span></div><d=
iv><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135176+=
00:00 kernel =C2=A0- - =C2=A00000000000000020 ffff88005c2d9a78 ffffffff8114=
15db ffff88005a690080</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-03-06T01:12:42.135181+00:00 kernel =C2=A0- - =C2=A0ffff88007d=
45ab38 01ff88005c2d9a98 ffffffff815b8196 ffff88005c2d9af0</span></div><div>=
<span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135184+00:=
00 kernel =C2=A0- - Call Trace:</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135191+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff8161e672&gt;] dump_stack+0x49/0x5f</span></div><div><span styl=
e=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135195+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff811415db&gt;] warn_alloc_failed+0xeb/0x150</sp=
an></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12=
:42.135200+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815b8196&gt;] ? tcp_v4=
_rcv+0x696/0x700</span></div><div><span style=3D"font-size:12.8000001907349=
px">2015-03-06T01:12:42.135214+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81=
1447bb&gt;] __alloc_pages_nodemask+0x74b/0xaa0</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135220+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff81592ae8&gt;] ? ip_local_deliver_finish+0xa8/0=
x230</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-=
06T01:12:42.135225+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff815bbe32&gt;] =
? tcp4_gro_receive+0xf2/0x140</span></div><div><span style=3D"font-size:12.=
8000001907349px">2015-03-06T01:12:42.135229+00:00 kernel =C2=A0- - =C2=A0[&=
lt;ffffffff811897a6&gt;] alloc_pages_current+0xb6/0x170</span></div><div><s=
pan style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135234+00:00=
 kernel =C2=A0- - =C2=A0[&lt;ffffffff81545d67&gt;] __netdev_alloc_frag+0x97=
/0x150</span></div><div><span style=3D"font-size:12.8000001907349px">2015-0=
3-06T01:12:42.135238+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8154a496&gt;=
] __netdev_alloc_skb+0x96/0x120</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135242+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff81559b31&gt;] ? napi_gro_receive+0x31/0x100</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135246+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffffa00b3f4d&gt;] igb_poll+0x3dd/0x1040 [=
igb]</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-=
06T01:12:42.135462+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81004f20&gt;] =
? xen_mc_flush+0xb0/0x1b0</span></div><div><span style=3D"font-size:12.8000=
001907349px">2015-03-06T01:12:42.135472+00:00 kernel =C2=A0- - =C2=A0[&lt;f=
fffffff81559271&gt;] net_rx_action+0x111/0x2a0</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135476+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff8107253c&gt;] __do_softirq+0xfc/0x2b0</span></=
div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.1=
35480+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81072728&gt;] run_ksoftirqd=
+0x38/0x50</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-03-06T01:12:42.135484+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8109766d=
&gt;] smpboot_thread_fn+0xfd/0x190</span></div><div><span style=3D"font-siz=
e:12.8000001907349px">2015-03-06T01:12:42.135519+00:00 kernel =C2=A0- - swa=
pper/0: page allocation failure: order:0, mode:0x20</span></div><div><span =
style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135523+00:00 ker=
nel =C2=A0- - CPU: 0 PID: 0 Comm: swapper/0 Tainted: GF =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A03.14.33-1.el6xen.x86_64 #1</span></div><div><span s=
tyle=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135527+00:00 kern=
el =C2=A0- - Hardware name: Supermicro X8DT3/X8DT3, BIOS 2.1 =C2=A0 =C2=A0 =
03/17/2012</span></div><div><span style=3D"font-size:12.8000001907349px">20=
15-03-06T01:12:42.135531+00:00 kernel =C2=A0- - =C2=A00000000000000000 ffff=
88007c803b08 ffffffff8161e672 0000000000000010</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135534+00:00 kernel =
=C2=A0- - =C2=A00000000000000020 ffff88007c803b98 ffffffff811415db 00000000=
25194c00</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-03-06T01:12:42.135734+00:00 kernel =C2=A0- - =C2=A0ffff88007d45ab38 01ff88=
007c803b38 ffffffff81085e94 ffff88007c803b78</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135742+00:00 kernel =
=C2=A0- - Call Trace:</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-03-06T01:12:42.135747+00:00 kernel =C2=A0- - =C2=A0&lt;IRQ&gt=
; =C2=A0[&lt;ffffffff8161e672&gt;] dump_stack+0x49/0x5f</span></div><div><s=
pan style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135752+00:00=
 kernel =C2=A0- - =C2=A0[&lt;ffffffff811415db&gt;] warn_alloc_failed+0xeb/0=
x150</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-=
06T01:12:42.135756+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81085e94&gt;] =
? wake_up_worker+0x24/0x30</span></div><div><span style=3D"font-size:12.800=
0001907349px">2015-03-06T01:12:42.135760+00:00 kernel =C2=A0- - =C2=A0[&lt;=
ffffffff811447bb&gt;] __alloc_pages_nodemask+0x74b/0xaa0</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135764+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffff8108832a&gt;] ? queue_work_on+0x3a/0x=
50</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06=
T01:12:42.135768+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff813f9b5e&gt;] ? =
credit_entropy_bits+0x22e/0x2e0</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135783+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff811897a6&gt;] alloc_pages_current+0xb6/0x170</span></div><div>=
<span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135789+00:=
00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81545d67&gt;] __netdev_alloc_frag+0x=
97/0x150</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-03-06T01:12:42.135793+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8154a496&g=
t;] __netdev_alloc_skb+0x96/0x120</span></div><div><span style=3D"font-size=
:12.8000001907349px">2015-03-06T01:12:42.135798+00:00 kernel =C2=A0- - =C2=
=A0[&lt;ffffffffa00b3f4d&gt;] igb_poll+0x3dd/0x1040 [igb]</span></div><div>=
<span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135802+00:=
00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810c0429&gt;] ? handle_irq_event_per=
cpu+0xc9/0x200</span></div><div><span style=3D"font-size:12.8000001907349px=
">2015-03-06T01:12:42.135804+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8155=
9271&gt;] net_rx_action+0x111/0x2a0</span></div><div><span style=3D"font-si=
ze:12.8000001907349px">2015-03-06T01:12:42.135807+00:00 kernel =C2=A0- - =
=C2=A0[&lt;ffffffff8107253c&gt;] __do_softirq+0xfc/0x2b0</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135817+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffff810727fd&gt;] irq_exit+0xbd/0xd0</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:=
42.135820+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff813b88e5&gt;] xen_evtch=
n_do_upcall+0x35/0x50</span></div><div><span style=3D"font-size:12.80000019=
07349px">2015-03-06T01:12:42.135823+00:00 kernel =C2=A0- - =C2=A0[&lt;fffff=
fff8162d0be&gt;] xen_do_hypervisor_callback+0x1e/0x30</span></div><div><spa=
n style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135826+00:00 k=
ernel =C2=A0- - =C2=A0&lt;EOI&gt; =C2=A0[&lt;ffffffff810013aa&gt;] ? xen_hy=
percall_sched_op+0xa/0x20</span></div><div><span style=3D"font-size:12.8000=
001907349px">2015-03-06T01:12:42.135828+00:00 kernel =C2=A0- - =C2=A0[&lt;f=
fffffff810013aa&gt;] ? xen_hypercall_sched_op+0xa/0x20</span></div><div><sp=
an style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135831+00:00 =
kernel =C2=A0- - =C2=A0[&lt;ffffffff8100a5b0&gt;] ? xen_safe_halt+0x10/0x20=
</span></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T0=
1:12:42.135833+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8101e844&gt;] ? de=
fault_idle+0x24/0xc0</span></div><div><span style=3D"font-size:12.800000190=
7349px">2015-03-06T01:12:42.135836+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffff=
ff8101e1e6&gt;] ? arch_cpu_idle+0x26/0x30</span></div><div><span style=3D"f=
ont-size:12.8000001907349px">2015-03-06T01:12:42.135844+00:00 kernel =C2=A0=
- - =C2=A0[&lt;ffffffff810bfa7e&gt;] ? cpu_startup_entry+0xae/0x260</span><=
/div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.=
135848+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff81613dc7&gt;] ? rest_init+=
0x77/0x80</span></div><div><span style=3D"font-size:12.8000001907349px">201=
5-03-06T01:12:42.135850+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff819332c0&=
gt;] ? start_kernel+0x43b/0x448</span></div><div><span style=3D"font-size:1=
2.8000001907349px">2015-03-06T01:12:42.135853+00:00 kernel =C2=A0- - =C2=A0=
[&lt;ffffffff81932ca3&gt;] ? repair_env_string+0x5b/0x5b</span></div><div><=
span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135856+00:0=
0 kernel =C2=A0- - =C2=A0[&lt;ffffffff81932603&gt;] ? x86_64_start_reservat=
ions+0x2a/0x2c</span></div><div><span style=3D"font-size:12.8000001907349px=
">2015-03-06T01:12:42.135860+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8193=
6688&gt;] ? xen_start_kernel+0x5bd/0x5bf</span></div><div><span style=3D"fo=
nt-size:12.8000001907349px">2015-03-06T01:12:42.135488+00:00 kernel =C2=A0-=
 - =C2=A0[&lt;ffffffff81097570&gt;] ? smpboot_create_threads+0x80/0x80</spa=
n></div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:=
42.135492+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff8109047e&gt;] kthread+0=
xce/0xf0</span></div><div><span style=3D"font-size:12.8000001907349px">2015=
-03-06T01:12:42.135496+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810903b0&g=
t;] ? kthread_freezable_should_stop+0x70/0x70</span></div><div><span style=
=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.135510+00:00 kernel =
=C2=A0- - =C2=A0[&lt;ffffffff8162b6fc&gt;] ret_from_fork+0x7c/0xb0</span></=
div><div><span style=3D"font-size:12.8000001907349px">2015-03-06T01:12:42.1=
35514+00:00 kernel =C2=A0- - =C2=A0[&lt;ffffffff810903b0&gt;] ? kthread_fre=
ezable_should_stop+0x70/0x70</span></div><div><br></div></div>

--001a11c38aced23e3105189a84ab--


--===============7632220235462650385==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============7632220235462650385==--


From xen-users-bounces@lists.xen.org Tue Jun 16 07:51:52 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 07:51:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4leB-0004Qs-7i; Tue, 16 Jun 2015 07:51:03 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6024c1d16=Ian.Campbell@citrix.com>)
	id 1Z4le8-0004Qm-U9
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 07:51:01 +0000
Received: from [193.109.254.147] by server-9.bemta-14.messagelabs.com id
	02/8E-03371-465DF755; Tue, 16 Jun 2015 07:51:00 +0000
X-Env-Sender: prvs=6024c1d16=Ian.Campbell@citrix.com
X-Msg-Ref: server-6.tower-27.messagelabs.com!1434441057!23665855!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 26237 invoked from network); 16 Jun 2015 07:50:59 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-6.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	16 Jun 2015 07:50:59 -0000
X-IronPort-AV: E=Sophos;i="5.13,624,1427760000"; d="scan'208";a="275192161"
Message-ID: <1434441054.3342.108.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Brandon Perez <a0225893@ti.com>
Date: Tue, 16 Jun 2015 08:50:54 +0100
In-Reply-To: <557F3CB3.90908@ti.com>
References: <557F3CB3.90908@ti.com>
Organization: Citrix
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
> Hello All,
> 
>     I'm experiencing some issues with booting into a Dom0 Linux Kernel 
> on a embedded ARM Cortex A15 processor. Tracing through the code has 
> shown me that the code is stuck in the idle_loop() function
> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and 
> there are no scheduled tasklets to run.
> 
>     A little about my setup to start. I'm using uBoot to boot Xen, which 
> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
> where the Xen version is 4.6-unstable. The commit I'm operating at has 
> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
> 
>     After looking through the Xen code, I was unable to find a place 
> where it explicitly jumps into the Dom0 kernel, which was what I was 
> expecting to see. Is there somewhere in the source code where this is 
> the case that I just missed? Or, is the initial jump into the kernel 
> scheduled as a tasklet? If the latter is the case, then the kernel is 
> never scheduled as a tasklet in the source code.
> 
>     Any tips on getting out the idle_loop() would be appreciated. Thanks 
> in advance for your assistance.

Without wishing to sound flippant, the idle loop will be exited when
things are not idle, i.e. there is some work to do. If it is idling that
would usually imply that every vcpu is sleeping or blocked. There's no
tasklets involved in the initial jump to dom0, just a normal return to
guest context.

IME the most common cause when things appear broken and Xen is just idle
is incorrect console= on the dom0 kernel command line or not running a
getty in dom0, so you get no output. Both should be configured refer to
hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
least.

If that doesn't help then please post full serial logs of your system
booting as far as it does, including the u-boot commands and any u-boot
scripts which are run, along with your kernel .config.

Also, when it is in this idling state you should be able to press the
Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
keys (h for help, q and d give useful cpu and vcpu register state) to
see where dom0's vcpus are at, so please include some of those in the
logs.

A dom0 vcpu address of 0x000000xx often indicates your kernel has
crashed early which can be another thing which goes wrong during initial
bringup on a new system (although normally more noisily than I am
inferring from what you've said here, but without logs its hard to say
for sure this isn't happening).

It would also be useful to know exactly which SoC you are using.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 07:51:52 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 07:51:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4leB-0004Qs-7i; Tue, 16 Jun 2015 07:51:03 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6024c1d16=Ian.Campbell@citrix.com>)
	id 1Z4le8-0004Qm-U9
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 07:51:01 +0000
Received: from [193.109.254.147] by server-9.bemta-14.messagelabs.com id
	02/8E-03371-465DF755; Tue, 16 Jun 2015 07:51:00 +0000
X-Env-Sender: prvs=6024c1d16=Ian.Campbell@citrix.com
X-Msg-Ref: server-6.tower-27.messagelabs.com!1434441057!23665855!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 26237 invoked from network); 16 Jun 2015 07:50:59 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-6.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	16 Jun 2015 07:50:59 -0000
X-IronPort-AV: E=Sophos;i="5.13,624,1427760000"; d="scan'208";a="275192161"
Message-ID: <1434441054.3342.108.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Brandon Perez <a0225893@ti.com>
Date: Tue, 16 Jun 2015 08:50:54 +0100
In-Reply-To: <557F3CB3.90908@ti.com>
References: <557F3CB3.90908@ti.com>
Organization: Citrix
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
> Hello All,
> 
>     I'm experiencing some issues with booting into a Dom0 Linux Kernel 
> on a embedded ARM Cortex A15 processor. Tracing through the code has 
> shown me that the code is stuck in the idle_loop() function
> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and 
> there are no scheduled tasklets to run.
> 
>     A little about my setup to start. I'm using uBoot to boot Xen, which 
> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
> where the Xen version is 4.6-unstable. The commit I'm operating at has 
> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
> 
>     After looking through the Xen code, I was unable to find a place 
> where it explicitly jumps into the Dom0 kernel, which was what I was 
> expecting to see. Is there somewhere in the source code where this is 
> the case that I just missed? Or, is the initial jump into the kernel 
> scheduled as a tasklet? If the latter is the case, then the kernel is 
> never scheduled as a tasklet in the source code.
> 
>     Any tips on getting out the idle_loop() would be appreciated. Thanks 
> in advance for your assistance.

Without wishing to sound flippant, the idle loop will be exited when
things are not idle, i.e. there is some work to do. If it is idling that
would usually imply that every vcpu is sleeping or blocked. There's no
tasklets involved in the initial jump to dom0, just a normal return to
guest context.

IME the most common cause when things appear broken and Xen is just idle
is incorrect console= on the dom0 kernel command line or not running a
getty in dom0, so you get no output. Both should be configured refer to
hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
least.

If that doesn't help then please post full serial logs of your system
booting as far as it does, including the u-boot commands and any u-boot
scripts which are run, along with your kernel .config.

Also, when it is in this idling state you should be able to press the
Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
keys (h for help, q and d give useful cpu and vcpu register state) to
see where dom0's vcpus are at, so please include some of those in the
logs.

A dom0 vcpu address of 0x000000xx often indicates your kernel has
crashed early which can be another thing which goes wrong during initial
bringup on a new system (although normally more noisily than I am
inferring from what you've said here, but without logs its hard to say
for sure this isn't happening).

It would also be useful to know exactly which SoC you are using.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 08:28:40 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 08:28:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4mE2-0000PW-Dv; Tue, 16 Jun 2015 08:28:06 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=602dd50dc=roger.pau@citrix.com>)
	id 1Z4mE0-0000PO-Qh
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 08:28:05 +0000
Received: from [85.158.139.211] by server-16.bemta-5.messagelabs.com id
	1F/0B-15949-31EDF755; Tue, 16 Jun 2015 08:28:03 +0000
X-Env-Sender: prvs=602dd50dc=roger.pau@citrix.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1434443281!11118873!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 3920 invoked from network); 16 Jun 2015 08:28:02 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	16 Jun 2015 08:28:02 -0000
X-IronPort-AV: E=Sophos;i="5.13,625,1427760000"; d="scan'208";a="272328954"
Message-ID: <557FDE0D.9030300@citrix.com>
Date: Tue, 16 Jun 2015 10:27:57 +0200
From: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Atom2 <ariel.atom2@web2web.at>, <xen-users@lists.xen.org>
References: <557E0433.9070307@web2web.at> <557E7FD7.40103@citrix.com>
	<557ECDAB.2050206@web2web.at>
In-Reply-To: <557ECDAB.2050206@web2web.at>
Content-Length: 6179
X-DLP: MIA2
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

El 15/06/15 a les 15.05, Atom2 ha escrit:
> Am 15.06.15 um 09:33 schrieb Roger Pau Monn=E9:
>> Hello,
> Roger, thanks for your reply.
>>
>> El 15/06/15 a les 0.46, Atom2 ha escrit:
>>> Hi guys,
>>> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
>>> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
>>> and domUs a spin - unfortunately with not too much success:
>>>
>>>
>>> DOM0:
>>> For dom0 I simply added dom0pvh=3D1 to the xen command line. The system
>>> booted up and I was also able to confirm that dom0 is running in the
>>> correct mode by checking with xen-detect.
>>>
>>> What I however found out is that xen creates a bunch of error/warning
>>> messages some of which make it to xl's dmesg file (the majority seems to
>>> get dropped due to rate limits). None of these messages are there when
>>> started without dom0pvh=3D1. Please see the two attached files for a
>>> comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl
>>> dmesg in non-PVH mode ("dmesg.xl").
>>>
>>> There are a few (most likely irrelevant) differences at line 109 to 111
>>> relating to messages about the "Start info", the "Page tables", and the
>>> "Boot stack". The main difference is in the additional lines in the file
>>> "dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines
>>> about suppressed messages totalling in excess of 236.000 (ignored)
>>> messages.  It's probably worth noteing that no further messages make it
>>> to xl's dmesg and also /var/log/messages does not have anything strange
>>> once the dom0 is up and running.
>> Those are errors from the IOMMU, your BIOS is probably missing some RMRR
>> regions. Do you know which devices are at 0000:00:1a.0 and 0000:00:02.0?
> Sure:
> 0000:00:1a.0 is one of the two USB controllers as part of the chipset;
> lspci output for this device is as follows:
> 00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset
> Family USB Enhanced Host Controller #2 (rev 05)
> =

> 0000:00:02.0 is the integrated graphics chip (IGD) in the XEON processor;
> lspci output for this device is as follows:
> 00:02.0 VGA compatible controller: Intel Corporation Xeon E3-1200
> Processor Family Integrated Graphics Controller (rev 09)

I've seen problems with other integrated Intel gfx cards, I still have
to figure out what's wrong.

> For reference: The system is a C206 chipset motherboard with a XEON
> E3-1260L processor
> The system has 32GB ECC memory installed
> =

>>
>> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:1a.0] fault addr
>> dc086000, iommu reg =3D ffff82c000203000
>> (XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
>>
>> The above error looks reasonable, this memory is between 3 and 4 GiB
>> which matches the MMIO hole.
>>
>> (XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr
>> 72c481000, iommu reg =3D ffff82c000201000
>> (XEN) [VT-D]DMAR: reason 05 - PTE Write access is not set
>>
>> This however is very high address, and is within a region marked as
>> usable in the memory map:
>>
>> (XEN)  0000000100000000 - 000000081e600000 (usable)
>>
>> There are some patches on the list to add additional RMRR regions on the
>> command line, however they are not committed yet, so there's not much
>> you can try right now (apart from trying it on a different box).
> That probably means I'll have to wait and see for further developments,
> most likely in 4.6
> I guess there's also nothing for you guys to be gained from this report .=
..

Yes, PVH is still experimental, and it will take some time to nail it down.

>>
>>> It, however, appears that the pvh dom0 compared to the standard dom0
>>> consumes _significantly_ more CPU time as shown by "xl info" from within
>>> dom0 - which to me seems counter-intuitive given my (limited)
>>> understanding of what pvh tries to achieve.
> Any idea about that ...

No, we are not yet at the point of doing performance measurements, not
until the ABI is finished, then we can start speaking about performance.
FWIW I have some old PVH/PV/PVHVM performance comparison here:

http://xenbits.xen.org/people/royger/talks/fosdem2014.pdf

>>>
>>>
>>> DOMU:
>>> For a test domU I just added pvh=3D1 to it's (otherwise unchanged)
>>> configuration file and tried to start the domU by issuing
>>> xl -v -v -v /path/to/config/file -c
>>>
>>> The domU did not come up at all (but works flawlessly when commenting
>>> out the pvh=3D1 configuration line); details of the xl command output f=
or
>>> the failed attempt can be found in the attached file xl.domU. I honestly
>>> can't make much sense out of the error message which in essence seems to
>>> complain about an unsupported feature and a missing file or directory
>>> before giving up.
>> AFAICT from the log provided you seem to be trying to launch a MiniOS
>> based guest with pvh=3D1, which is not supported. MiniOS doesn't support
>> the PVH mode yet.
> Well, I am using pvgrub to fire up the domUs and provide the grub
> configuration via a ramdisk:
> =

> =3D=3D=3D relevant part of my config file =3D=3D=3D
> kernel                  =3D '/usr/libexec/xen/boot/pv-grub-x86_64.gz'
> ramdisk                 =3D '/etc/xen/guests/grub.d/mysql.grub'
> =3D=3D=3D end relevant part of config file =3D=3D=3D
> =

> I suppose pvgrub is then what you refer to with the term MiniOS.
> Because other than this it's just a standard linux kernel w/ an
> initramfs that get's booted within the domU.

Yes, it at least reports it's using the MiniOS kernel, which means it
doesn't have PVH support (because MiniOS itself doesn't have PVH support
yet).

> In other words: pvh currently does not work with pvgrub at all?
> Any plans to change this - pvgrub IMHO is the most flexible tool to
> start a domU.
> Once you get used to that, there's no way back ...

Not right now, we are planning to do ABI changes to the PVH interface,
which means that even if pvgrub was ported to PVH right now it would
have to be modified afterwards in order to cope with the ABI changes.

Roger.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 08:28:40 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 08:28:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4mE2-0000PW-Dv; Tue, 16 Jun 2015 08:28:06 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=602dd50dc=roger.pau@citrix.com>)
	id 1Z4mE0-0000PO-Qh
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 08:28:05 +0000
Received: from [85.158.139.211] by server-16.bemta-5.messagelabs.com id
	1F/0B-15949-31EDF755; Tue, 16 Jun 2015 08:28:03 +0000
X-Env-Sender: prvs=602dd50dc=roger.pau@citrix.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1434443281!11118873!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 3920 invoked from network); 16 Jun 2015 08:28:02 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	16 Jun 2015 08:28:02 -0000
X-IronPort-AV: E=Sophos;i="5.13,625,1427760000"; d="scan'208";a="272328954"
Message-ID: <557FDE0D.9030300@citrix.com>
Date: Tue, 16 Jun 2015 10:27:57 +0200
From: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Atom2 <ariel.atom2@web2web.at>, <xen-users@lists.xen.org>
References: <557E0433.9070307@web2web.at> <557E7FD7.40103@citrix.com>
	<557ECDAB.2050206@web2web.at>
In-Reply-To: <557ECDAB.2050206@web2web.at>
Content-Length: 6179
X-DLP: MIA2
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

El 15/06/15 a les 15.05, Atom2 ha escrit:
> Am 15.06.15 um 09:33 schrieb Roger Pau Monn=E9:
>> Hello,
> Roger, thanks for your reply.
>>
>> El 15/06/15 a les 0.46, Atom2 ha escrit:
>>> Hi guys,
>>> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
>>> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
>>> and domUs a spin - unfortunately with not too much success:
>>>
>>>
>>> DOM0:
>>> For dom0 I simply added dom0pvh=3D1 to the xen command line. The system
>>> booted up and I was also able to confirm that dom0 is running in the
>>> correct mode by checking with xen-detect.
>>>
>>> What I however found out is that xen creates a bunch of error/warning
>>> messages some of which make it to xl's dmesg file (the majority seems to
>>> get dropped due to rate limits). None of these messages are there when
>>> started without dom0pvh=3D1. Please see the two attached files for a
>>> comparision between the xl dmesg for PVH ("dmesg.xl.pvh") and the xl
>>> dmesg in non-PVH mode ("dmesg.xl").
>>>
>>> There are a few (most likely irrelevant) differences at line 109 to 111
>>> relating to messages about the "Start info", the "Page tables", and the
>>> "Boot stack". The main difference is in the additional lines in the file
>>> "dmesg.xl.pvh" on line numbers 121-122 and 124-156 including 8 lines
>>> about suppressed messages totalling in excess of 236.000 (ignored)
>>> messages.  It's probably worth noteing that no further messages make it
>>> to xl's dmesg and also /var/log/messages does not have anything strange
>>> once the dom0 is up and running.
>> Those are errors from the IOMMU, your BIOS is probably missing some RMRR
>> regions. Do you know which devices are at 0000:00:1a.0 and 0000:00:02.0?
> Sure:
> 0000:00:1a.0 is one of the two USB controllers as part of the chipset;
> lspci output for this device is as follows:
> 00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset
> Family USB Enhanced Host Controller #2 (rev 05)
> =

> 0000:00:02.0 is the integrated graphics chip (IGD) in the XEON processor;
> lspci output for this device is as follows:
> 00:02.0 VGA compatible controller: Intel Corporation Xeon E3-1200
> Processor Family Integrated Graphics Controller (rev 09)

I've seen problems with other integrated Intel gfx cards, I still have
to figure out what's wrong.

> For reference: The system is a C206 chipset motherboard with a XEON
> E3-1260L processor
> The system has 32GB ECC memory installed
> =

>>
>> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:1a.0] fault addr
>> dc086000, iommu reg =3D ffff82c000203000
>> (XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
>>
>> The above error looks reasonable, this memory is between 3 and 4 GiB
>> which matches the MMIO hole.
>>
>> (XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr
>> 72c481000, iommu reg =3D ffff82c000201000
>> (XEN) [VT-D]DMAR: reason 05 - PTE Write access is not set
>>
>> This however is very high address, and is within a region marked as
>> usable in the memory map:
>>
>> (XEN)  0000000100000000 - 000000081e600000 (usable)
>>
>> There are some patches on the list to add additional RMRR regions on the
>> command line, however they are not committed yet, so there's not much
>> you can try right now (apart from trying it on a different box).
> That probably means I'll have to wait and see for further developments,
> most likely in 4.6
> I guess there's also nothing for you guys to be gained from this report .=
..

Yes, PVH is still experimental, and it will take some time to nail it down.

>>
>>> It, however, appears that the pvh dom0 compared to the standard dom0
>>> consumes _significantly_ more CPU time as shown by "xl info" from within
>>> dom0 - which to me seems counter-intuitive given my (limited)
>>> understanding of what pvh tries to achieve.
> Any idea about that ...

No, we are not yet at the point of doing performance measurements, not
until the ABI is finished, then we can start speaking about performance.
FWIW I have some old PVH/PV/PVHVM performance comparison here:

http://xenbits.xen.org/people/royger/talks/fosdem2014.pdf

>>>
>>>
>>> DOMU:
>>> For a test domU I just added pvh=3D1 to it's (otherwise unchanged)
>>> configuration file and tried to start the domU by issuing
>>> xl -v -v -v /path/to/config/file -c
>>>
>>> The domU did not come up at all (but works flawlessly when commenting
>>> out the pvh=3D1 configuration line); details of the xl command output f=
or
>>> the failed attempt can be found in the attached file xl.domU. I honestly
>>> can't make much sense out of the error message which in essence seems to
>>> complain about an unsupported feature and a missing file or directory
>>> before giving up.
>> AFAICT from the log provided you seem to be trying to launch a MiniOS
>> based guest with pvh=3D1, which is not supported. MiniOS doesn't support
>> the PVH mode yet.
> Well, I am using pvgrub to fire up the domUs and provide the grub
> configuration via a ramdisk:
> =

> =3D=3D=3D relevant part of my config file =3D=3D=3D
> kernel                  =3D '/usr/libexec/xen/boot/pv-grub-x86_64.gz'
> ramdisk                 =3D '/etc/xen/guests/grub.d/mysql.grub'
> =3D=3D=3D end relevant part of config file =3D=3D=3D
> =

> I suppose pvgrub is then what you refer to with the term MiniOS.
> Because other than this it's just a standard linux kernel w/ an
> initramfs that get's booted within the domU.

Yes, it at least reports it's using the MiniOS kernel, which means it
doesn't have PVH support (because MiniOS itself doesn't have PVH support
yet).

> In other words: pvh currently does not work with pvgrub at all?
> Any plans to change this - pvgrub IMHO is the most flexible tool to
> start a domU.
> Once you get used to that, there's no way back ...

Not right now, we are planning to do ABI changes to the PVH interface,
which means that even if pvgrub was ported to PVH right now it would
have to be modified afterwards in order to cope with the ABI changes.

Roger.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 14:59:21 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 14:59:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4sJf-0002AJ-RI; Tue, 16 Jun 2015 14:58:19 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4sCg-0001Hi-0e
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 14:51:10 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	30/85-21074-9D730855; Tue, 16 Jun 2015 14:51:05 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-3.tower-206.messagelabs.com!1434466260!7033757!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14235 invoked from network); 16 Jun 2015 14:51:02 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-3.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 16 Jun 2015 14:51:02 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GEotiH003798;
	Tue, 16 Jun 2015 09:50:56 -0500
Received: from DLEE70.ent.ti.com (dlemailx.itg.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GEotjh025751;
	Tue, 16 Jun 2015 09:50:55 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 09:50:54 -0500
Message-ID: <558029C0.1020806@ti.com>
Date: Tue, 16 Jun 2015 09:50:56 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
In-Reply-To: <1434441054.3342.108.camel@citrix.com>
Content-Type: multipart/mixed; boundary="------------090505040107040405030200"
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 14:58:18 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--------------090505040107040405030200
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Transfer-Encoding: 7bit

On 06/16/2015 03:50 AM, Ian Campbell wrote:
> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>> Hello All,
>>
>>      I'm experiencing some issues with booting into a Dom0 Linux Kernel
>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>> shown me that the code is stuck in the idle_loop() function
>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and
>> there are no scheduled tasklets to run.
>>
>>      A little about my setup to start. I'm using uBoot to boot Xen, which
>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>
>>      After looking through the Xen code, I was unable to find a place
>> where it explicitly jumps into the Dom0 kernel, which was what I was
>> expecting to see. Is there somewhere in the source code where this is
>> the case that I just missed? Or, is the initial jump into the kernel
>> scheduled as a tasklet? If the latter is the case, then the kernel is
>> never scheduled as a tasklet in the source code.
>>
>>      Any tips on getting out the idle_loop() would be appreciated. Thanks
>> in advance for your assistance.
>
> Without wishing to sound flippant, the idle loop will be exited when
> things are not idle, i.e. there is some work to do. If it is idling that
> would usually imply that every vcpu is sleeping or blocked. There's no
> tasklets involved in the initial jump to dom0, just a normal return to
> guest context.
>
> IME the most common cause when things appear broken and Xen is just idle
> is incorrect console= on the dom0 kernel command line or not running a
> getty in dom0, so you get no output. Both should be configured refer to
> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
> least.
>
> If that doesn't help then please post full serial logs of your system
> booting as far as it does, including the u-boot commands and any u-boot
> scripts which are run, along with your kernel .config.
>
> Also, when it is in this idling state you should be able to press the
> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
> keys (h for help, q and d give useful cpu and vcpu register state) to
> see where dom0's vcpus are at, so please include some of those in the
> logs.
>
> A dom0 vcpu address of 0x000000xx often indicates your kernel has
> crashed early which can be another thing which goes wrong during initial
> bringup on a new system (although normally more noisily than I am
> inferring from what you've said here, but without logs its hard to say
> for sure this isn't happening).
>
> It would also be useful to know exactly which SoC you are using.
>
> Ian.
>

Hello Ian,

    The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As 
such, I've been adapting the instructions at 
http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM

    I've attached the booting log, the uBoot commands I run to get the 
system up, and my .config file for the kernel.

    The log stops after "Freed x init memory.", and nothing is printed 
out after that. Also, pressing CTRL-A three times does not bring up a 
Xen prompt, and pressing those keys have no affect.

    It's worth noting that I am able to successfully boot the Linux 
kernel natively with uBoot.

    This may or may not be relevant, but I have stepped through the Xen 
booting using Trace32. What I noticed was that, in the start_xen() 
function (xen/arch/arm/setup.c), the code immediately goes into the
idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() -> 
idle_loop()). There is only 1 vCPU in my system currently.

Brandon

--------------090505040107040405030200
Content-Type: text/x-log; name="boot.log"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="boot.log"

U-Boot 2014.07-dirty (Jun 12 2015 - 15:46:06)

CPU  : DRA722 ES1.0
Board: DRA7xx
I2C:   ready
DRAM:  1 GiB
MMC:   OMAP SD/MMC: 0, OMAP SD/MMC: 1
SATA link 0 timeout.
AHCI 0001.0300 32 slots 1 ports 3 Gbps 0x1 impl SATA mode
flags: 64bit ncq stag pm led clo only pmp pio slum part ccc apst
scanning bus for devices...
Found 0 device(s).
     256      128K xloader
     512      384K bootloader
    1280      128K environment
    1536      128K misc
    2560       16M efs
   35328       16K crypto
   35360       10M recovery
   55840       10M boot
   76320      768M system
 1649184      256M cache
 2173472     1024K ipu1
 2175520     1024K ipu2
 2177568     6360M userdata
SCSI:  Net:   cpsw
Hit any key to stop autoboot:  0
reading dra72-evm-lcd10.dtb
90030 bytes read in 10 ms (8.6 MiB/s)
reading xen-uImage
754608 bytes read in 50 ms (14.4 MiB/s)
reading zImage
4581040 bytes read in 241 ms (18.1 MiB/s)
## Booting kernel from Legacy Image at 90000000 ...
   Image Name:
   Image Type:   ARM Linux Kernel Image (uncompressed)
   Data Size:    754544 Bytes = 736.9 KiB
   Load Address: 80200000
   Entry Point:  80200000
   Verifying Checksum ... OK
## Flattened Device Tree blob at 825f0000
   Booting using the fdt blob at 0x825f0000
   Loading Kernel Image ... OK
   Loading Device Tree to 8ffe7000, end 8fffffad ... OK

Starting kernel ...

- UART enabled -
- CPU 00000000 booting -
- Xen starting in Hyp mode -
- Zero BSS -
- Setting up control registers -
- Turning on paging -
- Ready -
(XEN) Checking for initrd in /chosen
(XEN) RAM: 0000000080000000 - 00000000bfffffff
(XEN)
(XEN) MODULE[0]: 000000008ffe7000 - 000000008fffe000 Device Tree
(XEN) MODULE[1]: 00000000a0000000 - 00000000a0a00000 Kernel
(XEN)  RESVD[0]: 000000008ffe7000 - 000000008fffe000
(XEN)
(XEN) Command line: sync_console console=dtuart dtuart=serial2
(XEN) Placing Xen at 0x00000000bfe00000-0x00000000c0000000
(XEN) Update BOOTMOD_XEN from 0000000080200000-0000000080301701 => 00000000bfe00000-00000000bff01701
(XEN) Xen heap: 00000000bc000000-00000000be000000 (8192 pages)
(XEN) Dom heap: 253952 pages
(XEN) Domain heap initialised
(XEN) Platform: TI DRA7
(XEN) Looking for dtuart at "serial2", options ""
(XEN) Unable to initialize dtuart: -19
(XEN) Bad console= option 'dtuart'
 Xen 4.6-unstable
(XEN) Xen version 4.6-unstable (brandonlocal@) (arm-linux-gnueabi-gcc (Ubuntu/Linaro 4.6.3-1ubuntu5) 5
(XEN) Latest ChangeSet: Fri Jun 5 14:35:49 2015 +0100 git:ecdae1c-dirty
(XEN) Console output is synchronous.
(XEN) Processor: 412fc0f2: "ARM Limited", variant: 0x2, part 0xc0f, rev 0x2
(XEN) 32-bit Execution:
(XEN)   Processor Features: 00001131:00011011
(XEN)     Instruction Sets: AArch32 A32 Thumb Thumb-2 ThumbEE Jazelle
(XEN)     Extensions: GenericTimer Security
(XEN)   Debug Features: 02010555
(XEN)   Auxiliary Features: 00000000
(XEN)   Memory Model Features: 10201105 20000000 01240000 02102211
(XEN)  ISA Features: 02101110 13112111 21232041 11112131 10011142 00000000
(XEN) Set AuxCoreBoot1 to 00000000bfe0004c (0020004c)
(XEN) Set AuxCoreBoot0 to 0x20
(XEN) Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
(XEN) GICv2 initialization:
(XEN)         gic_dist_addr=0000000048211000
(XEN)         gic_cpu_addr=0000000048212000
(XEN)         gic_hyp_addr=0000000048214000
(XEN)         gic_vcpu_addr=0000000048216000
(XEN)         gic_maintenance_irq=25
(XEN) GICv2: 192 lines, 1 cpu, secure (IID 0000043b).
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Allocated console ring of 16 KiB.
(XEN) VFP implementer 0x41 architecture 4 part 0x30 variant 0xf rev 0x0
(XEN) Brought up 1 CPUs
(XEN) P2M: 40-bit IPA
(XEN) P2M: 3 levels with order-1 root, VTCR 0x80003558
(XEN) I/O virtualisation disabled
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Loading kernel from boot module @ 00000000a0000000
(XEN) Allocating 1:1 mappings totalling 128MB for dom0:
(XEN) BANK[0] 0x00000080000000-0x00000088000000 (128MB)
(XEN) Loading zImage from 00000000a0000000 to 0000000087a00000-0000000087e5e6b0
(XEN) Allocating PPI 16 for event channel interrupt
(XEN) Loading dom0 DTB to 0x0000000087800000-0x0000000087815ec9
(XEN) Scrubbing Free RAM on 1 nodes using 1 CPUs
(XEN) ........done.
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Std. Loglevel: All
(XEN) Guest Loglevel: All
(XEN) **********************************************
(XEN) ******* WARNING: CONSOLE OUTPUT IS SYNCHRONOUS
(XEN) ******* This option is intended to aid debugging of Xen by ensuring
(XEN) ******* that all output is synchronously delivered on the serial line.
(XEN) ******* However it can introduce SIGNIFICANT latencies and affect
(XEN) ******* timekeeping. It is NOT recommended for production use!
(XEN) **********************************************
(XEN) 3... 2... 1...
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
(XEN) Freed 284kB init memory.


--------------090505040107040405030200
Content-Type: text/plain; charset="UTF-8"; name="uboot.script"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="uboot.script"

setenv dtb_addr_r 0x825f0000
setenv xen_addr_r 0x90000000
setenv kernel_addr_r 0xa0000000
setenv xen_bootargs 'sync_console console=dtuart dtuart=serial2'
setenv dom0_bootargs 'console=hvc0 earlyprintk=xen debug ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc'
fatload mmc 0:1 $dtb_addr_r dra72-evm-lcd10.dtb
fatload mmc 0:1 $xen_addr_r xen-uImage
fatload mmc 0:1 $kernel_addr_r zImage
fdt addr $dtb_addr_r
fdt resize
fdt set /chosen xen,xen-bootargs \"$xen_bootargs\"
fdt resize
fdt set /chosen xen,dom0-bootargs \"$dom0_bootargs\"
fdt mknode /chosen modules
fdt set /chosen/modules \#address-cells <1>
fdt set /chosen/modules \#size-cells <1>
fdt mknode /chosen/modules module@0
fdt set /chosen/modules/module@0 compatible xen,linux-zimage xen,multiboot-module
fdt set /chosen/modules/module@0 reg <$kernel_addr_r 0xa00000>
bootm $xen_addr_r - $dtb_addr_r


--------------090505040107040405030200
Content-Type: text/plain; charset="UTF-8"; name="kernel.config"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="kernel.config"

#
# Automatically generated file; DO NOT EDIT.
# Linux/arm 3.14.31 Kernel Configuration
#
CONFIG_ARM=y
CONFIG_MIGHT_HAVE_PCI=y
CONFIG_SYS_SUPPORTS_APM_EMULATION=y
CONFIG_HAVE_PROC_CPU=y
CONFIG_STACKTRACE_SUPPORT=y
CONFIG_LOCKDEP_SUPPORT=y
CONFIG_TRACE_IRQFLAGS_SUPPORT=y
CONFIG_RWSEM_GENERIC_SPINLOCK=y
CONFIG_ARCH_HAS_CPUFREQ=y
CONFIG_ARCH_HAS_BANDGAP=y
CONFIG_GENERIC_HWEIGHT=y
CONFIG_GENERIC_CALIBRATE_DELAY=y
CONFIG_NEED_DMA_MAP_STATE=y
CONFIG_VECTORS_BASE=0xffff0000
CONFIG_ARM_PATCH_PHYS_VIRT=y
CONFIG_GENERIC_BUG=y
CONFIG_DEFCONFIG_LIST="/lib/modules/$UNAME_RELEASE/.config"
CONFIG_IRQ_WORK=y
CONFIG_BUILDTIME_EXTABLE_SORT=y

#
# General setup
#
CONFIG_INIT_ENV_ARG_LIMIT=32
CONFIG_CROSS_COMPILE=""
# CONFIG_COMPILE_TEST is not set
CONFIG_LOCALVERSION=""
CONFIG_LOCALVERSION_AUTO=y
CONFIG_HAVE_KERNEL_GZIP=y
CONFIG_HAVE_KERNEL_LZMA=y
CONFIG_HAVE_KERNEL_XZ=y
CONFIG_HAVE_KERNEL_LZO=y
CONFIG_HAVE_KERNEL_LZ4=y
CONFIG_KERNEL_GZIP=y
# CONFIG_KERNEL_LZMA is not set
# CONFIG_KERNEL_XZ is not set
# CONFIG_KERNEL_LZO is not set
# CONFIG_KERNEL_LZ4 is not set
CONFIG_DEFAULT_HOSTNAME="(none)"
CONFIG_SWAP=y
CONFIG_SYSVIPC=y
CONFIG_SYSVIPC_SYSCTL=y
CONFIG_POSIX_MQUEUE=y
CONFIG_POSIX_MQUEUE_SYSCTL=y
# CONFIG_FHANDLE is not set
# CONFIG_AUDIT is not set

#
# IRQ subsystem
#
CONFIG_GENERIC_IRQ_PROBE=y
CONFIG_GENERIC_IRQ_SHOW=y
CONFIG_HARDIRQS_SW_RESEND=y
CONFIG_GENERIC_IRQ_CHIP=y
CONFIG_IRQ_DOMAIN=y
# CONFIG_IRQ_DOMAIN_DEBUG is not set
CONFIG_IRQ_FORCED_THREADING=y
CONFIG_SPARSE_IRQ=y
CONFIG_KTIME_SCALAR=y
CONFIG_GENERIC_CLOCKEVENTS=y
CONFIG_GENERIC_CLOCKEVENTS_BUILD=y
CONFIG_ARCH_HAS_TICK_BROADCAST=y
CONFIG_GENERIC_CLOCKEVENTS_BROADCAST=y

#
# Timers subsystem
#
CONFIG_TICK_ONESHOT=y
CONFIG_NO_HZ_COMMON=y
# CONFIG_HZ_PERIODIC is not set
CONFIG_NO_HZ_IDLE=y
# CONFIG_NO_HZ_FULL is not set
CONFIG_NO_HZ=y
CONFIG_HIGH_RES_TIMERS=y

#
# CPU/Task time and stats accounting
#
CONFIG_TICK_CPU_ACCOUNTING=y
# CONFIG_VIRT_CPU_ACCOUNTING_GEN is not set
# CONFIG_IRQ_TIME_ACCOUNTING is not set
CONFIG_BSD_PROCESS_ACCT=y
# CONFIG_BSD_PROCESS_ACCT_V3 is not set
# CONFIG_TASKSTATS is not set

#
# RCU Subsystem
#
CONFIG_TREE_PREEMPT_RCU=y
CONFIG_PREEMPT_RCU=y
CONFIG_RCU_STALL_COMMON=y
# CONFIG_RCU_USER_QS is not set
CONFIG_RCU_FANOUT=32
CONFIG_RCU_FANOUT_LEAF=16
# CONFIG_RCU_FANOUT_EXACT is not set
# CONFIG_RCU_FAST_NO_HZ is not set
# CONFIG_TREE_RCU_TRACE is not set
# CONFIG_RCU_BOOST is not set
# CONFIG_RCU_NOCB_CPU is not set
CONFIG_IKCONFIG=y
CONFIG_IKCONFIG_PROC=y
CONFIG_LOG_BUF_SHIFT=16
CONFIG_GENERIC_SCHED_CLOCK=y
CONFIG_CGROUPS=y
# CONFIG_CGROUP_DEBUG is not set
# CONFIG_CGROUP_FREEZER is not set
# CONFIG_CGROUP_DEVICE is not set
# CONFIG_CPUSETS is not set
# CONFIG_CGROUP_CPUACCT is not set
# CONFIG_RESOURCE_COUNTERS is not set
# CONFIG_CGROUP_PERF is not set
# CONFIG_CGROUP_SCHED is not set
# CONFIG_BLK_CGROUP is not set
# CONFIG_CHECKPOINT_RESTORE is not set
# CONFIG_NAMESPACES is not set
# CONFIG_SCHED_AUTOGROUP is not set
# CONFIG_SYSFS_DEPRECATED is not set
# CONFIG_RELAY is not set
CONFIG_BLK_DEV_INITRD=y
CONFIG_INITRAMFS_SOURCE=""
CONFIG_RD_GZIP=y
# CONFIG_RD_BZIP2 is not set
# CONFIG_RD_LZMA is not set
# CONFIG_RD_XZ is not set
# CONFIG_RD_LZO is not set
# CONFIG_RD_LZ4 is not set
# CONFIG_CC_OPTIMIZE_FOR_SIZE is not set
CONFIG_SYSCTL=y
CONFIG_ANON_INODES=y
CONFIG_HAVE_UID16=y
CONFIG_EXPERT=y
CONFIG_UID16=y
# CONFIG_SYSCTL_SYSCALL is not set
CONFIG_KALLSYMS=y
# CONFIG_KALLSYMS_ALL is not set
CONFIG_PRINTK=y
CONFIG_BUG=y
CONFIG_ELF_CORE=y
CONFIG_BASE_FULL=y
CONFIG_FUTEX=y
CONFIG_EPOLL=y
CONFIG_SIGNALFD=y
CONFIG_TIMERFD=y
CONFIG_EVENTFD=y
CONFIG_SHMEM=y
CONFIG_AIO=y
CONFIG_PCI_QUIRKS=y
# CONFIG_EMBEDDED is not set
CONFIG_HAVE_PERF_EVENTS=y
CONFIG_PERF_USE_VMALLOC=y

#
# Kernel Performance Events And Counters
#
CONFIG_PERF_EVENTS=y
# CONFIG_DEBUG_PERF_USE_VMALLOC is not set
CONFIG_VM_EVENT_COUNTERS=y
CONFIG_COMPAT_BRK=y
CONFIG_SLAB=y
# CONFIG_SLUB is not set
# CONFIG_SLOB is not set
# CONFIG_SYSTEM_TRUSTED_KEYRING is not set
CONFIG_PROFILING=y
CONFIG_OPROFILE=y
CONFIG_HAVE_OPROFILE=y
CONFIG_KPROBES=y
CONFIG_JUMP_LABEL=y
# CONFIG_HAVE_64BIT_ALIGNED_ACCESS is not set
CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS=y
CONFIG_ARCH_USE_BUILTIN_BSWAP=y
CONFIG_KRETPROBES=y
CONFIG_HAVE_KPROBES=y
CONFIG_HAVE_KRETPROBES=y
CONFIG_HAVE_ARCH_TRACEHOOK=y
CONFIG_HAVE_DMA_ATTRS=y
CONFIG_HAVE_DMA_CONTIGUOUS=y
CONFIG_GENERIC_SMP_IDLE_THREAD=y
CONFIG_GENERIC_IDLE_POLL_SETUP=y
CONFIG_HAVE_REGS_AND_STACK_ACCESS_API=y
CONFIG_HAVE_CLK=y
CONFIG_HAVE_DMA_API_DEBUG=y
CONFIG_HAVE_HW_BREAKPOINT=y
CONFIG_HAVE_PERF_REGS=y
CONFIG_HAVE_PERF_USER_STACK_DUMP=y
CONFIG_HAVE_ARCH_JUMP_LABEL=y
CONFIG_ARCH_WANT_IPC_PARSE_VERSION=y
CONFIG_HAVE_ARCH_SECCOMP_FILTER=y
CONFIG_HAVE_CC_STACKPROTECTOR=y
# CONFIG_CC_STACKPROTECTOR is not set
CONFIG_CC_STACKPROTECTOR_NONE=y
# CONFIG_CC_STACKPROTECTOR_REGULAR is not set
# CONFIG_CC_STACKPROTECTOR_STRONG is not set
CONFIG_HAVE_CONTEXT_TRACKING=y
CONFIG_HAVE_VIRT_CPU_ACCOUNTING_GEN=y
CONFIG_HAVE_IRQ_TIME_ACCOUNTING=y
CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE=y
CONFIG_MODULES_USE_ELF_REL=y
CONFIG_CLONE_BACKWARDS=y
CONFIG_OLD_SIGSUSPEND3=y
CONFIG_OLD_SIGACTION=y

#
# GCOV-based kernel profiling
#
# CONFIG_GCOV_KERNEL is not set
CONFIG_HAVE_GENERIC_DMA_COHERENT=y
CONFIG_SLABINFO=y
CONFIG_RT_MUTEXES=y
CONFIG_BASE_SMALL=0
CONFIG_MODULES=y
CONFIG_MODULE_FORCE_LOAD=y
CONFIG_MODULE_UNLOAD=y
CONFIG_MODULE_FORCE_UNLOAD=y
CONFIG_MODVERSIONS=y
CONFIG_MODULE_SRCVERSION_ALL=y
# CONFIG_MODULE_SIG is not set
CONFIG_STOP_MACHINE=y
CONFIG_BLOCK=y
CONFIG_LBDAF=y
# CONFIG_BLK_DEV_BSG is not set
# CONFIG_BLK_DEV_BSGLIB is not set
# CONFIG_BLK_DEV_INTEGRITY is not set
# CONFIG_BLK_CMDLINE_PARSER is not set

#
# Partition Types
#
CONFIG_PARTITION_ADVANCED=y
# CONFIG_ACORN_PARTITION is not set
# CONFIG_AIX_PARTITION is not set
# CONFIG_OSF_PARTITION is not set
# CONFIG_AMIGA_PARTITION is not set
# CONFIG_ATARI_PARTITION is not set
# CONFIG_MAC_PARTITION is not set
CONFIG_MSDOS_PARTITION=y
# CONFIG_BSD_DISKLABEL is not set
# CONFIG_MINIX_SUBPARTITION is not set
# CONFIG_SOLARIS_X86_PARTITION is not set
# CONFIG_UNIXWARE_DISKLABEL is not set
# CONFIG_LDM_PARTITION is not set
# CONFIG_SGI_PARTITION is not set
# CONFIG_ULTRIX_PARTITION is not set
# CONFIG_SUN_PARTITION is not set
# CONFIG_KARMA_PARTITION is not set
CONFIG_EFI_PARTITION=y
# CONFIG_SYSV68_PARTITION is not set
# CONFIG_CMDLINE_PARTITION is not set

#
# IO Schedulers
#
CONFIG_IOSCHED_NOOP=y
CONFIG_IOSCHED_DEADLINE=y
CONFIG_IOSCHED_CFQ=y
# CONFIG_DEFAULT_DEADLINE is not set
CONFIG_DEFAULT_CFQ=y
# CONFIG_DEFAULT_NOOP is not set
CONFIG_DEFAULT_IOSCHED="cfq"
CONFIG_UNINLINE_SPIN_UNLOCK=y
CONFIG_ARCH_SUPPORTS_ATOMIC_RMW=y
CONFIG_MUTEX_SPIN_ON_OWNER=y
CONFIG_FREEZER=y

#
# System Type
#
CONFIG_MMU=y
CONFIG_ARCH_MULTIPLATFORM=y
# CONFIG_ARCH_INTEGRATOR is not set
# CONFIG_ARCH_REALVIEW is not set
# CONFIG_ARCH_VERSATILE is not set
# CONFIG_ARCH_AT91 is not set
# CONFIG_ARCH_CLPS711X is not set
# CONFIG_ARCH_GEMINI is not set
# CONFIG_ARCH_EBSA110 is not set
# CONFIG_ARCH_EP93XX is not set
# CONFIG_ARCH_FOOTBRIDGE is not set
# CONFIG_ARCH_NETX is not set
# CONFIG_ARCH_IOP13XX is not set
# CONFIG_ARCH_IOP32X is not set
# CONFIG_ARCH_IOP33X is not set
# CONFIG_ARCH_IXP4XX is not set
# CONFIG_ARCH_DOVE is not set
# CONFIG_ARCH_KIRKWOOD is not set
# CONFIG_ARCH_MV78XX0 is not set
# CONFIG_ARCH_ORION5X is not set
# CONFIG_ARCH_MMP is not set
# CONFIG_ARCH_KS8695 is not set
# CONFIG_ARCH_W90X900 is not set
# CONFIG_ARCH_LPC32XX is not set
# CONFIG_ARCH_PXA is not set
# CONFIG_ARCH_MSM_NODT is not set
# CONFIG_ARCH_SHMOBILE_LEGACY is not set
# CONFIG_ARCH_RPC is not set
# CONFIG_ARCH_SA1100 is not set
# CONFIG_ARCH_S3C24XX is not set
# CONFIG_ARCH_S3C64XX is not set
# CONFIG_ARCH_S5P64X0 is not set
# CONFIG_ARCH_S5PC100 is not set
# CONFIG_ARCH_S5PV210 is not set
# CONFIG_ARCH_EXYNOS is not set
# CONFIG_ARCH_DAVINCI is not set
# CONFIG_ARCH_OMAP1 is not set

#
# Multiple platform selection
#

#
# CPU Core family selection
#
# CONFIG_ARCH_MULTI_V6 is not set
CONFIG_ARCH_MULTI_V7=y
CONFIG_ARCH_MULTI_V6_V7=y
# CONFIG_ARCH_MULTI_CPU_AUTO is not set
# CONFIG_ARCH_MVEBU is not set
# CONFIG_ARCH_BCM is not set
# CONFIG_ARCH_BERLIN is not set
CONFIG_GPIO_PCA953X=y
# CONFIG_KEYBOARD_GPIO_POLLED is not set
# CONFIG_ARCH_HIGHBANK is not set
# CONFIG_ARCH_HI3xxx is not set
# CONFIG_ARCH_KEYSTONE is not set
# CONFIG_ARCH_MSM_DT is not set
# CONFIG_ARCH_MXC is not set

#
# TI OMAP Common Features
#

#
# OMAP Feature Selections
#
CONFIG_OMAP_RESET_CLOCKS=y
CONFIG_OMAP_MUX=y
CONFIG_OMAP_MUX_DEBUG=y
CONFIG_OMAP_MUX_WARNINGS=y
CONFIG_OMAP_32K_TIMER=y
CONFIG_OMAP_DM_TIMER=y
CONFIG_OMAP_PM_NOOP=y
CONFIG_MACH_OMAP_GENERIC=y
CONFIG_ARCH_OMAP=y
# CONFIG_ARCH_OMAP3 is not set
# CONFIG_ARCH_OMAP4 is not set
# CONFIG_SOC_OMAP5 is not set
# CONFIG_SOC_AM33XX is not set
# CONFIG_SOC_AM43XX is not set
CONFIG_SOC_DRA7XX=y
CONFIG_ARCH_OMAP2PLUS=y

#
# TI OMAP2/3/4 Specific Features
#
CONFIG_ARCH_OMAP2PLUS_TYPICAL=y
# CONFIG_SOC_HAS_OMAP2_SDRC is not set
CONFIG_SOC_HAS_REALTIME_COUNTER=y

#
# OMAP Legacy Platform Data Board Type
#
# CONFIG_ARCH_ROCKCHIP is not set
# CONFIG_ARCH_SOCFPGA is not set
# CONFIG_PLAT_SPEAR is not set
# CONFIG_ARCH_STI is not set
# CONFIG_ARCH_SHMOBILE_MULTI is not set
# CONFIG_ARCH_SUNXI is not set
# CONFIG_ARCH_SIRF is not set
# CONFIG_ARCH_TEGRA is not set
# CONFIG_ARCH_U8500 is not set
# CONFIG_ARCH_VEXPRESS is not set
# CONFIG_ARCH_VIRT is not set
# CONFIG_ARCH_WM8850 is not set
# CONFIG_ARCH_ZYNQ is not set

#
# Processor Type
#
CONFIG_CPU_V7=y
CONFIG_CPU_32v6K=y
CONFIG_CPU_32v7=y
CONFIG_CPU_ABRT_EV7=y
CONFIG_CPU_PABRT_V7=y
CONFIG_CPU_CACHE_V7=y
CONFIG_CPU_CACHE_VIPT=y
CONFIG_CPU_COPY_V6=y
CONFIG_CPU_TLB_V7=y
CONFIG_CPU_HAS_ASID=y
CONFIG_CPU_CP15=y
CONFIG_CPU_CP15_MMU=y

#
# Processor Features
#
CONFIG_ARM_LPAE=y
CONFIG_ARCH_PHYS_ADDR_T_64BIT=y
CONFIG_ARCH_DMA_ADDR_T_64BIT=y
CONFIG_ARM_THUMB=y
CONFIG_ARM_THUMBEE=y
CONFIG_ARM_VIRT_EXT=y
CONFIG_SWP_EMULATE=y
# CONFIG_CPU_ICACHE_DISABLE is not set
# CONFIG_CPU_DCACHE_DISABLE is not set
# CONFIG_CPU_BPREDICT_DISABLE is not set
CONFIG_KUSER_HELPERS=y
# CONFIG_CACHE_L2X0 is not set
CONFIG_ARM_L1_CACHE_SHIFT_6=y
CONFIG_ARM_L1_CACHE_SHIFT=6
CONFIG_ARM_DMA_MEM_BUFFERABLE=y
CONFIG_ARM_NR_BANKS=8
CONFIG_MULTI_IRQ_HANDLER=y
# CONFIG_ARM_ERRATA_430973 is not set
# CONFIG_ARM_ERRATA_643719 is not set
# CONFIG_ARM_ERRATA_720789 is not set
# CONFIG_ARM_ERRATA_754322 is not set
# CONFIG_ARM_ERRATA_754327 is not set
# CONFIG_ARM_ERRATA_764369 is not set
# CONFIG_ARM_ERRATA_775420 is not set
# CONFIG_ARM_ERRATA_798181 is not set
# CONFIG_ARM_ERRATA_773022 is not set
CONFIG_TI_PRIV_EDMA=y

#
# Bus support
#
CONFIG_PCI=y
CONFIG_PCI_SYSCALL=y
# CONFIG_PCI_MSI is not set
# CONFIG_PCI_DEBUG is not set
# CONFIG_PCI_REALLOC_ENABLE_AUTO is not set
# CONFIG_PCI_STUB is not set
# CONFIG_PCI_IOV is not set
# CONFIG_PCI_PRI is not set
# CONFIG_PCI_PASID is not set

#
# PCI host controller drivers
#
CONFIG_PCI_DRA7XX=y
CONFIG_PCIE_DW=y
# CONFIG_PCIEPORTBUS is not set
# CONFIG_PCCARD is not set

#
# Kernel Features
#
CONFIG_HAVE_SMP=y
CONFIG_SMP=y
CONFIG_SMP_ON_UP=y
CONFIG_ARM_CPU_TOPOLOGY=y
# CONFIG_SCHED_MC is not set
# CONFIG_SCHED_SMT is not set
CONFIG_HAVE_ARM_ARCH_TIMER=y
# CONFIG_MCPM is not set
# CONFIG_BIG_LITTLE is not set
CONFIG_VMSPLIT_3G=y
# CONFIG_VMSPLIT_2G is not set
# CONFIG_VMSPLIT_1G is not set
CONFIG_PAGE_OFFSET=0xC0000000
CONFIG_NR_CPUS=2
CONFIG_HOTPLUG_CPU=y
CONFIG_ARM_PSCI=y
CONFIG_ARCH_NR_GPIO=512
# CONFIG_PREEMPT_NONE is not set
# CONFIG_PREEMPT_VOLUNTARY is not set
CONFIG_PREEMPT=y
CONFIG_PREEMPT_COUNT=y
CONFIG_HZ_FIXED=0
CONFIG_HZ_100=y
# CONFIG_HZ_200 is not set
# CONFIG_HZ_250 is not set
# CONFIG_HZ_300 is not set
# CONFIG_HZ_500 is not set
# CONFIG_HZ_1000 is not set
CONFIG_HZ=100
CONFIG_SCHED_HRTICK=y
# CONFIG_THUMB2_KERNEL is not set
CONFIG_AEABI=y
# CONFIG_OABI_COMPAT is not set
CONFIG_ARCH_HAS_HOLES_MEMORYMODEL=y
# CONFIG_ARCH_SPARSEMEM_DEFAULT is not set
# CONFIG_ARCH_SELECT_MEMORY_MODEL is not set
CONFIG_HAVE_ARCH_PFN_VALID=y
CONFIG_HIGHMEM=y
# CONFIG_HIGHPTE is not set
CONFIG_HW_PERF_EVENTS=y
CONFIG_SYS_SUPPORTS_HUGETLBFS=y
CONFIG_ARCH_WANT_GENERAL_HUGETLB=y
CONFIG_FLATMEM=y
CONFIG_FLAT_NODE_MEM_MAP=y
CONFIG_HAVE_MEMBLOCK=y
CONFIG_NO_BOOTMEM=y
CONFIG_MEMORY_ISOLATION=y
# CONFIG_HAVE_BOOTMEM_INFO_NODE is not set
CONFIG_PAGEFLAGS_EXTENDED=y
CONFIG_SPLIT_PTLOCK_CPUS=4
CONFIG_COMPACTION=y
CONFIG_MIGRATION=y
CONFIG_PHYS_ADDR_T_64BIT=y
CONFIG_ZONE_DMA_FLAG=0
CONFIG_BOUNCE=y
CONFIG_MMU_NOTIFIER=y
# CONFIG_KSM is not set
CONFIG_DEFAULT_MMAP_MIN_ADDR=4096
# CONFIG_TRANSPARENT_HUGEPAGE is not set
CONFIG_CROSS_MEMORY_ATTACH=y
# CONFIG_CLEANCACHE is not set
# CONFIG_FRONTSWAP is not set
CONFIG_CMA=y
# CONFIG_CMA_DEBUG is not set
# CONFIG_ZBUD is not set
# CONFIG_ZSMALLOC is not set
CONFIG_FORCE_MAX_ZONEORDER=11
CONFIG_ALIGNMENT_TRAP=y
# CONFIG_UACCESS_WITH_MEMCPY is not set
# CONFIG_SECCOMP is not set
CONFIG_SWIOTLB=y
CONFIG_IOMMU_HELPER=y
CONFIG_XEN_DOM0=y
CONFIG_XEN=y
# CONFIG_ARM_FLUSH_CONSOLE_ON_RESTART is not set

#
# Boot options
#
CONFIG_USE_OF=y
CONFIG_ATAGS=y
# CONFIG_DEPRECATED_PARAM_STRUCT is not set
# CONFIG_BUILD_ARM_APPENDED_DTB_IMAGE is not set
CONFIG_ZBOOT_ROM_TEXT=0x0
CONFIG_ZBOOT_ROM_BSS=0x0
CONFIG_ARM_APPENDED_DTB=y
CONFIG_ARM_ATAG_DTB_COMPAT=y
CONFIG_ARM_ATAG_DTB_COMPAT_CMDLINE_FROM_BOOTLOADER=y
# CONFIG_ARM_ATAG_DTB_COMPAT_CMDLINE_EXTEND is not set
CONFIG_CMDLINE="console=ttyO0,115200n8 earlyprintk=xen debug ignore_loglevel root=/dev/mmcbl    k0p2 rw rootwait fixrtc"
CONFIG_CMDLINE_FROM_BOOTLOADER=y
# CONFIG_CMDLINE_EXTEND is not set
# CONFIG_CMDLINE_FORCE is not set
CONFIG_KEXEC=y
CONFIG_ATAGS_PROC=y
# CONFIG_CRASH_DUMP is not set
CONFIG_AUTO_ZRELADDR=y

#
# CPU Power Management
#

#
# CPU Frequency scaling
#
CONFIG_CPU_FREQ=y
CONFIG_CPU_FREQ_GOV_COMMON=y
CONFIG_CPU_FREQ_STAT=y
CONFIG_CPU_FREQ_STAT_DETAILS=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_PERFORMANCE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_POWERSAVE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_USERSPACE is not set
CONFIG_CPU_FREQ_DEFAULT_GOV_ONDEMAND=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_CONSERVATIVE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_INTERACTIVE is not set
CONFIG_CPU_FREQ_GOV_PERFORMANCE=y
CONFIG_CPU_FREQ_GOV_POWERSAVE=m
CONFIG_CPU_FREQ_GOV_USERSPACE=m
CONFIG_CPU_FREQ_GOV_ONDEMAND=y
# CONFIG_CPU_FREQ_GOV_INTERACTIVE is not set
CONFIG_CPU_FREQ_GOV_CONSERVATIVE=m
CONFIG_GENERIC_CPUFREQ_CPU0=y

#
# ARM CPU frequency scaling drivers
#
# CONFIG_ARM_KIRKWOOD_CPUFREQ is not set
# CONFIG_ARM_OMAP2PLUS_CPUFREQ is not set

#
# CPU Idle
#
CONFIG_CPU_IDLE=y
# CONFIG_CPU_IDLE_MULTIPLE_DRIVERS is not set
CONFIG_CPU_IDLE_GOV_LADDER=y
CONFIG_CPU_IDLE_GOV_MENU=y

#
# ARM CPU Idle Drivers
#
# CONFIG_ARM_HIGHBANK_CPUIDLE is not set
# CONFIG_ARCH_NEEDS_CPU_IDLE_COUPLED is not set

#
# Floating point emulation
#

#
# At least one emulation must be selected
#
CONFIG_VFP=y
CONFIG_VFPv3=y
CONFIG_NEON=y
# CONFIG_KERNEL_MODE_NEON is not set

#
# Userspace binary formats
#
CONFIG_BINFMT_ELF=y
CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE=y
CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS=y
CONFIG_BINFMT_SCRIPT=y
# CONFIG_HAVE_AOUT is not set
CONFIG_BINFMT_MISC=y
CONFIG_COREDUMP=y

#
# Power management options
#
CONFIG_SUSPEND=y
CONFIG_SUSPEND_FREEZER=y
CONFIG_HAS_WAKELOCK=y
CONFIG_WAKELOCK=y
CONFIG_PM_SLEEP=y
CONFIG_PM_SLEEP_SMP=y
# CONFIG_PM_AUTOSLEEP is not set
# CONFIG_PM_WAKELOCKS is not set
CONFIG_PM_RUNTIME=y
CONFIG_PM=y
CONFIG_PM_DEBUG=y
# CONFIG_PM_ADVANCED_DEBUG is not set
# CONFIG_PM_TEST_SUSPEND is not set
CONFIG_PM_SLEEP_DEBUG=y
# CONFIG_APM_EMULATION is not set
CONFIG_ARCH_HAS_OPP=y
CONFIG_PM_OPP=y
CONFIG_PM_CLK=y
# CONFIG_WQ_POWER_EFFICIENT_DEFAULT is not set
CONFIG_CPU_PM=y
# CONFIG_SUSPEND_TIME is not set
CONFIG_ARCH_SUSPEND_POSSIBLE=y
CONFIG_ARM_CPU_SUSPEND=y
CONFIG_NET=y

#
# Networking options
#
CONFIG_PACKET=y
# CONFIG_PACKET_DIAG is not set
CONFIG_UNIX=y
# CONFIG_UNIX_DIAG is not set
CONFIG_XFRM=y
CONFIG_XFRM_ALGO=y
CONFIG_XFRM_USER=y
# CONFIG_XFRM_SUB_POLICY is not set
CONFIG_XFRM_MIGRATE=y
# CONFIG_XFRM_STATISTICS is not set
CONFIG_NET_KEY=y
CONFIG_NET_KEY_MIGRATE=y
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
# CONFIG_IP_ADVANCED_ROUTER is not set
CONFIG_IP_PNP=y
CONFIG_IP_PNP_DHCP=y
CONFIG_IP_PNP_BOOTP=y
CONFIG_IP_PNP_RARP=y
# CONFIG_NET_IPIP is not set
# CONFIG_NET_IPGRE_DEMUX is not set
# CONFIG_NET_IP_TUNNEL is not set
# CONFIG_IP_MROUTE is not set
# CONFIG_SYN_COOKIES is not set
# CONFIG_NET_IPVTI is not set
# CONFIG_INET_AH is not set
# CONFIG_INET_ESP is not set
# CONFIG_INET_IPCOMP is not set
# CONFIG_INET_XFRM_TUNNEL is not set
# CONFIG_INET_TUNNEL is not set
CONFIG_INET_XFRM_MODE_TRANSPORT=y
CONFIG_INET_XFRM_MODE_TUNNEL=y
CONFIG_INET_XFRM_MODE_BEET=y
# CONFIG_INET_LRO is not set
CONFIG_INET_DIAG=y
CONFIG_INET_TCP_DIAG=y
# CONFIG_INET_UDP_DIAG is not set
# CONFIG_TCP_CONG_ADVANCED is not set
CONFIG_TCP_CONG_CUBIC=y
CONFIG_DEFAULT_TCP_CONG="cubic"
# CONFIG_TCP_MD5SIG is not set
# CONFIG_IPV6 is not set
# CONFIG_NETLABEL is not set
CONFIG_ANDROID_PARANOID_NETWORK=y
CONFIG_NET_ACTIVITY_STATS=y
# CONFIG_NETWORK_SECMARK is not set
# CONFIG_NETWORK_PHY_TIMESTAMPING is not set
CONFIG_NETFILTER=y
# CONFIG_NETFILTER_DEBUG is not set
CONFIG_NETFILTER_ADVANCED=y
CONFIG_BRIDGE_NETFILTER=y

#
# Core Netfilter Configuration
#
# CONFIG_NETFILTER_NETLINK_ACCT is not set
# CONFIG_NETFILTER_NETLINK_QUEUE is not set
# CONFIG_NETFILTER_NETLINK_LOG is not set
CONFIG_NF_CONNTRACK=m
# CONFIG_NF_CONNTRACK_MARK is not set
CONFIG_NF_CONNTRACK_PROCFS=y
# CONFIG_NF_CONNTRACK_EVENTS is not set
# CONFIG_NF_CONNTRACK_TIMEOUT is not set
# CONFIG_NF_CONNTRACK_TIMESTAMP is not set
# CONFIG_NF_CT_PROTO_DCCP is not set
# CONFIG_NF_CT_PROTO_SCTP is not set
# CONFIG_NF_CT_PROTO_UDPLITE is not set
# CONFIG_NF_CONNTRACK_AMANDA is not set
# CONFIG_NF_CONNTRACK_FTP is not set
# CONFIG_NF_CONNTRACK_H323 is not set
# CONFIG_NF_CONNTRACK_IRC is not set
# CONFIG_NF_CONNTRACK_NETBIOS_NS is not set
# CONFIG_NF_CONNTRACK_SNMP is not set
# CONFIG_NF_CONNTRACK_PPTP is not set
# CONFIG_NF_CONNTRACK_SANE is not set
# CONFIG_NF_CONNTRACK_SIP is not set
# CONFIG_NF_CONNTRACK_TFTP is not set
# CONFIG_NF_CT_NETLINK is not set
# CONFIG_NF_CT_NETLINK_TIMEOUT is not set
CONFIG_NF_NAT=m
CONFIG_NF_NAT_NEEDED=y
# CONFIG_NF_NAT_AMANDA is not set
# CONFIG_NF_NAT_FTP is not set
# CONFIG_NF_NAT_IRC is not set
# CONFIG_NF_NAT_SIP is not set
# CONFIG_NF_NAT_TFTP is not set
# CONFIG_NF_TABLES is not set
CONFIG_NETFILTER_XTABLES=m

#
# Xtables combined modules
#
# CONFIG_NETFILTER_XT_MARK is not set
# CONFIG_NETFILTER_XT_CONNMARK is not set

#
# Xtables targets
#
# CONFIG_NETFILTER_XT_TARGET_CLASSIFY is not set
# CONFIG_NETFILTER_XT_TARGET_CONNMARK is not set
# CONFIG_NETFILTER_XT_TARGET_HMARK is not set
# CONFIG_NETFILTER_XT_TARGET_IDLETIMER is not set
# CONFIG_NETFILTER_XT_TARGET_LED is not set
# CONFIG_NETFILTER_XT_TARGET_LOG is not set
# CONFIG_NETFILTER_XT_TARGET_MARK is not set
# CONFIG_NETFILTER_XT_TARGET_NETMAP is not set
# CONFIG_NETFILTER_XT_TARGET_NFLOG is not set
# CONFIG_NETFILTER_XT_TARGET_NFQUEUE is not set
# CONFIG_NETFILTER_XT_TARGET_RATEEST is not set
# CONFIG_NETFILTER_XT_TARGET_REDIRECT is not set
# CONFIG_NETFILTER_XT_TARGET_TEE is not set
# CONFIG_NETFILTER_XT_TARGET_TCPMSS is not set

#
# Xtables matches
#
# CONFIG_NETFILTER_XT_MATCH_ADDRTYPE is not set
# CONFIG_NETFILTER_XT_MATCH_BPF is not set
# CONFIG_NETFILTER_XT_MATCH_CGROUP is not set
# CONFIG_NETFILTER_XT_MATCH_CLUSTER is not set
# CONFIG_NETFILTER_XT_MATCH_COMMENT is not set
# CONFIG_NETFILTER_XT_MATCH_CONNBYTES is not set
# CONFIG_NETFILTER_XT_MATCH_CONNLABEL is not set
# CONFIG_NETFILTER_XT_MATCH_CONNLIMIT is not set
# CONFIG_NETFILTER_XT_MATCH_CONNMARK is not set
# CONFIG_NETFILTER_XT_MATCH_CONNTRACK is not set
# CONFIG_NETFILTER_XT_MATCH_CPU is not set
# CONFIG_NETFILTER_XT_MATCH_DCCP is not set
# CONFIG_NETFILTER_XT_MATCH_DEVGROUP is not set
# CONFIG_NETFILTER_XT_MATCH_DSCP is not set
# CONFIG_NETFILTER_XT_MATCH_ECN is not set
# CONFIG_NETFILTER_XT_MATCH_ESP is not set
# CONFIG_NETFILTER_XT_MATCH_HASHLIMIT is not set
# CONFIG_NETFILTER_XT_MATCH_HELPER is not set
# CONFIG_NETFILTER_XT_MATCH_HL is not set
# CONFIG_NETFILTER_XT_MATCH_IPCOMP is not set
# CONFIG_NETFILTER_XT_MATCH_IPRANGE is not set
# CONFIG_NETFILTER_XT_MATCH_L2TP is not set
# CONFIG_NETFILTER_XT_MATCH_LENGTH is not set
# CONFIG_NETFILTER_XT_MATCH_LIMIT is not set
# CONFIG_NETFILTER_XT_MATCH_MAC is not set
# CONFIG_NETFILTER_XT_MATCH_MARK is not set
# CONFIG_NETFILTER_XT_MATCH_MULTIPORT is not set
# CONFIG_NETFILTER_XT_MATCH_NFACCT is not set
# CONFIG_NETFILTER_XT_MATCH_OWNER is not set
# CONFIG_NETFILTER_XT_MATCH_POLICY is not set
# CONFIG_NETFILTER_XT_MATCH_PHYSDEV is not set
# CONFIG_NETFILTER_XT_MATCH_PKTTYPE is not set
# CONFIG_NETFILTER_XT_MATCH_QUOTA is not set
# CONFIG_NETFILTER_XT_MATCH_QUOTA2 is not set
# CONFIG_NETFILTER_XT_MATCH_RATEEST is not set
# CONFIG_NETFILTER_XT_MATCH_REALM is not set
# CONFIG_NETFILTER_XT_MATCH_RECENT is not set
# CONFIG_NETFILTER_XT_MATCH_SCTP is not set
# CONFIG_NETFILTER_XT_MATCH_SOCKET is not set
# CONFIG_NETFILTER_XT_MATCH_STATE is not set
# CONFIG_NETFILTER_XT_MATCH_STATISTIC is not set
# CONFIG_NETFILTER_XT_MATCH_STRING is not set
# CONFIG_NETFILTER_XT_MATCH_TCPMSS is not set
# CONFIG_NETFILTER_XT_MATCH_TIME is not set
# CONFIG_NETFILTER_XT_MATCH_U32 is not set
# CONFIG_IP_SET is not set
# CONFIG_IP_VS is not set

#
# IP: Netfilter Configuration
#
CONFIG_NF_DEFRAG_IPV4=m
CONFIG_NF_CONNTRACK_IPV4=m
CONFIG_NF_CONNTRACK_PROC_COMPAT=y
CONFIG_IP_NF_IPTABLES=m
# CONFIG_IP_NF_MATCH_AH is not set
# CONFIG_IP_NF_MATCH_ECN is not set
# CONFIG_IP_NF_MATCH_TTL is not set
CONFIG_IP_NF_FILTER=m
# CONFIG_IP_NF_TARGET_REJECT is not set
# CONFIG_IP_NF_TARGET_SYNPROXY is not set
# CONFIG_IP_NF_TARGET_ULOG is not set
CONFIG_NF_NAT_IPV4=m
CONFIG_IP_NF_TARGET_MASQUERADE=m
# CONFIG_IP_NF_TARGET_NETMAP is not set
# CONFIG_IP_NF_TARGET_REDIRECT is not set
# CONFIG_NF_NAT_PPTP is not set
# CONFIG_NF_NAT_H323 is not set
# CONFIG_IP_NF_MANGLE is not set
# CONFIG_IP_NF_RAW is not set
# CONFIG_IP_NF_SECURITY is not set
# CONFIG_IP_NF_ARPTABLES is not set
# CONFIG_BRIDGE_NF_EBTABLES is not set
# CONFIG_IP_DCCP is not set
# CONFIG_IP_SCTP is not set
# CONFIG_RDS is not set
# CONFIG_TIPC is not set
# CONFIG_ATM is not set
# CONFIG_L2TP is not set
CONFIG_STP=m
CONFIG_BRIDGE=m
CONFIG_BRIDGE_IGMP_SNOOPING=y
CONFIG_HAVE_NET_DSA=y
# CONFIG_VLAN_8021Q is not set
# CONFIG_DECNET is not set
CONFIG_LLC=m
# CONFIG_LLC2 is not set
# CONFIG_IPX is not set
# CONFIG_ATALK is not set
# CONFIG_X25 is not set
# CONFIG_LAPB is not set
# CONFIG_PHONET is not set
# CONFIG_IEEE802154 is not set
CONFIG_6LOWPAN_IPHC=m
# CONFIG_NET_SCHED is not set
# CONFIG_DCB is not set
CONFIG_DNS_RESOLVER=y
# CONFIG_BATMAN_ADV is not set
# CONFIG_OPENVSWITCH is not set
# CONFIG_VSOCKETS is not set
# CONFIG_NETLINK_MMAP is not set
# CONFIG_NETLINK_DIAG is not set
# CONFIG_NET_MPLS_GSO is not set
# CONFIG_HSR is not set
CONFIG_RPS=y
CONFIG_RFS_ACCEL=y
CONFIG_XPS=y
# CONFIG_CGROUP_NET_PRIO is not set
# CONFIG_CGROUP_NET_CLASSID is not set
CONFIG_NET_RX_BUSY_POLL=y
CONFIG_BQL=y
# CONFIG_BPF_JIT is not set
CONFIG_NET_FLOW_LIMIT=y

#
# Network testing
#
# CONFIG_NET_PKTGEN is not set
# CONFIG_NET_TCPPROBE is not set
# CONFIG_HAMRADIO is not set
CONFIG_CAN=m
CONFIG_CAN_RAW=m
CONFIG_CAN_BCM=m
CONFIG_CAN_GW=m

#
# CAN Device Drivers
#
# CONFIG_CAN_VCAN is not set
# CONFIG_CAN_SLCAN is not set
CONFIG_CAN_DEV=m
CONFIG_CAN_CALC_BITTIMING=y
# CONFIG_CAN_LEDS is not set
# CONFIG_CAN_AT91 is not set
# CONFIG_CAN_TI_HECC is not set
# CONFIG_CAN_MCP251X is not set
# CONFIG_CAN_FLEXCAN is not set
# CONFIG_PCH_CAN is not set
# CONFIG_CAN_GRCAN is not set
# CONFIG_CAN_SJA1000 is not set
CONFIG_CAN_C_CAN=m
CONFIG_CAN_C_CAN_PLATFORM=m
# CONFIG_CAN_C_CAN_PCI is not set
# CONFIG_CAN_CC770 is not set

#
# CAN USB interfaces
#
# CONFIG_CAN_EMS_USB is not set
# CONFIG_CAN_ESD_USB2 is not set
# CONFIG_CAN_KVASER_USB is not set
# CONFIG_CAN_PEAK_USB is not set
# CONFIG_CAN_8DEV_USB is not set
# CONFIG_CAN_SOFTING is not set
# CONFIG_CAN_DEBUG_DEVICES is not set
# CONFIG_IRDA is not set
CONFIG_BT=m
# CONFIG_BT_RFCOMM is not set
# CONFIG_BT_BNEP is not set
# CONFIG_BT_HIDP is not set

#
# Bluetooth device drivers
#
# CONFIG_BT_HCIBTUSB is not set
# CONFIG_BT_HCIBTSDIO is not set
CONFIG_BT_HCIUART=m
CONFIG_BT_HCIUART_H4=y
CONFIG_BT_HCIUART_BCSP=y
# CONFIG_BT_HCIUART_ATH3K is not set
CONFIG_BT_HCIUART_LL=y
# CONFIG_BT_HCIUART_3WIRE is not set
CONFIG_BT_HCIBCM203X=m
CONFIG_BT_HCIBPA10X=m
# CONFIG_BT_HCIBFUSB is not set
# CONFIG_BT_HCIVHCI is not set
# CONFIG_BT_MRVL is not set
CONFIG_BT_WILINK=m
# CONFIG_AF_RXRPC is not set
CONFIG_WIRELESS=y
# CONFIG_CFG80211 is not set
# CONFIG_LIB80211 is not set

#
# CFG80211 needs to be enabled for MAC80211
#
# CONFIG_WIMAX is not set
CONFIG_RFKILL=y
CONFIG_RFKILL_PM=y
CONFIG_RFKILL_LEDS=y
# CONFIG_RFKILL_INPUT is not set
# CONFIG_RFKILL_REGULATOR is not set
# CONFIG_RFKILL_GPIO is not set
# CONFIG_NET_9P is not set
# CONFIG_CAIF is not set
# CONFIG_CEPH_LIB is not set
# CONFIG_NFC is not set
CONFIG_HAVE_BPF_JIT=y

#
# Device Drivers
#

#
# Generic Driver Options
#
CONFIG_UEVENT_HELPER_PATH="/sbin/hotplug"
CONFIG_DEVTMPFS=y
CONFIG_DEVTMPFS_MOUNT=y
CONFIG_STANDALONE=y
CONFIG_PREVENT_FIRMWARE_BUILD=y
CONFIG_FW_LOADER=y
CONFIG_FIRMWARE_IN_KERNEL=y
CONFIG_EXTRA_FIRMWARE=""
CONFIG_FW_LOADER_USER_HELPER=y
# CONFIG_DEBUG_DRIVER is not set
# CONFIG_DEBUG_DEVRES is not set
CONFIG_SYS_HYPERVISOR=y
# CONFIG_GENERIC_CPU_DEVICES is not set
# CONFIG_HAVE_CPU_AUTOPROBE is not set
CONFIG_SOC_BUS=y
CONFIG_REGMAP=y
CONFIG_REGMAP_I2C=y
CONFIG_REGMAP_SPI=y
CONFIG_REGMAP_MMIO=y
CONFIG_REGMAP_IRQ=y
CONFIG_DMA_SHARED_BUFFER=y
CONFIG_DMA_CMA=y

#
# Default contiguous memory area size:
#
CONFIG_CMA_SIZE_MBYTES=24
CONFIG_CMA_SIZE_SEL_MBYTES=y
# CONFIG_CMA_SIZE_SEL_PERCENTAGE is not set
# CONFIG_CMA_SIZE_SEL_MIN is not set
# CONFIG_CMA_SIZE_SEL_MAX is not set
CONFIG_CMA_ALIGNMENT=8
CONFIG_CMA_AREAS=7

#
# Bus devices
#
CONFIG_OMAP_OCP2SCP=y
# CONFIG_OMAP_INTERCONNECT is not set
# CONFIG_ARM_CCI is not set
CONFIG_CONNECTOR=y
CONFIG_PROC_EVENTS=y
CONFIG_MTD=y
CONFIG_MTD_TESTS=m
# CONFIG_MTD_REDBOOT_PARTS is not set
CONFIG_MTD_CMDLINE_PARTS=y
# CONFIG_MTD_AFS_PARTS is not set
CONFIG_MTD_OF_PARTS=y
# CONFIG_MTD_AR7_PARTS is not set

#
# User Modules And Translation Layers
#
CONFIG_MTD_BLKDEVS=y
CONFIG_MTD_BLOCK=y
# CONFIG_FTL is not set
# CONFIG_NFTL is not set
# CONFIG_INFTL is not set
# CONFIG_RFD_FTL is not set
# CONFIG_SSFDC is not set
# CONFIG_SM_FTL is not set
CONFIG_MTD_OOPS=y
# CONFIG_MTD_SWAP is not set

#
# RAM/ROM/Flash chip drivers
#
CONFIG_MTD_CFI=y
# CONFIG_MTD_JEDECPROBE is not set
CONFIG_MTD_GEN_PROBE=y
# CONFIG_MTD_CFI_ADV_OPTIONS is not set
CONFIG_MTD_MAP_BANK_WIDTH_1=y
CONFIG_MTD_MAP_BANK_WIDTH_2=y
CONFIG_MTD_MAP_BANK_WIDTH_4=y
# CONFIG_MTD_MAP_BANK_WIDTH_8 is not set
# CONFIG_MTD_MAP_BANK_WIDTH_16 is not set
# CONFIG_MTD_MAP_BANK_WIDTH_32 is not set
CONFIG_MTD_CFI_I1=y
CONFIG_MTD_CFI_I2=y
# CONFIG_MTD_CFI_I4 is not set
# CONFIG_MTD_CFI_I8 is not set
CONFIG_MTD_CFI_INTELEXT=y
# CONFIG_MTD_CFI_AMDSTD is not set
# CONFIG_MTD_CFI_STAA is not set
CONFIG_MTD_CFI_UTIL=y
# CONFIG_MTD_RAM is not set
# CONFIG_MTD_ROM is not set
# CONFIG_MTD_ABSENT is not set

#
# Mapping drivers for chip access
#
# CONFIG_MTD_COMPLEX_MAPPINGS is not set
# CONFIG_MTD_PHYSMAP is not set
# CONFIG_MTD_PHYSMAP_OF is not set
# CONFIG_MTD_INTEL_VR_NOR is not set
# CONFIG_MTD_PLATRAM is not set

#
# Self-contained MTD device drivers
#
# CONFIG_MTD_PMC551 is not set
# CONFIG_MTD_DATAFLASH is not set
CONFIG_MTD_M25P80=m
# CONFIG_MTD_SST25L is not set
# CONFIG_MTD_SLRAM is not set
# CONFIG_MTD_PHRAM is not set
# CONFIG_MTD_MTDRAM is not set
# CONFIG_MTD_BLOCK2MTD is not set

#
# Disk-On-Chip Device Drivers
#
# CONFIG_MTD_DOCG3 is not set
CONFIG_MTD_NAND_IDS=y
CONFIG_MTD_NAND_ECC=y
# CONFIG_MTD_NAND_ECC_SMC is not set
CONFIG_MTD_NAND=y
# CONFIG_MTD_NAND_ECC_BCH is not set
# CONFIG_MTD_SM_COMMON is not set
# CONFIG_MTD_NAND_DENALI is not set
# CONFIG_MTD_NAND_GPIO is not set
CONFIG_MTD_NAND_OMAP2=y
CONFIG_MTD_NAND_OMAP_BCH=y
# CONFIG_MTD_NAND_RICOH is not set
# CONFIG_MTD_NAND_DISKONCHIP is not set
# CONFIG_MTD_NAND_DOCG4 is not set
# CONFIG_MTD_NAND_CAFE is not set
# CONFIG_MTD_NAND_NANDSIM is not set
# CONFIG_MTD_NAND_PLATFORM is not set
CONFIG_MTD_ONENAND=y
CONFIG_MTD_ONENAND_VERIFY_WRITE=y
# CONFIG_MTD_ONENAND_GENERIC is not set
# CONFIG_MTD_ONENAND_OTP is not set
# CONFIG_MTD_ONENAND_2X_PROGRAM is not set

#
# LPDDR flash memory drivers
#
# CONFIG_MTD_LPDDR is not set
CONFIG_MTD_UBI=y
CONFIG_MTD_UBI_WL_THRESHOLD=4096
CONFIG_MTD_UBI_BEB_LIMIT=20
# CONFIG_MTD_UBI_FASTMAP is not set
# CONFIG_MTD_UBI_GLUEBI is not set
CONFIG_DTC=y
CONFIG_OF=y

#
# Device Tree and Open Firmware support
#
CONFIG_PROC_DEVICETREE=y
# CONFIG_OF_SELFTEST is not set
CONFIG_OF_FLATTREE=y
CONFIG_OF_EARLY_FLATTREE=y
CONFIG_OF_ADDRESS=y
CONFIG_OF_IRQ=y
CONFIG_OF_NET=y
CONFIG_OF_MDIO=y
CONFIG_OF_PCI=y
CONFIG_OF_PCI_IRQ=y
CONFIG_OF_MTD=y
CONFIG_OF_RESERVED_MEM=y
CONFIG_ARCH_MIGHT_HAVE_PC_PARPORT=y
# CONFIG_PARPORT is not set
CONFIG_BLK_DEV=y
# CONFIG_BLK_DEV_NULL_BLK is not set
# CONFIG_BLK_DEV_PCIESSD_MTIP32XX is not set
# CONFIG_BLK_CPQ_CISS_DA is not set
# CONFIG_BLK_DEV_DAC960 is not set
# CONFIG_BLK_DEV_UMEM is not set
# CONFIG_BLK_DEV_COW_COMMON is not set
CONFIG_BLK_DEV_LOOP=y
CONFIG_BLK_DEV_LOOP_MIN_COUNT=8
# CONFIG_BLK_DEV_CRYPTOLOOP is not set
# CONFIG_BLK_DEV_DRBD is not set
# CONFIG_BLK_DEV_NBD is not set
# CONFIG_BLK_DEV_NVME is not set
# CONFIG_BLK_DEV_SX8 is not set
CONFIG_BLK_DEV_RAM=y
CONFIG_BLK_DEV_RAM_COUNT=16
CONFIG_BLK_DEV_RAM_SIZE=16384
# CONFIG_BLK_DEV_XIP is not set
# CONFIG_CDROM_PKTCDVD is not set
# CONFIG_ATA_OVER_ETH is not set
# CONFIG_MG_DISK is not set
CONFIG_XEN_BLKDEV_FRONTEND=y
CONFIG_XEN_BLKDEV_BACKEND=y
# CONFIG_VIRTIO_BLK is not set
# CONFIG_BLK_DEV_RBD is not set
# CONFIG_BLK_DEV_RSXX is not set

#
# Misc devices
#
CONFIG_SENSORS_LIS3LV02D=m
# CONFIG_AD525X_DPOT is not set
# CONFIG_ATMEL_PWM is not set
# CONFIG_DUMMY_IRQ is not set
# CONFIG_PHANTOM is not set
# CONFIG_SGI_IOC4 is not set
# CONFIG_TIFM_CORE is not set
# CONFIG_ICS932S401 is not set
# CONFIG_ATMEL_SSC is not set
# CONFIG_ENCLOSURE_SERVICES is not set
# CONFIG_HP_ILO is not set
# CONFIG_APDS9802ALS is not set
# CONFIG_ISL29003 is not set
# CONFIG_ISL29020 is not set
CONFIG_SENSORS_TSL2550=m
# CONFIG_SENSORS_BH1780 is not set
# CONFIG_SENSORS_BH1770 is not set
# CONFIG_SENSORS_APDS990X is not set
# CONFIG_HMC6352 is not set
# CONFIG_DS1682 is not set
# CONFIG_TI_DAC7512 is not set
# CONFIG_UID_STAT is not set
CONFIG_BMP085=y
CONFIG_BMP085_I2C=m
# CONFIG_BMP085_SPI is not set
# CONFIG_PCH_PHUB is not set
# CONFIG_USB_SWITCH_FSA9480 is not set
# CONFIG_LATTICE_ECP3_CONFIG is not set
# CONFIG_SRAM is not set
# CONFIG_C2PORT is not set

#
# EEPROM support
#
# CONFIG_EEPROM_AT24 is not set
# CONFIG_EEPROM_AT25 is not set
# CONFIG_EEPROM_LEGACY is not set
# CONFIG_EEPROM_MAX6875 is not set
CONFIG_EEPROM_93CX6=y
# CONFIG_EEPROM_93XX46 is not set
# CONFIG_CB710_CORE is not set

#
# Texas Instruments shared transport line discipline
#
CONFIG_TI_ST=y
CONFIG_ST_HCI=y
# CONFIG_SENSORS_LIS3_SPI is not set
CONFIG_SENSORS_LIS3_I2C=m

#
# Altera FPGA firmware download module
#
# CONFIG_ALTERA_STAPL is not set

#
# Intel MIC Host Driver
#

#
# Intel MIC Card Driver
#
CONFIG_HAVE_IDE=y
# CONFIG_IDE is not set

#
# SCSI device support
#
CONFIG_SCSI_MOD=y
# CONFIG_RAID_ATTRS is not set
CONFIG_SCSI=y
CONFIG_SCSI_DMA=y
# CONFIG_SCSI_TGT is not set
# CONFIG_SCSI_NETLINK is not set
CONFIG_SCSI_PROC_FS=y

#
# SCSI support type (disk, tape, CD-ROM)
#
CONFIG_BLK_DEV_SD=y
# CONFIG_CHR_DEV_ST is not set
# CONFIG_CHR_DEV_OSST is not set
# CONFIG_BLK_DEV_SR is not set
# CONFIG_CHR_DEV_SG is not set
# CONFIG_CHR_DEV_SCH is not set
CONFIG_SCSI_MULTI_LUN=y
# CONFIG_SCSI_CONSTANTS is not set
# CONFIG_SCSI_LOGGING is not set
CONFIG_SCSI_SCAN_ASYNC=y

#
# SCSI Transports
#
# CONFIG_SCSI_SPI_ATTRS is not set
# CONFIG_SCSI_FC_ATTRS is not set
# CONFIG_SCSI_ISCSI_ATTRS is not set
# CONFIG_SCSI_SAS_ATTRS is not set
# CONFIG_SCSI_SAS_LIBSAS is not set
# CONFIG_SCSI_SRP_ATTRS is not set
CONFIG_SCSI_LOWLEVEL=y
# CONFIG_ISCSI_TCP is not set
# CONFIG_ISCSI_BOOT_SYSFS is not set
# CONFIG_SCSI_CXGB3_ISCSI is not set
# CONFIG_SCSI_CXGB4_ISCSI is not set
# CONFIG_SCSI_BNX2_ISCSI is not set
# CONFIG_SCSI_BNX2X_FCOE is not set
# CONFIG_BE2ISCSI is not set
# CONFIG_BLK_DEV_3W_XXXX_RAID is not set
# CONFIG_SCSI_HPSA is not set
# CONFIG_SCSI_3W_9XXX is not set
# CONFIG_SCSI_3W_SAS is not set
# CONFIG_SCSI_ACARD is not set
# CONFIG_SCSI_AACRAID is not set
# CONFIG_SCSI_AIC7XXX is not set
# CONFIG_SCSI_AIC79XX is not set
# CONFIG_SCSI_AIC94XX is not set
# CONFIG_SCSI_MVSAS is not set
# CONFIG_SCSI_MVUMI is not set
# CONFIG_SCSI_ARCMSR is not set
# CONFIG_SCSI_ESAS2R is not set
# CONFIG_MEGARAID_NEWGEN is not set
# CONFIG_MEGARAID_LEGACY is not set
# CONFIG_MEGARAID_SAS is not set
# CONFIG_SCSI_MPT2SAS is not set
# CONFIG_SCSI_MPT3SAS is not set
# CONFIG_SCSI_UFSHCD is not set
# CONFIG_SCSI_HPTIOP is not set
# CONFIG_LIBFC is not set
# CONFIG_LIBFCOE is not set
# CONFIG_FCOE is not set
# CONFIG_SCSI_DMX3191D is not set
# CONFIG_SCSI_FUTURE_DOMAIN is not set
# CONFIG_SCSI_IPS is not set
# CONFIG_SCSI_INITIO is not set
# CONFIG_SCSI_INIA100 is not set
# CONFIG_SCSI_STEX is not set
# CONFIG_SCSI_SYM53C8XX_2 is not set
# CONFIG_SCSI_IPR is not set
# CONFIG_SCSI_QLOGIC_1280 is not set
# CONFIG_SCSI_QLA_FC is not set
# CONFIG_SCSI_QLA_ISCSI is not set
# CONFIG_SCSI_LPFC is not set
# CONFIG_SCSI_DC395x is not set
# CONFIG_SCSI_DC390T is not set
# CONFIG_SCSI_NSP32 is not set
# CONFIG_SCSI_DEBUG is not set
# CONFIG_SCSI_PMCRAID is not set
# CONFIG_SCSI_PM8001 is not set
# CONFIG_SCSI_SRP is not set
# CONFIG_SCSI_BFA_FC is not set
# CONFIG_SCSI_VIRTIO is not set
# CONFIG_SCSI_CHELSIO_FCOE is not set
# CONFIG_SCSI_DH is not set
# CONFIG_SCSI_OSD_INITIATOR is not set
CONFIG_ATA=y
# CONFIG_ATA_NONSTANDARD is not set
CONFIG_ATA_VERBOSE_ERROR=y
CONFIG_SATA_PMP=y

#
# Controllers with non-SFF native interface
#
# CONFIG_SATA_AHCI is not set
CONFIG_SATA_AHCI_PLATFORM=y
# CONFIG_AHCI_IMX is not set
# CONFIG_SATA_INIC162X is not set
# CONFIG_SATA_ACARD_AHCI is not set
# CONFIG_SATA_SIL24 is not set
CONFIG_ATA_SFF=y

#
# SFF controllers with custom DMA interface
#
# CONFIG_PDC_ADMA is not set
# CONFIG_SATA_QSTOR is not set
# CONFIG_SATA_SX4 is not set
CONFIG_ATA_BMDMA=y

#
# SATA SFF controllers with BMDMA
#
# CONFIG_ATA_PIIX is not set
# CONFIG_SATA_HIGHBANK is not set
# CONFIG_SATA_MV is not set
# CONFIG_SATA_NV is not set
# CONFIG_SATA_PROMISE is not set
# CONFIG_SATA_RCAR is not set
# CONFIG_SATA_SIL is not set
# CONFIG_SATA_SIS is not set
# CONFIG_SATA_SVW is not set
# CONFIG_SATA_ULI is not set
# CONFIG_SATA_VIA is not set
# CONFIG_SATA_VITESSE is not set

#
# PATA SFF controllers with BMDMA
#
# CONFIG_PATA_ALI is not set
# CONFIG_PATA_AMD is not set
# CONFIG_PATA_ARASAN_CF is not set
# CONFIG_PATA_ARTOP is not set
# CONFIG_PATA_ATIIXP is not set
# CONFIG_PATA_ATP867X is not set
# CONFIG_PATA_CMD64X is not set
# CONFIG_PATA_CS5520 is not set
# CONFIG_PATA_CS5530 is not set
# CONFIG_PATA_CS5536 is not set
# CONFIG_PATA_CYPRESS is not set
# CONFIG_PATA_EFAR is not set
# CONFIG_PATA_HPT366 is not set
# CONFIG_PATA_HPT37X is not set
# CONFIG_PATA_HPT3X2N is not set
# CONFIG_PATA_HPT3X3 is not set
# CONFIG_PATA_IT8213 is not set
# CONFIG_PATA_IT821X is not set
# CONFIG_PATA_JMICRON is not set
# CONFIG_PATA_MARVELL is not set
# CONFIG_PATA_NETCELL is not set
# CONFIG_PATA_NINJA32 is not set
# CONFIG_PATA_NS87415 is not set
# CONFIG_PATA_OLDPIIX is not set
# CONFIG_PATA_OPTIDMA is not set
# CONFIG_PATA_PDC2027X is not set
# CONFIG_PATA_PDC_OLD is not set
# CONFIG_PATA_RADISYS is not set
# CONFIG_PATA_RDC is not set
# CONFIG_PATA_SC1200 is not set
# CONFIG_PATA_SCH is not set
# CONFIG_PATA_SERVERWORKS is not set
# CONFIG_PATA_SIL680 is not set
# CONFIG_PATA_SIS is not set
# CONFIG_PATA_TOSHIBA is not set
# CONFIG_PATA_TRIFLEX is not set
# CONFIG_PATA_VIA is not set
# CONFIG_PATA_WINBOND is not set

#
# PIO-only SFF controllers
#
# CONFIG_PATA_CMD640_PCI is not set
# CONFIG_PATA_MPIIX is not set
# CONFIG_PATA_NS87410 is not set
# CONFIG_PATA_OPTI is not set
# CONFIG_PATA_PLATFORM is not set
# CONFIG_PATA_RZ1000 is not set

#
# Generic fallback / legacy drivers
#
# CONFIG_ATA_GENERIC is not set
# CONFIG_PATA_LEGACY is not set
CONFIG_MD=y
# CONFIG_BLK_DEV_MD is not set
# CONFIG_BCACHE is not set
# CONFIG_BLK_DEV_DM is not set
# CONFIG_TARGET_CORE is not set
# CONFIG_FUSION is not set

#
# IEEE 1394 (FireWire) support
#
# CONFIG_FIREWIRE is not set
# CONFIG_FIREWIRE_NOSY is not set
# CONFIG_I2O is not set
CONFIG_NETDEVICES=y
CONFIG_MII=y
CONFIG_NET_CORE=y
# CONFIG_BONDING is not set
# CONFIG_DUMMY is not set
# CONFIG_EQUALIZER is not set
# CONFIG_NET_FC is not set
# CONFIG_NET_TEAM is not set
# CONFIG_MACVLAN is not set
# CONFIG_VXLAN is not set
# CONFIG_NETCONSOLE is not set
# CONFIG_NETPOLL is not set
# CONFIG_NET_POLL_CONTROLLER is not set
# CONFIG_TUN is not set
# CONFIG_VETH is not set
# CONFIG_VIRTIO_NET is not set
# CONFIG_NLMON is not set
# CONFIG_ARCNET is not set

#
# CAIF transport drivers
#

#
# Distributed Switch Architecture drivers
#
# CONFIG_NET_DSA_MV88E6XXX is not set
# CONFIG_NET_DSA_MV88E6060 is not set
# CONFIG_NET_DSA_MV88E6XXX_NEED_PPU is not set
# CONFIG_NET_DSA_MV88E6131 is not set
# CONFIG_NET_DSA_MV88E6123_61_65 is not set
CONFIG_ETHERNET=y
CONFIG_NET_VENDOR_3COM=y
# CONFIG_VORTEX is not set
# CONFIG_TYPHOON is not set
CONFIG_NET_VENDOR_ADAPTEC=y
# CONFIG_ADAPTEC_STARFIRE is not set
CONFIG_NET_VENDOR_ALTEON=y
# CONFIG_ACENIC is not set
CONFIG_NET_VENDOR_AMD=y
# CONFIG_AMD8111_ETH is not set
# CONFIG_PCNET32 is not set
CONFIG_NET_VENDOR_ARC=y
# CONFIG_ARC_EMAC is not set
CONFIG_NET_VENDOR_ATHEROS=y
# CONFIG_ATL2 is not set
# CONFIG_ATL1 is not set
# CONFIG_ATL1E is not set
# CONFIG_ATL1C is not set
# CONFIG_ALX is not set
CONFIG_NET_CADENCE=y
# CONFIG_ARM_AT91_ETHER is not set
# CONFIG_MACB is not set
CONFIG_NET_VENDOR_BROADCOM=y
# CONFIG_B44 is not set
# CONFIG_BNX2 is not set
# CONFIG_CNIC is not set
# CONFIG_TIGON3 is not set
# CONFIG_BNX2X is not set
CONFIG_NET_VENDOR_BROCADE=y
# CONFIG_BNA is not set
# CONFIG_NET_CALXEDA_XGMAC is not set
CONFIG_NET_VENDOR_CHELSIO=y
# CONFIG_CHELSIO_T1 is not set
# CONFIG_CHELSIO_T3 is not set
# CONFIG_CHELSIO_T4 is not set
# CONFIG_CHELSIO_T4VF is not set
CONFIG_NET_VENDOR_CIRRUS=y
# CONFIG_CS89x0 is not set
CONFIG_NET_VENDOR_CISCO=y
# CONFIG_ENIC is not set
# CONFIG_DM9000 is not set
# CONFIG_DNET is not set
CONFIG_NET_VENDOR_DEC=y
# CONFIG_NET_TULIP is not set
CONFIG_NET_VENDOR_DLINK=y
# CONFIG_DL2K is not set
# CONFIG_SUNDANCE is not set
CONFIG_NET_VENDOR_EMULEX=y
# CONFIG_BE2NET is not set
CONFIG_NET_VENDOR_EXAR=y
# CONFIG_S2IO is not set
# CONFIG_VXGE is not set
CONFIG_NET_VENDOR_FARADAY=y
# CONFIG_FTMAC100 is not set
# CONFIG_FTGMAC100 is not set
CONFIG_NET_VENDOR_HP=y
# CONFIG_HP100 is not set
CONFIG_NET_VENDOR_INTEL=y
# CONFIG_E100 is not set
# CONFIG_E1000 is not set
# CONFIG_E1000E is not set
# CONFIG_IGB is not set
# CONFIG_IGBVF is not set
# CONFIG_IXGB is not set
# CONFIG_IXGBE is not set
# CONFIG_I40E is not set
CONFIG_NET_VENDOR_I825XX=y
# CONFIG_IP1000 is not set
# CONFIG_JME is not set
CONFIG_NET_VENDOR_MARVELL=y
# CONFIG_MVMDIO is not set
# CONFIG_SKGE is not set
# CONFIG_SKY2 is not set
CONFIG_NET_VENDOR_MELLANOX=y
# CONFIG_MLX4_EN is not set
# CONFIG_MLX4_CORE is not set
# CONFIG_MLX5_CORE is not set
CONFIG_NET_VENDOR_MICREL=y
# CONFIG_KS8842 is not set
CONFIG_KS8851=y
CONFIG_KS8851_MLL=y
# CONFIG_KSZ884X_PCI is not set
CONFIG_NET_VENDOR_MICROCHIP=y
# CONFIG_ENC28J60 is not set
CONFIG_NET_VENDOR_MYRI=y
# CONFIG_MYRI10GE is not set
# CONFIG_FEALNX is not set
CONFIG_NET_VENDOR_NATSEMI=y
# CONFIG_NATSEMI is not set
# CONFIG_NS83820 is not set
CONFIG_NET_VENDOR_8390=y
# CONFIG_AX88796 is not set
# CONFIG_NE2K_PCI is not set
CONFIG_NET_VENDOR_NVIDIA=y
# CONFIG_FORCEDETH is not set
CONFIG_NET_VENDOR_OKI=y
# CONFIG_ETHOC is not set
CONFIG_NET_PACKET_ENGINE=y
# CONFIG_HAMACHI is not set
# CONFIG_YELLOWFIN is not set
CONFIG_NET_VENDOR_QLOGIC=y
# CONFIG_QLA3XXX is not set
# CONFIG_QLCNIC is not set
# CONFIG_QLGE is not set
# CONFIG_NETXEN_NIC is not set
CONFIG_NET_VENDOR_REALTEK=y
# CONFIG_8139CP is not set
# CONFIG_8139TOO is not set
# CONFIG_R8169 is not set
# CONFIG_SH_ETH is not set
CONFIG_NET_VENDOR_RDC=y
# CONFIG_R6040 is not set
CONFIG_NET_VENDOR_SEEQ=y
CONFIG_NET_VENDOR_SILAN=y
# CONFIG_SC92031 is not set
CONFIG_NET_VENDOR_SIS=y
# CONFIG_SIS900 is not set
# CONFIG_SIS190 is not set
# CONFIG_SFC is not set
CONFIG_NET_VENDOR_SMSC=y
CONFIG_SMC91X=y
# CONFIG_EPIC100 is not set
# CONFIG_SMC911X is not set
CONFIG_SMSC911X=y
# CONFIG_SMSC911X_ARCH_HOOKS is not set
# CONFIG_SMSC9420 is not set
CONFIG_NET_VENDOR_STMICRO=y
# CONFIG_STMMAC_ETH is not set
CONFIG_NET_VENDOR_SUN=y
# CONFIG_HAPPYMEAL is not set
# CONFIG_SUNGEM is not set
# CONFIG_CASSINI is not set
# CONFIG_NIU is not set
CONFIG_NET_VENDOR_TEHUTI=y
# CONFIG_TEHUTI is not set
CONFIG_NET_VENDOR_TI=y
CONFIG_TI_DAVINCI_MDIO=y
CONFIG_TI_DAVINCI_CPDMA=y
CONFIG_TI_CPSW_PHY_SEL=y
CONFIG_TI_CPSW=y
CONFIG_TI_CPTS=y
# CONFIG_TLAN is not set
CONFIG_NET_VENDOR_VIA=y
# CONFIG_VIA_RHINE is not set
# CONFIG_VIA_VELOCITY is not set
CONFIG_NET_VENDOR_WIZNET=y
# CONFIG_WIZNET_W5100 is not set
# CONFIG_WIZNET_W5300 is not set
# CONFIG_FDDI is not set
# CONFIG_HIPPI is not set
CONFIG_PHYLIB=y

#
# MII PHY device drivers
#
CONFIG_AT803X_PHY=y
# CONFIG_AMD_PHY is not set
# CONFIG_MARVELL_PHY is not set
# CONFIG_DAVICOM_PHY is not set
# CONFIG_QSEMI_PHY is not set
# CONFIG_LXT_PHY is not set
# CONFIG_CICADA_PHY is not set
# CONFIG_VITESSE_PHY is not set
CONFIG_SMSC_PHY=y
# CONFIG_BROADCOM_PHY is not set
# CONFIG_BCM87XX_PHY is not set
# CONFIG_ICPLUS_PHY is not set
# CONFIG_REALTEK_PHY is not set
# CONFIG_NATIONAL_PHY is not set
# CONFIG_STE10XP is not set
# CONFIG_LSI_ET1011C_PHY is not set
# CONFIG_MICREL_PHY is not set
# CONFIG_FIXED_PHY is not set
# CONFIG_MDIO_BITBANG is not set
# CONFIG_MDIO_BUS_MUX_GPIO is not set
# CONFIG_MDIO_BUS_MUX_MMIOREG is not set
# CONFIG_MICREL_KS8995MA is not set
# CONFIG_PPP is not set
# CONFIG_SLIP is not set

#
# USB Network Adapters
#
# CONFIG_USB_CATC is not set
# CONFIG_USB_KAWETH is not set
# CONFIG_USB_PEGASUS is not set
# CONFIG_USB_RTL8150 is not set
# CONFIG_USB_RTL8152 is not set
CONFIG_USB_USBNET=y
CONFIG_USB_NET_AX8817X=y
CONFIG_USB_NET_AX88179_178A=y
CONFIG_USB_NET_CDCETHER=y
# CONFIG_USB_NET_CDC_EEM is not set
CONFIG_USB_NET_CDC_NCM=y
# CONFIG_USB_NET_HUAWEI_CDC_NCM is not set
# CONFIG_USB_NET_CDC_MBIM is not set
# CONFIG_USB_NET_DM9601 is not set
# CONFIG_USB_NET_SR9700 is not set
# CONFIG_USB_NET_SR9800 is not set
# CONFIG_USB_NET_SMSC75XX is not set
CONFIG_USB_NET_SMSC95XX=y
# CONFIG_USB_NET_GL620A is not set
CONFIG_USB_NET_NET1080=y
# CONFIG_USB_NET_PLUSB is not set
# CONFIG_USB_NET_MCS7830 is not set
# CONFIG_USB_NET_RNDIS_HOST is not set
CONFIG_USB_NET_CDC_SUBSET=y
CONFIG_USB_ALI_M5632=y
CONFIG_USB_AN2720=y
CONFIG_USB_BELKIN=y
CONFIG_USB_ARMLINUX=y
CONFIG_USB_EPSON2888=y
CONFIG_USB_KC2190=y
CONFIG_USB_NET_ZAURUS=y
# CONFIG_USB_NET_CX82310_ETH is not set
# CONFIG_USB_NET_KALMIA is not set
# CONFIG_USB_NET_QMI_WWAN is not set
# CONFIG_USB_HSO is not set
# CONFIG_USB_NET_INT51X1 is not set
# CONFIG_USB_IPHETH is not set
# CONFIG_USB_SIERRA_NET is not set
# CONFIG_USB_VL600 is not set
CONFIG_WLAN=y
# CONFIG_ATMEL is not set
# CONFIG_PRISM54 is not set
# CONFIG_USB_ZD1201 is not set
# CONFIG_WIFI_CONTROL_FUNC is not set
# CONFIG_HOSTAP is not set
# CONFIG_WL_TI is not set

#
# Enable WiMAX (Networking options) to see the WiMAX drivers
#
# CONFIG_WAN is not set
CONFIG_XEN_NETDEV_FRONTEND=y
CONFIG_XEN_NETDEV_BACKEND=y
# CONFIG_VMXNET3 is not set
# CONFIG_ISDN is not set

#
# Input device support
#
CONFIG_INPUT=y
# CONFIG_INPUT_FF_MEMLESS is not set
CONFIG_INPUT_POLLDEV=m
# CONFIG_INPUT_SPARSEKMAP is not set
CONFIG_INPUT_MATRIXKMAP=m

#
# Userland interfaces
#
CONFIG_INPUT_MOUSEDEV=y
CONFIG_INPUT_MOUSEDEV_PSAUX=y
CONFIG_INPUT_MOUSEDEV_SCREEN_X=1024
CONFIG_INPUT_MOUSEDEV_SCREEN_Y=768
CONFIG_INPUT_JOYDEV=y
CONFIG_INPUT_EVDEV=y
# CONFIG_INPUT_EVBUG is not set
# CONFIG_INPUT_KEYRESET is not set
# CONFIG_INPUT_KEYCOMBO is not set

#
# Input Device Drivers
#
CONFIG_INPUT_KEYBOARD=y
# CONFIG_KEYBOARD_ADP5588 is not set
# CONFIG_KEYBOARD_ADP5589 is not set
CONFIG_KEYBOARD_ATKBD=y
# CONFIG_KEYBOARD_QT1070 is not set
# CONFIG_KEYBOARD_QT2160 is not set
# CONFIG_KEYBOARD_LKKBD is not set
CONFIG_KEYBOARD_GPIO=y
# CONFIG_KEYBOARD_TCA6416 is not set
# CONFIG_KEYBOARD_TCA8418 is not set
CONFIG_KEYBOARD_MATRIX=m
# CONFIG_KEYBOARD_LM8323 is not set
# CONFIG_KEYBOARD_LM8333 is not set
# CONFIG_KEYBOARD_MAX7359 is not set
# CONFIG_KEYBOARD_MCS is not set
# CONFIG_KEYBOARD_MPR121 is not set
# CONFIG_KEYBOARD_NEWTON is not set
# CONFIG_KEYBOARD_OPENCORES is not set
# CONFIG_KEYBOARD_SAMSUNG is not set
# CONFIG_KEYBOARD_STOWAWAY is not set
# CONFIG_KEYBOARD_SUNKBD is not set
# CONFIG_KEYBOARD_OMAP4 is not set
# CONFIG_KEYBOARD_XTKBD is not set
CONFIG_INPUT_MOUSE=y
CONFIG_MOUSE_PS2=y
CONFIG_MOUSE_PS2_ALPS=y
CONFIG_MOUSE_PS2_LOGIPS2PP=y
CONFIG_MOUSE_PS2_SYNAPTICS=y
CONFIG_MOUSE_PS2_CYPRESS=y
CONFIG_MOUSE_PS2_TRACKPOINT=y
# CONFIG_MOUSE_PS2_ELANTECH is not set
# CONFIG_MOUSE_PS2_SENTELIC is not set
# CONFIG_MOUSE_PS2_TOUCHKIT is not set
# CONFIG_MOUSE_SERIAL is not set
# CONFIG_MOUSE_APPLETOUCH is not set
# CONFIG_MOUSE_BCM5974 is not set
# CONFIG_MOUSE_CYAPA is not set
# CONFIG_MOUSE_VSXXXAA is not set
# CONFIG_MOUSE_GPIO is not set
# CONFIG_MOUSE_SYNAPTICS_I2C is not set
# CONFIG_MOUSE_SYNAPTICS_USB is not set
# CONFIG_INPUT_JOYSTICK is not set
# CONFIG_INPUT_TABLET is not set
CONFIG_INPUT_TOUCHSCREEN=y
CONFIG_TOUCHSCREEN_ADS7846=y
# CONFIG_TOUCHSCREEN_AD7877 is not set
# CONFIG_TOUCHSCREEN_AD7879 is not set
CONFIG_TOUCHSCREEN_ATMEL_MXT=y
# CONFIG_TOUCHSCREEN_AUO_PIXCIR is not set
# CONFIG_TOUCHSCREEN_BU21013 is not set
# CONFIG_TOUCHSCREEN_CY8CTMG110 is not set
# CONFIG_TOUCHSCREEN_CYTTSP_CORE is not set
# CONFIG_TOUCHSCREEN_CYTTSP4_CORE is not set
# CONFIG_TOUCHSCREEN_DYNAPRO is not set
# CONFIG_TOUCHSCREEN_HAMPSHIRE is not set
# CONFIG_TOUCHSCREEN_EETI is not set
# CONFIG_TOUCHSCREEN_EGALAX is not set
# CONFIG_TOUCHSCREEN_FUJITSU is not set
# CONFIG_TOUCHSCREEN_ILI210X is not set
# CONFIG_TOUCHSCREEN_GUNZE is not set
# CONFIG_TOUCHSCREEN_ELO is not set
# CONFIG_TOUCHSCREEN_WACOM_W8001 is not set
# CONFIG_TOUCHSCREEN_WACOM_I2C is not set
# CONFIG_TOUCHSCREEN_MAX11801 is not set
# CONFIG_TOUCHSCREEN_MCS5000 is not set
# CONFIG_TOUCHSCREEN_MMS114 is not set
# CONFIG_TOUCHSCREEN_MTOUCH is not set
# CONFIG_TOUCHSCREEN_INEXIO is not set
# CONFIG_TOUCHSCREEN_MK712 is not set
# CONFIG_TOUCHSCREEN_PENMOUNT is not set
# CONFIG_TOUCHSCREEN_EDT_FT5X06 is not set
# CONFIG_TOUCHSCREEN_TOUCHRIGHT is not set
# CONFIG_TOUCHSCREEN_TOUCHWIN is not set
CONFIG_TOUCHSCREEN_TI_AM335X_TSC=y
CONFIG_TOUCHSCREEN_PIXCIR=m
CONFIG_TOUCHSCREEN_LDC3001=y
# CONFIG_TOUCHSCREEN_USB_COMPOSITE is not set
# CONFIG_TOUCHSCREEN_TOUCHIT213 is not set
# CONFIG_TOUCHSCREEN_TSC_SERIO is not set
# CONFIG_TOUCHSCREEN_TSC2005 is not set
# CONFIG_TOUCHSCREEN_TSC2007 is not set
# CONFIG_TOUCHSCREEN_W90X900 is not set
# CONFIG_TOUCHSCREEN_ST1232 is not set
# CONFIG_TOUCHSCREEN_SUR40 is not set
# CONFIG_TOUCHSCREEN_TPS6507X is not set
# CONFIG_TOUCHSCREEN_ZFORCE is not set
CONFIG_INPUT_MISC=y
# CONFIG_INPUT_AD714X is not set
# CONFIG_INPUT_BMA150 is not set
# CONFIG_INPUT_MMA8450 is not set
# CONFIG_INPUT_MPU3050 is not set
# CONFIG_INPUT_GP2A is not set
# CONFIG_INPUT_GPIO_BEEPER is not set
# CONFIG_INPUT_GPIO_TILT_POLLED is not set
# CONFIG_INPUT_ATI_REMOTE2 is not set
# CONFIG_INPUT_KEYCHORD is not set
# CONFIG_INPUT_KEYSPAN_REMOTE is not set
# CONFIG_INPUT_KXTJ9 is not set
# CONFIG_INPUT_POWERMATE is not set
# CONFIG_INPUT_YEALINK is not set
# CONFIG_INPUT_CM109 is not set
# CONFIG_INPUT_TWL6040_VIBRA is not set
# CONFIG_INPUT_UINPUT is not set
# CONFIG_INPUT_GPIO is not set
CONFIG_INPUT_PALMAS_PWRBUTTON=y
# CONFIG_INPUT_PCF8574 is not set
# CONFIG_INPUT_GPIO_ROTARY_ENCODER is not set
# CONFIG_INPUT_ADXL34X is not set
# CONFIG_INPUT_IMS_PCU is not set
# CONFIG_INPUT_CMA3000 is not set
CONFIG_INPUT_XEN_KBDDEV_FRONTEND=y

#
# Hardware I/O ports
#
CONFIG_SERIO=y
CONFIG_SERIO_SERPORT=y
# CONFIG_SERIO_PCIPS2 is not set
CONFIG_SERIO_LIBPS2=y
# CONFIG_SERIO_RAW is not set
# CONFIG_SERIO_ALTERA_PS2 is not set
# CONFIG_SERIO_PS2MULT is not set
# CONFIG_SERIO_ARC_PS2 is not set
# CONFIG_SERIO_APBPS2 is not set
# CONFIG_SERIO_OLPC_APSP is not set
# CONFIG_GAMEPORT is not set

#
# Character devices
#
CONFIG_TTY=y
CONFIG_VT=y
CONFIG_CONSOLE_TRANSLATIONS=y
CONFIG_VT_CONSOLE=y
CONFIG_VT_CONSOLE_SLEEP=y
CONFIG_HW_CONSOLE=y
CONFIG_VT_HW_CONSOLE_BINDING=y
CONFIG_UNIX98_PTYS=y
# CONFIG_DEVPTS_MULTIPLE_INSTANCES is not set
# CONFIG_LEGACY_PTYS is not set
# CONFIG_SERIAL_NONSTANDARD is not set
# CONFIG_NOZOMI is not set
# CONFIG_N_GSM is not set
# CONFIG_TRACE_SINK is not set
CONFIG_DEVMEM=y
CONFIG_DEVKMEM=y

#
# Serial drivers
#
CONFIG_SERIAL_8250=y
CONFIG_SERIAL_8250_DEPRECATED_OPTIONS=y
CONFIG_SERIAL_8250_CONSOLE=y
CONFIG_SERIAL_8250_DMA=y
CONFIG_SERIAL_8250_PCI=y
CONFIG_SERIAL_8250_NR_UARTS=32
CONFIG_SERIAL_8250_RUNTIME_UARTS=4
CONFIG_SERIAL_8250_EXTENDED=y
CONFIG_SERIAL_8250_MANY_PORTS=y
CONFIG_SERIAL_8250_SHARE_IRQ=y
CONFIG_SERIAL_8250_DETECT_IRQ=y
CONFIG_SERIAL_8250_RSA=y
# CONFIG_SERIAL_8250_DW is not set
# CONFIG_SERIAL_8250_EM is not set
# CONFIG_SERIAL_8250_OMAP is not set

#
# Non-8250 serial port support
#
# CONFIG_SERIAL_MAX3100 is not set
# CONFIG_SERIAL_MAX310X is not set
# CONFIG_SERIAL_MFD_HSU is not set
# CONFIG_SERIAL_SH_SCI is not set
CONFIG_SERIAL_CORE=y
CONFIG_SERIAL_CORE_CONSOLE=y
# CONFIG_SERIAL_JSM is not set
CONFIG_SERIAL_OF_PLATFORM=y
CONFIG_SERIAL_OMAP=y
CONFIG_SERIAL_OMAP_CONSOLE=y
# CONFIG_SERIAL_SCCNXP is not set
# CONFIG_SERIAL_TIMBERDALE is not set
# CONFIG_SERIAL_ALTERA_JTAGUART is not set
# CONFIG_SERIAL_ALTERA_UART is not set
# CONFIG_SERIAL_IFX6X60 is not set
# CONFIG_SERIAL_PCH_UART is not set
# CONFIG_SERIAL_XILINX_PS_UART is not set
# CONFIG_SERIAL_ARC is not set
# CONFIG_SERIAL_RP2 is not set
# CONFIG_SERIAL_FSL_LPUART is not set
# CONFIG_SERIAL_ST_ASC is not set
# CONFIG_TTY_PRINTK is not set
CONFIG_HVC_DRIVER=y
CONFIG_HVC_IRQ=y
CONFIG_HVC_XEN=y
CONFIG_HVC_XEN_FRONTEND=y
# CONFIG_HVC_DCC is not set
# CONFIG_VIRTIO_CONSOLE is not set
# CONFIG_IPMI_HANDLER is not set
CONFIG_HW_RANDOM=y
# CONFIG_HW_RANDOM_TIMERIOMEM is not set
# CONFIG_HW_RANDOM_ATMEL is not set
CONFIG_HW_RANDOM_OMAP=y
# CONFIG_HW_RANDOM_VIRTIO is not set
# CONFIG_HW_RANDOM_EXYNOS is not set
# CONFIG_R3964 is not set
# CONFIG_APPLICOM is not set
# CONFIG_RAW_DRIVER is not set
# CONFIG_TCG_TPM is not set
CONFIG_DEVPORT=y
# CONFIG_DCC_TTY is not set
CONFIG_I2C=y
CONFIG_I2C_BOARDINFO=y
CONFIG_I2C_COMPAT=y
CONFIG_I2C_CHARDEV=y
# CONFIG_I2C_MUX is not set
CONFIG_I2C_HELPER_AUTO=y
CONFIG_I2C_ALGOBIT=y

#
# I2C Hardware Bus support
#

#
# PC SMBus host controller drivers
#
# CONFIG_I2C_ALI1535 is not set
# CONFIG_I2C_ALI1563 is not set
# CONFIG_I2C_ALI15X3 is not set
# CONFIG_I2C_AMD756 is not set
# CONFIG_I2C_AMD8111 is not set
# CONFIG_I2C_I801 is not set
# CONFIG_I2C_ISCH is not set
# CONFIG_I2C_PIIX4 is not set
# CONFIG_I2C_NFORCE2 is not set
# CONFIG_I2C_SIS5595 is not set
# CONFIG_I2C_SIS630 is not set
# CONFIG_I2C_SIS96X is not set
# CONFIG_I2C_VIA is not set
# CONFIG_I2C_VIAPRO is not set

#
# I2C system bus drivers (mostly embedded / system-on-chip)
#
# CONFIG_I2C_CBUS_GPIO is not set
# CONFIG_I2C_DESIGNWARE_PLATFORM is not set
# CONFIG_I2C_DESIGNWARE_PCI is not set
# CONFIG_I2C_EG20T is not set
# CONFIG_I2C_GPIO is not set
# CONFIG_I2C_OCORES is not set
CONFIG_I2C_OMAP=y
# CONFIG_I2C_PCA_PLATFORM is not set
# CONFIG_I2C_PXA_PCI is not set
# CONFIG_I2C_SIMTEC is not set
# CONFIG_I2C_XILINX is not set

#
# External I2C/SMBus adapter drivers
#
# CONFIG_I2C_DIOLAN_U2C is not set
# CONFIG_I2C_PARPORT_LIGHT is not set
# CONFIG_I2C_ROBOTFUZZ_OSIF is not set
# CONFIG_I2C_TAOS_EVM is not set
# CONFIG_I2C_TINY_USB is not set

#
# Other I2C/SMBus bus drivers
#
# CONFIG_I2C_STUB is not set
# CONFIG_I2C_DEBUG_CORE is not set
# CONFIG_I2C_DEBUG_ALGO is not set
# CONFIG_I2C_DEBUG_BUS is not set
CONFIG_SPI=y
# CONFIG_SPI_DEBUG is not set
CONFIG_SPI_MASTER=y

#
# SPI Master Controller Drivers
#
# CONFIG_SPI_ALTERA is not set
# CONFIG_SPI_BITBANG is not set
# CONFIG_SPI_GPIO is not set
# CONFIG_SPI_FSL_SPI is not set
# CONFIG_SPI_OC_TINY is not set
CONFIG_SPI_OMAP24XX=y
CONFIG_SPI_TI_QSPI=y
# CONFIG_SPI_PXA2XX is not set
# CONFIG_SPI_PXA2XX_PCI is not set
# CONFIG_SPI_SC18IS602 is not set
# CONFIG_SPI_TOPCLIFF_PCH is not set
# CONFIG_SPI_XCOMM is not set
# CONFIG_SPI_XILINX is not set
# CONFIG_SPI_DESIGNWARE is not set

#
# SPI Protocol Masters
#
CONFIG_SPI_SPIDEV=y
# CONFIG_SPI_TLE62X0 is not set
# CONFIG_HSI is not set

#
# PPS support
#
CONFIG_PPS=y
# CONFIG_PPS_DEBUG is not set

#
# PPS clients support
#
# CONFIG_PPS_CLIENT_KTIMER is not set
# CONFIG_PPS_CLIENT_LDISC is not set
# CONFIG_PPS_CLIENT_GPIO is not set

#
# PPS generators support
#

#
# PTP clock support
#
CONFIG_PTP_1588_CLOCK=y

#
# Enable PHYLIB and NETWORK_PHY_TIMESTAMPING to see the additional clocks.
#
CONFIG_PINCTRL=y

#
# Pin controllers
#
CONFIG_PINMUX=y
CONFIG_PINCONF=y
CONFIG_GENERIC_PINCONF=y
# CONFIG_DEBUG_PINCTRL is not set
# CONFIG_PINCTRL_CAPRI is not set
CONFIG_PINCTRL_TI_IODELAY=y
# CONFIG_PINCTRL_MSM8X74 is not set
CONFIG_PINCTRL_SINGLE=y
# CONFIG_PINCTRL_PALMAS is not set
CONFIG_ARCH_HAVE_CUSTOM_GPIO_H=y
CONFIG_ARCH_REQUIRE_GPIOLIB=y
CONFIG_GPIOLIB=y
CONFIG_GPIO_DEVRES=y
CONFIG_OF_GPIO=y
CONFIG_DEBUG_GPIO=y
CONFIG_GPIO_SYSFS=y

#
# Memory mapped GPIO drivers:
#
# CONFIG_GPIO_GENERIC_PLATFORM is not set
# CONFIG_GPIO_EM is not set
# CONFIG_GPIO_RCAR is not set
# CONFIG_GPIO_SCH311X is not set
# CONFIG_GPIO_TS5500 is not set
# CONFIG_GPIO_VX855 is not set
# CONFIG_GPIO_GRGPIO is not set

#
# I2C GPIO expanders:
#
# CONFIG_GPIO_MAX7300 is not set
# CONFIG_GPIO_MAX732X is not set
# CONFIG_GPIO_PCA953X_IRQ is not set
CONFIG_GPIO_PCF857X=y
# CONFIG_GPIO_SX150X is not set
# CONFIG_GPIO_TWL6040 is not set
# CONFIG_GPIO_ADP5588 is not set
# CONFIG_GPIO_ADNP is not set

#
# PCI GPIO expanders:
#
# CONFIG_GPIO_BT8XX is not set
# CONFIG_GPIO_AMD8111 is not set
# CONFIG_GPIO_ML_IOH is not set
# CONFIG_GPIO_RDC321X is not set

#
# SPI GPIO expanders:
#
# CONFIG_GPIO_MAX7301 is not set
# CONFIG_GPIO_MCP23S08 is not set
# CONFIG_GPIO_MC33880 is not set
# CONFIG_GPIO_74X164 is not set

#
# AC97 GPIO expanders:
#

#
# LPC GPIO expanders:
#

#
# MODULbus GPIO expanders:
#
CONFIG_GPIO_PALMAS=y
# CONFIG_GPIO_TPS65910 is not set
# CONFIG_GPIO_BCM_KONA is not set

#
# USB GPIO expanders:
#
CONFIG_W1=y
CONFIG_W1_CON=y

#
# 1-wire Bus Masters
#
# CONFIG_W1_MASTER_MATROX is not set
# CONFIG_W1_MASTER_DS2490 is not set
# CONFIG_W1_MASTER_DS2482 is not set
# CONFIG_W1_MASTER_DS1WM is not set
# CONFIG_W1_MASTER_GPIO is not set
# CONFIG_HDQ_MASTER_OMAP is not set

#
# 1-wire Slaves
#
# CONFIG_W1_SLAVE_THERM is not set
# CONFIG_W1_SLAVE_SMEM is not set
# CONFIG_W1_SLAVE_DS2408 is not set
# CONFIG_W1_SLAVE_DS2413 is not set
# CONFIG_W1_SLAVE_DS2423 is not set
# CONFIG_W1_SLAVE_DS2431 is not set
# CONFIG_W1_SLAVE_DS2433 is not set
# CONFIG_W1_SLAVE_DS2760 is not set
# CONFIG_W1_SLAVE_DS2780 is not set
# CONFIG_W1_SLAVE_DS2781 is not set
# CONFIG_W1_SLAVE_DS28E04 is not set
# CONFIG_W1_SLAVE_BQ27000 is not set
CONFIG_POWER_SUPPLY=y
# CONFIG_POWER_SUPPLY_DEBUG is not set
# CONFIG_PDA_POWER is not set
# CONFIG_GENERIC_ADC_BATTERY is not set
# CONFIG_TEST_POWER is not set
# CONFIG_BATTERY_DS2780 is not set
# CONFIG_BATTERY_DS2781 is not set
# CONFIG_BATTERY_DS2782 is not set
# CONFIG_BATTERY_SBS is not set
# CONFIG_BATTERY_BQ27x00 is not set
# CONFIG_BATTERY_MAX17040 is not set
# CONFIG_BATTERY_MAX17042 is not set
# CONFIG_CHARGER_ISP1704 is not set
# CONFIG_CHARGER_MAX8903 is not set
# CONFIG_CHARGER_LP8727 is not set
# CONFIG_CHARGER_GPIO is not set
# CONFIG_CHARGER_MANAGER is not set
# CONFIG_CHARGER_BQ2415X is not set
# CONFIG_CHARGER_BQ24190 is not set
# CONFIG_CHARGER_BQ24735 is not set
# CONFIG_CHARGER_SMB347 is not set
# CONFIG_POWER_RESET is not set
# CONFIG_POWER_RESET_RESTART is not set
CONFIG_POWER_AVS=y
CONFIG_VOLTAGE_DOMAIN=y

#
# Voltage Domain Framework Drivers
#
CONFIG_VOLTAGE_DOMAIN_OMAP=y
CONFIG_TI_COPROC=y
CONFIG_HWMON=y
# CONFIG_HWMON_VID is not set
# CONFIG_HWMON_DEBUG_CHIP is not set

#
# Native drivers
#
# CONFIG_SENSORS_AD7314 is not set
# CONFIG_SENSORS_AD7414 is not set
# CONFIG_SENSORS_AD7418 is not set
# CONFIG_SENSORS_ADCXX is not set
# CONFIG_SENSORS_ADM1021 is not set
# CONFIG_SENSORS_ADM1025 is not set
# CONFIG_SENSORS_ADM1026 is not set
# CONFIG_SENSORS_ADM1029 is not set
# CONFIG_SENSORS_ADM1031 is not set
# CONFIG_SENSORS_ADM9240 is not set
# CONFIG_SENSORS_ADT7310 is not set
# CONFIG_SENSORS_ADT7410 is not set
# CONFIG_SENSORS_ADT7411 is not set
# CONFIG_SENSORS_ADT7462 is not set
# CONFIG_SENSORS_ADT7470 is not set
# CONFIG_SENSORS_ADT7475 is not set
# CONFIG_SENSORS_ASC7621 is not set
# CONFIG_SENSORS_ATXP1 is not set
# CONFIG_SENSORS_DS620 is not set
# CONFIG_SENSORS_DS1621 is not set
# CONFIG_SENSORS_I5K_AMB is not set
# CONFIG_SENSORS_F71805F is not set
# CONFIG_SENSORS_F71882FG is not set
# CONFIG_SENSORS_F75375S is not set
# CONFIG_SENSORS_G760A is not set
# CONFIG_SENSORS_G762 is not set
# CONFIG_SENSORS_GL518SM is not set
# CONFIG_SENSORS_GL520SM is not set
CONFIG_SENSORS_GPIO_FAN=y
# CONFIG_SENSORS_HIH6130 is not set
# CONFIG_SENSORS_HTU21 is not set
# CONFIG_SENSORS_IIO_HWMON is not set
# CONFIG_SENSORS_IT87 is not set
# CONFIG_SENSORS_JC42 is not set
# CONFIG_SENSORS_LINEAGE is not set
# CONFIG_SENSORS_LM63 is not set
# CONFIG_SENSORS_LM70 is not set
# CONFIG_SENSORS_LM73 is not set
CONFIG_SENSORS_LM75=m
# CONFIG_SENSORS_LM77 is not set
# CONFIG_SENSORS_LM78 is not set
# CONFIG_SENSORS_LM80 is not set
# CONFIG_SENSORS_LM83 is not set
# CONFIG_SENSORS_LM85 is not set
# CONFIG_SENSORS_LM87 is not set
# CONFIG_SENSORS_LM90 is not set
# CONFIG_SENSORS_LM92 is not set
# CONFIG_SENSORS_LM93 is not set
# CONFIG_SENSORS_LTC4151 is not set
# CONFIG_SENSORS_LTC4215 is not set
# CONFIG_SENSORS_LTC4245 is not set
# CONFIG_SENSORS_LTC4261 is not set
# CONFIG_SENSORS_LM95234 is not set
# CONFIG_SENSORS_LM95241 is not set
# CONFIG_SENSORS_LM95245 is not set
# CONFIG_SENSORS_MAX1111 is not set
# CONFIG_SENSORS_MAX16065 is not set
# CONFIG_SENSORS_MAX1619 is not set
# CONFIG_SENSORS_MAX1668 is not set
# CONFIG_SENSORS_MAX197 is not set
# CONFIG_SENSORS_MAX6639 is not set
# CONFIG_SENSORS_MAX6642 is not set
# CONFIG_SENSORS_MAX6650 is not set
# CONFIG_SENSORS_MAX6697 is not set
# CONFIG_SENSORS_MCP3021 is not set
# CONFIG_SENSORS_NCT6775 is not set
# CONFIG_SENSORS_NTC_THERMISTOR is not set
# CONFIG_SENSORS_PC87360 is not set
# CONFIG_SENSORS_PC87427 is not set
# CONFIG_SENSORS_PCF8591 is not set
# CONFIG_PMBUS is not set
# CONFIG_SENSORS_SHT15 is not set
# CONFIG_SENSORS_SHT21 is not set
# CONFIG_SENSORS_SIS5595 is not set
# CONFIG_SENSORS_SMM665 is not set
# CONFIG_SENSORS_DME1737 is not set
# CONFIG_SENSORS_EMC1403 is not set
# CONFIG_SENSORS_EMC2103 is not set
# CONFIG_SENSORS_EMC6W201 is not set
# CONFIG_SENSORS_SMSC47M1 is not set
# CONFIG_SENSORS_SMSC47M192 is not set
# CONFIG_SENSORS_SMSC47B397 is not set
# CONFIG_SENSORS_SCH56XX_COMMON is not set
# CONFIG_SENSORS_SCH5627 is not set
# CONFIG_SENSORS_SCH5636 is not set
# CONFIG_SENSORS_ADS1015 is not set
# CONFIG_SENSORS_ADS7828 is not set
# CONFIG_SENSORS_ADS7871 is not set
# CONFIG_SENSORS_AMC6821 is not set
# CONFIG_SENSORS_INA209 is not set
# CONFIG_SENSORS_INA2XX is not set
# CONFIG_SENSORS_THMC50 is not set
CONFIG_SENSORS_TMP102=y
# CONFIG_SENSORS_TMP401 is not set
# CONFIG_SENSORS_TMP421 is not set
# CONFIG_SENSORS_VIA686A is not set
# CONFIG_SENSORS_VT1211 is not set
# CONFIG_SENSORS_VT8231 is not set
# CONFIG_SENSORS_W83781D is not set
# CONFIG_SENSORS_W83791D is not set
# CONFIG_SENSORS_W83792D is not set
# CONFIG_SENSORS_W83793 is not set
# CONFIG_SENSORS_W83795 is not set
# CONFIG_SENSORS_W83L785TS is not set
# CONFIG_SENSORS_W83L786NG is not set
# CONFIG_SENSORS_W83627HF is not set
# CONFIG_SENSORS_W83627EHF is not set
CONFIG_THERMAL=y
CONFIG_THERMAL_HWMON=y
CONFIG_THERMAL_OF=y
CONFIG_THERMAL_DEFAULT_GOV_STEP_WISE=y
# CONFIG_THERMAL_DEFAULT_GOV_FAIR_SHARE is not set
# CONFIG_THERMAL_DEFAULT_GOV_USER_SPACE is not set
CONFIG_THERMAL_GOV_FAIR_SHARE=y
CONFIG_THERMAL_GOV_STEP_WISE=y
CONFIG_THERMAL_GOV_USER_SPACE=y
CONFIG_CPU_THERMAL=y
# CONFIG_THERMAL_EMULATION is not set
# CONFIG_IMX_THERMAL is not set

#
# Texas Instruments thermal drivers
#
CONFIG_TI_SOC_THERMAL=y
CONFIG_TI_THERMAL=y
CONFIG_DRA752_THERMAL=y
CONFIG_WATCHDOG=y
CONFIG_WATCHDOG_CORE=y
# CONFIG_WATCHDOG_NOWAYOUT is not set

#
# Watchdog Device Drivers
#
# CONFIG_SOFT_WATCHDOG is not set
# CONFIG_GPIO_WATCHDOG is not set
# CONFIG_DW_WATCHDOG is not set
CONFIG_OMAP_WATCHDOG=y
# CONFIG_MAX63XX_WATCHDOG is not set
# CONFIG_ALIM7101_WDT is not set
# CONFIG_I6300ESB_WDT is not set
# CONFIG_MEN_A21_WDT is not set
# CONFIG_XEN_WDT is not set

#
# PCI-based Watchdog Cards
#
# CONFIG_PCIPCWATCHDOG is not set
# CONFIG_WDTPCI is not set

#
# USB-based Watchdog Cards
#
# CONFIG_USBPCWATCHDOG is not set
CONFIG_SSB_POSSIBLE=y

#
# Sonics Silicon Backplane
#
# CONFIG_SSB is not set
CONFIG_BCMA_POSSIBLE=y

#
# Broadcom specific AMBA
#
# CONFIG_BCMA is not set

#
# Multifunction device drivers
#
CONFIG_MFD_CORE=y
# CONFIG_MFD_AS3711 is not set
# CONFIG_MFD_AS3722 is not set
# CONFIG_PMIC_ADP5520 is not set
# CONFIG_MFD_AAT2870_CORE is not set
# CONFIG_MFD_CROS_EC is not set
# CONFIG_MFD_ASIC3 is not set
# CONFIG_PMIC_DA903X is not set
# CONFIG_MFD_DA9052_SPI is not set
# CONFIG_MFD_DA9052_I2C is not set
# CONFIG_MFD_DA9055 is not set
# CONFIG_MFD_DA9063 is not set
# CONFIG_MFD_MC13XXX_SPI is not set
# CONFIG_MFD_MC13XXX_I2C is not set
# CONFIG_HTC_EGPIO is not set
# CONFIG_HTC_PASIC3 is not set
# CONFIG_HTC_I2CPLD is not set
# CONFIG_LPC_ICH is not set
# CONFIG_LPC_SCH is not set
# CONFIG_MFD_JANZ_CMODIO is not set
# CONFIG_MFD_KEMPLD is not set
# CONFIG_MFD_88PM800 is not set
# CONFIG_MFD_88PM805 is not set
# CONFIG_MFD_88PM860X is not set
# CONFIG_MFD_MAX14577 is not set
# CONFIG_MFD_MAX77686 is not set
# CONFIG_MFD_MAX77693 is not set
# CONFIG_MFD_MAX8907 is not set
# CONFIG_MFD_MAX8925 is not set
# CONFIG_MFD_MAX8997 is not set
# CONFIG_MFD_MAX8998 is not set
# CONFIG_EZX_PCAP is not set
# CONFIG_MFD_VIPERBOARD is not set
# CONFIG_MFD_RETU is not set
# CONFIG_MFD_PCF50633 is not set
# CONFIG_MFD_RDC321X is not set
# CONFIG_MFD_RTSX_PCI is not set
# CONFIG_MFD_RC5T583 is not set
# CONFIG_MFD_SEC_CORE is not set
# CONFIG_MFD_SI476X_CORE is not set
# CONFIG_MFD_SM501 is not set
# CONFIG_MFD_SMSC is not set
# CONFIG_ABX500_CORE is not set
# CONFIG_MFD_STMPE is not set
CONFIG_MFD_SYSCON=y
CONFIG_MFD_TI_AM335X_TSCADC=y
# CONFIG_MFD_LP3943 is not set
# CONFIG_MFD_LP8788 is not set
CONFIG_MFD_OMAP_USB_HOST=y
CONFIG_MFD_PALMAS=y
# CONFIG_TPS6105X is not set
# CONFIG_TPS65010 is not set
# CONFIG_TPS6507X is not set
# CONFIG_MFD_TPS65090 is not set
CONFIG_MFD_TPS65217=y
CONFIG_MFD_TPS65218=y
# CONFIG_MFD_TPS6586X is not set
CONFIG_MFD_TPS65910=y
# CONFIG_MFD_TPS65912 is not set
# CONFIG_MFD_TPS65912_I2C is not set
# CONFIG_MFD_TPS65912_SPI is not set
# CONFIG_MFD_TPS80031 is not set
# CONFIG_TWL4030_CORE is not set
CONFIG_TWL6040_CORE=y
# CONFIG_MFD_WL1273_CORE is not set
# CONFIG_MFD_LM3533 is not set
# CONFIG_MFD_TIMBERDALE is not set
# CONFIG_MFD_TC3589X is not set
# CONFIG_MFD_TMIO is not set
# CONFIG_MFD_T7L66XB is not set
# CONFIG_MFD_TC6387XB is not set
# CONFIG_MFD_TC6393XB is not set
# CONFIG_MFD_VX855 is not set
# CONFIG_MFD_ARIZONA_I2C is not set
# CONFIG_MFD_ARIZONA_SPI is not set
# CONFIG_MFD_WM8400 is not set
# CONFIG_MFD_WM831X_I2C is not set
# CONFIG_MFD_WM831X_SPI is not set
# CONFIG_MFD_WM8350_I2C is not set
# CONFIG_MFD_WM8994 is not set
# CONFIG_VEXPRESS_CONFIG is not set
CONFIG_REGULATOR=y
# CONFIG_REGULATOR_DEBUG is not set
CONFIG_REGULATOR_FIXED_VOLTAGE=y
# CONFIG_REGULATOR_VIRTUAL_CONSUMER is not set
# CONFIG_REGULATOR_USERSPACE_CONSUMER is not set
# CONFIG_REGULATOR_ACT8865 is not set
# CONFIG_REGULATOR_AD5398 is not set
# CONFIG_REGULATOR_ANATOP is not set
# CONFIG_REGULATOR_DA9210 is not set
# CONFIG_REGULATOR_FAN53555 is not set
CONFIG_REGULATOR_GPIO=y
# CONFIG_REGULATOR_ISL6271A is not set
# CONFIG_REGULATOR_LP3971 is not set
# CONFIG_REGULATOR_LP3972 is not set
# CONFIG_REGULATOR_LP872X is not set
# CONFIG_REGULATOR_LP8755 is not set
# CONFIG_REGULATOR_MAX1586 is not set
# CONFIG_REGULATOR_MAX8649 is not set
# CONFIG_REGULATOR_MAX8660 is not set
# CONFIG_REGULATOR_MAX8952 is not set
# CONFIG_REGULATOR_MAX8973 is not set
CONFIG_REGULATOR_PALMAS=y
CONFIG_REGULATOR_PBIAS=y
# CONFIG_REGULATOR_PFUZE100 is not set
CONFIG_REGULATOR_TI_ABB=y
# CONFIG_REGULATOR_TPS51632 is not set
# CONFIG_REGULATOR_TPS62360 is not set
CONFIG_REGULATOR_TPS65023=y
CONFIG_REGULATOR_TPS6507X=y
CONFIG_REGULATOR_TPS65217=y
CONFIG_REGULATOR_TPS65218=y
# CONFIG_REGULATOR_TPS6524X is not set
CONFIG_REGULATOR_TPS65910=y
CONFIG_MEDIA_SUPPORT=y

#
# Multimedia core support
#
CONFIG_MEDIA_CAMERA_SUPPORT=y
# CONFIG_MEDIA_ANALOG_TV_SUPPORT is not set
# CONFIG_MEDIA_DIGITAL_TV_SUPPORT is not set
CONFIG_MEDIA_RADIO_SUPPORT=y
# CONFIG_MEDIA_RC_SUPPORT is not set
CONFIG_MEDIA_CONTROLLER=y
CONFIG_VIDEO_DEV=y
CONFIG_VIDEO_V4L2_SUBDEV_API=y
CONFIG_VIDEO_V4L2=y
# CONFIG_VIDEO_ADV_DEBUG is not set
# CONFIG_VIDEO_FIXED_MINOR_RANGES is not set
CONFIG_V4L2_MEM2MEM_DEV=m
CONFIG_VIDEOBUF2_CORE=m
CONFIG_VIDEOBUF2_MEMOPS=m
CONFIG_VIDEOBUF2_DMA_CONTIG=m
CONFIG_VIDEOBUF2_VMALLOC=m
# CONFIG_TTPCI_EEPROM is not set

#
# Media drivers
#
CONFIG_MEDIA_USB_SUPPORT=y

#
# Webcam devices
#
CONFIG_USB_VIDEO_CLASS=m
CONFIG_USB_VIDEO_CLASS_INPUT_EVDEV=y
CONFIG_USB_GSPCA=m
# CONFIG_USB_M5602 is not set
# CONFIG_USB_STV06XX is not set
# CONFIG_USB_GL860 is not set
# CONFIG_USB_GSPCA_BENQ is not set
# CONFIG_USB_GSPCA_CONEX is not set
# CONFIG_USB_GSPCA_CPIA1 is not set
# CONFIG_USB_GSPCA_ETOMS is not set
# CONFIG_USB_GSPCA_FINEPIX is not set
# CONFIG_USB_GSPCA_JEILINJ is not set
# CONFIG_USB_GSPCA_JL2005BCD is not set
# CONFIG_USB_GSPCA_KINECT is not set
# CONFIG_USB_GSPCA_KONICA is not set
# CONFIG_USB_GSPCA_MARS is not set
# CONFIG_USB_GSPCA_MR97310A is not set
# CONFIG_USB_GSPCA_NW80X is not set
# CONFIG_USB_GSPCA_OV519 is not set
# CONFIG_USB_GSPCA_OV534 is not set
# CONFIG_USB_GSPCA_OV534_9 is not set
# CONFIG_USB_GSPCA_PAC207 is not set
# CONFIG_USB_GSPCA_PAC7302 is not set
# CONFIG_USB_GSPCA_PAC7311 is not set
# CONFIG_USB_GSPCA_SE401 is not set
# CONFIG_USB_GSPCA_SN9C2028 is not set
# CONFIG_USB_GSPCA_SN9C20X is not set
# CONFIG_USB_GSPCA_SONIXB is not set
# CONFIG_USB_GSPCA_SONIXJ is not set
# CONFIG_USB_GSPCA_SPCA500 is not set
# CONFIG_USB_GSPCA_SPCA501 is not set
# CONFIG_USB_GSPCA_SPCA505 is not set
# CONFIG_USB_GSPCA_SPCA506 is not set
# CONFIG_USB_GSPCA_SPCA508 is not set
# CONFIG_USB_GSPCA_SPCA561 is not set
# CONFIG_USB_GSPCA_SPCA1528 is not set
# CONFIG_USB_GSPCA_SQ905 is not set
# CONFIG_USB_GSPCA_SQ905C is not set
# CONFIG_USB_GSPCA_SQ930X is not set
# CONFIG_USB_GSPCA_STK014 is not set
# CONFIG_USB_GSPCA_STK1135 is not set
# CONFIG_USB_GSPCA_STV0680 is not set
# CONFIG_USB_GSPCA_SUNPLUS is not set
# CONFIG_USB_GSPCA_T613 is not set
# CONFIG_USB_GSPCA_TOPRO is not set
# CONFIG_USB_GSPCA_TV8532 is not set
# CONFIG_USB_GSPCA_VC032X is not set
# CONFIG_USB_GSPCA_VICAM is not set
# CONFIG_USB_GSPCA_XIRLINK_CIT is not set
# CONFIG_USB_GSPCA_ZC3XX is not set
# CONFIG_USB_PWC is not set
# CONFIG_VIDEO_CPIA2 is not set
# CONFIG_USB_ZR364XX is not set
# CONFIG_USB_STKWEBCAM is not set
# CONFIG_USB_S2255 is not set
# CONFIG_VIDEO_USBTV is not set

#
# Webcam, TV (analog/digital) USB devices
#
# CONFIG_VIDEO_EM28XX is not set
# CONFIG_MEDIA_PCI_SUPPORT is not set
CONFIG_V4L_PLATFORM_DRIVERS=y
# CONFIG_VIDEO_CAFE_CCIC is not set
# CONFIG_VIDEO_TIMBERDALE is not set
# CONFIG_SOC_CAMERA is not set
CONFIG_VIDEO_TI_VIP=m
CONFIG_V4L_MEM2MEM_DRIVERS=y
# CONFIG_VIDEO_MEM2MEM_DEINTERLACE is not set
# CONFIG_VIDEO_SH_VEU is not set
# CONFIG_VIDEO_RENESAS_VSP1 is not set
CONFIG_VIDEO_TI_VPE=m
# CONFIG_VIDEO_TI_VPE_DEBUG is not set
CONFIG_VIDEO_TI_VPDMA_HELPER=m
# CONFIG_VIDEO_TI_VPDMA_LOAD_FW is not set
# CONFIG_V4L_TEST_DRIVERS is not set

#
# Supported MMC/SDIO adapters
#
CONFIG_RADIO_ADAPTERS=y
# CONFIG_RADIO_SI470X is not set
CONFIG_DRA7XX_RADIO_HELPER=y
# CONFIG_RADIO_SI4713 is not set
# CONFIG_USB_MR800 is not set
# CONFIG_USB_DSBR is not set
# CONFIG_RADIO_MAXIRADIO is not set
# CONFIG_RADIO_SHARK is not set
# CONFIG_RADIO_SHARK2 is not set
# CONFIG_USB_KEENE is not set
# CONFIG_USB_RAREMONO is not set
# CONFIG_USB_MA901 is not set
# CONFIG_RADIO_TEA5764 is not set
# CONFIG_RADIO_SAA7706H is not set
# CONFIG_RADIO_TEF6862 is not set
# CONFIG_RADIO_WL1273 is not set

#
# Texas Instruments WL128x FM driver (ST based)
#
# CONFIG_RADIO_WL128X is not set
# CONFIG_CYPRESS_FIRMWARE is not set

#
# Media ancillary drivers (tuners, sensors, i2c, frontends)
#
# CONFIG_MEDIA_SUBDRV_AUTOSELECT is not set
CONFIG_MEDIA_ATTACH=y

#
# Encoders, decoders, sensors and other helper chips
#

#
# Audio decoders, processors and mixers
#
# CONFIG_VIDEO_TVAUDIO is not set
# CONFIG_VIDEO_TDA7432 is not set
# CONFIG_VIDEO_TDA9840 is not set
# CONFIG_VIDEO_TEA6415C is not set
# CONFIG_VIDEO_TEA6420 is not set
# CONFIG_VIDEO_MSP3400 is not set
# CONFIG_VIDEO_CS5345 is not set
# CONFIG_VIDEO_CS53L32A is not set
# CONFIG_VIDEO_TLV320AIC23B is not set
# CONFIG_VIDEO_UDA1342 is not set
# CONFIG_VIDEO_WM8775 is not set
# CONFIG_VIDEO_WM8739 is not set
# CONFIG_VIDEO_VP27SMPX is not set
# CONFIG_VIDEO_SONY_BTF_MPX is not set

#
# RDS decoders
#
# CONFIG_VIDEO_SAA6588 is not set

#
# Video decoders
#
# CONFIG_VIDEO_ADV7180 is not set
# CONFIG_VIDEO_ADV7183 is not set
# CONFIG_VIDEO_ADV7604 is not set
# CONFIG_VIDEO_ADV7842 is not set
# CONFIG_VIDEO_BT819 is not set
# CONFIG_VIDEO_BT856 is not set
# CONFIG_VIDEO_BT866 is not set
# CONFIG_VIDEO_KS0127 is not set
# CONFIG_VIDEO_ML86V7667 is not set
# CONFIG_VIDEO_SAA7110 is not set
# CONFIG_VIDEO_SAA711X is not set
# CONFIG_VIDEO_SAA7191 is not set
# CONFIG_VIDEO_TVP514X is not set
# CONFIG_VIDEO_TVP5150 is not set
# CONFIG_VIDEO_TVP7002 is not set
# CONFIG_VIDEO_TW2804 is not set
# CONFIG_VIDEO_TW9903 is not set
# CONFIG_VIDEO_TW9906 is not set
# CONFIG_VIDEO_VPX3220 is not set

#
# Video and audio decoders
#
# CONFIG_VIDEO_SAA717X is not set
# CONFIG_VIDEO_CX25840 is not set

#
# Video encoders
#
# CONFIG_VIDEO_SAA7127 is not set
# CONFIG_VIDEO_SAA7185 is not set
# CONFIG_VIDEO_ADV7170 is not set
# CONFIG_VIDEO_ADV7175 is not set
# CONFIG_VIDEO_ADV7343 is not set
# CONFIG_VIDEO_ADV7393 is not set
# CONFIG_VIDEO_ADV7511 is not set
# CONFIG_VIDEO_AD9389B is not set
# CONFIG_VIDEO_AK881X is not set
# CONFIG_VIDEO_THS8200 is not set

#
# Camera sensor devices
#
CONFIG_VIDEO_OV2659=m
# CONFIG_VIDEO_OV7640 is not set
# CONFIG_VIDEO_OV7670 is not set
# CONFIG_VIDEO_OV9650 is not set
# CONFIG_VIDEO_VS6624 is not set
# CONFIG_VIDEO_MT9M032 is not set
# CONFIG_VIDEO_MT9P031 is not set
# CONFIG_VIDEO_MT9T001 is not set
# CONFIG_VIDEO_MT9V011 is not set
# CONFIG_VIDEO_MT9V032 is not set
# CONFIG_VIDEO_SR030PC30 is not set
# CONFIG_VIDEO_NOON010PC30 is not set
# CONFIG_VIDEO_M5MOLS is not set
# CONFIG_VIDEO_S5K6AA is not set
# CONFIG_VIDEO_S5K4ECGX is not set
# CONFIG_VIDEO_S5K5BAF is not set
# CONFIG_VIDEO_SMIAPP is not set
# CONFIG_VIDEO_S5C73M3 is not set

#
# Flash devices
#
# CONFIG_VIDEO_ADP1653 is not set
# CONFIG_VIDEO_AS3645A is not set
# CONFIG_VIDEO_LM3560 is not set

#
# Video improvement chips
#
# CONFIG_VIDEO_UPD64031A is not set
# CONFIG_VIDEO_UPD64083 is not set

#
# Audio/Video compression chips
#
# CONFIG_VIDEO_SAA6752HS is not set

#
# Miscellaneous helper chips
#
# CONFIG_VIDEO_THS7303 is not set
# CONFIG_VIDEO_M52790 is not set

#
# Sensors used on soc_camera driver
#
CONFIG_MEDIA_TUNER=y

#
# Customize TV tuners
#
CONFIG_MEDIA_TUNER_SIMPLE=m
CONFIG_MEDIA_TUNER_TDA8290=m
CONFIG_MEDIA_TUNER_TDA827X=m
CONFIG_MEDIA_TUNER_TDA18271=m
CONFIG_MEDIA_TUNER_TDA9887=m
CONFIG_MEDIA_TUNER_TEA5761=m
CONFIG_MEDIA_TUNER_TEA5767=m
CONFIG_MEDIA_TUNER_MT20XX=m
CONFIG_MEDIA_TUNER_MT2060=m
CONFIG_MEDIA_TUNER_MT2063=m
CONFIG_MEDIA_TUNER_MT2266=m
CONFIG_MEDIA_TUNER_MT2131=m
CONFIG_MEDIA_TUNER_QT1010=m
CONFIG_MEDIA_TUNER_XC2028=m
CONFIG_MEDIA_TUNER_XC5000=m
CONFIG_MEDIA_TUNER_XC4000=m
CONFIG_MEDIA_TUNER_MXL5005S=m
CONFIG_MEDIA_TUNER_MXL5007T=m
CONFIG_MEDIA_TUNER_MC44S803=m
CONFIG_MEDIA_TUNER_MAX2165=m
CONFIG_MEDIA_TUNER_TDA18218=m
CONFIG_MEDIA_TUNER_FC0011=m
CONFIG_MEDIA_TUNER_FC0012=m
CONFIG_MEDIA_TUNER_FC0013=m
CONFIG_MEDIA_TUNER_TDA18212=m
CONFIG_MEDIA_TUNER_E4000=m
CONFIG_MEDIA_TUNER_FC2580=m
CONFIG_MEDIA_TUNER_M88TS2022=m
CONFIG_MEDIA_TUNER_TUA9001=m
CONFIG_MEDIA_TUNER_IT913X=m
CONFIG_MEDIA_TUNER_R820T=m

#
# Customise DVB Frontends
#
CONFIG_DVB_AU8522=m
CONFIG_DVB_AU8522_V4L=m
CONFIG_DVB_TUNER_DIB0070=m
CONFIG_DVB_TUNER_DIB0090=m

#
# Tools to develop new frontends
#
# CONFIG_DVB_DUMMY_FE is not set

#
# Graphics support
#
CONFIG_VGA_ARB=y
CONFIG_VGA_ARB_MAX_GPUS=16

#
# Direct Rendering Manager
#
CONFIG_DRM=y
CONFIG_DRM_KMS_HELPER=y
CONFIG_DRM_KMS_FB_HELPER=y
# CONFIG_DRM_LOAD_EDID_FIRMWARE is not set
CONFIG_DRM_GEM_CMA_HELPER=y
CONFIG_DRM_KMS_CMA_HELPER=y

#
# I2C encoder or helper chips
#
# CONFIG_DRM_I2C_CH7006 is not set
# CONFIG_DRM_I2C_SIL164 is not set
CONFIG_DRM_I2C_NXP_TDA998X=y
# CONFIG_DRM_TDFX is not set
# CONFIG_DRM_R128 is not set
# CONFIG_DRM_RADEON is not set
# CONFIG_DRM_NOUVEAU is not set
# CONFIG_DRM_MGA is not set
# CONFIG_DRM_VIA is not set
# CONFIG_DRM_SAVAGE is not set
# CONFIG_DRM_EXYNOS is not set
# CONFIG_DRM_VMWGFX is not set
# CONFIG_DRM_UDL is not set
# CONFIG_DRM_AST is not set
# CONFIG_DRM_MGAG200 is not set
# CONFIG_DRM_CIRRUS_QEMU is not set
# CONFIG_DRM_ARMADA is not set
# CONFIG_DRM_RCAR_DU is not set
# CONFIG_DRM_SHMOBILE is not set
CONFIG_DRM_OMAP=y
CONFIG_DRM_OMAP_NUM_CRTCS=2
CONFIG_DRM_TILCDC=y
# CONFIG_DRM_QXL is not set
# CONFIG_DRM_BOCHS is not set

#
# Frame buffer Devices
#
CONFIG_FB=y
CONFIG_FIRMWARE_EDID=y
# CONFIG_FB_DDC is not set
# CONFIG_FB_BOOT_VESA_SUPPORT is not set
# CONFIG_FB_CFB_FILLRECT is not set
# CONFIG_FB_CFB_COPYAREA is not set
# CONFIG_FB_CFB_IMAGEBLIT is not set
# CONFIG_FB_CFB_REV_PIXELS_IN_BYTE is not set
CONFIG_FB_SYS_FILLRECT=y
CONFIG_FB_SYS_COPYAREA=y
CONFIG_FB_SYS_IMAGEBLIT=y
# CONFIG_FB_FOREIGN_ENDIAN is not set
CONFIG_FB_SYS_FOPS=y
CONFIG_FB_DEFERRED_IO=y
# CONFIG_FB_SVGALIB is not set
# CONFIG_FB_MACMODES is not set
# CONFIG_FB_BACKLIGHT is not set
CONFIG_FB_MODE_HELPERS=y
CONFIG_FB_TILEBLITTING=y

#
# Frame buffer hardware drivers
#
# CONFIG_FB_CIRRUS is not set
# CONFIG_FB_PM2 is not set
# CONFIG_FB_CYBER2000 is not set
# CONFIG_FB_ASILIANT is not set
# CONFIG_FB_IMSTT is not set
# CONFIG_FB_UVESA is not set
# CONFIG_FB_OPENCORES is not set
# CONFIG_FB_S1D13XXX is not set
# CONFIG_FB_NVIDIA is not set
# CONFIG_FB_RIVA is not set
# CONFIG_FB_I740 is not set
# CONFIG_FB_MATROX is not set
# CONFIG_FB_RADEON is not set
# CONFIG_FB_ATY128 is not set
# CONFIG_FB_ATY is not set
# CONFIG_FB_S3 is not set
# CONFIG_FB_SAVAGE is not set
# CONFIG_FB_SIS is not set
# CONFIG_FB_NEOMAGIC is not set
# CONFIG_FB_KYRO is not set
# CONFIG_FB_3DFX is not set
# CONFIG_FB_VOODOO1 is not set
# CONFIG_FB_VT8623 is not set
# CONFIG_FB_TRIDENT is not set
# CONFIG_FB_ARK is not set
# CONFIG_FB_PM3 is not set
# CONFIG_FB_CARMINE is not set
# CONFIG_FB_TMIO is not set
# CONFIG_FB_SMSCUFX is not set
# CONFIG_FB_UDL is not set
# CONFIG_FB_GOLDFISH is not set
# CONFIG_FB_VIRTUAL is not set
CONFIG_XEN_FBDEV_FRONTEND=y
# CONFIG_FB_METRONOME is not set
# CONFIG_FB_MB862XX is not set
# CONFIG_FB_BROADSHEET is not set
# CONFIG_FB_AUO_K190X is not set
# CONFIG_FB_SIMPLE is not set
CONFIG_OMAP2_DSS_INIT=y
CONFIG_OMAP2_DSS=y
# CONFIG_OMAP2_DSS_DEBUG is not set
# CONFIG_OMAP2_DSS_DEBUGFS is not set
CONFIG_OMAP2_DSS_DPI=y
CONFIG_OMAP2_DSS_VENC=y
CONFIG_OMAP2_DSS_HDMI_COMMON=y
CONFIG_OMAP_DSS_HDMI_AUDIO=y
CONFIG_OMAP4_DSS_HDMI=y
CONFIG_OMAP4_DSS_HDMI_AUDIO=y
CONFIG_OMAP5_DSS_HDMI=y
CONFIG_OMAP5_DSS_HDMI_AUDIO=y
CONFIG_OMAP2_DSS_SDI=y
CONFIG_OMAP2_DSS_DSI=y
CONFIG_OMAP2_DSS_MIN_FCK_PER_PCK=0
CONFIG_OMAP2_DSS_SLEEP_AFTER_VENC_RESET=y

#
# OMAP Display Device Drivers (new device model)
#
CONFIG_DISPLAY_ENCODER_TFP410=m
CONFIG_DISPLAY_ENCODER_TPD12S015=y
CONFIG_DISPLAY_DRA7EVM_ENCODER_TPD12S015=y
CONFIG_DISPLAY_ENCODER_SII9022=y
CONFIG_DISPLAY_ENCODER_SII9022_AUDIO_CODEC=y
CONFIG_DISPLAY_CONNECTOR_DVI=m
CONFIG_DISPLAY_CONNECTOR_HDMI=y
# CONFIG_DISPLAY_CONNECTOR_ANALOG_TV is not set
CONFIG_DISPLAY_PANEL_DPI=y
# CONFIG_DISPLAY_PANEL_DSI_CM is not set
# CONFIG_DISPLAY_PANEL_SONY_ACX565AKM is not set
# CONFIG_DISPLAY_PANEL_LGPHILIPS_LB035Q02 is not set
# CONFIG_DISPLAY_PANEL_SHARP_LS037V7DW01 is not set
# CONFIG_DISPLAY_PANEL_TPO_TD028TTEC1 is not set
# CONFIG_DISPLAY_PANEL_TPO_TD043MTEA1 is not set
# CONFIG_DISPLAY_PANEL_NEC_NL8048HL11 is not set
CONFIG_DISPLAY_PANEL_TLC59108=y
# CONFIG_EXYNOS_VIDEO is not set
# CONFIG_FB_SSD1307 is not set
CONFIG_BACKLIGHT_LCD_SUPPORT=y
CONFIG_LCD_CLASS_DEVICE=y
# CONFIG_LCD_L4F00242T03 is not set
# CONFIG_LCD_LMS283GF05 is not set
# CONFIG_LCD_LTV350QV is not set
# CONFIG_LCD_ILI922X is not set
# CONFIG_LCD_ILI9320 is not set
# CONFIG_LCD_TDO24M is not set
# CONFIG_LCD_VGG2432A4 is not set
CONFIG_LCD_PLATFORM=y
# CONFIG_LCD_S6E63M0 is not set
# CONFIG_LCD_LD9040 is not set
# CONFIG_LCD_AMS369FG06 is not set
# CONFIG_LCD_LMS501KF03 is not set
# CONFIG_LCD_HX8357 is not set
CONFIG_BACKLIGHT_CLASS_DEVICE=y
CONFIG_BACKLIGHT_GENERIC=y
CONFIG_BACKLIGHT_PWM=y
# CONFIG_BACKLIGHT_ADP8860 is not set
# CONFIG_BACKLIGHT_ADP8870 is not set
# CONFIG_BACKLIGHT_LM3630A is not set
# CONFIG_BACKLIGHT_LM3639 is not set
# CONFIG_BACKLIGHT_LP855X is not set
# CONFIG_BACKLIGHT_TPS65217 is not set
CONFIG_BACKLIGHT_GPIO=y
# CONFIG_BACKLIGHT_LV5207LP is not set
# CONFIG_BACKLIGHT_BD6107 is not set
# CONFIG_VGASTATE is not set
# CONFIG_VIDEO_OUTPUT_CONTROL is not set
CONFIG_VIDEOMODE_HELPERS=y
CONFIG_HDMI=y

#
# Console display driver support
#
CONFIG_DUMMY_CONSOLE=y
CONFIG_FRAMEBUFFER_CONSOLE=y
CONFIG_FRAMEBUFFER_CONSOLE_DETECT_PRIMARY=y
CONFIG_FRAMEBUFFER_CONSOLE_ROTATION=y
CONFIG_LOGO=y
CONFIG_LOGO_LINUX_MONO=y
CONFIG_LOGO_LINUX_VGA16=y
CONFIG_LOGO_LINUX_CLUT224=y
CONFIG_SOUND=y
CONFIG_SOUND_OSS_CORE=y
CONFIG_SOUND_OSS_CORE_PRECLAIM=y
CONFIG_SND=y
CONFIG_SND_TIMER=y
CONFIG_SND_PCM=y
CONFIG_SND_DMAENGINE_PCM=y
CONFIG_SND_HWDEP=m
CONFIG_SND_RAWMIDI=m
CONFIG_SND_COMPRESS_OFFLOAD=y
CONFIG_SND_JACK=y
# CONFIG_SND_SEQUENCER is not set
CONFIG_SND_OSSEMUL=y
CONFIG_SND_MIXER_OSS=m
CONFIG_SND_PCM_OSS=m
CONFIG_SND_PCM_OSS_PLUGINS=y
# CONFIG_SND_HRTIMER is not set
# CONFIG_SND_DYNAMIC_MINORS is not set
CONFIG_SND_SUPPORT_OLD_API=y
CONFIG_SND_VERBOSE_PROCFS=y
CONFIG_SND_VERBOSE_PRINTK=y
CONFIG_SND_DEBUG=y
# CONFIG_SND_DEBUG_VERBOSE is not set
# CONFIG_SND_PCM_XRUN_DEBUG is not set
# CONFIG_SND_RAWMIDI_SEQ is not set
# CONFIG_SND_OPL3_LIB_SEQ is not set
# CONFIG_SND_OPL4_LIB_SEQ is not set
# CONFIG_SND_SBAWE_SEQ is not set
# CONFIG_SND_EMU10K1_SEQ is not set
CONFIG_SND_DRIVERS=y
# CONFIG_SND_DUMMY is not set
# CONFIG_SND_ALOOP is not set
# CONFIG_SND_MTPAV is not set
# CONFIG_SND_SERIAL_U16550 is not set
# CONFIG_SND_MPU401 is not set
CONFIG_SND_PCI=y
# CONFIG_SND_AD1889 is not set
# CONFIG_SND_ALS300 is not set
# CONFIG_SND_ALI5451 is not set
# CONFIG_SND_ATIIXP is not set
# CONFIG_SND_ATIIXP_MODEM is not set
# CONFIG_SND_AU8810 is not set
# CONFIG_SND_AU8820 is not set
# CONFIG_SND_AU8830 is not set
# CONFIG_SND_AW2 is not set
# CONFIG_SND_AZT3328 is not set
# CONFIG_SND_BT87X is not set
# CONFIG_SND_CA0106 is not set
# CONFIG_SND_CMIPCI is not set
# CONFIG_SND_OXYGEN is not set
# CONFIG_SND_CS4281 is not set
# CONFIG_SND_CS46XX is not set
# CONFIG_SND_CS5535AUDIO is not set
# CONFIG_SND_CTXFI is not set
# CONFIG_SND_DARLA20 is not set
# CONFIG_SND_GINA20 is not set
# CONFIG_SND_LAYLA20 is not set
# CONFIG_SND_DARLA24 is not set
# CONFIG_SND_GINA24 is not set
# CONFIG_SND_LAYLA24 is not set
# CONFIG_SND_MONA is not set
# CONFIG_SND_MIA is not set
# CONFIG_SND_ECHO3G is not set
# CONFIG_SND_INDIGO is not set
# CONFIG_SND_INDIGOIO is not set
# CONFIG_SND_INDIGODJ is not set
# CONFIG_SND_INDIGOIOX is not set
# CONFIG_SND_INDIGODJX is not set
# CONFIG_SND_EMU10K1 is not set
# CONFIG_SND_EMU10K1X is not set
# CONFIG_SND_ENS1370 is not set
# CONFIG_SND_ENS1371 is not set
# CONFIG_SND_ES1938 is not set
# CONFIG_SND_ES1968 is not set
# CONFIG_SND_FM801 is not set
# CONFIG_SND_HDA_INTEL is not set
# CONFIG_SND_HDSP is not set
# CONFIG_SND_HDSPM is not set
# CONFIG_SND_ICE1712 is not set
# CONFIG_SND_ICE1724 is not set
# CONFIG_SND_INTEL8X0 is not set
# CONFIG_SND_INTEL8X0M is not set
# CONFIG_SND_KORG1212 is not set
# CONFIG_SND_LOLA is not set
# CONFIG_SND_LX6464ES is not set
# CONFIG_SND_MAESTRO3 is not set
# CONFIG_SND_MIXART is not set
# CONFIG_SND_NM256 is not set
# CONFIG_SND_PCXHR is not set
# CONFIG_SND_RIPTIDE is not set
# CONFIG_SND_RME32 is not set
# CONFIG_SND_RME96 is not set
# CONFIG_SND_RME9652 is not set
# CONFIG_SND_SONICVIBES is not set
# CONFIG_SND_TRIDENT is not set
# CONFIG_SND_VIA82XX is not set
# CONFIG_SND_VIA82XX_MODEM is not set
# CONFIG_SND_VIRTUOSO is not set
# CONFIG_SND_VX222 is not set
# CONFIG_SND_YMFPCI is not set
CONFIG_SND_ARM=y
CONFIG_SND_SPI=y
CONFIG_SND_USB=y
CONFIG_SND_USB_AUDIO=m
# CONFIG_SND_USB_UA101 is not set
# CONFIG_SND_USB_CAIAQ is not set
# CONFIG_SND_USB_6FIRE is not set
# CONFIG_SND_USB_HIFACE is not set
CONFIG_SND_SOC=y
# CONFIG_SND_ATMEL_SOC is not set
CONFIG_SND_DAVINCI_SOC_MCASP=y
CONFIG_SND_DAVINCI_SOC_GENERIC_EVM=y
# CONFIG_SND_DESIGNWARE_I2S is not set
CONFIG_SND_OMAP_SOC=y
CONFIG_SND_OMAP_SOC_HDMI_AUDIO=y
CONFIG_SND_OMAP_SOC_DRA7EVM=y
CONFIG_SND_SOC_I2C_AND_SPI=y

#
# CODEC drivers
#
# CONFIG_SND_SOC_ADAU1701 is not set
# CONFIG_SND_SOC_AK4104 is not set
# CONFIG_SND_SOC_AK4554 is not set
# CONFIG_SND_SOC_AK4642 is not set
# CONFIG_SND_SOC_AK5386 is not set
# CONFIG_SND_SOC_CS42L52 is not set
# CONFIG_SND_SOC_CS42L73 is not set
# CONFIG_SND_SOC_CS4270 is not set
# CONFIG_SND_SOC_CS4271 is not set
CONFIG_SND_SOC_HDMI_CODEC=y
# CONFIG_SND_SOC_PCM1681 is not set
# CONFIG_SND_SOC_PCM1792A is not set
# CONFIG_SND_SOC_SGTL5000 is not set
# CONFIG_SND_SOC_SPDIF is not set
# CONFIG_SND_SOC_TAS5086 is not set
CONFIG_SND_SOC_TLV320AIC31XX=y
CONFIG_SND_SOC_TLV320AIC3X=y
# CONFIG_SND_SOC_WM8510 is not set
# CONFIG_SND_SOC_WM8523 is not set
# CONFIG_SND_SOC_WM8580 is not set
# CONFIG_SND_SOC_WM8711 is not set
# CONFIG_SND_SOC_WM8728 is not set
# CONFIG_SND_SOC_WM8731 is not set
# CONFIG_SND_SOC_WM8737 is not set
# CONFIG_SND_SOC_WM8741 is not set
# CONFIG_SND_SOC_WM8750 is not set
# CONFIG_SND_SOC_WM8753 is not set
# CONFIG_SND_SOC_WM8770 is not set
# CONFIG_SND_SOC_WM8776 is not set
# CONFIG_SND_SOC_WM8804 is not set
# CONFIG_SND_SOC_WM8903 is not set
# CONFIG_SND_SOC_WM8962 is not set
# CONFIG_SND_SOC_TPA6130A2 is not set
CONFIG_SND_SIMPLE_CARD=y
# CONFIG_SOUND_PRIME is not set

#
# HID support
#
CONFIG_HID=y
# CONFIG_HID_BATTERY_STRENGTH is not set
# CONFIG_HIDRAW is not set
# CONFIG_UHID is not set
CONFIG_HID_GENERIC=y

#
# Special HID drivers
#
# CONFIG_HID_A4TECH is not set
# CONFIG_HID_ACRUX is not set
# CONFIG_HID_APPLE is not set
# CONFIG_HID_APPLEIR is not set
# CONFIG_HID_AUREAL is not set
# CONFIG_HID_BELKIN is not set
# CONFIG_HID_CHERRY is not set
# CONFIG_HID_CHICONY is not set
# CONFIG_HID_PRODIKEYS is not set
# CONFIG_HID_CYPRESS is not set
# CONFIG_HID_DRAGONRISE is not set
# CONFIG_HID_EMS_FF is not set
# CONFIG_HID_ELECOM is not set
# CONFIG_HID_ELO is not set
# CONFIG_HID_EZKEY is not set
# CONFIG_HID_HOLTEK is not set
# CONFIG_HID_HUION is not set
# CONFIG_HID_KEYTOUCH is not set
# CONFIG_HID_KYE is not set
# CONFIG_HID_UCLOGIC is not set
# CONFIG_HID_WALTOP is not set
# CONFIG_HID_GYRATION is not set
# CONFIG_HID_ICADE is not set
# CONFIG_HID_TWINHAN is not set
# CONFIG_HID_KENSINGTON is not set
# CONFIG_HID_LCPOWER is not set
# CONFIG_HID_LENOVO_TPKBD is not set
# CONFIG_HID_LOGITECH is not set
# CONFIG_HID_MAGICMOUSE is not set
# CONFIG_HID_MICROSOFT is not set
# CONFIG_HID_MONTEREY is not set
# CONFIG_HID_MULTITOUCH is not set
# CONFIG_HID_NTRIG is not set
# CONFIG_HID_ORTEK is not set
# CONFIG_HID_PANTHERLORD is not set
# CONFIG_HID_PETALYNX is not set
# CONFIG_HID_PICOLCD is not set
# CONFIG_HID_PRIMAX is not set
# CONFIG_HID_ROCCAT is not set
# CONFIG_HID_SAITEK is not set
# CONFIG_HID_SAMSUNG is not set
# CONFIG_HID_SONY is not set
# CONFIG_HID_SPEEDLINK is not set
# CONFIG_HID_STEELSERIES is not set
# CONFIG_HID_SUNPLUS is not set
# CONFIG_HID_GREENASIA is not set
# CONFIG_HID_SMARTJOYPLUS is not set
# CONFIG_HID_TIVO is not set
# CONFIG_HID_TOPSEED is not set
# CONFIG_HID_THINGM is not set
# CONFIG_HID_THRUSTMASTER is not set
# CONFIG_HID_WACOM is not set
# CONFIG_HID_WIIMOTE is not set
# CONFIG_HID_XINMO is not set
# CONFIG_HID_ZEROPLUS is not set
# CONFIG_HID_ZYDACRON is not set
# CONFIG_HID_SENSOR_HUB is not set

#
# USB HID support
#
CONFIG_USB_HID=y
# CONFIG_HID_PID is not set
# CONFIG_USB_HIDDEV is not set

#
# I2C HID support
#
# CONFIG_I2C_HID is not set
CONFIG_USB_OHCI_LITTLE_ENDIAN=y
CONFIG_USB_SUPPORT=y
CONFIG_USB_COMMON=y
CONFIG_DRD_LIB=y
CONFIG_USB_ARCH_HAS_HCD=y
CONFIG_USB=y
# CONFIG_USB_DEBUG is not set
CONFIG_USB_ANNOUNCE_NEW_DEVICES=y

#
# Miscellaneous USB options
#
CONFIG_USB_DEFAULT_PERSIST=y
# CONFIG_USB_DYNAMIC_MINORS is not set
# CONFIG_USB_OTG is not set
# CONFIG_USB_OTG_WHITELIST is not set
# CONFIG_USB_OTG_BLACKLIST_HUB is not set
CONFIG_USB_MON=y
# CONFIG_USB_WUSB_CBAF is not set

#
# USB Host Controller Drivers
#
# CONFIG_USB_C67X00_HCD is not set
CONFIG_USB_XHCI_HCD=m
CONFIG_USB_XHCI_PLATFORM=m
CONFIG_USB_EHCI_HCD=y
# CONFIG_USB_EHCI_ROOT_HUB_TT is not set
CONFIG_USB_EHCI_TT_NEWSCHED=y
CONFIG_USB_EHCI_PCI=y
CONFIG_USB_EHCI_HCD_OMAP=y
# CONFIG_USB_EHCI_HCD_PLATFORM is not set
# CONFIG_USB_OXU210HP_HCD is not set
# CONFIG_USB_ISP116X_HCD is not set
# CONFIG_USB_ISP1760_HCD is not set
# CONFIG_USB_ISP1362_HCD is not set
# CONFIG_USB_FUSBH200_HCD is not set
# CONFIG_USB_FOTG210_HCD is not set
# CONFIG_USB_OHCI_HCD is not set
# CONFIG_USB_UHCI_HCD is not set
# CONFIG_USB_SL811_HCD is not set
# CONFIG_USB_R8A66597_HCD is not set
# CONFIG_USB_HCD_TEST_MODE is not set
# CONFIG_USB_RENESAS_USBHS is not set

#
# USB Device Class drivers
#
CONFIG_USB_ACM=m
CONFIG_USB_PRINTER=m
CONFIG_USB_WDM=y
# CONFIG_USB_TMC is not set

#
# NOTE: USB_STORAGE depends on SCSI but BLK_DEV_SD may
#

#
# also be needed; see USB_STORAGE Help for more info
#
CONFIG_USB_STORAGE=y
# CONFIG_USB_STORAGE_DEBUG is not set
# CONFIG_USB_STORAGE_REALTEK is not set
# CONFIG_USB_STORAGE_DATAFAB is not set
# CONFIG_USB_STORAGE_FREECOM is not set
# CONFIG_USB_STORAGE_ISD200 is not set
# CONFIG_USB_STORAGE_USBAT is not set
# CONFIG_USB_STORAGE_SDDR09 is not set
# CONFIG_USB_STORAGE_SDDR55 is not set
# CONFIG_USB_STORAGE_JUMPSHOT is not set
# CONFIG_USB_STORAGE_ALAUDA is not set
# CONFIG_USB_STORAGE_ONETOUCH is not set
# CONFIG_USB_STORAGE_KARMA is not set
# CONFIG_USB_STORAGE_CYPRESS_ATACB is not set
# CONFIG_USB_STORAGE_ENE_UB6250 is not set

#
# USB Imaging devices
#
# CONFIG_USB_MDC800 is not set
# CONFIG_USB_MICROTEK is not set
CONFIG_USB_MUSB_HDRC=m
# CONFIG_USB_MUSB_HOST is not set
# CONFIG_USB_MUSB_GADGET is not set
CONFIG_USB_MUSB_DUAL_ROLE=y
# CONFIG_USB_MUSB_TUSB6010 is not set
CONFIG_USB_MUSB_OMAP2PLUS=m
# CONFIG_USB_MUSB_AM35X is not set
CONFIG_USB_MUSB_DSPS=m
# CONFIG_USB_MUSB_UX500 is not set
CONFIG_USB_MUSB_AM335X_CHILD=m
# CONFIG_USB_INVENTRA_DMA is not set
CONFIG_USB_TI_CPPI41_DMA=y
# CONFIG_MUSB_PIO_ONLY is not set
CONFIG_USB_DWC3=m
# CONFIG_USB_DWC3_HOST is not set
# CONFIG_USB_DWC3_GADGET is not set
CONFIG_USB_DWC3_DUAL_ROLE=y

#
# Platform Glue Driver Support
#
CONFIG_USB_DWC3_OMAP=m
CONFIG_USB_DWC3_PCI=m

#
# Debugging features
#
# CONFIG_USB_DWC3_DEBUG is not set
# CONFIG_DWC3_HOST_USB3_LPM_ENABLE is not set
# CONFIG_USB_DWC2 is not set
# CONFIG_USB_CHIPIDEA is not set

#
# USB port drivers
#
CONFIG_USB_SERIAL=m
# CONFIG_USB_SERIAL_GENERIC is not set
# CONFIG_USB_SERIAL_SIMPLE is not set
# CONFIG_USB_SERIAL_AIRCABLE is not set
# CONFIG_USB_SERIAL_ARK3116 is not set
# CONFIG_USB_SERIAL_BELKIN is not set
# CONFIG_USB_SERIAL_CH341 is not set
# CONFIG_USB_SERIAL_WHITEHEAT is not set
# CONFIG_USB_SERIAL_DIGI_ACCELEPORT is not set
# CONFIG_USB_SERIAL_CP210X is not set
# CONFIG_USB_SERIAL_CYPRESS_M8 is not set
# CONFIG_USB_SERIAL_EMPEG is not set
# CONFIG_USB_SERIAL_FTDI_SIO is not set
# CONFIG_USB_SERIAL_VISOR is not set
# CONFIG_USB_SERIAL_IPAQ is not set
# CONFIG_USB_SERIAL_IR is not set
# CONFIG_USB_SERIAL_EDGEPORT is not set
# CONFIG_USB_SERIAL_EDGEPORT_TI is not set
# CONFIG_USB_SERIAL_F81232 is not set
# CONFIG_USB_SERIAL_GARMIN is not set
# CONFIG_USB_SERIAL_IPW is not set
# CONFIG_USB_SERIAL_IUU is not set
# CONFIG_USB_SERIAL_KEYSPAN_PDA is not set
# CONFIG_USB_SERIAL_KEYSPAN is not set
# CONFIG_USB_SERIAL_KLSI is not set
# CONFIG_USB_SERIAL_KOBIL_SCT is not set
# CONFIG_USB_SERIAL_MCT_U232 is not set
# CONFIG_USB_SERIAL_METRO is not set
# CONFIG_USB_SERIAL_MOS7720 is not set
# CONFIG_USB_SERIAL_MOS7840 is not set
# CONFIG_USB_SERIAL_MXUPORT is not set
# CONFIG_USB_SERIAL_NAVMAN is not set
CONFIG_USB_SERIAL_PL2303=m
# CONFIG_USB_SERIAL_OTI6858 is not set
# CONFIG_USB_SERIAL_QCAUX is not set
# CONFIG_USB_SERIAL_QUALCOMM is not set
# CONFIG_USB_SERIAL_SPCP8X5 is not set
# CONFIG_USB_SERIAL_SAFE is not set
# CONFIG_USB_SERIAL_SIERRAWIRELESS is not set
# CONFIG_USB_SERIAL_SYMBOL is not set
# CONFIG_USB_SERIAL_TI is not set
# CONFIG_USB_SERIAL_CYBERJACK is not set
# CONFIG_USB_SERIAL_XIRCOM is not set
# CONFIG_USB_SERIAL_OPTION is not set
# CONFIG_USB_SERIAL_OMNINET is not set
# CONFIG_USB_SERIAL_OPTICON is not set
# CONFIG_USB_SERIAL_XSENS_MT is not set
# CONFIG_USB_SERIAL_WISHBONE is not set
# CONFIG_USB_SERIAL_ZTE is not set
# CONFIG_USB_SERIAL_SSU100 is not set
# CONFIG_USB_SERIAL_QT2 is not set
# CONFIG_USB_SERIAL_DEBUG is not set

#
# USB Miscellaneous drivers
#
# CONFIG_USB_EMI62 is not set
# CONFIG_USB_EMI26 is not set
# CONFIG_USB_ADUTUX is not set
# CONFIG_USB_SEVSEG is not set
# CONFIG_USB_RIO500 is not set
# CONFIG_USB_LEGOTOWER is not set
# CONFIG_USB_LCD is not set
# CONFIG_USB_LED is not set
# CONFIG_USB_CYPRESS_CY7C63 is not set
# CONFIG_USB_CYTHERM is not set
# CONFIG_USB_IDMOUSE is not set
# CONFIG_USB_FTDI_ELAN is not set
# CONFIG_USB_APPLEDISPLAY is not set
# CONFIG_USB_SISUSBVGA is not set
# CONFIG_USB_LD is not set
# CONFIG_USB_TRANCEVIBRATOR is not set
# CONFIG_USB_IOWARRIOR is not set
CONFIG_USB_TEST=m
# CONFIG_USB_EHSET_TEST_FIXTURE is not set
# CONFIG_USB_ISIGHTFW is not set
# CONFIG_USB_YUREX is not set
# CONFIG_USB_EZUSB_FX2 is not set
# CONFIG_USB_HSIC_USB3503 is not set

#
# USB Physical Layer drivers
#
CONFIG_USB_PHY=y
# CONFIG_USB_OTG_FSM is not set
# CONFIG_USB_OTG_WAKELOCK is not set
CONFIG_NOP_USB_XCEIV=y
CONFIG_AM335X_CONTROL_USB=y
CONFIG_AM335X_PHY_USB=y
# CONFIG_SAMSUNG_USB2PHY is not set
# CONFIG_SAMSUNG_USB3PHY is not set
# CONFIG_USB_GPIO_VBUS is not set
# CONFIG_USB_ISP1301 is not set
# CONFIG_USB_RCAR_PHY is not set
# CONFIG_USB_ULPI is not set
CONFIG_USB_GADGET=y
CONFIG_USB_GADGET_DEBUG=y
# CONFIG_USB_GADGET_VERBOSE is not set
CONFIG_USB_GADGET_DEBUG_FILES=y
CONFIG_USB_GADGET_DEBUG_FS=y
CONFIG_USB_GADGET_VBUS_DRAW=2
CONFIG_USB_GADGET_STORAGE_NUM_BUFFERS=2

#
# USB Peripheral Controller
#
# CONFIG_USB_FOTG210_UDC is not set
# CONFIG_USB_GR_UDC is not set
# CONFIG_USB_R8A66597 is not set
# CONFIG_USB_PXA27X is not set
# CONFIG_USB_S3C_HSOTG is not set
# CONFIG_USB_MV_UDC is not set
# CONFIG_USB_MV_U3D is not set
# CONFIG_USB_M66592 is not set
# CONFIG_USB_AMD5536UDC is not set
# CONFIG_USB_NET2272 is not set
# CONFIG_USB_NET2280 is not set
# CONFIG_USB_GOKU is not set
# CONFIG_USB_EG20T is not set
# CONFIG_USB_DUMMY_HCD is not set
CONFIG_USB_LIBCOMPOSITE=m
CONFIG_USB_F_ACM=m
CONFIG_USB_F_SS_LB=m
CONFIG_USB_U_SERIAL=m
CONFIG_USB_U_ETHER=m
CONFIG_USB_F_SERIAL=m
CONFIG_USB_F_OBEX=m
CONFIG_USB_F_NCM=m
CONFIG_USB_F_ECM=m
CONFIG_USB_F_SUBSET=m
CONFIG_USB_F_RNDIS=m
CONFIG_USB_F_MASS_STORAGE=m
CONFIG_USB_F_FS=m
# CONFIG_USB_CONFIGFS is not set
CONFIG_USB_ZERO=m
CONFIG_USB_AUDIO=m
# CONFIG_GADGET_UAC1 is not set
CONFIG_USB_ETH=m
CONFIG_USB_ETH_RNDIS=y
# CONFIG_USB_ETH_EEM is not set
CONFIG_USB_G_NCM=m
CONFIG_USB_GADGETFS=m
CONFIG_USB_FUNCTIONFS=m
CONFIG_USB_FUNCTIONFS_ETH=y
CONFIG_USB_FUNCTIONFS_RNDIS=y
CONFIG_USB_FUNCTIONFS_GENERIC=y
CONFIG_USB_MASS_STORAGE=m
CONFIG_USB_G_SERIAL=m
CONFIG_USB_MIDI_GADGET=m
CONFIG_USB_G_PRINTER=m
CONFIG_USB_CDC_COMPOSITE=m
CONFIG_USB_G_ACM_MS=m
CONFIG_USB_G_MULTI=m
CONFIG_USB_G_MULTI_RNDIS=y
CONFIG_USB_G_MULTI_CDC=y
CONFIG_USB_G_HID=m
CONFIG_USB_G_DBGP=m
# CONFIG_USB_G_DBGP_PRINTK is not set
CONFIG_USB_G_DBGP_SERIAL=y
CONFIG_USB_G_WEBCAM=m
# CONFIG_UWB is not set
CONFIG_MMC=y
# CONFIG_MMC_DEBUG is not set
CONFIG_MMC_UNSAFE_RESUME=y
# CONFIG_MMC_CLKGATE is not set
# CONFIG_MMC_EMBEDDED_SDIO is not set
# CONFIG_MMC_PARANOID_SD_INIT is not set

#
# MMC/SD/SDIO Card Drivers
#
CONFIG_MMC_BLOCK=y
CONFIG_MMC_BLOCK_MINORS=8
CONFIG_MMC_BLOCK_BOUNCE=y
# CONFIG_MMC_BLOCK_DEFERRED_RESUME is not set
CONFIG_SDIO_UART=y
# CONFIG_MMC_TEST is not set

#
# MMC/SD/SDIO Host Controller Drivers
#
# CONFIG_MMC_SDHCI is not set
# CONFIG_MMC_SDHCI_PXAV3 is not set
# CONFIG_MMC_SDHCI_PXAV2 is not set
CONFIG_MMC_OMAP=y
CONFIG_MMC_OMAP_HS=y
# CONFIG_MMC_TIFM_SD is not set
# CONFIG_MMC_CB710 is not set
# CONFIG_MMC_VIA_SDMMC is not set
# CONFIG_MMC_DW is not set
# CONFIG_MMC_VUB300 is not set
# CONFIG_MMC_USHC is not set
# CONFIG_MEMSTICK is not set
CONFIG_NEW_LEDS=y
CONFIG_LEDS_CLASS=y

#
# LED drivers
#
# CONFIG_LEDS_LM3530 is not set
# CONFIG_LEDS_LM3642 is not set
# CONFIG_LEDS_PCA9532 is not set
CONFIG_LEDS_GPIO=y
# CONFIG_LEDS_LP3944 is not set
# CONFIG_LEDS_LP5521 is not set
# CONFIG_LEDS_LP5523 is not set
# CONFIG_LEDS_LP5562 is not set
# CONFIG_LEDS_LP8501 is not set
# CONFIG_LEDS_PCA955X is not set
# CONFIG_LEDS_PCA963X is not set
# CONFIG_LEDS_PCA9685 is not set
# CONFIG_LEDS_DAC124S085 is not set
# CONFIG_LEDS_PWM is not set
# CONFIG_LEDS_REGULATOR is not set
# CONFIG_LEDS_BD2802 is not set
# CONFIG_LEDS_LT3593 is not set
# CONFIG_LEDS_TCA6507 is not set
# CONFIG_LEDS_LM355x is not set
# CONFIG_LEDS_OT200 is not set
# CONFIG_LEDS_BLINKM is not set

#
# LED Triggers
#
CONFIG_LEDS_TRIGGERS=y
CONFIG_LEDS_TRIGGER_TIMER=y
CONFIG_LEDS_TRIGGER_ONESHOT=y
CONFIG_LEDS_TRIGGER_HEARTBEAT=y
CONFIG_LEDS_TRIGGER_BACKLIGHT=y
CONFIG_LEDS_TRIGGER_CPU=y
CONFIG_LEDS_TRIGGER_GPIO=y
CONFIG_LEDS_TRIGGER_DEFAULT_ON=y

#
# iptables trigger is under Netfilter config (LED target)
#
CONFIG_LEDS_TRIGGER_TRANSIENT=y
CONFIG_LEDS_TRIGGER_CAMERA=y
# CONFIG_SWITCH is not set
# CONFIG_ACCESSIBILITY is not set
# CONFIG_INFINIBAND is not set
# CONFIG_EDAC is not set
CONFIG_RTC_LIB=y
CONFIG_RTC_CLASS=y
CONFIG_RTC_HCTOSYS=y
CONFIG_RTC_SYSTOHC=y
CONFIG_RTC_HCTOSYS_DEVICE="rtc0"
# CONFIG_RTC_DEBUG is not set

#
# RTC interfaces
#
CONFIG_RTC_INTF_SYSFS=y
CONFIG_RTC_INTF_PROC=y
CONFIG_RTC_INTF_DEV=y
# CONFIG_RTC_INTF_DEV_UIE_EMUL is not set
# CONFIG_RTC_DRV_TEST is not set

#
# I2C RTC drivers
#
CONFIG_RTC_DRV_DS1307=y
# CONFIG_RTC_DRV_DS1374 is not set
# CONFIG_RTC_DRV_DS1672 is not set
# CONFIG_RTC_DRV_DS3232 is not set
# CONFIG_RTC_DRV_HYM8563 is not set
# CONFIG_RTC_DRV_MAX6900 is not set
# CONFIG_RTC_DRV_RS5C372 is not set
# CONFIG_RTC_DRV_ISL1208 is not set
# CONFIG_RTC_DRV_ISL12022 is not set
# CONFIG_RTC_DRV_ISL12057 is not set
# CONFIG_RTC_DRV_X1205 is not set
CONFIG_RTC_DRV_PALMAS=y
# CONFIG_RTC_DRV_PCF2127 is not set
# CONFIG_RTC_DRV_PCF8523 is not set
# CONFIG_RTC_DRV_PCF8563 is not set
# CONFIG_RTC_DRV_PCF8583 is not set
# CONFIG_RTC_DRV_M41T80 is not set
# CONFIG_RTC_DRV_BQ32K is not set
# CONFIG_RTC_DRV_TPS65910 is not set
# CONFIG_RTC_DRV_S35390A is not set
# CONFIG_RTC_DRV_FM3130 is not set
# CONFIG_RTC_DRV_RX8581 is not set
# CONFIG_RTC_DRV_RX8025 is not set
# CONFIG_RTC_DRV_EM3027 is not set
# CONFIG_RTC_DRV_RV3029C2 is not set

#
# SPI RTC drivers
#
# CONFIG_RTC_DRV_M41T93 is not set
# CONFIG_RTC_DRV_M41T94 is not set
# CONFIG_RTC_DRV_DS1305 is not set
# CONFIG_RTC_DRV_DS1390 is not set
# CONFIG_RTC_DRV_MAX6902 is not set
# CONFIG_RTC_DRV_R9701 is not set
# CONFIG_RTC_DRV_RS5C348 is not set
# CONFIG_RTC_DRV_DS3234 is not set
# CONFIG_RTC_DRV_PCF2123 is not set
# CONFIG_RTC_DRV_RX4581 is not set

#
# Platform RTC drivers
#
# CONFIG_RTC_DRV_CMOS is not set
# CONFIG_RTC_DRV_DS1286 is not set
# CONFIG_RTC_DRV_DS1511 is not set
# CONFIG_RTC_DRV_DS1553 is not set
# CONFIG_RTC_DRV_DS1742 is not set
# CONFIG_RTC_DRV_STK17TA8 is not set
# CONFIG_RTC_DRV_M48T86 is not set
# CONFIG_RTC_DRV_M48T35 is not set
# CONFIG_RTC_DRV_M48T59 is not set
# CONFIG_RTC_DRV_MSM6242 is not set
# CONFIG_RTC_DRV_BQ4802 is not set
# CONFIG_RTC_DRV_RP5C01 is not set
# CONFIG_RTC_DRV_V3020 is not set
# CONFIG_RTC_DRV_DS2404 is not set

#
# on-CPU RTC drivers
#
CONFIG_RTC_DRV_OMAP=y
# CONFIG_RTC_DRV_SNVS is not set
# CONFIG_RTC_DRV_MOXART is not set

#
# HID Sensor RTC drivers
#
# CONFIG_RTC_DRV_HID_SENSOR_TIME is not set
CONFIG_DMADEVICES=y
# CONFIG_DMADEVICES_DEBUG is not set

#
# DMA Devices
#
# CONFIG_DW_DMAC_CORE is not set
# CONFIG_DW_DMAC is not set
# CONFIG_DW_DMAC_PCI is not set
# CONFIG_TIMB_DMA is not set
CONFIG_TI_EDMA=y
CONFIG_DMA_OMAP=y
CONFIG_TI_CPPI41=y
CONFIG_DMA_ENGINE=y
CONFIG_DMA_VIRTUAL_CHANNELS=y
CONFIG_DMA_OF=y

#
# DMA Clients
#
# CONFIG_ASYNC_TX_DMA is not set
# CONFIG_DMATEST is not set
CONFIG_OMAP_DMA_CROSSBAR=y
# CONFIG_AUXDISPLAY is not set
# CONFIG_UIO is not set
# CONFIG_VFIO is not set
# CONFIG_VIRT_DRIVERS is not set
CONFIG_VIRTIO=m

#
# Virtio drivers
#
# CONFIG_VIRTIO_PCI is not set
# CONFIG_VIRTIO_BALLOON is not set
# CONFIG_VIRTIO_MMIO is not set

#
# Microsoft Hyper-V guest support
#

#
# Xen driver support
#
CONFIG_XEN_BALLOON=y
CONFIG_XEN_SCRUB_PAGES=y
CONFIG_XEN_DEV_EVTCHN=y
CONFIG_XEN_BACKEND=y
CONFIG_XENFS=y
CONFIG_XEN_COMPAT_XENFS=y
CONFIG_XEN_SYS_HYPERVISOR=y
CONFIG_XEN_XENBUS_FRONTEND=y
CONFIG_XEN_GNTDEV=y
CONFIG_XEN_GRANT_DEV_ALLOC=y
CONFIG_SWIOTLB_XEN=y
CONFIG_XEN_PRIVCMD=y
# CONFIG_STAGING is not set
CONFIG_CLKDEV_LOOKUP=y
CONFIG_HAVE_CLK_PREPARE=y
CONFIG_COMMON_CLK=y

#
# Common Clock Framework
#
# CONFIG_COMMON_CLK_SI5351 is not set
# CONFIG_COMMON_CLK_SI570 is not set
# CONFIG_CLK_TWL6040 is not set
# CONFIG_COMMON_CLK_QCOM is not set
CONFIG_HWSPINLOCK=y

#
# Hardware Spinlock drivers
#
CONFIG_HWSPINLOCK_OMAP=y
CONFIG_CLKSRC_OF=y
CONFIG_CLKSRC_MMIO=y
CONFIG_ARM_ARCH_TIMER=y
CONFIG_ARM_ARCH_TIMER_EVTSTREAM=y
CONFIG_MAILBOX=y
CONFIG_OMAP2PLUS_MBOX=y
CONFIG_OMAP_MBOX_KFIFO_SIZE=256
CONFIG_IOMMU_API=y
CONFIG_IOMMU_SUPPORT=y
CONFIG_OF_IOMMU=y
CONFIG_OMAP_IOMMU=y
CONFIG_OMAP_IOVMM=y
CONFIG_OMAP_IOMMU_DEBUG=y
# CONFIG_ARM_SMMU is not set

#
# Remoteproc drivers
#
CONFIG_REMOTEPROC=m
CONFIG_OMAP_REMOTEPROC=m
CONFIG_OMAP_REMOTEPROC_WATCHDOG=y
# CONFIG_STE_MODEM_RPROC is not set
# CONFIG_PRUSS_REMOTEPROC is not set

#
# Rpmsg drivers
#
CONFIG_RPMSG=m
CONFIG_RPMSG_RPC=m
# CONFIG_PM_DEVFREQ is not set
CONFIG_EXTCON=y

#
# Extcon Device Drivers
#
CONFIG_EXTCON_GPIO=y
# CONFIG_EXTCON_ADC_JACK is not set
CONFIG_EXTCON_PALMAS=y
# CONFIG_MEMORY is not set
CONFIG_IIO=m
CONFIG_IIO_BUFFER=y
CONFIG_IIO_BUFFER_CB=y
CONFIG_IIO_KFIFO_BUF=m
CONFIG_IIO_TRIGGER=y
CONFIG_IIO_CONSUMERS_PER_TRIGGER=2

#
# Accelerometers
#
# CONFIG_BMA180 is not set
# CONFIG_IIO_ST_ACCEL_3AXIS is not set
# CONFIG_KXSD9 is not set

#
# Analog to digital converters
#
# CONFIG_AD7266 is not set
# CONFIG_AD7298 is not set
# CONFIG_AD7476 is not set
# CONFIG_AD7791 is not set
# CONFIG_AD7793 is not set
# CONFIG_AD7887 is not set
# CONFIG_AD7923 is not set
# CONFIG_EXYNOS_ADC is not set
# CONFIG_MAX1363 is not set
# CONFIG_MCP320X is not set
# CONFIG_MCP3422 is not set
# CONFIG_NAU7802 is not set
# CONFIG_TI_ADC081C is not set
CONFIG_TI_AM335X_ADC=m

#
# Amplifiers
#
# CONFIG_AD8366 is not set

#
# Hid Sensor IIO Common
#

#
# Digital to analog converters
#
# CONFIG_AD5064 is not set
# CONFIG_AD5360 is not set
# CONFIG_AD5380 is not set
# CONFIG_AD5421 is not set
# CONFIG_AD5446 is not set
# CONFIG_AD5449 is not set
# CONFIG_AD5504 is not set
# CONFIG_AD5624R_SPI is not set
# CONFIG_AD5686 is not set
# CONFIG_AD5755 is not set
# CONFIG_AD5764 is not set
# CONFIG_AD5791 is not set
# CONFIG_AD7303 is not set
# CONFIG_MAX517 is not set
# CONFIG_MCP4725 is not set

#
# Frequency Synthesizers DDS/PLL
#

#
# Clock Generator/Distribution
#
# CONFIG_AD9523 is not set

#
# Phase-Locked Loop (PLL) frequency synthesizers
#
# CONFIG_ADF4350 is not set

#
# Digital gyroscope sensors
#
# CONFIG_ADIS16080 is not set
# CONFIG_ADIS16130 is not set
# CONFIG_ADIS16136 is not set
# CONFIG_ADIS16260 is not set
# CONFIG_ADXRS450 is not set
# CONFIG_IIO_ST_GYRO_3AXIS is not set
# CONFIG_ITG3200 is not set

#
# Humidity sensors
#
# CONFIG_DHT11 is not set

#
# Inertial measurement units
#
# CONFIG_ADIS16400 is not set
# CONFIG_ADIS16480 is not set
# CONFIG_INV_MPU6050_IIO is not set

#
# Light sensors
#
# CONFIG_ADJD_S311 is not set
# CONFIG_APDS9300 is not set
# CONFIG_CM32181 is not set
# CONFIG_CM36651 is not set
# CONFIG_GP2AP020A00F is not set
# CONFIG_TCS3472 is not set
# CONFIG_SENSORS_TSL2563 is not set
# CONFIG_TSL4531 is not set
# CONFIG_VCNL4000 is not set

#
# Magnetometer sensors
#
# CONFIG_AK8975 is not set
# CONFIG_MAG3110 is not set
# CONFIG_IIO_ST_MAGN_3AXIS is not set

#
# Inclinometer sensors
#

#
# Triggers - standalone
#
# CONFIG_IIO_INTERRUPT_TRIGGER is not set
# CONFIG_IIO_SYSFS_TRIGGER is not set

#
# Pressure sensors
#
# CONFIG_MPL3115 is not set
# CONFIG_IIO_ST_PRESS is not set

#
# Temperature sensors
#
# CONFIG_TMP006 is not set
# CONFIG_VME_BUS is not set
CONFIG_PWM=y
CONFIG_PWM_SYSFS=y
# CONFIG_PWM_PCA9685 is not set
CONFIG_IRQCHIP=y
CONFIG_ARM_GIC=y
CONFIG_IRQ_CROSSBAR=y
# CONFIG_IPACK_BUS is not set
# CONFIG_RESET_CONTROLLER is not set
# CONFIG_FMC is not set

#
# PHY Subsystem
#
CONFIG_GENERIC_PHY=y
# CONFIG_PHY_EXYNOS_MIPI_VIDEO is not set
CONFIG_OMAP_CONTROL_PHY=y
CONFIG_OMAP_USB2=y
CONFIG_TI_PIPE3=y
# CONFIG_PHY_EXYNOS_DP_VIDEO is not set
# CONFIG_BCM_KONA_USB2_PHY is not set
# CONFIG_POWERCAP is not set

#
# File systems
#
CONFIG_DCACHE_WORD_ACCESS=y
CONFIG_EXT2_FS=y
# CONFIG_EXT2_FS_XATTR is not set
# CONFIG_EXT2_FS_XIP is not set
CONFIG_EXT3_FS=y
CONFIG_EXT3_DEFAULTS_TO_ORDERED=y
# CONFIG_EXT3_FS_XATTR is not set
CONFIG_EXT4_FS=y
# CONFIG_EXT4_FS_POSIX_ACL is not set
# CONFIG_EXT4_FS_SECURITY is not set
# CONFIG_EXT4_DEBUG is not set
CONFIG_JBD=y
# CONFIG_JBD_DEBUG is not set
CONFIG_JBD2=y
# CONFIG_JBD2_DEBUG is not set
CONFIG_FS_MBCACHE=y
# CONFIG_REISERFS_FS is not set
# CONFIG_JFS_FS is not set
# CONFIG_XFS_FS is not set
# CONFIG_GFS2_FS is not set
# CONFIG_OCFS2_FS is not set
# CONFIG_BTRFS_FS is not set
# CONFIG_NILFS2_FS is not set
CONFIG_FS_POSIX_ACL=y
CONFIG_FILE_LOCKING=y
CONFIG_FSNOTIFY=y
CONFIG_DNOTIFY=y
CONFIG_INOTIFY_USER=y
# CONFIG_FANOTIFY is not set
CONFIG_QUOTA=y
# CONFIG_QUOTA_NETLINK_INTERFACE is not set
CONFIG_PRINT_QUOTA_WARNING=y
# CONFIG_QUOTA_DEBUG is not set
CONFIG_QUOTA_TREE=y
# CONFIG_QFMT_V1 is not set
CONFIG_QFMT_V2=y
CONFIG_QUOTACTL=y
# CONFIG_AUTOFS4_FS is not set
# CONFIG_FUSE_FS is not set

#
# Caches
#
# CONFIG_FSCACHE is not set

#
# CD-ROM/DVD Filesystems
#
# CONFIG_ISO9660_FS is not set
# CONFIG_UDF_FS is not set

#
# DOS/FAT/NT Filesystems
#
CONFIG_FAT_FS=y
CONFIG_MSDOS_FS=y
CONFIG_VFAT_FS=y
CONFIG_FAT_DEFAULT_CODEPAGE=437
CONFIG_FAT_DEFAULT_IOCHARSET="iso8859-1"
# CONFIG_NTFS_FS is not set

#
# Pseudo filesystems
#
CONFIG_PROC_FS=y
CONFIG_PROC_SYSCTL=y
CONFIG_PROC_PAGE_MONITOR=y
CONFIG_SYSFS=y
CONFIG_TMPFS=y
# CONFIG_TMPFS_POSIX_ACL is not set
# CONFIG_TMPFS_XATTR is not set
# CONFIG_HUGETLBFS is not set
# CONFIG_HUGETLB_PAGE is not set
CONFIG_CONFIGFS_FS=m
CONFIG_MISC_FILESYSTEMS=y
# CONFIG_ADFS_FS is not set
# CONFIG_AFFS_FS is not set
# CONFIG_ECRYPT_FS is not set
# CONFIG_HFS_FS is not set
# CONFIG_HFSPLUS_FS is not set
# CONFIG_BEFS_FS is not set
# CONFIG_BFS_FS is not set
# CONFIG_EFS_FS is not set
CONFIG_JFFS2_FS=y
CONFIG_JFFS2_FS_DEBUG=0
CONFIG_JFFS2_FS_WRITEBUFFER=y
# CONFIG_JFFS2_FS_WBUF_VERIFY is not set
CONFIG_JFFS2_SUMMARY=y
CONFIG_JFFS2_FS_XATTR=y
CONFIG_JFFS2_FS_POSIX_ACL=y
CONFIG_JFFS2_FS_SECURITY=y
CONFIG_JFFS2_COMPRESSION_OPTIONS=y
CONFIG_JFFS2_ZLIB=y
CONFIG_JFFS2_LZO=y
CONFIG_JFFS2_RTIME=y
CONFIG_JFFS2_RUBIN=y
# CONFIG_JFFS2_CMODE_NONE is not set
CONFIG_JFFS2_CMODE_PRIORITY=y
# CONFIG_JFFS2_CMODE_SIZE is not set
# CONFIG_JFFS2_CMODE_FAVOURLZO is not set
CONFIG_UBIFS_FS=y
# CONFIG_UBIFS_FS_ADVANCED_COMPR is not set
CONFIG_UBIFS_FS_LZO=y
CONFIG_UBIFS_FS_ZLIB=y
# CONFIG_LOGFS is not set
CONFIG_CRAMFS=y
# CONFIG_SQUASHFS is not set
# CONFIG_VXFS_FS is not set
# CONFIG_MINIX_FS is not set
# CONFIG_OMFS_FS is not set
# CONFIG_HPFS_FS is not set
# CONFIG_QNX4FS_FS is not set
# CONFIG_QNX6FS_FS is not set
# CONFIG_ROMFS_FS is not set
# CONFIG_PSTORE is not set
# CONFIG_SYSV_FS is not set
# CONFIG_UFS_FS is not set
# CONFIG_F2FS_FS is not set
CONFIG_NETWORK_FILESYSTEMS=y
CONFIG_NFS_FS=y
CONFIG_NFS_V2=y
CONFIG_NFS_V3=y
CONFIG_NFS_V3_ACL=y
CONFIG_NFS_V4=y
# CONFIG_NFS_SWAP is not set
# CONFIG_NFS_V4_1 is not set
CONFIG_ROOT_NFS=y
# CONFIG_NFS_USE_LEGACY_DNS is not set
CONFIG_NFS_USE_KERNEL_DNS=y
# CONFIG_NFSD is not set
CONFIG_LOCKD=y
CONFIG_LOCKD_V4=y
CONFIG_NFS_ACL_SUPPORT=y
CONFIG_NFS_COMMON=y
CONFIG_SUNRPC=y
CONFIG_SUNRPC_GSS=y
# CONFIG_SUNRPC_DEBUG is not set
# CONFIG_CEPH_FS is not set
# CONFIG_CIFS is not set
# CONFIG_NCP_FS is not set
# CONFIG_CODA_FS is not set
# CONFIG_AFS_FS is not set
CONFIG_NLS=y
CONFIG_NLS_DEFAULT="iso8859-1"
CONFIG_NLS_CODEPAGE_437=y
# CONFIG_NLS_CODEPAGE_737 is not set
# CONFIG_NLS_CODEPAGE_775 is not set
# CONFIG_NLS_CODEPAGE_850 is not set
# CONFIG_NLS_CODEPAGE_852 is not set
# CONFIG_NLS_CODEPAGE_855 is not set
# CONFIG_NLS_CODEPAGE_857 is not set
# CONFIG_NLS_CODEPAGE_860 is not set
# CONFIG_NLS_CODEPAGE_861 is not set
# CONFIG_NLS_CODEPAGE_862 is not set
# CONFIG_NLS_CODEPAGE_863 is not set
# CONFIG_NLS_CODEPAGE_864 is not set
# CONFIG_NLS_CODEPAGE_865 is not set
# CONFIG_NLS_CODEPAGE_866 is not set
# CONFIG_NLS_CODEPAGE_869 is not set
# CONFIG_NLS_CODEPAGE_936 is not set
# CONFIG_NLS_CODEPAGE_950 is not set
# CONFIG_NLS_CODEPAGE_932 is not set
# CONFIG_NLS_CODEPAGE_949 is not set
# CONFIG_NLS_CODEPAGE_874 is not set
# CONFIG_NLS_ISO8859_8 is not set
# CONFIG_NLS_CODEPAGE_1250 is not set
# CONFIG_NLS_CODEPAGE_1251 is not set
# CONFIG_NLS_ASCII is not set
CONFIG_NLS_ISO8859_1=y
# CONFIG_NLS_ISO8859_2 is not set
# CONFIG_NLS_ISO8859_3 is not set
# CONFIG_NLS_ISO8859_4 is not set
# CONFIG_NLS_ISO8859_5 is not set
# CONFIG_NLS_ISO8859_6 is not set
# CONFIG_NLS_ISO8859_7 is not set
# CONFIG_NLS_ISO8859_9 is not set
# CONFIG_NLS_ISO8859_13 is not set
# CONFIG_NLS_ISO8859_14 is not set
# CONFIG_NLS_ISO8859_15 is not set
# CONFIG_NLS_KOI8_R is not set
# CONFIG_NLS_KOI8_U is not set
# CONFIG_NLS_MAC_ROMAN is not set
# CONFIG_NLS_MAC_CELTIC is not set
# CONFIG_NLS_MAC_CENTEURO is not set
# CONFIG_NLS_MAC_CROATIAN is not set
# CONFIG_NLS_MAC_CYRILLIC is not set
# CONFIG_NLS_MAC_GAELIC is not set
# CONFIG_NLS_MAC_GREEK is not set
# CONFIG_NLS_MAC_ICELAND is not set
# CONFIG_NLS_MAC_INUIT is not set
# CONFIG_NLS_MAC_ROMANIAN is not set
# CONFIG_NLS_MAC_TURKISH is not set
# CONFIG_NLS_UTF8 is not set
# CONFIG_DLM is not set

#
# Kernel hacking
#

#
# printk and dmesg options
#
CONFIG_PRINTK_TIME=y
CONFIG_DEFAULT_MESSAGE_LOGLEVEL=4
# CONFIG_BOOT_PRINTK_DELAY is not set
# CONFIG_DYNAMIC_DEBUG is not set

#
# Compile-time checks and compiler options
#
CONFIG_DEBUG_INFO=y
# CONFIG_DEBUG_INFO_REDUCED is not set
CONFIG_ENABLE_WARN_DEPRECATED=y
CONFIG_ENABLE_MUST_CHECK=y
CONFIG_FRAME_WARN=1024
# CONFIG_STRIP_ASM_SYMS is not set
# CONFIG_READABLE_ASM is not set
# CONFIG_UNUSED_SYMBOLS is not set
CONFIG_DEBUG_FS=y
# CONFIG_HEADERS_CHECK is not set
# CONFIG_DEBUG_SECTION_MISMATCH is not set
CONFIG_FRAME_POINTER=y
# CONFIG_DEBUG_FORCE_WEAK_PER_CPU is not set
CONFIG_MAGIC_SYSRQ=y
CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE=0x1
CONFIG_DEBUG_KERNEL=y

#
# Memory Debugging
#
# CONFIG_DEBUG_PAGEALLOC is not set
# CONFIG_DEBUG_OBJECTS is not set
# CONFIG_DEBUG_SLAB is not set
CONFIG_HAVE_DEBUG_KMEMLEAK=y
# CONFIG_DEBUG_KMEMLEAK is not set
# CONFIG_DEBUG_STACK_USAGE is not set
# CONFIG_DEBUG_VM is not set
# CONFIG_DEBUG_MEMORY_INIT is not set
# CONFIG_DEBUG_PER_CPU_MAPS is not set
# CONFIG_DEBUG_HIGHMEM is not set
# CONFIG_DEBUG_SHIRQ is not set

#
# Debug Lockups and Hangs
#
# CONFIG_LOCKUP_DETECTOR is not set
# CONFIG_DETECT_HUNG_TASK is not set
# CONFIG_PANIC_ON_OOPS is not set
CONFIG_PANIC_ON_OOPS_VALUE=0
CONFIG_PANIC_TIMEOUT=0
# CONFIG_SCHED_DEBUG is not set
# CONFIG_SCHEDSTATS is not set
# CONFIG_TIMER_STATS is not set
CONFIG_DEBUG_PREEMPT=y

#
# Lock Debugging (spinlocks, mutexes, etc...)
#
# CONFIG_DEBUG_RT_MUTEXES is not set
# CONFIG_RT_MUTEX_TESTER is not set
# CONFIG_DEBUG_SPINLOCK is not set
# CONFIG_DEBUG_MUTEXES is not set
# CONFIG_DEBUG_WW_MUTEX_SLOWPATH is not set
# CONFIG_DEBUG_LOCK_ALLOC is not set
# CONFIG_PROVE_LOCKING is not set
# CONFIG_LOCK_STAT is not set
# CONFIG_DEBUG_ATOMIC_SLEEP is not set
# CONFIG_DEBUG_LOCKING_API_SELFTESTS is not set
# CONFIG_STACKTRACE is not set
# CONFIG_DEBUG_KOBJECT is not set
# CONFIG_DEBUG_BUGVERBOSE is not set
# CONFIG_DEBUG_WRITECOUNT is not set
# CONFIG_DEBUG_LIST is not set
# CONFIG_DEBUG_SG is not set
# CONFIG_DEBUG_NOTIFIERS is not set
# CONFIG_DEBUG_CREDENTIALS is not set

#
# RCU Debugging
#
# CONFIG_PROVE_RCU_DELAY is not set
# CONFIG_SPARSE_RCU_POINTER is not set
# CONFIG_RCU_TORTURE_TEST is not set
CONFIG_RCU_CPU_STALL_TIMEOUT=21
CONFIG_RCU_CPU_STALL_VERBOSE=y
# CONFIG_RCU_CPU_STALL_INFO is not set
# CONFIG_RCU_TRACE is not set
# CONFIG_DEBUG_BLOCK_EXT_DEVT is not set
# CONFIG_NOTIFIER_ERROR_INJECTION is not set
# CONFIG_FAULT_INJECTION is not set
CONFIG_HAVE_FUNCTION_TRACER=y
CONFIG_HAVE_FUNCTION_GRAPH_TRACER=y
CONFIG_HAVE_DYNAMIC_FTRACE=y
CONFIG_HAVE_FTRACE_MCOUNT_RECORD=y
CONFIG_HAVE_SYSCALL_TRACEPOINTS=y
CONFIG_HAVE_C_RECORDMCOUNT=y
CONFIG_TRACE_CLOCK=y
CONFIG_RING_BUFFER=y
CONFIG_RING_BUFFER_ALLOW_SWAP=y
CONFIG_TRACING_SUPPORT=y
# CONFIG_FTRACE is not set

#
# Runtime Testing
#
# CONFIG_LKDTM is not set
# CONFIG_TEST_LIST_SORT is not set
# CONFIG_KPROBES_SANITY_TEST is not set
# CONFIG_BACKTRACE_SELF_TEST is not set
# CONFIG_RBTREE_TEST is not set
# CONFIG_INTERVAL_TREE_TEST is not set
# CONFIG_PERCPU_TEST is not set
# CONFIG_ATOMIC64_SELFTEST is not set
# CONFIG_TEST_STRING_HELPERS is not set
# CONFIG_TEST_KSTRTOX is not set
# CONFIG_DMA_API_DEBUG is not set
# CONFIG_TEST_MODULE is not set
# CONFIG_TEST_USER_COPY is not set
# CONFIG_SAMPLES is not set
CONFIG_HAVE_ARCH_KGDB=y
# CONFIG_KGDB is not set
# CONFIG_ARM_PTDUMP is not set
# CONFIG_STRICT_DEVMEM is not set
# CONFIG_ARM_UNWIND is not set
# CONFIG_DEBUG_USER is not set
# CONFIG_DEBUG_LL is not set
CONFIG_DEBUG_LL_INCLUDE="mach/debug-macro.S"
# CONFIG_DEBUG_UART_PL01X is not set
# CONFIG_DEBUG_UART_8250 is not set
CONFIG_UNCOMPRESS_INCLUDE="debug/uncompress.h"
# CONFIG_ARM_KPROBES_TEST is not set
# CONFIG_PID_IN_CONTEXTIDR is not set
# CONFIG_DEBUG_SET_MODULE_RONX is not set

#
# Security options
#
CONFIG_KEYS=y
# CONFIG_PERSISTENT_KEYRINGS is not set
# CONFIG_BIG_KEYS is not set
# CONFIG_ENCRYPTED_KEYS is not set
# CONFIG_KEYS_DEBUG_PROC_KEYS is not set
# CONFIG_SECURITY_DMESG_RESTRICT is not set
CONFIG_SECURITY=y
# CONFIG_SECURITYFS is not set
# CONFIG_SECURITY_NETWORK is not set
# CONFIG_SECURITY_PATH is not set
# CONFIG_SECURITY_SMACK is not set
# CONFIG_SECURITY_TOMOYO is not set
# CONFIG_SECURITY_APPARMOR is not set
# CONFIG_SECURITY_YAMA is not set
# CONFIG_IMA is not set
# CONFIG_EVM is not set
CONFIG_DEFAULT_SECURITY_DAC=y
CONFIG_DEFAULT_SECURITY=""
CONFIG_CRYPTO=y

#
# Crypto core or helper
#
CONFIG_CRYPTO_ALGAPI=y
CONFIG_CRYPTO_ALGAPI2=y
CONFIG_CRYPTO_AEAD=y
CONFIG_CRYPTO_AEAD2=y
CONFIG_CRYPTO_BLKCIPHER=y
CONFIG_CRYPTO_BLKCIPHER2=y
CONFIG_CRYPTO_HASH=y
CONFIG_CRYPTO_HASH2=y
CONFIG_CRYPTO_RNG=y
CONFIG_CRYPTO_RNG2=y
CONFIG_CRYPTO_PCOMP2=y
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_MANAGER2=y
# CONFIG_CRYPTO_USER is not set
CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=y
# CONFIG_CRYPTO_GF128MUL is not set
# CONFIG_CRYPTO_NULL is not set
# CONFIG_CRYPTO_PCRYPT is not set
CONFIG_CRYPTO_WORKQUEUE=y
# CONFIG_CRYPTO_CRYPTD is not set
# CONFIG_CRYPTO_AUTHENC is not set
CONFIG_CRYPTO_TEST=m

#
# Authenticated Encryption with Associated Data
#
CONFIG_CRYPTO_CCM=y
# CONFIG_CRYPTO_GCM is not set
CONFIG_CRYPTO_SEQIV=y

#
# Block modes
#
# CONFIG_CRYPTO_CBC is not set
CONFIG_CRYPTO_CTR=y
# CONFIG_CRYPTO_CTS is not set
CONFIG_CRYPTO_ECB=y
# CONFIG_CRYPTO_LRW is not set
# CONFIG_CRYPTO_PCBC is not set
# CONFIG_CRYPTO_XTS is not set

#
# Hash modes
#
# CONFIG_CRYPTO_CMAC is not set
CONFIG_CRYPTO_HMAC=y
# CONFIG_CRYPTO_XCBC is not set
# CONFIG_CRYPTO_VMAC is not set

#
# Digest
#
CONFIG_CRYPTO_CRC32C=y
# CONFIG_CRYPTO_CRC32 is not set
CONFIG_CRYPTO_CRCT10DIF=y
# CONFIG_CRYPTO_GHASH is not set
# CONFIG_CRYPTO_MD4 is not set
CONFIG_CRYPTO_MD5=y
CONFIG_CRYPTO_MICHAEL_MIC=y
# CONFIG_CRYPTO_RMD128 is not set
# CONFIG_CRYPTO_RMD160 is not set
# CONFIG_CRYPTO_RMD256 is not set
# CONFIG_CRYPTO_RMD320 is not set
CONFIG_CRYPTO_SHA1=y
# CONFIG_CRYPTO_SHA1_ARM is not set
CONFIG_CRYPTO_SHA256=y
CONFIG_CRYPTO_SHA512=y
# CONFIG_CRYPTO_TGR192 is not set
# CONFIG_CRYPTO_WP512 is not set

#
# Ciphers
#
CONFIG_CRYPTO_AES=y
# CONFIG_CRYPTO_AES_ARM is not set
# CONFIG_CRYPTO_ANUBIS is not set
CONFIG_CRYPTO_ARC4=y
# CONFIG_CRYPTO_BLOWFISH is not set
# CONFIG_CRYPTO_CAMELLIA is not set
# CONFIG_CRYPTO_CAST5 is not set
# CONFIG_CRYPTO_CAST6 is not set
CONFIG_CRYPTO_DES=y
# CONFIG_CRYPTO_FCRYPT is not set
# CONFIG_CRYPTO_KHAZAD is not set
# CONFIG_CRYPTO_SALSA20 is not set
# CONFIG_CRYPTO_SEED is not set
# CONFIG_CRYPTO_SERPENT is not set
# CONFIG_CRYPTO_TEA is not set
# CONFIG_CRYPTO_TWOFISH is not set

#
# Compression
#
CONFIG_CRYPTO_DEFLATE=y
# CONFIG_CRYPTO_ZLIB is not set
CONFIG_CRYPTO_LZO=y
# CONFIG_CRYPTO_LZ4 is not set
# CONFIG_CRYPTO_LZ4HC is not set

#
# Random Number Generation
#
# CONFIG_CRYPTO_ANSI_CPRNG is not set
CONFIG_CRYPTO_USER_API=y
CONFIG_CRYPTO_USER_API_HASH=y
CONFIG_CRYPTO_USER_API_SKCIPHER=y
CONFIG_CRYPTO_HW=y
CONFIG_CRYPTO_DEV_OMAP_SHAM=y
CONFIG_CRYPTO_DEV_OMAP_AES=y
CONFIG_CRYPTO_DEV_OMAP_DES=y
# CONFIG_ASYMMETRIC_KEY_TYPE is not set
# CONFIG_BINARY_PRINTF is not set

#
# Library routines
#
CONFIG_BITREVERSE=y
CONFIG_GENERIC_STRNCPY_FROM_USER=y
CONFIG_GENERIC_STRNLEN_USER=y
CONFIG_GENERIC_NET_UTILS=y
CONFIG_GENERIC_PCI_IOMAP=y
CONFIG_GENERIC_IO=y
CONFIG_ARCH_USE_CMPXCHG_LOCKREF=y
CONFIG_CRC_CCITT=y
CONFIG_CRC16=y
CONFIG_CRC_T10DIF=y
CONFIG_CRC_ITU_T=y
CONFIG_CRC32=y
# CONFIG_CRC32_SELFTEST is not set
CONFIG_CRC32_SLICEBY8=y
# CONFIG_CRC32_SLICEBY4 is not set
# CONFIG_CRC32_SARWATE is not set
# CONFIG_CRC32_BIT is not set
CONFIG_CRC7=y
CONFIG_LIBCRC32C=y
# CONFIG_CRC8 is not set
# CONFIG_RANDOM32_SELFTEST is not set
CONFIG_ZLIB_INFLATE=y
CONFIG_ZLIB_DEFLATE=y
CONFIG_LZO_COMPRESS=y
CONFIG_LZO_DECOMPRESS=y
# CONFIG_XZ_DEC is not set
# CONFIG_XZ_DEC_BCJ is not set
CONFIG_DECOMPRESS_GZIP=y
CONFIG_BCH=y
CONFIG_ASSOCIATIVE_ARRAY=y
CONFIG_HAS_IOMEM=y
CONFIG_HAS_IOPORT=y
CONFIG_HAS_DMA=y
CONFIG_CPU_RMAP=y
CONFIG_DQL=y
CONFIG_NLATTR=y
CONFIG_ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE=y
# CONFIG_AVERAGE is not set
# CONFIG_CORDIC is not set
# CONFIG_DDR is not set
CONFIG_OID_REGISTRY=y
CONFIG_FONT_SUPPORT=y
CONFIG_FONTS=y
CONFIG_FONT_8x8=y
CONFIG_FONT_8x16=y
# CONFIG_FONT_6x11 is not set
# CONFIG_FONT_7x14 is not set
# CONFIG_FONT_PEARL_8x8 is not set
# CONFIG_FONT_ACORN_8x8 is not set
# CONFIG_FONT_MINI_4x6 is not set
# CONFIG_FONT_SUN8x16 is not set
# CONFIG_FONT_SUN12x22 is not set
# CONFIG_FONT_10x18 is not set
CONFIG_VIRTUALIZATION=y
# CONFIG_KVM is not set

--------------090505040107040405030200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------090505040107040405030200--


From xen-users-bounces@lists.xen.org Tue Jun 16 14:59:21 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 14:59:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4sJf-0002AJ-RI; Tue, 16 Jun 2015 14:58:19 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4sCg-0001Hi-0e
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 14:51:10 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	30/85-21074-9D730855; Tue, 16 Jun 2015 14:51:05 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-3.tower-206.messagelabs.com!1434466260!7033757!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14235 invoked from network); 16 Jun 2015 14:51:02 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-3.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 16 Jun 2015 14:51:02 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GEotiH003798;
	Tue, 16 Jun 2015 09:50:56 -0500
Received: from DLEE70.ent.ti.com (dlemailx.itg.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GEotjh025751;
	Tue, 16 Jun 2015 09:50:55 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 09:50:54 -0500
Message-ID: <558029C0.1020806@ti.com>
Date: Tue, 16 Jun 2015 09:50:56 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
In-Reply-To: <1434441054.3342.108.camel@citrix.com>
Content-Type: multipart/mixed; boundary="------------090505040107040405030200"
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 14:58:18 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--------------090505040107040405030200
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Transfer-Encoding: 7bit

On 06/16/2015 03:50 AM, Ian Campbell wrote:
> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>> Hello All,
>>
>>      I'm experiencing some issues with booting into a Dom0 Linux Kernel
>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>> shown me that the code is stuck in the idle_loop() function
>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and
>> there are no scheduled tasklets to run.
>>
>>      A little about my setup to start. I'm using uBoot to boot Xen, which
>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>
>>      After looking through the Xen code, I was unable to find a place
>> where it explicitly jumps into the Dom0 kernel, which was what I was
>> expecting to see. Is there somewhere in the source code where this is
>> the case that I just missed? Or, is the initial jump into the kernel
>> scheduled as a tasklet? If the latter is the case, then the kernel is
>> never scheduled as a tasklet in the source code.
>>
>>      Any tips on getting out the idle_loop() would be appreciated. Thanks
>> in advance for your assistance.
>
> Without wishing to sound flippant, the idle loop will be exited when
> things are not idle, i.e. there is some work to do. If it is idling that
> would usually imply that every vcpu is sleeping or blocked. There's no
> tasklets involved in the initial jump to dom0, just a normal return to
> guest context.
>
> IME the most common cause when things appear broken and Xen is just idle
> is incorrect console= on the dom0 kernel command line or not running a
> getty in dom0, so you get no output. Both should be configured refer to
> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
> least.
>
> If that doesn't help then please post full serial logs of your system
> booting as far as it does, including the u-boot commands and any u-boot
> scripts which are run, along with your kernel .config.
>
> Also, when it is in this idling state you should be able to press the
> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
> keys (h for help, q and d give useful cpu and vcpu register state) to
> see where dom0's vcpus are at, so please include some of those in the
> logs.
>
> A dom0 vcpu address of 0x000000xx often indicates your kernel has
> crashed early which can be another thing which goes wrong during initial
> bringup on a new system (although normally more noisily than I am
> inferring from what you've said here, but without logs its hard to say
> for sure this isn't happening).
>
> It would also be useful to know exactly which SoC you are using.
>
> Ian.
>

Hello Ian,

    The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As 
such, I've been adapting the instructions at 
http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM

    I've attached the booting log, the uBoot commands I run to get the 
system up, and my .config file for the kernel.

    The log stops after "Freed x init memory.", and nothing is printed 
out after that. Also, pressing CTRL-A three times does not bring up a 
Xen prompt, and pressing those keys have no affect.

    It's worth noting that I am able to successfully boot the Linux 
kernel natively with uBoot.

    This may or may not be relevant, but I have stepped through the Xen 
booting using Trace32. What I noticed was that, in the start_xen() 
function (xen/arch/arm/setup.c), the code immediately goes into the
idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() -> 
idle_loop()). There is only 1 vCPU in my system currently.

Brandon

--------------090505040107040405030200
Content-Type: text/x-log; name="boot.log"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="boot.log"

U-Boot 2014.07-dirty (Jun 12 2015 - 15:46:06)

CPU  : DRA722 ES1.0
Board: DRA7xx
I2C:   ready
DRAM:  1 GiB
MMC:   OMAP SD/MMC: 0, OMAP SD/MMC: 1
SATA link 0 timeout.
AHCI 0001.0300 32 slots 1 ports 3 Gbps 0x1 impl SATA mode
flags: 64bit ncq stag pm led clo only pmp pio slum part ccc apst
scanning bus for devices...
Found 0 device(s).
     256      128K xloader
     512      384K bootloader
    1280      128K environment
    1536      128K misc
    2560       16M efs
   35328       16K crypto
   35360       10M recovery
   55840       10M boot
   76320      768M system
 1649184      256M cache
 2173472     1024K ipu1
 2175520     1024K ipu2
 2177568     6360M userdata
SCSI:  Net:   cpsw
Hit any key to stop autoboot:  0
reading dra72-evm-lcd10.dtb
90030 bytes read in 10 ms (8.6 MiB/s)
reading xen-uImage
754608 bytes read in 50 ms (14.4 MiB/s)
reading zImage
4581040 bytes read in 241 ms (18.1 MiB/s)
## Booting kernel from Legacy Image at 90000000 ...
   Image Name:
   Image Type:   ARM Linux Kernel Image (uncompressed)
   Data Size:    754544 Bytes = 736.9 KiB
   Load Address: 80200000
   Entry Point:  80200000
   Verifying Checksum ... OK
## Flattened Device Tree blob at 825f0000
   Booting using the fdt blob at 0x825f0000
   Loading Kernel Image ... OK
   Loading Device Tree to 8ffe7000, end 8fffffad ... OK

Starting kernel ...

- UART enabled -
- CPU 00000000 booting -
- Xen starting in Hyp mode -
- Zero BSS -
- Setting up control registers -
- Turning on paging -
- Ready -
(XEN) Checking for initrd in /chosen
(XEN) RAM: 0000000080000000 - 00000000bfffffff
(XEN)
(XEN) MODULE[0]: 000000008ffe7000 - 000000008fffe000 Device Tree
(XEN) MODULE[1]: 00000000a0000000 - 00000000a0a00000 Kernel
(XEN)  RESVD[0]: 000000008ffe7000 - 000000008fffe000
(XEN)
(XEN) Command line: sync_console console=dtuart dtuart=serial2
(XEN) Placing Xen at 0x00000000bfe00000-0x00000000c0000000
(XEN) Update BOOTMOD_XEN from 0000000080200000-0000000080301701 => 00000000bfe00000-00000000bff01701
(XEN) Xen heap: 00000000bc000000-00000000be000000 (8192 pages)
(XEN) Dom heap: 253952 pages
(XEN) Domain heap initialised
(XEN) Platform: TI DRA7
(XEN) Looking for dtuart at "serial2", options ""
(XEN) Unable to initialize dtuart: -19
(XEN) Bad console= option 'dtuart'
 Xen 4.6-unstable
(XEN) Xen version 4.6-unstable (brandonlocal@) (arm-linux-gnueabi-gcc (Ubuntu/Linaro 4.6.3-1ubuntu5) 5
(XEN) Latest ChangeSet: Fri Jun 5 14:35:49 2015 +0100 git:ecdae1c-dirty
(XEN) Console output is synchronous.
(XEN) Processor: 412fc0f2: "ARM Limited", variant: 0x2, part 0xc0f, rev 0x2
(XEN) 32-bit Execution:
(XEN)   Processor Features: 00001131:00011011
(XEN)     Instruction Sets: AArch32 A32 Thumb Thumb-2 ThumbEE Jazelle
(XEN)     Extensions: GenericTimer Security
(XEN)   Debug Features: 02010555
(XEN)   Auxiliary Features: 00000000
(XEN)   Memory Model Features: 10201105 20000000 01240000 02102211
(XEN)  ISA Features: 02101110 13112111 21232041 11112131 10011142 00000000
(XEN) Set AuxCoreBoot1 to 00000000bfe0004c (0020004c)
(XEN) Set AuxCoreBoot0 to 0x20
(XEN) Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
(XEN) GICv2 initialization:
(XEN)         gic_dist_addr=0000000048211000
(XEN)         gic_cpu_addr=0000000048212000
(XEN)         gic_hyp_addr=0000000048214000
(XEN)         gic_vcpu_addr=0000000048216000
(XEN)         gic_maintenance_irq=25
(XEN) GICv2: 192 lines, 1 cpu, secure (IID 0000043b).
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Allocated console ring of 16 KiB.
(XEN) VFP implementer 0x41 architecture 4 part 0x30 variant 0xf rev 0x0
(XEN) Brought up 1 CPUs
(XEN) P2M: 40-bit IPA
(XEN) P2M: 3 levels with order-1 root, VTCR 0x80003558
(XEN) I/O virtualisation disabled
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Loading kernel from boot module @ 00000000a0000000
(XEN) Allocating 1:1 mappings totalling 128MB for dom0:
(XEN) BANK[0] 0x00000080000000-0x00000088000000 (128MB)
(XEN) Loading zImage from 00000000a0000000 to 0000000087a00000-0000000087e5e6b0
(XEN) Allocating PPI 16 for event channel interrupt
(XEN) Loading dom0 DTB to 0x0000000087800000-0x0000000087815ec9
(XEN) Scrubbing Free RAM on 1 nodes using 1 CPUs
(XEN) ........done.
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Std. Loglevel: All
(XEN) Guest Loglevel: All
(XEN) **********************************************
(XEN) ******* WARNING: CONSOLE OUTPUT IS SYNCHRONOUS
(XEN) ******* This option is intended to aid debugging of Xen by ensuring
(XEN) ******* that all output is synchronously delivered on the serial line.
(XEN) ******* However it can introduce SIGNIFICANT latencies and affect
(XEN) ******* timekeeping. It is NOT recommended for production use!
(XEN) **********************************************
(XEN) 3... 2... 1...
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
(XEN) Freed 284kB init memory.


--------------090505040107040405030200
Content-Type: text/plain; charset="UTF-8"; name="uboot.script"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="uboot.script"

setenv dtb_addr_r 0x825f0000
setenv xen_addr_r 0x90000000
setenv kernel_addr_r 0xa0000000
setenv xen_bootargs 'sync_console console=dtuart dtuart=serial2'
setenv dom0_bootargs 'console=hvc0 earlyprintk=xen debug ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc'
fatload mmc 0:1 $dtb_addr_r dra72-evm-lcd10.dtb
fatload mmc 0:1 $xen_addr_r xen-uImage
fatload mmc 0:1 $kernel_addr_r zImage
fdt addr $dtb_addr_r
fdt resize
fdt set /chosen xen,xen-bootargs \"$xen_bootargs\"
fdt resize
fdt set /chosen xen,dom0-bootargs \"$dom0_bootargs\"
fdt mknode /chosen modules
fdt set /chosen/modules \#address-cells <1>
fdt set /chosen/modules \#size-cells <1>
fdt mknode /chosen/modules module@0
fdt set /chosen/modules/module@0 compatible xen,linux-zimage xen,multiboot-module
fdt set /chosen/modules/module@0 reg <$kernel_addr_r 0xa00000>
bootm $xen_addr_r - $dtb_addr_r


--------------090505040107040405030200
Content-Type: text/plain; charset="UTF-8"; name="kernel.config"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="kernel.config"

#
# Automatically generated file; DO NOT EDIT.
# Linux/arm 3.14.31 Kernel Configuration
#
CONFIG_ARM=y
CONFIG_MIGHT_HAVE_PCI=y
CONFIG_SYS_SUPPORTS_APM_EMULATION=y
CONFIG_HAVE_PROC_CPU=y
CONFIG_STACKTRACE_SUPPORT=y
CONFIG_LOCKDEP_SUPPORT=y
CONFIG_TRACE_IRQFLAGS_SUPPORT=y
CONFIG_RWSEM_GENERIC_SPINLOCK=y
CONFIG_ARCH_HAS_CPUFREQ=y
CONFIG_ARCH_HAS_BANDGAP=y
CONFIG_GENERIC_HWEIGHT=y
CONFIG_GENERIC_CALIBRATE_DELAY=y
CONFIG_NEED_DMA_MAP_STATE=y
CONFIG_VECTORS_BASE=0xffff0000
CONFIG_ARM_PATCH_PHYS_VIRT=y
CONFIG_GENERIC_BUG=y
CONFIG_DEFCONFIG_LIST="/lib/modules/$UNAME_RELEASE/.config"
CONFIG_IRQ_WORK=y
CONFIG_BUILDTIME_EXTABLE_SORT=y

#
# General setup
#
CONFIG_INIT_ENV_ARG_LIMIT=32
CONFIG_CROSS_COMPILE=""
# CONFIG_COMPILE_TEST is not set
CONFIG_LOCALVERSION=""
CONFIG_LOCALVERSION_AUTO=y
CONFIG_HAVE_KERNEL_GZIP=y
CONFIG_HAVE_KERNEL_LZMA=y
CONFIG_HAVE_KERNEL_XZ=y
CONFIG_HAVE_KERNEL_LZO=y
CONFIG_HAVE_KERNEL_LZ4=y
CONFIG_KERNEL_GZIP=y
# CONFIG_KERNEL_LZMA is not set
# CONFIG_KERNEL_XZ is not set
# CONFIG_KERNEL_LZO is not set
# CONFIG_KERNEL_LZ4 is not set
CONFIG_DEFAULT_HOSTNAME="(none)"
CONFIG_SWAP=y
CONFIG_SYSVIPC=y
CONFIG_SYSVIPC_SYSCTL=y
CONFIG_POSIX_MQUEUE=y
CONFIG_POSIX_MQUEUE_SYSCTL=y
# CONFIG_FHANDLE is not set
# CONFIG_AUDIT is not set

#
# IRQ subsystem
#
CONFIG_GENERIC_IRQ_PROBE=y
CONFIG_GENERIC_IRQ_SHOW=y
CONFIG_HARDIRQS_SW_RESEND=y
CONFIG_GENERIC_IRQ_CHIP=y
CONFIG_IRQ_DOMAIN=y
# CONFIG_IRQ_DOMAIN_DEBUG is not set
CONFIG_IRQ_FORCED_THREADING=y
CONFIG_SPARSE_IRQ=y
CONFIG_KTIME_SCALAR=y
CONFIG_GENERIC_CLOCKEVENTS=y
CONFIG_GENERIC_CLOCKEVENTS_BUILD=y
CONFIG_ARCH_HAS_TICK_BROADCAST=y
CONFIG_GENERIC_CLOCKEVENTS_BROADCAST=y

#
# Timers subsystem
#
CONFIG_TICK_ONESHOT=y
CONFIG_NO_HZ_COMMON=y
# CONFIG_HZ_PERIODIC is not set
CONFIG_NO_HZ_IDLE=y
# CONFIG_NO_HZ_FULL is not set
CONFIG_NO_HZ=y
CONFIG_HIGH_RES_TIMERS=y

#
# CPU/Task time and stats accounting
#
CONFIG_TICK_CPU_ACCOUNTING=y
# CONFIG_VIRT_CPU_ACCOUNTING_GEN is not set
# CONFIG_IRQ_TIME_ACCOUNTING is not set
CONFIG_BSD_PROCESS_ACCT=y
# CONFIG_BSD_PROCESS_ACCT_V3 is not set
# CONFIG_TASKSTATS is not set

#
# RCU Subsystem
#
CONFIG_TREE_PREEMPT_RCU=y
CONFIG_PREEMPT_RCU=y
CONFIG_RCU_STALL_COMMON=y
# CONFIG_RCU_USER_QS is not set
CONFIG_RCU_FANOUT=32
CONFIG_RCU_FANOUT_LEAF=16
# CONFIG_RCU_FANOUT_EXACT is not set
# CONFIG_RCU_FAST_NO_HZ is not set
# CONFIG_TREE_RCU_TRACE is not set
# CONFIG_RCU_BOOST is not set
# CONFIG_RCU_NOCB_CPU is not set
CONFIG_IKCONFIG=y
CONFIG_IKCONFIG_PROC=y
CONFIG_LOG_BUF_SHIFT=16
CONFIG_GENERIC_SCHED_CLOCK=y
CONFIG_CGROUPS=y
# CONFIG_CGROUP_DEBUG is not set
# CONFIG_CGROUP_FREEZER is not set
# CONFIG_CGROUP_DEVICE is not set
# CONFIG_CPUSETS is not set
# CONFIG_CGROUP_CPUACCT is not set
# CONFIG_RESOURCE_COUNTERS is not set
# CONFIG_CGROUP_PERF is not set
# CONFIG_CGROUP_SCHED is not set
# CONFIG_BLK_CGROUP is not set
# CONFIG_CHECKPOINT_RESTORE is not set
# CONFIG_NAMESPACES is not set
# CONFIG_SCHED_AUTOGROUP is not set
# CONFIG_SYSFS_DEPRECATED is not set
# CONFIG_RELAY is not set
CONFIG_BLK_DEV_INITRD=y
CONFIG_INITRAMFS_SOURCE=""
CONFIG_RD_GZIP=y
# CONFIG_RD_BZIP2 is not set
# CONFIG_RD_LZMA is not set
# CONFIG_RD_XZ is not set
# CONFIG_RD_LZO is not set
# CONFIG_RD_LZ4 is not set
# CONFIG_CC_OPTIMIZE_FOR_SIZE is not set
CONFIG_SYSCTL=y
CONFIG_ANON_INODES=y
CONFIG_HAVE_UID16=y
CONFIG_EXPERT=y
CONFIG_UID16=y
# CONFIG_SYSCTL_SYSCALL is not set
CONFIG_KALLSYMS=y
# CONFIG_KALLSYMS_ALL is not set
CONFIG_PRINTK=y
CONFIG_BUG=y
CONFIG_ELF_CORE=y
CONFIG_BASE_FULL=y
CONFIG_FUTEX=y
CONFIG_EPOLL=y
CONFIG_SIGNALFD=y
CONFIG_TIMERFD=y
CONFIG_EVENTFD=y
CONFIG_SHMEM=y
CONFIG_AIO=y
CONFIG_PCI_QUIRKS=y
# CONFIG_EMBEDDED is not set
CONFIG_HAVE_PERF_EVENTS=y
CONFIG_PERF_USE_VMALLOC=y

#
# Kernel Performance Events And Counters
#
CONFIG_PERF_EVENTS=y
# CONFIG_DEBUG_PERF_USE_VMALLOC is not set
CONFIG_VM_EVENT_COUNTERS=y
CONFIG_COMPAT_BRK=y
CONFIG_SLAB=y
# CONFIG_SLUB is not set
# CONFIG_SLOB is not set
# CONFIG_SYSTEM_TRUSTED_KEYRING is not set
CONFIG_PROFILING=y
CONFIG_OPROFILE=y
CONFIG_HAVE_OPROFILE=y
CONFIG_KPROBES=y
CONFIG_JUMP_LABEL=y
# CONFIG_HAVE_64BIT_ALIGNED_ACCESS is not set
CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS=y
CONFIG_ARCH_USE_BUILTIN_BSWAP=y
CONFIG_KRETPROBES=y
CONFIG_HAVE_KPROBES=y
CONFIG_HAVE_KRETPROBES=y
CONFIG_HAVE_ARCH_TRACEHOOK=y
CONFIG_HAVE_DMA_ATTRS=y
CONFIG_HAVE_DMA_CONTIGUOUS=y
CONFIG_GENERIC_SMP_IDLE_THREAD=y
CONFIG_GENERIC_IDLE_POLL_SETUP=y
CONFIG_HAVE_REGS_AND_STACK_ACCESS_API=y
CONFIG_HAVE_CLK=y
CONFIG_HAVE_DMA_API_DEBUG=y
CONFIG_HAVE_HW_BREAKPOINT=y
CONFIG_HAVE_PERF_REGS=y
CONFIG_HAVE_PERF_USER_STACK_DUMP=y
CONFIG_HAVE_ARCH_JUMP_LABEL=y
CONFIG_ARCH_WANT_IPC_PARSE_VERSION=y
CONFIG_HAVE_ARCH_SECCOMP_FILTER=y
CONFIG_HAVE_CC_STACKPROTECTOR=y
# CONFIG_CC_STACKPROTECTOR is not set
CONFIG_CC_STACKPROTECTOR_NONE=y
# CONFIG_CC_STACKPROTECTOR_REGULAR is not set
# CONFIG_CC_STACKPROTECTOR_STRONG is not set
CONFIG_HAVE_CONTEXT_TRACKING=y
CONFIG_HAVE_VIRT_CPU_ACCOUNTING_GEN=y
CONFIG_HAVE_IRQ_TIME_ACCOUNTING=y
CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE=y
CONFIG_MODULES_USE_ELF_REL=y
CONFIG_CLONE_BACKWARDS=y
CONFIG_OLD_SIGSUSPEND3=y
CONFIG_OLD_SIGACTION=y

#
# GCOV-based kernel profiling
#
# CONFIG_GCOV_KERNEL is not set
CONFIG_HAVE_GENERIC_DMA_COHERENT=y
CONFIG_SLABINFO=y
CONFIG_RT_MUTEXES=y
CONFIG_BASE_SMALL=0
CONFIG_MODULES=y
CONFIG_MODULE_FORCE_LOAD=y
CONFIG_MODULE_UNLOAD=y
CONFIG_MODULE_FORCE_UNLOAD=y
CONFIG_MODVERSIONS=y
CONFIG_MODULE_SRCVERSION_ALL=y
# CONFIG_MODULE_SIG is not set
CONFIG_STOP_MACHINE=y
CONFIG_BLOCK=y
CONFIG_LBDAF=y
# CONFIG_BLK_DEV_BSG is not set
# CONFIG_BLK_DEV_BSGLIB is not set
# CONFIG_BLK_DEV_INTEGRITY is not set
# CONFIG_BLK_CMDLINE_PARSER is not set

#
# Partition Types
#
CONFIG_PARTITION_ADVANCED=y
# CONFIG_ACORN_PARTITION is not set
# CONFIG_AIX_PARTITION is not set
# CONFIG_OSF_PARTITION is not set
# CONFIG_AMIGA_PARTITION is not set
# CONFIG_ATARI_PARTITION is not set
# CONFIG_MAC_PARTITION is not set
CONFIG_MSDOS_PARTITION=y
# CONFIG_BSD_DISKLABEL is not set
# CONFIG_MINIX_SUBPARTITION is not set
# CONFIG_SOLARIS_X86_PARTITION is not set
# CONFIG_UNIXWARE_DISKLABEL is not set
# CONFIG_LDM_PARTITION is not set
# CONFIG_SGI_PARTITION is not set
# CONFIG_ULTRIX_PARTITION is not set
# CONFIG_SUN_PARTITION is not set
# CONFIG_KARMA_PARTITION is not set
CONFIG_EFI_PARTITION=y
# CONFIG_SYSV68_PARTITION is not set
# CONFIG_CMDLINE_PARTITION is not set

#
# IO Schedulers
#
CONFIG_IOSCHED_NOOP=y
CONFIG_IOSCHED_DEADLINE=y
CONFIG_IOSCHED_CFQ=y
# CONFIG_DEFAULT_DEADLINE is not set
CONFIG_DEFAULT_CFQ=y
# CONFIG_DEFAULT_NOOP is not set
CONFIG_DEFAULT_IOSCHED="cfq"
CONFIG_UNINLINE_SPIN_UNLOCK=y
CONFIG_ARCH_SUPPORTS_ATOMIC_RMW=y
CONFIG_MUTEX_SPIN_ON_OWNER=y
CONFIG_FREEZER=y

#
# System Type
#
CONFIG_MMU=y
CONFIG_ARCH_MULTIPLATFORM=y
# CONFIG_ARCH_INTEGRATOR is not set
# CONFIG_ARCH_REALVIEW is not set
# CONFIG_ARCH_VERSATILE is not set
# CONFIG_ARCH_AT91 is not set
# CONFIG_ARCH_CLPS711X is not set
# CONFIG_ARCH_GEMINI is not set
# CONFIG_ARCH_EBSA110 is not set
# CONFIG_ARCH_EP93XX is not set
# CONFIG_ARCH_FOOTBRIDGE is not set
# CONFIG_ARCH_NETX is not set
# CONFIG_ARCH_IOP13XX is not set
# CONFIG_ARCH_IOP32X is not set
# CONFIG_ARCH_IOP33X is not set
# CONFIG_ARCH_IXP4XX is not set
# CONFIG_ARCH_DOVE is not set
# CONFIG_ARCH_KIRKWOOD is not set
# CONFIG_ARCH_MV78XX0 is not set
# CONFIG_ARCH_ORION5X is not set
# CONFIG_ARCH_MMP is not set
# CONFIG_ARCH_KS8695 is not set
# CONFIG_ARCH_W90X900 is not set
# CONFIG_ARCH_LPC32XX is not set
# CONFIG_ARCH_PXA is not set
# CONFIG_ARCH_MSM_NODT is not set
# CONFIG_ARCH_SHMOBILE_LEGACY is not set
# CONFIG_ARCH_RPC is not set
# CONFIG_ARCH_SA1100 is not set
# CONFIG_ARCH_S3C24XX is not set
# CONFIG_ARCH_S3C64XX is not set
# CONFIG_ARCH_S5P64X0 is not set
# CONFIG_ARCH_S5PC100 is not set
# CONFIG_ARCH_S5PV210 is not set
# CONFIG_ARCH_EXYNOS is not set
# CONFIG_ARCH_DAVINCI is not set
# CONFIG_ARCH_OMAP1 is not set

#
# Multiple platform selection
#

#
# CPU Core family selection
#
# CONFIG_ARCH_MULTI_V6 is not set
CONFIG_ARCH_MULTI_V7=y
CONFIG_ARCH_MULTI_V6_V7=y
# CONFIG_ARCH_MULTI_CPU_AUTO is not set
# CONFIG_ARCH_MVEBU is not set
# CONFIG_ARCH_BCM is not set
# CONFIG_ARCH_BERLIN is not set
CONFIG_GPIO_PCA953X=y
# CONFIG_KEYBOARD_GPIO_POLLED is not set
# CONFIG_ARCH_HIGHBANK is not set
# CONFIG_ARCH_HI3xxx is not set
# CONFIG_ARCH_KEYSTONE is not set
# CONFIG_ARCH_MSM_DT is not set
# CONFIG_ARCH_MXC is not set

#
# TI OMAP Common Features
#

#
# OMAP Feature Selections
#
CONFIG_OMAP_RESET_CLOCKS=y
CONFIG_OMAP_MUX=y
CONFIG_OMAP_MUX_DEBUG=y
CONFIG_OMAP_MUX_WARNINGS=y
CONFIG_OMAP_32K_TIMER=y
CONFIG_OMAP_DM_TIMER=y
CONFIG_OMAP_PM_NOOP=y
CONFIG_MACH_OMAP_GENERIC=y
CONFIG_ARCH_OMAP=y
# CONFIG_ARCH_OMAP3 is not set
# CONFIG_ARCH_OMAP4 is not set
# CONFIG_SOC_OMAP5 is not set
# CONFIG_SOC_AM33XX is not set
# CONFIG_SOC_AM43XX is not set
CONFIG_SOC_DRA7XX=y
CONFIG_ARCH_OMAP2PLUS=y

#
# TI OMAP2/3/4 Specific Features
#
CONFIG_ARCH_OMAP2PLUS_TYPICAL=y
# CONFIG_SOC_HAS_OMAP2_SDRC is not set
CONFIG_SOC_HAS_REALTIME_COUNTER=y

#
# OMAP Legacy Platform Data Board Type
#
# CONFIG_ARCH_ROCKCHIP is not set
# CONFIG_ARCH_SOCFPGA is not set
# CONFIG_PLAT_SPEAR is not set
# CONFIG_ARCH_STI is not set
# CONFIG_ARCH_SHMOBILE_MULTI is not set
# CONFIG_ARCH_SUNXI is not set
# CONFIG_ARCH_SIRF is not set
# CONFIG_ARCH_TEGRA is not set
# CONFIG_ARCH_U8500 is not set
# CONFIG_ARCH_VEXPRESS is not set
# CONFIG_ARCH_VIRT is not set
# CONFIG_ARCH_WM8850 is not set
# CONFIG_ARCH_ZYNQ is not set

#
# Processor Type
#
CONFIG_CPU_V7=y
CONFIG_CPU_32v6K=y
CONFIG_CPU_32v7=y
CONFIG_CPU_ABRT_EV7=y
CONFIG_CPU_PABRT_V7=y
CONFIG_CPU_CACHE_V7=y
CONFIG_CPU_CACHE_VIPT=y
CONFIG_CPU_COPY_V6=y
CONFIG_CPU_TLB_V7=y
CONFIG_CPU_HAS_ASID=y
CONFIG_CPU_CP15=y
CONFIG_CPU_CP15_MMU=y

#
# Processor Features
#
CONFIG_ARM_LPAE=y
CONFIG_ARCH_PHYS_ADDR_T_64BIT=y
CONFIG_ARCH_DMA_ADDR_T_64BIT=y
CONFIG_ARM_THUMB=y
CONFIG_ARM_THUMBEE=y
CONFIG_ARM_VIRT_EXT=y
CONFIG_SWP_EMULATE=y
# CONFIG_CPU_ICACHE_DISABLE is not set
# CONFIG_CPU_DCACHE_DISABLE is not set
# CONFIG_CPU_BPREDICT_DISABLE is not set
CONFIG_KUSER_HELPERS=y
# CONFIG_CACHE_L2X0 is not set
CONFIG_ARM_L1_CACHE_SHIFT_6=y
CONFIG_ARM_L1_CACHE_SHIFT=6
CONFIG_ARM_DMA_MEM_BUFFERABLE=y
CONFIG_ARM_NR_BANKS=8
CONFIG_MULTI_IRQ_HANDLER=y
# CONFIG_ARM_ERRATA_430973 is not set
# CONFIG_ARM_ERRATA_643719 is not set
# CONFIG_ARM_ERRATA_720789 is not set
# CONFIG_ARM_ERRATA_754322 is not set
# CONFIG_ARM_ERRATA_754327 is not set
# CONFIG_ARM_ERRATA_764369 is not set
# CONFIG_ARM_ERRATA_775420 is not set
# CONFIG_ARM_ERRATA_798181 is not set
# CONFIG_ARM_ERRATA_773022 is not set
CONFIG_TI_PRIV_EDMA=y

#
# Bus support
#
CONFIG_PCI=y
CONFIG_PCI_SYSCALL=y
# CONFIG_PCI_MSI is not set
# CONFIG_PCI_DEBUG is not set
# CONFIG_PCI_REALLOC_ENABLE_AUTO is not set
# CONFIG_PCI_STUB is not set
# CONFIG_PCI_IOV is not set
# CONFIG_PCI_PRI is not set
# CONFIG_PCI_PASID is not set

#
# PCI host controller drivers
#
CONFIG_PCI_DRA7XX=y
CONFIG_PCIE_DW=y
# CONFIG_PCIEPORTBUS is not set
# CONFIG_PCCARD is not set

#
# Kernel Features
#
CONFIG_HAVE_SMP=y
CONFIG_SMP=y
CONFIG_SMP_ON_UP=y
CONFIG_ARM_CPU_TOPOLOGY=y
# CONFIG_SCHED_MC is not set
# CONFIG_SCHED_SMT is not set
CONFIG_HAVE_ARM_ARCH_TIMER=y
# CONFIG_MCPM is not set
# CONFIG_BIG_LITTLE is not set
CONFIG_VMSPLIT_3G=y
# CONFIG_VMSPLIT_2G is not set
# CONFIG_VMSPLIT_1G is not set
CONFIG_PAGE_OFFSET=0xC0000000
CONFIG_NR_CPUS=2
CONFIG_HOTPLUG_CPU=y
CONFIG_ARM_PSCI=y
CONFIG_ARCH_NR_GPIO=512
# CONFIG_PREEMPT_NONE is not set
# CONFIG_PREEMPT_VOLUNTARY is not set
CONFIG_PREEMPT=y
CONFIG_PREEMPT_COUNT=y
CONFIG_HZ_FIXED=0
CONFIG_HZ_100=y
# CONFIG_HZ_200 is not set
# CONFIG_HZ_250 is not set
# CONFIG_HZ_300 is not set
# CONFIG_HZ_500 is not set
# CONFIG_HZ_1000 is not set
CONFIG_HZ=100
CONFIG_SCHED_HRTICK=y
# CONFIG_THUMB2_KERNEL is not set
CONFIG_AEABI=y
# CONFIG_OABI_COMPAT is not set
CONFIG_ARCH_HAS_HOLES_MEMORYMODEL=y
# CONFIG_ARCH_SPARSEMEM_DEFAULT is not set
# CONFIG_ARCH_SELECT_MEMORY_MODEL is not set
CONFIG_HAVE_ARCH_PFN_VALID=y
CONFIG_HIGHMEM=y
# CONFIG_HIGHPTE is not set
CONFIG_HW_PERF_EVENTS=y
CONFIG_SYS_SUPPORTS_HUGETLBFS=y
CONFIG_ARCH_WANT_GENERAL_HUGETLB=y
CONFIG_FLATMEM=y
CONFIG_FLAT_NODE_MEM_MAP=y
CONFIG_HAVE_MEMBLOCK=y
CONFIG_NO_BOOTMEM=y
CONFIG_MEMORY_ISOLATION=y
# CONFIG_HAVE_BOOTMEM_INFO_NODE is not set
CONFIG_PAGEFLAGS_EXTENDED=y
CONFIG_SPLIT_PTLOCK_CPUS=4
CONFIG_COMPACTION=y
CONFIG_MIGRATION=y
CONFIG_PHYS_ADDR_T_64BIT=y
CONFIG_ZONE_DMA_FLAG=0
CONFIG_BOUNCE=y
CONFIG_MMU_NOTIFIER=y
# CONFIG_KSM is not set
CONFIG_DEFAULT_MMAP_MIN_ADDR=4096
# CONFIG_TRANSPARENT_HUGEPAGE is not set
CONFIG_CROSS_MEMORY_ATTACH=y
# CONFIG_CLEANCACHE is not set
# CONFIG_FRONTSWAP is not set
CONFIG_CMA=y
# CONFIG_CMA_DEBUG is not set
# CONFIG_ZBUD is not set
# CONFIG_ZSMALLOC is not set
CONFIG_FORCE_MAX_ZONEORDER=11
CONFIG_ALIGNMENT_TRAP=y
# CONFIG_UACCESS_WITH_MEMCPY is not set
# CONFIG_SECCOMP is not set
CONFIG_SWIOTLB=y
CONFIG_IOMMU_HELPER=y
CONFIG_XEN_DOM0=y
CONFIG_XEN=y
# CONFIG_ARM_FLUSH_CONSOLE_ON_RESTART is not set

#
# Boot options
#
CONFIG_USE_OF=y
CONFIG_ATAGS=y
# CONFIG_DEPRECATED_PARAM_STRUCT is not set
# CONFIG_BUILD_ARM_APPENDED_DTB_IMAGE is not set
CONFIG_ZBOOT_ROM_TEXT=0x0
CONFIG_ZBOOT_ROM_BSS=0x0
CONFIG_ARM_APPENDED_DTB=y
CONFIG_ARM_ATAG_DTB_COMPAT=y
CONFIG_ARM_ATAG_DTB_COMPAT_CMDLINE_FROM_BOOTLOADER=y
# CONFIG_ARM_ATAG_DTB_COMPAT_CMDLINE_EXTEND is not set
CONFIG_CMDLINE="console=ttyO0,115200n8 earlyprintk=xen debug ignore_loglevel root=/dev/mmcbl    k0p2 rw rootwait fixrtc"
CONFIG_CMDLINE_FROM_BOOTLOADER=y
# CONFIG_CMDLINE_EXTEND is not set
# CONFIG_CMDLINE_FORCE is not set
CONFIG_KEXEC=y
CONFIG_ATAGS_PROC=y
# CONFIG_CRASH_DUMP is not set
CONFIG_AUTO_ZRELADDR=y

#
# CPU Power Management
#

#
# CPU Frequency scaling
#
CONFIG_CPU_FREQ=y
CONFIG_CPU_FREQ_GOV_COMMON=y
CONFIG_CPU_FREQ_STAT=y
CONFIG_CPU_FREQ_STAT_DETAILS=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_PERFORMANCE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_POWERSAVE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_USERSPACE is not set
CONFIG_CPU_FREQ_DEFAULT_GOV_ONDEMAND=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_CONSERVATIVE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_INTERACTIVE is not set
CONFIG_CPU_FREQ_GOV_PERFORMANCE=y
CONFIG_CPU_FREQ_GOV_POWERSAVE=m
CONFIG_CPU_FREQ_GOV_USERSPACE=m
CONFIG_CPU_FREQ_GOV_ONDEMAND=y
# CONFIG_CPU_FREQ_GOV_INTERACTIVE is not set
CONFIG_CPU_FREQ_GOV_CONSERVATIVE=m
CONFIG_GENERIC_CPUFREQ_CPU0=y

#
# ARM CPU frequency scaling drivers
#
# CONFIG_ARM_KIRKWOOD_CPUFREQ is not set
# CONFIG_ARM_OMAP2PLUS_CPUFREQ is not set

#
# CPU Idle
#
CONFIG_CPU_IDLE=y
# CONFIG_CPU_IDLE_MULTIPLE_DRIVERS is not set
CONFIG_CPU_IDLE_GOV_LADDER=y
CONFIG_CPU_IDLE_GOV_MENU=y

#
# ARM CPU Idle Drivers
#
# CONFIG_ARM_HIGHBANK_CPUIDLE is not set
# CONFIG_ARCH_NEEDS_CPU_IDLE_COUPLED is not set

#
# Floating point emulation
#

#
# At least one emulation must be selected
#
CONFIG_VFP=y
CONFIG_VFPv3=y
CONFIG_NEON=y
# CONFIG_KERNEL_MODE_NEON is not set

#
# Userspace binary formats
#
CONFIG_BINFMT_ELF=y
CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE=y
CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS=y
CONFIG_BINFMT_SCRIPT=y
# CONFIG_HAVE_AOUT is not set
CONFIG_BINFMT_MISC=y
CONFIG_COREDUMP=y

#
# Power management options
#
CONFIG_SUSPEND=y
CONFIG_SUSPEND_FREEZER=y
CONFIG_HAS_WAKELOCK=y
CONFIG_WAKELOCK=y
CONFIG_PM_SLEEP=y
CONFIG_PM_SLEEP_SMP=y
# CONFIG_PM_AUTOSLEEP is not set
# CONFIG_PM_WAKELOCKS is not set
CONFIG_PM_RUNTIME=y
CONFIG_PM=y
CONFIG_PM_DEBUG=y
# CONFIG_PM_ADVANCED_DEBUG is not set
# CONFIG_PM_TEST_SUSPEND is not set
CONFIG_PM_SLEEP_DEBUG=y
# CONFIG_APM_EMULATION is not set
CONFIG_ARCH_HAS_OPP=y
CONFIG_PM_OPP=y
CONFIG_PM_CLK=y
# CONFIG_WQ_POWER_EFFICIENT_DEFAULT is not set
CONFIG_CPU_PM=y
# CONFIG_SUSPEND_TIME is not set
CONFIG_ARCH_SUSPEND_POSSIBLE=y
CONFIG_ARM_CPU_SUSPEND=y
CONFIG_NET=y

#
# Networking options
#
CONFIG_PACKET=y
# CONFIG_PACKET_DIAG is not set
CONFIG_UNIX=y
# CONFIG_UNIX_DIAG is not set
CONFIG_XFRM=y
CONFIG_XFRM_ALGO=y
CONFIG_XFRM_USER=y
# CONFIG_XFRM_SUB_POLICY is not set
CONFIG_XFRM_MIGRATE=y
# CONFIG_XFRM_STATISTICS is not set
CONFIG_NET_KEY=y
CONFIG_NET_KEY_MIGRATE=y
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
# CONFIG_IP_ADVANCED_ROUTER is not set
CONFIG_IP_PNP=y
CONFIG_IP_PNP_DHCP=y
CONFIG_IP_PNP_BOOTP=y
CONFIG_IP_PNP_RARP=y
# CONFIG_NET_IPIP is not set
# CONFIG_NET_IPGRE_DEMUX is not set
# CONFIG_NET_IP_TUNNEL is not set
# CONFIG_IP_MROUTE is not set
# CONFIG_SYN_COOKIES is not set
# CONFIG_NET_IPVTI is not set
# CONFIG_INET_AH is not set
# CONFIG_INET_ESP is not set
# CONFIG_INET_IPCOMP is not set
# CONFIG_INET_XFRM_TUNNEL is not set
# CONFIG_INET_TUNNEL is not set
CONFIG_INET_XFRM_MODE_TRANSPORT=y
CONFIG_INET_XFRM_MODE_TUNNEL=y
CONFIG_INET_XFRM_MODE_BEET=y
# CONFIG_INET_LRO is not set
CONFIG_INET_DIAG=y
CONFIG_INET_TCP_DIAG=y
# CONFIG_INET_UDP_DIAG is not set
# CONFIG_TCP_CONG_ADVANCED is not set
CONFIG_TCP_CONG_CUBIC=y
CONFIG_DEFAULT_TCP_CONG="cubic"
# CONFIG_TCP_MD5SIG is not set
# CONFIG_IPV6 is not set
# CONFIG_NETLABEL is not set
CONFIG_ANDROID_PARANOID_NETWORK=y
CONFIG_NET_ACTIVITY_STATS=y
# CONFIG_NETWORK_SECMARK is not set
# CONFIG_NETWORK_PHY_TIMESTAMPING is not set
CONFIG_NETFILTER=y
# CONFIG_NETFILTER_DEBUG is not set
CONFIG_NETFILTER_ADVANCED=y
CONFIG_BRIDGE_NETFILTER=y

#
# Core Netfilter Configuration
#
# CONFIG_NETFILTER_NETLINK_ACCT is not set
# CONFIG_NETFILTER_NETLINK_QUEUE is not set
# CONFIG_NETFILTER_NETLINK_LOG is not set
CONFIG_NF_CONNTRACK=m
# CONFIG_NF_CONNTRACK_MARK is not set
CONFIG_NF_CONNTRACK_PROCFS=y
# CONFIG_NF_CONNTRACK_EVENTS is not set
# CONFIG_NF_CONNTRACK_TIMEOUT is not set
# CONFIG_NF_CONNTRACK_TIMESTAMP is not set
# CONFIG_NF_CT_PROTO_DCCP is not set
# CONFIG_NF_CT_PROTO_SCTP is not set
# CONFIG_NF_CT_PROTO_UDPLITE is not set
# CONFIG_NF_CONNTRACK_AMANDA is not set
# CONFIG_NF_CONNTRACK_FTP is not set
# CONFIG_NF_CONNTRACK_H323 is not set
# CONFIG_NF_CONNTRACK_IRC is not set
# CONFIG_NF_CONNTRACK_NETBIOS_NS is not set
# CONFIG_NF_CONNTRACK_SNMP is not set
# CONFIG_NF_CONNTRACK_PPTP is not set
# CONFIG_NF_CONNTRACK_SANE is not set
# CONFIG_NF_CONNTRACK_SIP is not set
# CONFIG_NF_CONNTRACK_TFTP is not set
# CONFIG_NF_CT_NETLINK is not set
# CONFIG_NF_CT_NETLINK_TIMEOUT is not set
CONFIG_NF_NAT=m
CONFIG_NF_NAT_NEEDED=y
# CONFIG_NF_NAT_AMANDA is not set
# CONFIG_NF_NAT_FTP is not set
# CONFIG_NF_NAT_IRC is not set
# CONFIG_NF_NAT_SIP is not set
# CONFIG_NF_NAT_TFTP is not set
# CONFIG_NF_TABLES is not set
CONFIG_NETFILTER_XTABLES=m

#
# Xtables combined modules
#
# CONFIG_NETFILTER_XT_MARK is not set
# CONFIG_NETFILTER_XT_CONNMARK is not set

#
# Xtables targets
#
# CONFIG_NETFILTER_XT_TARGET_CLASSIFY is not set
# CONFIG_NETFILTER_XT_TARGET_CONNMARK is not set
# CONFIG_NETFILTER_XT_TARGET_HMARK is not set
# CONFIG_NETFILTER_XT_TARGET_IDLETIMER is not set
# CONFIG_NETFILTER_XT_TARGET_LED is not set
# CONFIG_NETFILTER_XT_TARGET_LOG is not set
# CONFIG_NETFILTER_XT_TARGET_MARK is not set
# CONFIG_NETFILTER_XT_TARGET_NETMAP is not set
# CONFIG_NETFILTER_XT_TARGET_NFLOG is not set
# CONFIG_NETFILTER_XT_TARGET_NFQUEUE is not set
# CONFIG_NETFILTER_XT_TARGET_RATEEST is not set
# CONFIG_NETFILTER_XT_TARGET_REDIRECT is not set
# CONFIG_NETFILTER_XT_TARGET_TEE is not set
# CONFIG_NETFILTER_XT_TARGET_TCPMSS is not set

#
# Xtables matches
#
# CONFIG_NETFILTER_XT_MATCH_ADDRTYPE is not set
# CONFIG_NETFILTER_XT_MATCH_BPF is not set
# CONFIG_NETFILTER_XT_MATCH_CGROUP is not set
# CONFIG_NETFILTER_XT_MATCH_CLUSTER is not set
# CONFIG_NETFILTER_XT_MATCH_COMMENT is not set
# CONFIG_NETFILTER_XT_MATCH_CONNBYTES is not set
# CONFIG_NETFILTER_XT_MATCH_CONNLABEL is not set
# CONFIG_NETFILTER_XT_MATCH_CONNLIMIT is not set
# CONFIG_NETFILTER_XT_MATCH_CONNMARK is not set
# CONFIG_NETFILTER_XT_MATCH_CONNTRACK is not set
# CONFIG_NETFILTER_XT_MATCH_CPU is not set
# CONFIG_NETFILTER_XT_MATCH_DCCP is not set
# CONFIG_NETFILTER_XT_MATCH_DEVGROUP is not set
# CONFIG_NETFILTER_XT_MATCH_DSCP is not set
# CONFIG_NETFILTER_XT_MATCH_ECN is not set
# CONFIG_NETFILTER_XT_MATCH_ESP is not set
# CONFIG_NETFILTER_XT_MATCH_HASHLIMIT is not set
# CONFIG_NETFILTER_XT_MATCH_HELPER is not set
# CONFIG_NETFILTER_XT_MATCH_HL is not set
# CONFIG_NETFILTER_XT_MATCH_IPCOMP is not set
# CONFIG_NETFILTER_XT_MATCH_IPRANGE is not set
# CONFIG_NETFILTER_XT_MATCH_L2TP is not set
# CONFIG_NETFILTER_XT_MATCH_LENGTH is not set
# CONFIG_NETFILTER_XT_MATCH_LIMIT is not set
# CONFIG_NETFILTER_XT_MATCH_MAC is not set
# CONFIG_NETFILTER_XT_MATCH_MARK is not set
# CONFIG_NETFILTER_XT_MATCH_MULTIPORT is not set
# CONFIG_NETFILTER_XT_MATCH_NFACCT is not set
# CONFIG_NETFILTER_XT_MATCH_OWNER is not set
# CONFIG_NETFILTER_XT_MATCH_POLICY is not set
# CONFIG_NETFILTER_XT_MATCH_PHYSDEV is not set
# CONFIG_NETFILTER_XT_MATCH_PKTTYPE is not set
# CONFIG_NETFILTER_XT_MATCH_QUOTA is not set
# CONFIG_NETFILTER_XT_MATCH_QUOTA2 is not set
# CONFIG_NETFILTER_XT_MATCH_RATEEST is not set
# CONFIG_NETFILTER_XT_MATCH_REALM is not set
# CONFIG_NETFILTER_XT_MATCH_RECENT is not set
# CONFIG_NETFILTER_XT_MATCH_SCTP is not set
# CONFIG_NETFILTER_XT_MATCH_SOCKET is not set
# CONFIG_NETFILTER_XT_MATCH_STATE is not set
# CONFIG_NETFILTER_XT_MATCH_STATISTIC is not set
# CONFIG_NETFILTER_XT_MATCH_STRING is not set
# CONFIG_NETFILTER_XT_MATCH_TCPMSS is not set
# CONFIG_NETFILTER_XT_MATCH_TIME is not set
# CONFIG_NETFILTER_XT_MATCH_U32 is not set
# CONFIG_IP_SET is not set
# CONFIG_IP_VS is not set

#
# IP: Netfilter Configuration
#
CONFIG_NF_DEFRAG_IPV4=m
CONFIG_NF_CONNTRACK_IPV4=m
CONFIG_NF_CONNTRACK_PROC_COMPAT=y
CONFIG_IP_NF_IPTABLES=m
# CONFIG_IP_NF_MATCH_AH is not set
# CONFIG_IP_NF_MATCH_ECN is not set
# CONFIG_IP_NF_MATCH_TTL is not set
CONFIG_IP_NF_FILTER=m
# CONFIG_IP_NF_TARGET_REJECT is not set
# CONFIG_IP_NF_TARGET_SYNPROXY is not set
# CONFIG_IP_NF_TARGET_ULOG is not set
CONFIG_NF_NAT_IPV4=m
CONFIG_IP_NF_TARGET_MASQUERADE=m
# CONFIG_IP_NF_TARGET_NETMAP is not set
# CONFIG_IP_NF_TARGET_REDIRECT is not set
# CONFIG_NF_NAT_PPTP is not set
# CONFIG_NF_NAT_H323 is not set
# CONFIG_IP_NF_MANGLE is not set
# CONFIG_IP_NF_RAW is not set
# CONFIG_IP_NF_SECURITY is not set
# CONFIG_IP_NF_ARPTABLES is not set
# CONFIG_BRIDGE_NF_EBTABLES is not set
# CONFIG_IP_DCCP is not set
# CONFIG_IP_SCTP is not set
# CONFIG_RDS is not set
# CONFIG_TIPC is not set
# CONFIG_ATM is not set
# CONFIG_L2TP is not set
CONFIG_STP=m
CONFIG_BRIDGE=m
CONFIG_BRIDGE_IGMP_SNOOPING=y
CONFIG_HAVE_NET_DSA=y
# CONFIG_VLAN_8021Q is not set
# CONFIG_DECNET is not set
CONFIG_LLC=m
# CONFIG_LLC2 is not set
# CONFIG_IPX is not set
# CONFIG_ATALK is not set
# CONFIG_X25 is not set
# CONFIG_LAPB is not set
# CONFIG_PHONET is not set
# CONFIG_IEEE802154 is not set
CONFIG_6LOWPAN_IPHC=m
# CONFIG_NET_SCHED is not set
# CONFIG_DCB is not set
CONFIG_DNS_RESOLVER=y
# CONFIG_BATMAN_ADV is not set
# CONFIG_OPENVSWITCH is not set
# CONFIG_VSOCKETS is not set
# CONFIG_NETLINK_MMAP is not set
# CONFIG_NETLINK_DIAG is not set
# CONFIG_NET_MPLS_GSO is not set
# CONFIG_HSR is not set
CONFIG_RPS=y
CONFIG_RFS_ACCEL=y
CONFIG_XPS=y
# CONFIG_CGROUP_NET_PRIO is not set
# CONFIG_CGROUP_NET_CLASSID is not set
CONFIG_NET_RX_BUSY_POLL=y
CONFIG_BQL=y
# CONFIG_BPF_JIT is not set
CONFIG_NET_FLOW_LIMIT=y

#
# Network testing
#
# CONFIG_NET_PKTGEN is not set
# CONFIG_NET_TCPPROBE is not set
# CONFIG_HAMRADIO is not set
CONFIG_CAN=m
CONFIG_CAN_RAW=m
CONFIG_CAN_BCM=m
CONFIG_CAN_GW=m

#
# CAN Device Drivers
#
# CONFIG_CAN_VCAN is not set
# CONFIG_CAN_SLCAN is not set
CONFIG_CAN_DEV=m
CONFIG_CAN_CALC_BITTIMING=y
# CONFIG_CAN_LEDS is not set
# CONFIG_CAN_AT91 is not set
# CONFIG_CAN_TI_HECC is not set
# CONFIG_CAN_MCP251X is not set
# CONFIG_CAN_FLEXCAN is not set
# CONFIG_PCH_CAN is not set
# CONFIG_CAN_GRCAN is not set
# CONFIG_CAN_SJA1000 is not set
CONFIG_CAN_C_CAN=m
CONFIG_CAN_C_CAN_PLATFORM=m
# CONFIG_CAN_C_CAN_PCI is not set
# CONFIG_CAN_CC770 is not set

#
# CAN USB interfaces
#
# CONFIG_CAN_EMS_USB is not set
# CONFIG_CAN_ESD_USB2 is not set
# CONFIG_CAN_KVASER_USB is not set
# CONFIG_CAN_PEAK_USB is not set
# CONFIG_CAN_8DEV_USB is not set
# CONFIG_CAN_SOFTING is not set
# CONFIG_CAN_DEBUG_DEVICES is not set
# CONFIG_IRDA is not set
CONFIG_BT=m
# CONFIG_BT_RFCOMM is not set
# CONFIG_BT_BNEP is not set
# CONFIG_BT_HIDP is not set

#
# Bluetooth device drivers
#
# CONFIG_BT_HCIBTUSB is not set
# CONFIG_BT_HCIBTSDIO is not set
CONFIG_BT_HCIUART=m
CONFIG_BT_HCIUART_H4=y
CONFIG_BT_HCIUART_BCSP=y
# CONFIG_BT_HCIUART_ATH3K is not set
CONFIG_BT_HCIUART_LL=y
# CONFIG_BT_HCIUART_3WIRE is not set
CONFIG_BT_HCIBCM203X=m
CONFIG_BT_HCIBPA10X=m
# CONFIG_BT_HCIBFUSB is not set
# CONFIG_BT_HCIVHCI is not set
# CONFIG_BT_MRVL is not set
CONFIG_BT_WILINK=m
# CONFIG_AF_RXRPC is not set
CONFIG_WIRELESS=y
# CONFIG_CFG80211 is not set
# CONFIG_LIB80211 is not set

#
# CFG80211 needs to be enabled for MAC80211
#
# CONFIG_WIMAX is not set
CONFIG_RFKILL=y
CONFIG_RFKILL_PM=y
CONFIG_RFKILL_LEDS=y
# CONFIG_RFKILL_INPUT is not set
# CONFIG_RFKILL_REGULATOR is not set
# CONFIG_RFKILL_GPIO is not set
# CONFIG_NET_9P is not set
# CONFIG_CAIF is not set
# CONFIG_CEPH_LIB is not set
# CONFIG_NFC is not set
CONFIG_HAVE_BPF_JIT=y

#
# Device Drivers
#

#
# Generic Driver Options
#
CONFIG_UEVENT_HELPER_PATH="/sbin/hotplug"
CONFIG_DEVTMPFS=y
CONFIG_DEVTMPFS_MOUNT=y
CONFIG_STANDALONE=y
CONFIG_PREVENT_FIRMWARE_BUILD=y
CONFIG_FW_LOADER=y
CONFIG_FIRMWARE_IN_KERNEL=y
CONFIG_EXTRA_FIRMWARE=""
CONFIG_FW_LOADER_USER_HELPER=y
# CONFIG_DEBUG_DRIVER is not set
# CONFIG_DEBUG_DEVRES is not set
CONFIG_SYS_HYPERVISOR=y
# CONFIG_GENERIC_CPU_DEVICES is not set
# CONFIG_HAVE_CPU_AUTOPROBE is not set
CONFIG_SOC_BUS=y
CONFIG_REGMAP=y
CONFIG_REGMAP_I2C=y
CONFIG_REGMAP_SPI=y
CONFIG_REGMAP_MMIO=y
CONFIG_REGMAP_IRQ=y
CONFIG_DMA_SHARED_BUFFER=y
CONFIG_DMA_CMA=y

#
# Default contiguous memory area size:
#
CONFIG_CMA_SIZE_MBYTES=24
CONFIG_CMA_SIZE_SEL_MBYTES=y
# CONFIG_CMA_SIZE_SEL_PERCENTAGE is not set
# CONFIG_CMA_SIZE_SEL_MIN is not set
# CONFIG_CMA_SIZE_SEL_MAX is not set
CONFIG_CMA_ALIGNMENT=8
CONFIG_CMA_AREAS=7

#
# Bus devices
#
CONFIG_OMAP_OCP2SCP=y
# CONFIG_OMAP_INTERCONNECT is not set
# CONFIG_ARM_CCI is not set
CONFIG_CONNECTOR=y
CONFIG_PROC_EVENTS=y
CONFIG_MTD=y
CONFIG_MTD_TESTS=m
# CONFIG_MTD_REDBOOT_PARTS is not set
CONFIG_MTD_CMDLINE_PARTS=y
# CONFIG_MTD_AFS_PARTS is not set
CONFIG_MTD_OF_PARTS=y
# CONFIG_MTD_AR7_PARTS is not set

#
# User Modules And Translation Layers
#
CONFIG_MTD_BLKDEVS=y
CONFIG_MTD_BLOCK=y
# CONFIG_FTL is not set
# CONFIG_NFTL is not set
# CONFIG_INFTL is not set
# CONFIG_RFD_FTL is not set
# CONFIG_SSFDC is not set
# CONFIG_SM_FTL is not set
CONFIG_MTD_OOPS=y
# CONFIG_MTD_SWAP is not set

#
# RAM/ROM/Flash chip drivers
#
CONFIG_MTD_CFI=y
# CONFIG_MTD_JEDECPROBE is not set
CONFIG_MTD_GEN_PROBE=y
# CONFIG_MTD_CFI_ADV_OPTIONS is not set
CONFIG_MTD_MAP_BANK_WIDTH_1=y
CONFIG_MTD_MAP_BANK_WIDTH_2=y
CONFIG_MTD_MAP_BANK_WIDTH_4=y
# CONFIG_MTD_MAP_BANK_WIDTH_8 is not set
# CONFIG_MTD_MAP_BANK_WIDTH_16 is not set
# CONFIG_MTD_MAP_BANK_WIDTH_32 is not set
CONFIG_MTD_CFI_I1=y
CONFIG_MTD_CFI_I2=y
# CONFIG_MTD_CFI_I4 is not set
# CONFIG_MTD_CFI_I8 is not set
CONFIG_MTD_CFI_INTELEXT=y
# CONFIG_MTD_CFI_AMDSTD is not set
# CONFIG_MTD_CFI_STAA is not set
CONFIG_MTD_CFI_UTIL=y
# CONFIG_MTD_RAM is not set
# CONFIG_MTD_ROM is not set
# CONFIG_MTD_ABSENT is not set

#
# Mapping drivers for chip access
#
# CONFIG_MTD_COMPLEX_MAPPINGS is not set
# CONFIG_MTD_PHYSMAP is not set
# CONFIG_MTD_PHYSMAP_OF is not set
# CONFIG_MTD_INTEL_VR_NOR is not set
# CONFIG_MTD_PLATRAM is not set

#
# Self-contained MTD device drivers
#
# CONFIG_MTD_PMC551 is not set
# CONFIG_MTD_DATAFLASH is not set
CONFIG_MTD_M25P80=m
# CONFIG_MTD_SST25L is not set
# CONFIG_MTD_SLRAM is not set
# CONFIG_MTD_PHRAM is not set
# CONFIG_MTD_MTDRAM is not set
# CONFIG_MTD_BLOCK2MTD is not set

#
# Disk-On-Chip Device Drivers
#
# CONFIG_MTD_DOCG3 is not set
CONFIG_MTD_NAND_IDS=y
CONFIG_MTD_NAND_ECC=y
# CONFIG_MTD_NAND_ECC_SMC is not set
CONFIG_MTD_NAND=y
# CONFIG_MTD_NAND_ECC_BCH is not set
# CONFIG_MTD_SM_COMMON is not set
# CONFIG_MTD_NAND_DENALI is not set
# CONFIG_MTD_NAND_GPIO is not set
CONFIG_MTD_NAND_OMAP2=y
CONFIG_MTD_NAND_OMAP_BCH=y
# CONFIG_MTD_NAND_RICOH is not set
# CONFIG_MTD_NAND_DISKONCHIP is not set
# CONFIG_MTD_NAND_DOCG4 is not set
# CONFIG_MTD_NAND_CAFE is not set
# CONFIG_MTD_NAND_NANDSIM is not set
# CONFIG_MTD_NAND_PLATFORM is not set
CONFIG_MTD_ONENAND=y
CONFIG_MTD_ONENAND_VERIFY_WRITE=y
# CONFIG_MTD_ONENAND_GENERIC is not set
# CONFIG_MTD_ONENAND_OTP is not set
# CONFIG_MTD_ONENAND_2X_PROGRAM is not set

#
# LPDDR flash memory drivers
#
# CONFIG_MTD_LPDDR is not set
CONFIG_MTD_UBI=y
CONFIG_MTD_UBI_WL_THRESHOLD=4096
CONFIG_MTD_UBI_BEB_LIMIT=20
# CONFIG_MTD_UBI_FASTMAP is not set
# CONFIG_MTD_UBI_GLUEBI is not set
CONFIG_DTC=y
CONFIG_OF=y

#
# Device Tree and Open Firmware support
#
CONFIG_PROC_DEVICETREE=y
# CONFIG_OF_SELFTEST is not set
CONFIG_OF_FLATTREE=y
CONFIG_OF_EARLY_FLATTREE=y
CONFIG_OF_ADDRESS=y
CONFIG_OF_IRQ=y
CONFIG_OF_NET=y
CONFIG_OF_MDIO=y
CONFIG_OF_PCI=y
CONFIG_OF_PCI_IRQ=y
CONFIG_OF_MTD=y
CONFIG_OF_RESERVED_MEM=y
CONFIG_ARCH_MIGHT_HAVE_PC_PARPORT=y
# CONFIG_PARPORT is not set
CONFIG_BLK_DEV=y
# CONFIG_BLK_DEV_NULL_BLK is not set
# CONFIG_BLK_DEV_PCIESSD_MTIP32XX is not set
# CONFIG_BLK_CPQ_CISS_DA is not set
# CONFIG_BLK_DEV_DAC960 is not set
# CONFIG_BLK_DEV_UMEM is not set
# CONFIG_BLK_DEV_COW_COMMON is not set
CONFIG_BLK_DEV_LOOP=y
CONFIG_BLK_DEV_LOOP_MIN_COUNT=8
# CONFIG_BLK_DEV_CRYPTOLOOP is not set
# CONFIG_BLK_DEV_DRBD is not set
# CONFIG_BLK_DEV_NBD is not set
# CONFIG_BLK_DEV_NVME is not set
# CONFIG_BLK_DEV_SX8 is not set
CONFIG_BLK_DEV_RAM=y
CONFIG_BLK_DEV_RAM_COUNT=16
CONFIG_BLK_DEV_RAM_SIZE=16384
# CONFIG_BLK_DEV_XIP is not set
# CONFIG_CDROM_PKTCDVD is not set
# CONFIG_ATA_OVER_ETH is not set
# CONFIG_MG_DISK is not set
CONFIG_XEN_BLKDEV_FRONTEND=y
CONFIG_XEN_BLKDEV_BACKEND=y
# CONFIG_VIRTIO_BLK is not set
# CONFIG_BLK_DEV_RBD is not set
# CONFIG_BLK_DEV_RSXX is not set

#
# Misc devices
#
CONFIG_SENSORS_LIS3LV02D=m
# CONFIG_AD525X_DPOT is not set
# CONFIG_ATMEL_PWM is not set
# CONFIG_DUMMY_IRQ is not set
# CONFIG_PHANTOM is not set
# CONFIG_SGI_IOC4 is not set
# CONFIG_TIFM_CORE is not set
# CONFIG_ICS932S401 is not set
# CONFIG_ATMEL_SSC is not set
# CONFIG_ENCLOSURE_SERVICES is not set
# CONFIG_HP_ILO is not set
# CONFIG_APDS9802ALS is not set
# CONFIG_ISL29003 is not set
# CONFIG_ISL29020 is not set
CONFIG_SENSORS_TSL2550=m
# CONFIG_SENSORS_BH1780 is not set
# CONFIG_SENSORS_BH1770 is not set
# CONFIG_SENSORS_APDS990X is not set
# CONFIG_HMC6352 is not set
# CONFIG_DS1682 is not set
# CONFIG_TI_DAC7512 is not set
# CONFIG_UID_STAT is not set
CONFIG_BMP085=y
CONFIG_BMP085_I2C=m
# CONFIG_BMP085_SPI is not set
# CONFIG_PCH_PHUB is not set
# CONFIG_USB_SWITCH_FSA9480 is not set
# CONFIG_LATTICE_ECP3_CONFIG is not set
# CONFIG_SRAM is not set
# CONFIG_C2PORT is not set

#
# EEPROM support
#
# CONFIG_EEPROM_AT24 is not set
# CONFIG_EEPROM_AT25 is not set
# CONFIG_EEPROM_LEGACY is not set
# CONFIG_EEPROM_MAX6875 is not set
CONFIG_EEPROM_93CX6=y
# CONFIG_EEPROM_93XX46 is not set
# CONFIG_CB710_CORE is not set

#
# Texas Instruments shared transport line discipline
#
CONFIG_TI_ST=y
CONFIG_ST_HCI=y
# CONFIG_SENSORS_LIS3_SPI is not set
CONFIG_SENSORS_LIS3_I2C=m

#
# Altera FPGA firmware download module
#
# CONFIG_ALTERA_STAPL is not set

#
# Intel MIC Host Driver
#

#
# Intel MIC Card Driver
#
CONFIG_HAVE_IDE=y
# CONFIG_IDE is not set

#
# SCSI device support
#
CONFIG_SCSI_MOD=y
# CONFIG_RAID_ATTRS is not set
CONFIG_SCSI=y
CONFIG_SCSI_DMA=y
# CONFIG_SCSI_TGT is not set
# CONFIG_SCSI_NETLINK is not set
CONFIG_SCSI_PROC_FS=y

#
# SCSI support type (disk, tape, CD-ROM)
#
CONFIG_BLK_DEV_SD=y
# CONFIG_CHR_DEV_ST is not set
# CONFIG_CHR_DEV_OSST is not set
# CONFIG_BLK_DEV_SR is not set
# CONFIG_CHR_DEV_SG is not set
# CONFIG_CHR_DEV_SCH is not set
CONFIG_SCSI_MULTI_LUN=y
# CONFIG_SCSI_CONSTANTS is not set
# CONFIG_SCSI_LOGGING is not set
CONFIG_SCSI_SCAN_ASYNC=y

#
# SCSI Transports
#
# CONFIG_SCSI_SPI_ATTRS is not set
# CONFIG_SCSI_FC_ATTRS is not set
# CONFIG_SCSI_ISCSI_ATTRS is not set
# CONFIG_SCSI_SAS_ATTRS is not set
# CONFIG_SCSI_SAS_LIBSAS is not set
# CONFIG_SCSI_SRP_ATTRS is not set
CONFIG_SCSI_LOWLEVEL=y
# CONFIG_ISCSI_TCP is not set
# CONFIG_ISCSI_BOOT_SYSFS is not set
# CONFIG_SCSI_CXGB3_ISCSI is not set
# CONFIG_SCSI_CXGB4_ISCSI is not set
# CONFIG_SCSI_BNX2_ISCSI is not set
# CONFIG_SCSI_BNX2X_FCOE is not set
# CONFIG_BE2ISCSI is not set
# CONFIG_BLK_DEV_3W_XXXX_RAID is not set
# CONFIG_SCSI_HPSA is not set
# CONFIG_SCSI_3W_9XXX is not set
# CONFIG_SCSI_3W_SAS is not set
# CONFIG_SCSI_ACARD is not set
# CONFIG_SCSI_AACRAID is not set
# CONFIG_SCSI_AIC7XXX is not set
# CONFIG_SCSI_AIC79XX is not set
# CONFIG_SCSI_AIC94XX is not set
# CONFIG_SCSI_MVSAS is not set
# CONFIG_SCSI_MVUMI is not set
# CONFIG_SCSI_ARCMSR is not set
# CONFIG_SCSI_ESAS2R is not set
# CONFIG_MEGARAID_NEWGEN is not set
# CONFIG_MEGARAID_LEGACY is not set
# CONFIG_MEGARAID_SAS is not set
# CONFIG_SCSI_MPT2SAS is not set
# CONFIG_SCSI_MPT3SAS is not set
# CONFIG_SCSI_UFSHCD is not set
# CONFIG_SCSI_HPTIOP is not set
# CONFIG_LIBFC is not set
# CONFIG_LIBFCOE is not set
# CONFIG_FCOE is not set
# CONFIG_SCSI_DMX3191D is not set
# CONFIG_SCSI_FUTURE_DOMAIN is not set
# CONFIG_SCSI_IPS is not set
# CONFIG_SCSI_INITIO is not set
# CONFIG_SCSI_INIA100 is not set
# CONFIG_SCSI_STEX is not set
# CONFIG_SCSI_SYM53C8XX_2 is not set
# CONFIG_SCSI_IPR is not set
# CONFIG_SCSI_QLOGIC_1280 is not set
# CONFIG_SCSI_QLA_FC is not set
# CONFIG_SCSI_QLA_ISCSI is not set
# CONFIG_SCSI_LPFC is not set
# CONFIG_SCSI_DC395x is not set
# CONFIG_SCSI_DC390T is not set
# CONFIG_SCSI_NSP32 is not set
# CONFIG_SCSI_DEBUG is not set
# CONFIG_SCSI_PMCRAID is not set
# CONFIG_SCSI_PM8001 is not set
# CONFIG_SCSI_SRP is not set
# CONFIG_SCSI_BFA_FC is not set
# CONFIG_SCSI_VIRTIO is not set
# CONFIG_SCSI_CHELSIO_FCOE is not set
# CONFIG_SCSI_DH is not set
# CONFIG_SCSI_OSD_INITIATOR is not set
CONFIG_ATA=y
# CONFIG_ATA_NONSTANDARD is not set
CONFIG_ATA_VERBOSE_ERROR=y
CONFIG_SATA_PMP=y

#
# Controllers with non-SFF native interface
#
# CONFIG_SATA_AHCI is not set
CONFIG_SATA_AHCI_PLATFORM=y
# CONFIG_AHCI_IMX is not set
# CONFIG_SATA_INIC162X is not set
# CONFIG_SATA_ACARD_AHCI is not set
# CONFIG_SATA_SIL24 is not set
CONFIG_ATA_SFF=y

#
# SFF controllers with custom DMA interface
#
# CONFIG_PDC_ADMA is not set
# CONFIG_SATA_QSTOR is not set
# CONFIG_SATA_SX4 is not set
CONFIG_ATA_BMDMA=y

#
# SATA SFF controllers with BMDMA
#
# CONFIG_ATA_PIIX is not set
# CONFIG_SATA_HIGHBANK is not set
# CONFIG_SATA_MV is not set
# CONFIG_SATA_NV is not set
# CONFIG_SATA_PROMISE is not set
# CONFIG_SATA_RCAR is not set
# CONFIG_SATA_SIL is not set
# CONFIG_SATA_SIS is not set
# CONFIG_SATA_SVW is not set
# CONFIG_SATA_ULI is not set
# CONFIG_SATA_VIA is not set
# CONFIG_SATA_VITESSE is not set

#
# PATA SFF controllers with BMDMA
#
# CONFIG_PATA_ALI is not set
# CONFIG_PATA_AMD is not set
# CONFIG_PATA_ARASAN_CF is not set
# CONFIG_PATA_ARTOP is not set
# CONFIG_PATA_ATIIXP is not set
# CONFIG_PATA_ATP867X is not set
# CONFIG_PATA_CMD64X is not set
# CONFIG_PATA_CS5520 is not set
# CONFIG_PATA_CS5530 is not set
# CONFIG_PATA_CS5536 is not set
# CONFIG_PATA_CYPRESS is not set
# CONFIG_PATA_EFAR is not set
# CONFIG_PATA_HPT366 is not set
# CONFIG_PATA_HPT37X is not set
# CONFIG_PATA_HPT3X2N is not set
# CONFIG_PATA_HPT3X3 is not set
# CONFIG_PATA_IT8213 is not set
# CONFIG_PATA_IT821X is not set
# CONFIG_PATA_JMICRON is not set
# CONFIG_PATA_MARVELL is not set
# CONFIG_PATA_NETCELL is not set
# CONFIG_PATA_NINJA32 is not set
# CONFIG_PATA_NS87415 is not set
# CONFIG_PATA_OLDPIIX is not set
# CONFIG_PATA_OPTIDMA is not set
# CONFIG_PATA_PDC2027X is not set
# CONFIG_PATA_PDC_OLD is not set
# CONFIG_PATA_RADISYS is not set
# CONFIG_PATA_RDC is not set
# CONFIG_PATA_SC1200 is not set
# CONFIG_PATA_SCH is not set
# CONFIG_PATA_SERVERWORKS is not set
# CONFIG_PATA_SIL680 is not set
# CONFIG_PATA_SIS is not set
# CONFIG_PATA_TOSHIBA is not set
# CONFIG_PATA_TRIFLEX is not set
# CONFIG_PATA_VIA is not set
# CONFIG_PATA_WINBOND is not set

#
# PIO-only SFF controllers
#
# CONFIG_PATA_CMD640_PCI is not set
# CONFIG_PATA_MPIIX is not set
# CONFIG_PATA_NS87410 is not set
# CONFIG_PATA_OPTI is not set
# CONFIG_PATA_PLATFORM is not set
# CONFIG_PATA_RZ1000 is not set

#
# Generic fallback / legacy drivers
#
# CONFIG_ATA_GENERIC is not set
# CONFIG_PATA_LEGACY is not set
CONFIG_MD=y
# CONFIG_BLK_DEV_MD is not set
# CONFIG_BCACHE is not set
# CONFIG_BLK_DEV_DM is not set
# CONFIG_TARGET_CORE is not set
# CONFIG_FUSION is not set

#
# IEEE 1394 (FireWire) support
#
# CONFIG_FIREWIRE is not set
# CONFIG_FIREWIRE_NOSY is not set
# CONFIG_I2O is not set
CONFIG_NETDEVICES=y
CONFIG_MII=y
CONFIG_NET_CORE=y
# CONFIG_BONDING is not set
# CONFIG_DUMMY is not set
# CONFIG_EQUALIZER is not set
# CONFIG_NET_FC is not set
# CONFIG_NET_TEAM is not set
# CONFIG_MACVLAN is not set
# CONFIG_VXLAN is not set
# CONFIG_NETCONSOLE is not set
# CONFIG_NETPOLL is not set
# CONFIG_NET_POLL_CONTROLLER is not set
# CONFIG_TUN is not set
# CONFIG_VETH is not set
# CONFIG_VIRTIO_NET is not set
# CONFIG_NLMON is not set
# CONFIG_ARCNET is not set

#
# CAIF transport drivers
#

#
# Distributed Switch Architecture drivers
#
# CONFIG_NET_DSA_MV88E6XXX is not set
# CONFIG_NET_DSA_MV88E6060 is not set
# CONFIG_NET_DSA_MV88E6XXX_NEED_PPU is not set
# CONFIG_NET_DSA_MV88E6131 is not set
# CONFIG_NET_DSA_MV88E6123_61_65 is not set
CONFIG_ETHERNET=y
CONFIG_NET_VENDOR_3COM=y
# CONFIG_VORTEX is not set
# CONFIG_TYPHOON is not set
CONFIG_NET_VENDOR_ADAPTEC=y
# CONFIG_ADAPTEC_STARFIRE is not set
CONFIG_NET_VENDOR_ALTEON=y
# CONFIG_ACENIC is not set
CONFIG_NET_VENDOR_AMD=y
# CONFIG_AMD8111_ETH is not set
# CONFIG_PCNET32 is not set
CONFIG_NET_VENDOR_ARC=y
# CONFIG_ARC_EMAC is not set
CONFIG_NET_VENDOR_ATHEROS=y
# CONFIG_ATL2 is not set
# CONFIG_ATL1 is not set
# CONFIG_ATL1E is not set
# CONFIG_ATL1C is not set
# CONFIG_ALX is not set
CONFIG_NET_CADENCE=y
# CONFIG_ARM_AT91_ETHER is not set
# CONFIG_MACB is not set
CONFIG_NET_VENDOR_BROADCOM=y
# CONFIG_B44 is not set
# CONFIG_BNX2 is not set
# CONFIG_CNIC is not set
# CONFIG_TIGON3 is not set
# CONFIG_BNX2X is not set
CONFIG_NET_VENDOR_BROCADE=y
# CONFIG_BNA is not set
# CONFIG_NET_CALXEDA_XGMAC is not set
CONFIG_NET_VENDOR_CHELSIO=y
# CONFIG_CHELSIO_T1 is not set
# CONFIG_CHELSIO_T3 is not set
# CONFIG_CHELSIO_T4 is not set
# CONFIG_CHELSIO_T4VF is not set
CONFIG_NET_VENDOR_CIRRUS=y
# CONFIG_CS89x0 is not set
CONFIG_NET_VENDOR_CISCO=y
# CONFIG_ENIC is not set
# CONFIG_DM9000 is not set
# CONFIG_DNET is not set
CONFIG_NET_VENDOR_DEC=y
# CONFIG_NET_TULIP is not set
CONFIG_NET_VENDOR_DLINK=y
# CONFIG_DL2K is not set
# CONFIG_SUNDANCE is not set
CONFIG_NET_VENDOR_EMULEX=y
# CONFIG_BE2NET is not set
CONFIG_NET_VENDOR_EXAR=y
# CONFIG_S2IO is not set
# CONFIG_VXGE is not set
CONFIG_NET_VENDOR_FARADAY=y
# CONFIG_FTMAC100 is not set
# CONFIG_FTGMAC100 is not set
CONFIG_NET_VENDOR_HP=y
# CONFIG_HP100 is not set
CONFIG_NET_VENDOR_INTEL=y
# CONFIG_E100 is not set
# CONFIG_E1000 is not set
# CONFIG_E1000E is not set
# CONFIG_IGB is not set
# CONFIG_IGBVF is not set
# CONFIG_IXGB is not set
# CONFIG_IXGBE is not set
# CONFIG_I40E is not set
CONFIG_NET_VENDOR_I825XX=y
# CONFIG_IP1000 is not set
# CONFIG_JME is not set
CONFIG_NET_VENDOR_MARVELL=y
# CONFIG_MVMDIO is not set
# CONFIG_SKGE is not set
# CONFIG_SKY2 is not set
CONFIG_NET_VENDOR_MELLANOX=y
# CONFIG_MLX4_EN is not set
# CONFIG_MLX4_CORE is not set
# CONFIG_MLX5_CORE is not set
CONFIG_NET_VENDOR_MICREL=y
# CONFIG_KS8842 is not set
CONFIG_KS8851=y
CONFIG_KS8851_MLL=y
# CONFIG_KSZ884X_PCI is not set
CONFIG_NET_VENDOR_MICROCHIP=y
# CONFIG_ENC28J60 is not set
CONFIG_NET_VENDOR_MYRI=y
# CONFIG_MYRI10GE is not set
# CONFIG_FEALNX is not set
CONFIG_NET_VENDOR_NATSEMI=y
# CONFIG_NATSEMI is not set
# CONFIG_NS83820 is not set
CONFIG_NET_VENDOR_8390=y
# CONFIG_AX88796 is not set
# CONFIG_NE2K_PCI is not set
CONFIG_NET_VENDOR_NVIDIA=y
# CONFIG_FORCEDETH is not set
CONFIG_NET_VENDOR_OKI=y
# CONFIG_ETHOC is not set
CONFIG_NET_PACKET_ENGINE=y
# CONFIG_HAMACHI is not set
# CONFIG_YELLOWFIN is not set
CONFIG_NET_VENDOR_QLOGIC=y
# CONFIG_QLA3XXX is not set
# CONFIG_QLCNIC is not set
# CONFIG_QLGE is not set
# CONFIG_NETXEN_NIC is not set
CONFIG_NET_VENDOR_REALTEK=y
# CONFIG_8139CP is not set
# CONFIG_8139TOO is not set
# CONFIG_R8169 is not set
# CONFIG_SH_ETH is not set
CONFIG_NET_VENDOR_RDC=y
# CONFIG_R6040 is not set
CONFIG_NET_VENDOR_SEEQ=y
CONFIG_NET_VENDOR_SILAN=y
# CONFIG_SC92031 is not set
CONFIG_NET_VENDOR_SIS=y
# CONFIG_SIS900 is not set
# CONFIG_SIS190 is not set
# CONFIG_SFC is not set
CONFIG_NET_VENDOR_SMSC=y
CONFIG_SMC91X=y
# CONFIG_EPIC100 is not set
# CONFIG_SMC911X is not set
CONFIG_SMSC911X=y
# CONFIG_SMSC911X_ARCH_HOOKS is not set
# CONFIG_SMSC9420 is not set
CONFIG_NET_VENDOR_STMICRO=y
# CONFIG_STMMAC_ETH is not set
CONFIG_NET_VENDOR_SUN=y
# CONFIG_HAPPYMEAL is not set
# CONFIG_SUNGEM is not set
# CONFIG_CASSINI is not set
# CONFIG_NIU is not set
CONFIG_NET_VENDOR_TEHUTI=y
# CONFIG_TEHUTI is not set
CONFIG_NET_VENDOR_TI=y
CONFIG_TI_DAVINCI_MDIO=y
CONFIG_TI_DAVINCI_CPDMA=y
CONFIG_TI_CPSW_PHY_SEL=y
CONFIG_TI_CPSW=y
CONFIG_TI_CPTS=y
# CONFIG_TLAN is not set
CONFIG_NET_VENDOR_VIA=y
# CONFIG_VIA_RHINE is not set
# CONFIG_VIA_VELOCITY is not set
CONFIG_NET_VENDOR_WIZNET=y
# CONFIG_WIZNET_W5100 is not set
# CONFIG_WIZNET_W5300 is not set
# CONFIG_FDDI is not set
# CONFIG_HIPPI is not set
CONFIG_PHYLIB=y

#
# MII PHY device drivers
#
CONFIG_AT803X_PHY=y
# CONFIG_AMD_PHY is not set
# CONFIG_MARVELL_PHY is not set
# CONFIG_DAVICOM_PHY is not set
# CONFIG_QSEMI_PHY is not set
# CONFIG_LXT_PHY is not set
# CONFIG_CICADA_PHY is not set
# CONFIG_VITESSE_PHY is not set
CONFIG_SMSC_PHY=y
# CONFIG_BROADCOM_PHY is not set
# CONFIG_BCM87XX_PHY is not set
# CONFIG_ICPLUS_PHY is not set
# CONFIG_REALTEK_PHY is not set
# CONFIG_NATIONAL_PHY is not set
# CONFIG_STE10XP is not set
# CONFIG_LSI_ET1011C_PHY is not set
# CONFIG_MICREL_PHY is not set
# CONFIG_FIXED_PHY is not set
# CONFIG_MDIO_BITBANG is not set
# CONFIG_MDIO_BUS_MUX_GPIO is not set
# CONFIG_MDIO_BUS_MUX_MMIOREG is not set
# CONFIG_MICREL_KS8995MA is not set
# CONFIG_PPP is not set
# CONFIG_SLIP is not set

#
# USB Network Adapters
#
# CONFIG_USB_CATC is not set
# CONFIG_USB_KAWETH is not set
# CONFIG_USB_PEGASUS is not set
# CONFIG_USB_RTL8150 is not set
# CONFIG_USB_RTL8152 is not set
CONFIG_USB_USBNET=y
CONFIG_USB_NET_AX8817X=y
CONFIG_USB_NET_AX88179_178A=y
CONFIG_USB_NET_CDCETHER=y
# CONFIG_USB_NET_CDC_EEM is not set
CONFIG_USB_NET_CDC_NCM=y
# CONFIG_USB_NET_HUAWEI_CDC_NCM is not set
# CONFIG_USB_NET_CDC_MBIM is not set
# CONFIG_USB_NET_DM9601 is not set
# CONFIG_USB_NET_SR9700 is not set
# CONFIG_USB_NET_SR9800 is not set
# CONFIG_USB_NET_SMSC75XX is not set
CONFIG_USB_NET_SMSC95XX=y
# CONFIG_USB_NET_GL620A is not set
CONFIG_USB_NET_NET1080=y
# CONFIG_USB_NET_PLUSB is not set
# CONFIG_USB_NET_MCS7830 is not set
# CONFIG_USB_NET_RNDIS_HOST is not set
CONFIG_USB_NET_CDC_SUBSET=y
CONFIG_USB_ALI_M5632=y
CONFIG_USB_AN2720=y
CONFIG_USB_BELKIN=y
CONFIG_USB_ARMLINUX=y
CONFIG_USB_EPSON2888=y
CONFIG_USB_KC2190=y
CONFIG_USB_NET_ZAURUS=y
# CONFIG_USB_NET_CX82310_ETH is not set
# CONFIG_USB_NET_KALMIA is not set
# CONFIG_USB_NET_QMI_WWAN is not set
# CONFIG_USB_HSO is not set
# CONFIG_USB_NET_INT51X1 is not set
# CONFIG_USB_IPHETH is not set
# CONFIG_USB_SIERRA_NET is not set
# CONFIG_USB_VL600 is not set
CONFIG_WLAN=y
# CONFIG_ATMEL is not set
# CONFIG_PRISM54 is not set
# CONFIG_USB_ZD1201 is not set
# CONFIG_WIFI_CONTROL_FUNC is not set
# CONFIG_HOSTAP is not set
# CONFIG_WL_TI is not set

#
# Enable WiMAX (Networking options) to see the WiMAX drivers
#
# CONFIG_WAN is not set
CONFIG_XEN_NETDEV_FRONTEND=y
CONFIG_XEN_NETDEV_BACKEND=y
# CONFIG_VMXNET3 is not set
# CONFIG_ISDN is not set

#
# Input device support
#
CONFIG_INPUT=y
# CONFIG_INPUT_FF_MEMLESS is not set
CONFIG_INPUT_POLLDEV=m
# CONFIG_INPUT_SPARSEKMAP is not set
CONFIG_INPUT_MATRIXKMAP=m

#
# Userland interfaces
#
CONFIG_INPUT_MOUSEDEV=y
CONFIG_INPUT_MOUSEDEV_PSAUX=y
CONFIG_INPUT_MOUSEDEV_SCREEN_X=1024
CONFIG_INPUT_MOUSEDEV_SCREEN_Y=768
CONFIG_INPUT_JOYDEV=y
CONFIG_INPUT_EVDEV=y
# CONFIG_INPUT_EVBUG is not set
# CONFIG_INPUT_KEYRESET is not set
# CONFIG_INPUT_KEYCOMBO is not set

#
# Input Device Drivers
#
CONFIG_INPUT_KEYBOARD=y
# CONFIG_KEYBOARD_ADP5588 is not set
# CONFIG_KEYBOARD_ADP5589 is not set
CONFIG_KEYBOARD_ATKBD=y
# CONFIG_KEYBOARD_QT1070 is not set
# CONFIG_KEYBOARD_QT2160 is not set
# CONFIG_KEYBOARD_LKKBD is not set
CONFIG_KEYBOARD_GPIO=y
# CONFIG_KEYBOARD_TCA6416 is not set
# CONFIG_KEYBOARD_TCA8418 is not set
CONFIG_KEYBOARD_MATRIX=m
# CONFIG_KEYBOARD_LM8323 is not set
# CONFIG_KEYBOARD_LM8333 is not set
# CONFIG_KEYBOARD_MAX7359 is not set
# CONFIG_KEYBOARD_MCS is not set
# CONFIG_KEYBOARD_MPR121 is not set
# CONFIG_KEYBOARD_NEWTON is not set
# CONFIG_KEYBOARD_OPENCORES is not set
# CONFIG_KEYBOARD_SAMSUNG is not set
# CONFIG_KEYBOARD_STOWAWAY is not set
# CONFIG_KEYBOARD_SUNKBD is not set
# CONFIG_KEYBOARD_OMAP4 is not set
# CONFIG_KEYBOARD_XTKBD is not set
CONFIG_INPUT_MOUSE=y
CONFIG_MOUSE_PS2=y
CONFIG_MOUSE_PS2_ALPS=y
CONFIG_MOUSE_PS2_LOGIPS2PP=y
CONFIG_MOUSE_PS2_SYNAPTICS=y
CONFIG_MOUSE_PS2_CYPRESS=y
CONFIG_MOUSE_PS2_TRACKPOINT=y
# CONFIG_MOUSE_PS2_ELANTECH is not set
# CONFIG_MOUSE_PS2_SENTELIC is not set
# CONFIG_MOUSE_PS2_TOUCHKIT is not set
# CONFIG_MOUSE_SERIAL is not set
# CONFIG_MOUSE_APPLETOUCH is not set
# CONFIG_MOUSE_BCM5974 is not set
# CONFIG_MOUSE_CYAPA is not set
# CONFIG_MOUSE_VSXXXAA is not set
# CONFIG_MOUSE_GPIO is not set
# CONFIG_MOUSE_SYNAPTICS_I2C is not set
# CONFIG_MOUSE_SYNAPTICS_USB is not set
# CONFIG_INPUT_JOYSTICK is not set
# CONFIG_INPUT_TABLET is not set
CONFIG_INPUT_TOUCHSCREEN=y
CONFIG_TOUCHSCREEN_ADS7846=y
# CONFIG_TOUCHSCREEN_AD7877 is not set
# CONFIG_TOUCHSCREEN_AD7879 is not set
CONFIG_TOUCHSCREEN_ATMEL_MXT=y
# CONFIG_TOUCHSCREEN_AUO_PIXCIR is not set
# CONFIG_TOUCHSCREEN_BU21013 is not set
# CONFIG_TOUCHSCREEN_CY8CTMG110 is not set
# CONFIG_TOUCHSCREEN_CYTTSP_CORE is not set
# CONFIG_TOUCHSCREEN_CYTTSP4_CORE is not set
# CONFIG_TOUCHSCREEN_DYNAPRO is not set
# CONFIG_TOUCHSCREEN_HAMPSHIRE is not set
# CONFIG_TOUCHSCREEN_EETI is not set
# CONFIG_TOUCHSCREEN_EGALAX is not set
# CONFIG_TOUCHSCREEN_FUJITSU is not set
# CONFIG_TOUCHSCREEN_ILI210X is not set
# CONFIG_TOUCHSCREEN_GUNZE is not set
# CONFIG_TOUCHSCREEN_ELO is not set
# CONFIG_TOUCHSCREEN_WACOM_W8001 is not set
# CONFIG_TOUCHSCREEN_WACOM_I2C is not set
# CONFIG_TOUCHSCREEN_MAX11801 is not set
# CONFIG_TOUCHSCREEN_MCS5000 is not set
# CONFIG_TOUCHSCREEN_MMS114 is not set
# CONFIG_TOUCHSCREEN_MTOUCH is not set
# CONFIG_TOUCHSCREEN_INEXIO is not set
# CONFIG_TOUCHSCREEN_MK712 is not set
# CONFIG_TOUCHSCREEN_PENMOUNT is not set
# CONFIG_TOUCHSCREEN_EDT_FT5X06 is not set
# CONFIG_TOUCHSCREEN_TOUCHRIGHT is not set
# CONFIG_TOUCHSCREEN_TOUCHWIN is not set
CONFIG_TOUCHSCREEN_TI_AM335X_TSC=y
CONFIG_TOUCHSCREEN_PIXCIR=m
CONFIG_TOUCHSCREEN_LDC3001=y
# CONFIG_TOUCHSCREEN_USB_COMPOSITE is not set
# CONFIG_TOUCHSCREEN_TOUCHIT213 is not set
# CONFIG_TOUCHSCREEN_TSC_SERIO is not set
# CONFIG_TOUCHSCREEN_TSC2005 is not set
# CONFIG_TOUCHSCREEN_TSC2007 is not set
# CONFIG_TOUCHSCREEN_W90X900 is not set
# CONFIG_TOUCHSCREEN_ST1232 is not set
# CONFIG_TOUCHSCREEN_SUR40 is not set
# CONFIG_TOUCHSCREEN_TPS6507X is not set
# CONFIG_TOUCHSCREEN_ZFORCE is not set
CONFIG_INPUT_MISC=y
# CONFIG_INPUT_AD714X is not set
# CONFIG_INPUT_BMA150 is not set
# CONFIG_INPUT_MMA8450 is not set
# CONFIG_INPUT_MPU3050 is not set
# CONFIG_INPUT_GP2A is not set
# CONFIG_INPUT_GPIO_BEEPER is not set
# CONFIG_INPUT_GPIO_TILT_POLLED is not set
# CONFIG_INPUT_ATI_REMOTE2 is not set
# CONFIG_INPUT_KEYCHORD is not set
# CONFIG_INPUT_KEYSPAN_REMOTE is not set
# CONFIG_INPUT_KXTJ9 is not set
# CONFIG_INPUT_POWERMATE is not set
# CONFIG_INPUT_YEALINK is not set
# CONFIG_INPUT_CM109 is not set
# CONFIG_INPUT_TWL6040_VIBRA is not set
# CONFIG_INPUT_UINPUT is not set
# CONFIG_INPUT_GPIO is not set
CONFIG_INPUT_PALMAS_PWRBUTTON=y
# CONFIG_INPUT_PCF8574 is not set
# CONFIG_INPUT_GPIO_ROTARY_ENCODER is not set
# CONFIG_INPUT_ADXL34X is not set
# CONFIG_INPUT_IMS_PCU is not set
# CONFIG_INPUT_CMA3000 is not set
CONFIG_INPUT_XEN_KBDDEV_FRONTEND=y

#
# Hardware I/O ports
#
CONFIG_SERIO=y
CONFIG_SERIO_SERPORT=y
# CONFIG_SERIO_PCIPS2 is not set
CONFIG_SERIO_LIBPS2=y
# CONFIG_SERIO_RAW is not set
# CONFIG_SERIO_ALTERA_PS2 is not set
# CONFIG_SERIO_PS2MULT is not set
# CONFIG_SERIO_ARC_PS2 is not set
# CONFIG_SERIO_APBPS2 is not set
# CONFIG_SERIO_OLPC_APSP is not set
# CONFIG_GAMEPORT is not set

#
# Character devices
#
CONFIG_TTY=y
CONFIG_VT=y
CONFIG_CONSOLE_TRANSLATIONS=y
CONFIG_VT_CONSOLE=y
CONFIG_VT_CONSOLE_SLEEP=y
CONFIG_HW_CONSOLE=y
CONFIG_VT_HW_CONSOLE_BINDING=y
CONFIG_UNIX98_PTYS=y
# CONFIG_DEVPTS_MULTIPLE_INSTANCES is not set
# CONFIG_LEGACY_PTYS is not set
# CONFIG_SERIAL_NONSTANDARD is not set
# CONFIG_NOZOMI is not set
# CONFIG_N_GSM is not set
# CONFIG_TRACE_SINK is not set
CONFIG_DEVMEM=y
CONFIG_DEVKMEM=y

#
# Serial drivers
#
CONFIG_SERIAL_8250=y
CONFIG_SERIAL_8250_DEPRECATED_OPTIONS=y
CONFIG_SERIAL_8250_CONSOLE=y
CONFIG_SERIAL_8250_DMA=y
CONFIG_SERIAL_8250_PCI=y
CONFIG_SERIAL_8250_NR_UARTS=32
CONFIG_SERIAL_8250_RUNTIME_UARTS=4
CONFIG_SERIAL_8250_EXTENDED=y
CONFIG_SERIAL_8250_MANY_PORTS=y
CONFIG_SERIAL_8250_SHARE_IRQ=y
CONFIG_SERIAL_8250_DETECT_IRQ=y
CONFIG_SERIAL_8250_RSA=y
# CONFIG_SERIAL_8250_DW is not set
# CONFIG_SERIAL_8250_EM is not set
# CONFIG_SERIAL_8250_OMAP is not set

#
# Non-8250 serial port support
#
# CONFIG_SERIAL_MAX3100 is not set
# CONFIG_SERIAL_MAX310X is not set
# CONFIG_SERIAL_MFD_HSU is not set
# CONFIG_SERIAL_SH_SCI is not set
CONFIG_SERIAL_CORE=y
CONFIG_SERIAL_CORE_CONSOLE=y
# CONFIG_SERIAL_JSM is not set
CONFIG_SERIAL_OF_PLATFORM=y
CONFIG_SERIAL_OMAP=y
CONFIG_SERIAL_OMAP_CONSOLE=y
# CONFIG_SERIAL_SCCNXP is not set
# CONFIG_SERIAL_TIMBERDALE is not set
# CONFIG_SERIAL_ALTERA_JTAGUART is not set
# CONFIG_SERIAL_ALTERA_UART is not set
# CONFIG_SERIAL_IFX6X60 is not set
# CONFIG_SERIAL_PCH_UART is not set
# CONFIG_SERIAL_XILINX_PS_UART is not set
# CONFIG_SERIAL_ARC is not set
# CONFIG_SERIAL_RP2 is not set
# CONFIG_SERIAL_FSL_LPUART is not set
# CONFIG_SERIAL_ST_ASC is not set
# CONFIG_TTY_PRINTK is not set
CONFIG_HVC_DRIVER=y
CONFIG_HVC_IRQ=y
CONFIG_HVC_XEN=y
CONFIG_HVC_XEN_FRONTEND=y
# CONFIG_HVC_DCC is not set
# CONFIG_VIRTIO_CONSOLE is not set
# CONFIG_IPMI_HANDLER is not set
CONFIG_HW_RANDOM=y
# CONFIG_HW_RANDOM_TIMERIOMEM is not set
# CONFIG_HW_RANDOM_ATMEL is not set
CONFIG_HW_RANDOM_OMAP=y
# CONFIG_HW_RANDOM_VIRTIO is not set
# CONFIG_HW_RANDOM_EXYNOS is not set
# CONFIG_R3964 is not set
# CONFIG_APPLICOM is not set
# CONFIG_RAW_DRIVER is not set
# CONFIG_TCG_TPM is not set
CONFIG_DEVPORT=y
# CONFIG_DCC_TTY is not set
CONFIG_I2C=y
CONFIG_I2C_BOARDINFO=y
CONFIG_I2C_COMPAT=y
CONFIG_I2C_CHARDEV=y
# CONFIG_I2C_MUX is not set
CONFIG_I2C_HELPER_AUTO=y
CONFIG_I2C_ALGOBIT=y

#
# I2C Hardware Bus support
#

#
# PC SMBus host controller drivers
#
# CONFIG_I2C_ALI1535 is not set
# CONFIG_I2C_ALI1563 is not set
# CONFIG_I2C_ALI15X3 is not set
# CONFIG_I2C_AMD756 is not set
# CONFIG_I2C_AMD8111 is not set
# CONFIG_I2C_I801 is not set
# CONFIG_I2C_ISCH is not set
# CONFIG_I2C_PIIX4 is not set
# CONFIG_I2C_NFORCE2 is not set
# CONFIG_I2C_SIS5595 is not set
# CONFIG_I2C_SIS630 is not set
# CONFIG_I2C_SIS96X is not set
# CONFIG_I2C_VIA is not set
# CONFIG_I2C_VIAPRO is not set

#
# I2C system bus drivers (mostly embedded / system-on-chip)
#
# CONFIG_I2C_CBUS_GPIO is not set
# CONFIG_I2C_DESIGNWARE_PLATFORM is not set
# CONFIG_I2C_DESIGNWARE_PCI is not set
# CONFIG_I2C_EG20T is not set
# CONFIG_I2C_GPIO is not set
# CONFIG_I2C_OCORES is not set
CONFIG_I2C_OMAP=y
# CONFIG_I2C_PCA_PLATFORM is not set
# CONFIG_I2C_PXA_PCI is not set
# CONFIG_I2C_SIMTEC is not set
# CONFIG_I2C_XILINX is not set

#
# External I2C/SMBus adapter drivers
#
# CONFIG_I2C_DIOLAN_U2C is not set
# CONFIG_I2C_PARPORT_LIGHT is not set
# CONFIG_I2C_ROBOTFUZZ_OSIF is not set
# CONFIG_I2C_TAOS_EVM is not set
# CONFIG_I2C_TINY_USB is not set

#
# Other I2C/SMBus bus drivers
#
# CONFIG_I2C_STUB is not set
# CONFIG_I2C_DEBUG_CORE is not set
# CONFIG_I2C_DEBUG_ALGO is not set
# CONFIG_I2C_DEBUG_BUS is not set
CONFIG_SPI=y
# CONFIG_SPI_DEBUG is not set
CONFIG_SPI_MASTER=y

#
# SPI Master Controller Drivers
#
# CONFIG_SPI_ALTERA is not set
# CONFIG_SPI_BITBANG is not set
# CONFIG_SPI_GPIO is not set
# CONFIG_SPI_FSL_SPI is not set
# CONFIG_SPI_OC_TINY is not set
CONFIG_SPI_OMAP24XX=y
CONFIG_SPI_TI_QSPI=y
# CONFIG_SPI_PXA2XX is not set
# CONFIG_SPI_PXA2XX_PCI is not set
# CONFIG_SPI_SC18IS602 is not set
# CONFIG_SPI_TOPCLIFF_PCH is not set
# CONFIG_SPI_XCOMM is not set
# CONFIG_SPI_XILINX is not set
# CONFIG_SPI_DESIGNWARE is not set

#
# SPI Protocol Masters
#
CONFIG_SPI_SPIDEV=y
# CONFIG_SPI_TLE62X0 is not set
# CONFIG_HSI is not set

#
# PPS support
#
CONFIG_PPS=y
# CONFIG_PPS_DEBUG is not set

#
# PPS clients support
#
# CONFIG_PPS_CLIENT_KTIMER is not set
# CONFIG_PPS_CLIENT_LDISC is not set
# CONFIG_PPS_CLIENT_GPIO is not set

#
# PPS generators support
#

#
# PTP clock support
#
CONFIG_PTP_1588_CLOCK=y

#
# Enable PHYLIB and NETWORK_PHY_TIMESTAMPING to see the additional clocks.
#
CONFIG_PINCTRL=y

#
# Pin controllers
#
CONFIG_PINMUX=y
CONFIG_PINCONF=y
CONFIG_GENERIC_PINCONF=y
# CONFIG_DEBUG_PINCTRL is not set
# CONFIG_PINCTRL_CAPRI is not set
CONFIG_PINCTRL_TI_IODELAY=y
# CONFIG_PINCTRL_MSM8X74 is not set
CONFIG_PINCTRL_SINGLE=y
# CONFIG_PINCTRL_PALMAS is not set
CONFIG_ARCH_HAVE_CUSTOM_GPIO_H=y
CONFIG_ARCH_REQUIRE_GPIOLIB=y
CONFIG_GPIOLIB=y
CONFIG_GPIO_DEVRES=y
CONFIG_OF_GPIO=y
CONFIG_DEBUG_GPIO=y
CONFIG_GPIO_SYSFS=y

#
# Memory mapped GPIO drivers:
#
# CONFIG_GPIO_GENERIC_PLATFORM is not set
# CONFIG_GPIO_EM is not set
# CONFIG_GPIO_RCAR is not set
# CONFIG_GPIO_SCH311X is not set
# CONFIG_GPIO_TS5500 is not set
# CONFIG_GPIO_VX855 is not set
# CONFIG_GPIO_GRGPIO is not set

#
# I2C GPIO expanders:
#
# CONFIG_GPIO_MAX7300 is not set
# CONFIG_GPIO_MAX732X is not set
# CONFIG_GPIO_PCA953X_IRQ is not set
CONFIG_GPIO_PCF857X=y
# CONFIG_GPIO_SX150X is not set
# CONFIG_GPIO_TWL6040 is not set
# CONFIG_GPIO_ADP5588 is not set
# CONFIG_GPIO_ADNP is not set

#
# PCI GPIO expanders:
#
# CONFIG_GPIO_BT8XX is not set
# CONFIG_GPIO_AMD8111 is not set
# CONFIG_GPIO_ML_IOH is not set
# CONFIG_GPIO_RDC321X is not set

#
# SPI GPIO expanders:
#
# CONFIG_GPIO_MAX7301 is not set
# CONFIG_GPIO_MCP23S08 is not set
# CONFIG_GPIO_MC33880 is not set
# CONFIG_GPIO_74X164 is not set

#
# AC97 GPIO expanders:
#

#
# LPC GPIO expanders:
#

#
# MODULbus GPIO expanders:
#
CONFIG_GPIO_PALMAS=y
# CONFIG_GPIO_TPS65910 is not set
# CONFIG_GPIO_BCM_KONA is not set

#
# USB GPIO expanders:
#
CONFIG_W1=y
CONFIG_W1_CON=y

#
# 1-wire Bus Masters
#
# CONFIG_W1_MASTER_MATROX is not set
# CONFIG_W1_MASTER_DS2490 is not set
# CONFIG_W1_MASTER_DS2482 is not set
# CONFIG_W1_MASTER_DS1WM is not set
# CONFIG_W1_MASTER_GPIO is not set
# CONFIG_HDQ_MASTER_OMAP is not set

#
# 1-wire Slaves
#
# CONFIG_W1_SLAVE_THERM is not set
# CONFIG_W1_SLAVE_SMEM is not set
# CONFIG_W1_SLAVE_DS2408 is not set
# CONFIG_W1_SLAVE_DS2413 is not set
# CONFIG_W1_SLAVE_DS2423 is not set
# CONFIG_W1_SLAVE_DS2431 is not set
# CONFIG_W1_SLAVE_DS2433 is not set
# CONFIG_W1_SLAVE_DS2760 is not set
# CONFIG_W1_SLAVE_DS2780 is not set
# CONFIG_W1_SLAVE_DS2781 is not set
# CONFIG_W1_SLAVE_DS28E04 is not set
# CONFIG_W1_SLAVE_BQ27000 is not set
CONFIG_POWER_SUPPLY=y
# CONFIG_POWER_SUPPLY_DEBUG is not set
# CONFIG_PDA_POWER is not set
# CONFIG_GENERIC_ADC_BATTERY is not set
# CONFIG_TEST_POWER is not set
# CONFIG_BATTERY_DS2780 is not set
# CONFIG_BATTERY_DS2781 is not set
# CONFIG_BATTERY_DS2782 is not set
# CONFIG_BATTERY_SBS is not set
# CONFIG_BATTERY_BQ27x00 is not set
# CONFIG_BATTERY_MAX17040 is not set
# CONFIG_BATTERY_MAX17042 is not set
# CONFIG_CHARGER_ISP1704 is not set
# CONFIG_CHARGER_MAX8903 is not set
# CONFIG_CHARGER_LP8727 is not set
# CONFIG_CHARGER_GPIO is not set
# CONFIG_CHARGER_MANAGER is not set
# CONFIG_CHARGER_BQ2415X is not set
# CONFIG_CHARGER_BQ24190 is not set
# CONFIG_CHARGER_BQ24735 is not set
# CONFIG_CHARGER_SMB347 is not set
# CONFIG_POWER_RESET is not set
# CONFIG_POWER_RESET_RESTART is not set
CONFIG_POWER_AVS=y
CONFIG_VOLTAGE_DOMAIN=y

#
# Voltage Domain Framework Drivers
#
CONFIG_VOLTAGE_DOMAIN_OMAP=y
CONFIG_TI_COPROC=y
CONFIG_HWMON=y
# CONFIG_HWMON_VID is not set
# CONFIG_HWMON_DEBUG_CHIP is not set

#
# Native drivers
#
# CONFIG_SENSORS_AD7314 is not set
# CONFIG_SENSORS_AD7414 is not set
# CONFIG_SENSORS_AD7418 is not set
# CONFIG_SENSORS_ADCXX is not set
# CONFIG_SENSORS_ADM1021 is not set
# CONFIG_SENSORS_ADM1025 is not set
# CONFIG_SENSORS_ADM1026 is not set
# CONFIG_SENSORS_ADM1029 is not set
# CONFIG_SENSORS_ADM1031 is not set
# CONFIG_SENSORS_ADM9240 is not set
# CONFIG_SENSORS_ADT7310 is not set
# CONFIG_SENSORS_ADT7410 is not set
# CONFIG_SENSORS_ADT7411 is not set
# CONFIG_SENSORS_ADT7462 is not set
# CONFIG_SENSORS_ADT7470 is not set
# CONFIG_SENSORS_ADT7475 is not set
# CONFIG_SENSORS_ASC7621 is not set
# CONFIG_SENSORS_ATXP1 is not set
# CONFIG_SENSORS_DS620 is not set
# CONFIG_SENSORS_DS1621 is not set
# CONFIG_SENSORS_I5K_AMB is not set
# CONFIG_SENSORS_F71805F is not set
# CONFIG_SENSORS_F71882FG is not set
# CONFIG_SENSORS_F75375S is not set
# CONFIG_SENSORS_G760A is not set
# CONFIG_SENSORS_G762 is not set
# CONFIG_SENSORS_GL518SM is not set
# CONFIG_SENSORS_GL520SM is not set
CONFIG_SENSORS_GPIO_FAN=y
# CONFIG_SENSORS_HIH6130 is not set
# CONFIG_SENSORS_HTU21 is not set
# CONFIG_SENSORS_IIO_HWMON is not set
# CONFIG_SENSORS_IT87 is not set
# CONFIG_SENSORS_JC42 is not set
# CONFIG_SENSORS_LINEAGE is not set
# CONFIG_SENSORS_LM63 is not set
# CONFIG_SENSORS_LM70 is not set
# CONFIG_SENSORS_LM73 is not set
CONFIG_SENSORS_LM75=m
# CONFIG_SENSORS_LM77 is not set
# CONFIG_SENSORS_LM78 is not set
# CONFIG_SENSORS_LM80 is not set
# CONFIG_SENSORS_LM83 is not set
# CONFIG_SENSORS_LM85 is not set
# CONFIG_SENSORS_LM87 is not set
# CONFIG_SENSORS_LM90 is not set
# CONFIG_SENSORS_LM92 is not set
# CONFIG_SENSORS_LM93 is not set
# CONFIG_SENSORS_LTC4151 is not set
# CONFIG_SENSORS_LTC4215 is not set
# CONFIG_SENSORS_LTC4245 is not set
# CONFIG_SENSORS_LTC4261 is not set
# CONFIG_SENSORS_LM95234 is not set
# CONFIG_SENSORS_LM95241 is not set
# CONFIG_SENSORS_LM95245 is not set
# CONFIG_SENSORS_MAX1111 is not set
# CONFIG_SENSORS_MAX16065 is not set
# CONFIG_SENSORS_MAX1619 is not set
# CONFIG_SENSORS_MAX1668 is not set
# CONFIG_SENSORS_MAX197 is not set
# CONFIG_SENSORS_MAX6639 is not set
# CONFIG_SENSORS_MAX6642 is not set
# CONFIG_SENSORS_MAX6650 is not set
# CONFIG_SENSORS_MAX6697 is not set
# CONFIG_SENSORS_MCP3021 is not set
# CONFIG_SENSORS_NCT6775 is not set
# CONFIG_SENSORS_NTC_THERMISTOR is not set
# CONFIG_SENSORS_PC87360 is not set
# CONFIG_SENSORS_PC87427 is not set
# CONFIG_SENSORS_PCF8591 is not set
# CONFIG_PMBUS is not set
# CONFIG_SENSORS_SHT15 is not set
# CONFIG_SENSORS_SHT21 is not set
# CONFIG_SENSORS_SIS5595 is not set
# CONFIG_SENSORS_SMM665 is not set
# CONFIG_SENSORS_DME1737 is not set
# CONFIG_SENSORS_EMC1403 is not set
# CONFIG_SENSORS_EMC2103 is not set
# CONFIG_SENSORS_EMC6W201 is not set
# CONFIG_SENSORS_SMSC47M1 is not set
# CONFIG_SENSORS_SMSC47M192 is not set
# CONFIG_SENSORS_SMSC47B397 is not set
# CONFIG_SENSORS_SCH56XX_COMMON is not set
# CONFIG_SENSORS_SCH5627 is not set
# CONFIG_SENSORS_SCH5636 is not set
# CONFIG_SENSORS_ADS1015 is not set
# CONFIG_SENSORS_ADS7828 is not set
# CONFIG_SENSORS_ADS7871 is not set
# CONFIG_SENSORS_AMC6821 is not set
# CONFIG_SENSORS_INA209 is not set
# CONFIG_SENSORS_INA2XX is not set
# CONFIG_SENSORS_THMC50 is not set
CONFIG_SENSORS_TMP102=y
# CONFIG_SENSORS_TMP401 is not set
# CONFIG_SENSORS_TMP421 is not set
# CONFIG_SENSORS_VIA686A is not set
# CONFIG_SENSORS_VT1211 is not set
# CONFIG_SENSORS_VT8231 is not set
# CONFIG_SENSORS_W83781D is not set
# CONFIG_SENSORS_W83791D is not set
# CONFIG_SENSORS_W83792D is not set
# CONFIG_SENSORS_W83793 is not set
# CONFIG_SENSORS_W83795 is not set
# CONFIG_SENSORS_W83L785TS is not set
# CONFIG_SENSORS_W83L786NG is not set
# CONFIG_SENSORS_W83627HF is not set
# CONFIG_SENSORS_W83627EHF is not set
CONFIG_THERMAL=y
CONFIG_THERMAL_HWMON=y
CONFIG_THERMAL_OF=y
CONFIG_THERMAL_DEFAULT_GOV_STEP_WISE=y
# CONFIG_THERMAL_DEFAULT_GOV_FAIR_SHARE is not set
# CONFIG_THERMAL_DEFAULT_GOV_USER_SPACE is not set
CONFIG_THERMAL_GOV_FAIR_SHARE=y
CONFIG_THERMAL_GOV_STEP_WISE=y
CONFIG_THERMAL_GOV_USER_SPACE=y
CONFIG_CPU_THERMAL=y
# CONFIG_THERMAL_EMULATION is not set
# CONFIG_IMX_THERMAL is not set

#
# Texas Instruments thermal drivers
#
CONFIG_TI_SOC_THERMAL=y
CONFIG_TI_THERMAL=y
CONFIG_DRA752_THERMAL=y
CONFIG_WATCHDOG=y
CONFIG_WATCHDOG_CORE=y
# CONFIG_WATCHDOG_NOWAYOUT is not set

#
# Watchdog Device Drivers
#
# CONFIG_SOFT_WATCHDOG is not set
# CONFIG_GPIO_WATCHDOG is not set
# CONFIG_DW_WATCHDOG is not set
CONFIG_OMAP_WATCHDOG=y
# CONFIG_MAX63XX_WATCHDOG is not set
# CONFIG_ALIM7101_WDT is not set
# CONFIG_I6300ESB_WDT is not set
# CONFIG_MEN_A21_WDT is not set
# CONFIG_XEN_WDT is not set

#
# PCI-based Watchdog Cards
#
# CONFIG_PCIPCWATCHDOG is not set
# CONFIG_WDTPCI is not set

#
# USB-based Watchdog Cards
#
# CONFIG_USBPCWATCHDOG is not set
CONFIG_SSB_POSSIBLE=y

#
# Sonics Silicon Backplane
#
# CONFIG_SSB is not set
CONFIG_BCMA_POSSIBLE=y

#
# Broadcom specific AMBA
#
# CONFIG_BCMA is not set

#
# Multifunction device drivers
#
CONFIG_MFD_CORE=y
# CONFIG_MFD_AS3711 is not set
# CONFIG_MFD_AS3722 is not set
# CONFIG_PMIC_ADP5520 is not set
# CONFIG_MFD_AAT2870_CORE is not set
# CONFIG_MFD_CROS_EC is not set
# CONFIG_MFD_ASIC3 is not set
# CONFIG_PMIC_DA903X is not set
# CONFIG_MFD_DA9052_SPI is not set
# CONFIG_MFD_DA9052_I2C is not set
# CONFIG_MFD_DA9055 is not set
# CONFIG_MFD_DA9063 is not set
# CONFIG_MFD_MC13XXX_SPI is not set
# CONFIG_MFD_MC13XXX_I2C is not set
# CONFIG_HTC_EGPIO is not set
# CONFIG_HTC_PASIC3 is not set
# CONFIG_HTC_I2CPLD is not set
# CONFIG_LPC_ICH is not set
# CONFIG_LPC_SCH is not set
# CONFIG_MFD_JANZ_CMODIO is not set
# CONFIG_MFD_KEMPLD is not set
# CONFIG_MFD_88PM800 is not set
# CONFIG_MFD_88PM805 is not set
# CONFIG_MFD_88PM860X is not set
# CONFIG_MFD_MAX14577 is not set
# CONFIG_MFD_MAX77686 is not set
# CONFIG_MFD_MAX77693 is not set
# CONFIG_MFD_MAX8907 is not set
# CONFIG_MFD_MAX8925 is not set
# CONFIG_MFD_MAX8997 is not set
# CONFIG_MFD_MAX8998 is not set
# CONFIG_EZX_PCAP is not set
# CONFIG_MFD_VIPERBOARD is not set
# CONFIG_MFD_RETU is not set
# CONFIG_MFD_PCF50633 is not set
# CONFIG_MFD_RDC321X is not set
# CONFIG_MFD_RTSX_PCI is not set
# CONFIG_MFD_RC5T583 is not set
# CONFIG_MFD_SEC_CORE is not set
# CONFIG_MFD_SI476X_CORE is not set
# CONFIG_MFD_SM501 is not set
# CONFIG_MFD_SMSC is not set
# CONFIG_ABX500_CORE is not set
# CONFIG_MFD_STMPE is not set
CONFIG_MFD_SYSCON=y
CONFIG_MFD_TI_AM335X_TSCADC=y
# CONFIG_MFD_LP3943 is not set
# CONFIG_MFD_LP8788 is not set
CONFIG_MFD_OMAP_USB_HOST=y
CONFIG_MFD_PALMAS=y
# CONFIG_TPS6105X is not set
# CONFIG_TPS65010 is not set
# CONFIG_TPS6507X is not set
# CONFIG_MFD_TPS65090 is not set
CONFIG_MFD_TPS65217=y
CONFIG_MFD_TPS65218=y
# CONFIG_MFD_TPS6586X is not set
CONFIG_MFD_TPS65910=y
# CONFIG_MFD_TPS65912 is not set
# CONFIG_MFD_TPS65912_I2C is not set
# CONFIG_MFD_TPS65912_SPI is not set
# CONFIG_MFD_TPS80031 is not set
# CONFIG_TWL4030_CORE is not set
CONFIG_TWL6040_CORE=y
# CONFIG_MFD_WL1273_CORE is not set
# CONFIG_MFD_LM3533 is not set
# CONFIG_MFD_TIMBERDALE is not set
# CONFIG_MFD_TC3589X is not set
# CONFIG_MFD_TMIO is not set
# CONFIG_MFD_T7L66XB is not set
# CONFIG_MFD_TC6387XB is not set
# CONFIG_MFD_TC6393XB is not set
# CONFIG_MFD_VX855 is not set
# CONFIG_MFD_ARIZONA_I2C is not set
# CONFIG_MFD_ARIZONA_SPI is not set
# CONFIG_MFD_WM8400 is not set
# CONFIG_MFD_WM831X_I2C is not set
# CONFIG_MFD_WM831X_SPI is not set
# CONFIG_MFD_WM8350_I2C is not set
# CONFIG_MFD_WM8994 is not set
# CONFIG_VEXPRESS_CONFIG is not set
CONFIG_REGULATOR=y
# CONFIG_REGULATOR_DEBUG is not set
CONFIG_REGULATOR_FIXED_VOLTAGE=y
# CONFIG_REGULATOR_VIRTUAL_CONSUMER is not set
# CONFIG_REGULATOR_USERSPACE_CONSUMER is not set
# CONFIG_REGULATOR_ACT8865 is not set
# CONFIG_REGULATOR_AD5398 is not set
# CONFIG_REGULATOR_ANATOP is not set
# CONFIG_REGULATOR_DA9210 is not set
# CONFIG_REGULATOR_FAN53555 is not set
CONFIG_REGULATOR_GPIO=y
# CONFIG_REGULATOR_ISL6271A is not set
# CONFIG_REGULATOR_LP3971 is not set
# CONFIG_REGULATOR_LP3972 is not set
# CONFIG_REGULATOR_LP872X is not set
# CONFIG_REGULATOR_LP8755 is not set
# CONFIG_REGULATOR_MAX1586 is not set
# CONFIG_REGULATOR_MAX8649 is not set
# CONFIG_REGULATOR_MAX8660 is not set
# CONFIG_REGULATOR_MAX8952 is not set
# CONFIG_REGULATOR_MAX8973 is not set
CONFIG_REGULATOR_PALMAS=y
CONFIG_REGULATOR_PBIAS=y
# CONFIG_REGULATOR_PFUZE100 is not set
CONFIG_REGULATOR_TI_ABB=y
# CONFIG_REGULATOR_TPS51632 is not set
# CONFIG_REGULATOR_TPS62360 is not set
CONFIG_REGULATOR_TPS65023=y
CONFIG_REGULATOR_TPS6507X=y
CONFIG_REGULATOR_TPS65217=y
CONFIG_REGULATOR_TPS65218=y
# CONFIG_REGULATOR_TPS6524X is not set
CONFIG_REGULATOR_TPS65910=y
CONFIG_MEDIA_SUPPORT=y

#
# Multimedia core support
#
CONFIG_MEDIA_CAMERA_SUPPORT=y
# CONFIG_MEDIA_ANALOG_TV_SUPPORT is not set
# CONFIG_MEDIA_DIGITAL_TV_SUPPORT is not set
CONFIG_MEDIA_RADIO_SUPPORT=y
# CONFIG_MEDIA_RC_SUPPORT is not set
CONFIG_MEDIA_CONTROLLER=y
CONFIG_VIDEO_DEV=y
CONFIG_VIDEO_V4L2_SUBDEV_API=y
CONFIG_VIDEO_V4L2=y
# CONFIG_VIDEO_ADV_DEBUG is not set
# CONFIG_VIDEO_FIXED_MINOR_RANGES is not set
CONFIG_V4L2_MEM2MEM_DEV=m
CONFIG_VIDEOBUF2_CORE=m
CONFIG_VIDEOBUF2_MEMOPS=m
CONFIG_VIDEOBUF2_DMA_CONTIG=m
CONFIG_VIDEOBUF2_VMALLOC=m
# CONFIG_TTPCI_EEPROM is not set

#
# Media drivers
#
CONFIG_MEDIA_USB_SUPPORT=y

#
# Webcam devices
#
CONFIG_USB_VIDEO_CLASS=m
CONFIG_USB_VIDEO_CLASS_INPUT_EVDEV=y
CONFIG_USB_GSPCA=m
# CONFIG_USB_M5602 is not set
# CONFIG_USB_STV06XX is not set
# CONFIG_USB_GL860 is not set
# CONFIG_USB_GSPCA_BENQ is not set
# CONFIG_USB_GSPCA_CONEX is not set
# CONFIG_USB_GSPCA_CPIA1 is not set
# CONFIG_USB_GSPCA_ETOMS is not set
# CONFIG_USB_GSPCA_FINEPIX is not set
# CONFIG_USB_GSPCA_JEILINJ is not set
# CONFIG_USB_GSPCA_JL2005BCD is not set
# CONFIG_USB_GSPCA_KINECT is not set
# CONFIG_USB_GSPCA_KONICA is not set
# CONFIG_USB_GSPCA_MARS is not set
# CONFIG_USB_GSPCA_MR97310A is not set
# CONFIG_USB_GSPCA_NW80X is not set
# CONFIG_USB_GSPCA_OV519 is not set
# CONFIG_USB_GSPCA_OV534 is not set
# CONFIG_USB_GSPCA_OV534_9 is not set
# CONFIG_USB_GSPCA_PAC207 is not set
# CONFIG_USB_GSPCA_PAC7302 is not set
# CONFIG_USB_GSPCA_PAC7311 is not set
# CONFIG_USB_GSPCA_SE401 is not set
# CONFIG_USB_GSPCA_SN9C2028 is not set
# CONFIG_USB_GSPCA_SN9C20X is not set
# CONFIG_USB_GSPCA_SONIXB is not set
# CONFIG_USB_GSPCA_SONIXJ is not set
# CONFIG_USB_GSPCA_SPCA500 is not set
# CONFIG_USB_GSPCA_SPCA501 is not set
# CONFIG_USB_GSPCA_SPCA505 is not set
# CONFIG_USB_GSPCA_SPCA506 is not set
# CONFIG_USB_GSPCA_SPCA508 is not set
# CONFIG_USB_GSPCA_SPCA561 is not set
# CONFIG_USB_GSPCA_SPCA1528 is not set
# CONFIG_USB_GSPCA_SQ905 is not set
# CONFIG_USB_GSPCA_SQ905C is not set
# CONFIG_USB_GSPCA_SQ930X is not set
# CONFIG_USB_GSPCA_STK014 is not set
# CONFIG_USB_GSPCA_STK1135 is not set
# CONFIG_USB_GSPCA_STV0680 is not set
# CONFIG_USB_GSPCA_SUNPLUS is not set
# CONFIG_USB_GSPCA_T613 is not set
# CONFIG_USB_GSPCA_TOPRO is not set
# CONFIG_USB_GSPCA_TV8532 is not set
# CONFIG_USB_GSPCA_VC032X is not set
# CONFIG_USB_GSPCA_VICAM is not set
# CONFIG_USB_GSPCA_XIRLINK_CIT is not set
# CONFIG_USB_GSPCA_ZC3XX is not set
# CONFIG_USB_PWC is not set
# CONFIG_VIDEO_CPIA2 is not set
# CONFIG_USB_ZR364XX is not set
# CONFIG_USB_STKWEBCAM is not set
# CONFIG_USB_S2255 is not set
# CONFIG_VIDEO_USBTV is not set

#
# Webcam, TV (analog/digital) USB devices
#
# CONFIG_VIDEO_EM28XX is not set
# CONFIG_MEDIA_PCI_SUPPORT is not set
CONFIG_V4L_PLATFORM_DRIVERS=y
# CONFIG_VIDEO_CAFE_CCIC is not set
# CONFIG_VIDEO_TIMBERDALE is not set
# CONFIG_SOC_CAMERA is not set
CONFIG_VIDEO_TI_VIP=m
CONFIG_V4L_MEM2MEM_DRIVERS=y
# CONFIG_VIDEO_MEM2MEM_DEINTERLACE is not set
# CONFIG_VIDEO_SH_VEU is not set
# CONFIG_VIDEO_RENESAS_VSP1 is not set
CONFIG_VIDEO_TI_VPE=m
# CONFIG_VIDEO_TI_VPE_DEBUG is not set
CONFIG_VIDEO_TI_VPDMA_HELPER=m
# CONFIG_VIDEO_TI_VPDMA_LOAD_FW is not set
# CONFIG_V4L_TEST_DRIVERS is not set

#
# Supported MMC/SDIO adapters
#
CONFIG_RADIO_ADAPTERS=y
# CONFIG_RADIO_SI470X is not set
CONFIG_DRA7XX_RADIO_HELPER=y
# CONFIG_RADIO_SI4713 is not set
# CONFIG_USB_MR800 is not set
# CONFIG_USB_DSBR is not set
# CONFIG_RADIO_MAXIRADIO is not set
# CONFIG_RADIO_SHARK is not set
# CONFIG_RADIO_SHARK2 is not set
# CONFIG_USB_KEENE is not set
# CONFIG_USB_RAREMONO is not set
# CONFIG_USB_MA901 is not set
# CONFIG_RADIO_TEA5764 is not set
# CONFIG_RADIO_SAA7706H is not set
# CONFIG_RADIO_TEF6862 is not set
# CONFIG_RADIO_WL1273 is not set

#
# Texas Instruments WL128x FM driver (ST based)
#
# CONFIG_RADIO_WL128X is not set
# CONFIG_CYPRESS_FIRMWARE is not set

#
# Media ancillary drivers (tuners, sensors, i2c, frontends)
#
# CONFIG_MEDIA_SUBDRV_AUTOSELECT is not set
CONFIG_MEDIA_ATTACH=y

#
# Encoders, decoders, sensors and other helper chips
#

#
# Audio decoders, processors and mixers
#
# CONFIG_VIDEO_TVAUDIO is not set
# CONFIG_VIDEO_TDA7432 is not set
# CONFIG_VIDEO_TDA9840 is not set
# CONFIG_VIDEO_TEA6415C is not set
# CONFIG_VIDEO_TEA6420 is not set
# CONFIG_VIDEO_MSP3400 is not set
# CONFIG_VIDEO_CS5345 is not set
# CONFIG_VIDEO_CS53L32A is not set
# CONFIG_VIDEO_TLV320AIC23B is not set
# CONFIG_VIDEO_UDA1342 is not set
# CONFIG_VIDEO_WM8775 is not set
# CONFIG_VIDEO_WM8739 is not set
# CONFIG_VIDEO_VP27SMPX is not set
# CONFIG_VIDEO_SONY_BTF_MPX is not set

#
# RDS decoders
#
# CONFIG_VIDEO_SAA6588 is not set

#
# Video decoders
#
# CONFIG_VIDEO_ADV7180 is not set
# CONFIG_VIDEO_ADV7183 is not set
# CONFIG_VIDEO_ADV7604 is not set
# CONFIG_VIDEO_ADV7842 is not set
# CONFIG_VIDEO_BT819 is not set
# CONFIG_VIDEO_BT856 is not set
# CONFIG_VIDEO_BT866 is not set
# CONFIG_VIDEO_KS0127 is not set
# CONFIG_VIDEO_ML86V7667 is not set
# CONFIG_VIDEO_SAA7110 is not set
# CONFIG_VIDEO_SAA711X is not set
# CONFIG_VIDEO_SAA7191 is not set
# CONFIG_VIDEO_TVP514X is not set
# CONFIG_VIDEO_TVP5150 is not set
# CONFIG_VIDEO_TVP7002 is not set
# CONFIG_VIDEO_TW2804 is not set
# CONFIG_VIDEO_TW9903 is not set
# CONFIG_VIDEO_TW9906 is not set
# CONFIG_VIDEO_VPX3220 is not set

#
# Video and audio decoders
#
# CONFIG_VIDEO_SAA717X is not set
# CONFIG_VIDEO_CX25840 is not set

#
# Video encoders
#
# CONFIG_VIDEO_SAA7127 is not set
# CONFIG_VIDEO_SAA7185 is not set
# CONFIG_VIDEO_ADV7170 is not set
# CONFIG_VIDEO_ADV7175 is not set
# CONFIG_VIDEO_ADV7343 is not set
# CONFIG_VIDEO_ADV7393 is not set
# CONFIG_VIDEO_ADV7511 is not set
# CONFIG_VIDEO_AD9389B is not set
# CONFIG_VIDEO_AK881X is not set
# CONFIG_VIDEO_THS8200 is not set

#
# Camera sensor devices
#
CONFIG_VIDEO_OV2659=m
# CONFIG_VIDEO_OV7640 is not set
# CONFIG_VIDEO_OV7670 is not set
# CONFIG_VIDEO_OV9650 is not set
# CONFIG_VIDEO_VS6624 is not set
# CONFIG_VIDEO_MT9M032 is not set
# CONFIG_VIDEO_MT9P031 is not set
# CONFIG_VIDEO_MT9T001 is not set
# CONFIG_VIDEO_MT9V011 is not set
# CONFIG_VIDEO_MT9V032 is not set
# CONFIG_VIDEO_SR030PC30 is not set
# CONFIG_VIDEO_NOON010PC30 is not set
# CONFIG_VIDEO_M5MOLS is not set
# CONFIG_VIDEO_S5K6AA is not set
# CONFIG_VIDEO_S5K4ECGX is not set
# CONFIG_VIDEO_S5K5BAF is not set
# CONFIG_VIDEO_SMIAPP is not set
# CONFIG_VIDEO_S5C73M3 is not set

#
# Flash devices
#
# CONFIG_VIDEO_ADP1653 is not set
# CONFIG_VIDEO_AS3645A is not set
# CONFIG_VIDEO_LM3560 is not set

#
# Video improvement chips
#
# CONFIG_VIDEO_UPD64031A is not set
# CONFIG_VIDEO_UPD64083 is not set

#
# Audio/Video compression chips
#
# CONFIG_VIDEO_SAA6752HS is not set

#
# Miscellaneous helper chips
#
# CONFIG_VIDEO_THS7303 is not set
# CONFIG_VIDEO_M52790 is not set

#
# Sensors used on soc_camera driver
#
CONFIG_MEDIA_TUNER=y

#
# Customize TV tuners
#
CONFIG_MEDIA_TUNER_SIMPLE=m
CONFIG_MEDIA_TUNER_TDA8290=m
CONFIG_MEDIA_TUNER_TDA827X=m
CONFIG_MEDIA_TUNER_TDA18271=m
CONFIG_MEDIA_TUNER_TDA9887=m
CONFIG_MEDIA_TUNER_TEA5761=m
CONFIG_MEDIA_TUNER_TEA5767=m
CONFIG_MEDIA_TUNER_MT20XX=m
CONFIG_MEDIA_TUNER_MT2060=m
CONFIG_MEDIA_TUNER_MT2063=m
CONFIG_MEDIA_TUNER_MT2266=m
CONFIG_MEDIA_TUNER_MT2131=m
CONFIG_MEDIA_TUNER_QT1010=m
CONFIG_MEDIA_TUNER_XC2028=m
CONFIG_MEDIA_TUNER_XC5000=m
CONFIG_MEDIA_TUNER_XC4000=m
CONFIG_MEDIA_TUNER_MXL5005S=m
CONFIG_MEDIA_TUNER_MXL5007T=m
CONFIG_MEDIA_TUNER_MC44S803=m
CONFIG_MEDIA_TUNER_MAX2165=m
CONFIG_MEDIA_TUNER_TDA18218=m
CONFIG_MEDIA_TUNER_FC0011=m
CONFIG_MEDIA_TUNER_FC0012=m
CONFIG_MEDIA_TUNER_FC0013=m
CONFIG_MEDIA_TUNER_TDA18212=m
CONFIG_MEDIA_TUNER_E4000=m
CONFIG_MEDIA_TUNER_FC2580=m
CONFIG_MEDIA_TUNER_M88TS2022=m
CONFIG_MEDIA_TUNER_TUA9001=m
CONFIG_MEDIA_TUNER_IT913X=m
CONFIG_MEDIA_TUNER_R820T=m

#
# Customise DVB Frontends
#
CONFIG_DVB_AU8522=m
CONFIG_DVB_AU8522_V4L=m
CONFIG_DVB_TUNER_DIB0070=m
CONFIG_DVB_TUNER_DIB0090=m

#
# Tools to develop new frontends
#
# CONFIG_DVB_DUMMY_FE is not set

#
# Graphics support
#
CONFIG_VGA_ARB=y
CONFIG_VGA_ARB_MAX_GPUS=16

#
# Direct Rendering Manager
#
CONFIG_DRM=y
CONFIG_DRM_KMS_HELPER=y
CONFIG_DRM_KMS_FB_HELPER=y
# CONFIG_DRM_LOAD_EDID_FIRMWARE is not set
CONFIG_DRM_GEM_CMA_HELPER=y
CONFIG_DRM_KMS_CMA_HELPER=y

#
# I2C encoder or helper chips
#
# CONFIG_DRM_I2C_CH7006 is not set
# CONFIG_DRM_I2C_SIL164 is not set
CONFIG_DRM_I2C_NXP_TDA998X=y
# CONFIG_DRM_TDFX is not set
# CONFIG_DRM_R128 is not set
# CONFIG_DRM_RADEON is not set
# CONFIG_DRM_NOUVEAU is not set
# CONFIG_DRM_MGA is not set
# CONFIG_DRM_VIA is not set
# CONFIG_DRM_SAVAGE is not set
# CONFIG_DRM_EXYNOS is not set
# CONFIG_DRM_VMWGFX is not set
# CONFIG_DRM_UDL is not set
# CONFIG_DRM_AST is not set
# CONFIG_DRM_MGAG200 is not set
# CONFIG_DRM_CIRRUS_QEMU is not set
# CONFIG_DRM_ARMADA is not set
# CONFIG_DRM_RCAR_DU is not set
# CONFIG_DRM_SHMOBILE is not set
CONFIG_DRM_OMAP=y
CONFIG_DRM_OMAP_NUM_CRTCS=2
CONFIG_DRM_TILCDC=y
# CONFIG_DRM_QXL is not set
# CONFIG_DRM_BOCHS is not set

#
# Frame buffer Devices
#
CONFIG_FB=y
CONFIG_FIRMWARE_EDID=y
# CONFIG_FB_DDC is not set
# CONFIG_FB_BOOT_VESA_SUPPORT is not set
# CONFIG_FB_CFB_FILLRECT is not set
# CONFIG_FB_CFB_COPYAREA is not set
# CONFIG_FB_CFB_IMAGEBLIT is not set
# CONFIG_FB_CFB_REV_PIXELS_IN_BYTE is not set
CONFIG_FB_SYS_FILLRECT=y
CONFIG_FB_SYS_COPYAREA=y
CONFIG_FB_SYS_IMAGEBLIT=y
# CONFIG_FB_FOREIGN_ENDIAN is not set
CONFIG_FB_SYS_FOPS=y
CONFIG_FB_DEFERRED_IO=y
# CONFIG_FB_SVGALIB is not set
# CONFIG_FB_MACMODES is not set
# CONFIG_FB_BACKLIGHT is not set
CONFIG_FB_MODE_HELPERS=y
CONFIG_FB_TILEBLITTING=y

#
# Frame buffer hardware drivers
#
# CONFIG_FB_CIRRUS is not set
# CONFIG_FB_PM2 is not set
# CONFIG_FB_CYBER2000 is not set
# CONFIG_FB_ASILIANT is not set
# CONFIG_FB_IMSTT is not set
# CONFIG_FB_UVESA is not set
# CONFIG_FB_OPENCORES is not set
# CONFIG_FB_S1D13XXX is not set
# CONFIG_FB_NVIDIA is not set
# CONFIG_FB_RIVA is not set
# CONFIG_FB_I740 is not set
# CONFIG_FB_MATROX is not set
# CONFIG_FB_RADEON is not set
# CONFIG_FB_ATY128 is not set
# CONFIG_FB_ATY is not set
# CONFIG_FB_S3 is not set
# CONFIG_FB_SAVAGE is not set
# CONFIG_FB_SIS is not set
# CONFIG_FB_NEOMAGIC is not set
# CONFIG_FB_KYRO is not set
# CONFIG_FB_3DFX is not set
# CONFIG_FB_VOODOO1 is not set
# CONFIG_FB_VT8623 is not set
# CONFIG_FB_TRIDENT is not set
# CONFIG_FB_ARK is not set
# CONFIG_FB_PM3 is not set
# CONFIG_FB_CARMINE is not set
# CONFIG_FB_TMIO is not set
# CONFIG_FB_SMSCUFX is not set
# CONFIG_FB_UDL is not set
# CONFIG_FB_GOLDFISH is not set
# CONFIG_FB_VIRTUAL is not set
CONFIG_XEN_FBDEV_FRONTEND=y
# CONFIG_FB_METRONOME is not set
# CONFIG_FB_MB862XX is not set
# CONFIG_FB_BROADSHEET is not set
# CONFIG_FB_AUO_K190X is not set
# CONFIG_FB_SIMPLE is not set
CONFIG_OMAP2_DSS_INIT=y
CONFIG_OMAP2_DSS=y
# CONFIG_OMAP2_DSS_DEBUG is not set
# CONFIG_OMAP2_DSS_DEBUGFS is not set
CONFIG_OMAP2_DSS_DPI=y
CONFIG_OMAP2_DSS_VENC=y
CONFIG_OMAP2_DSS_HDMI_COMMON=y
CONFIG_OMAP_DSS_HDMI_AUDIO=y
CONFIG_OMAP4_DSS_HDMI=y
CONFIG_OMAP4_DSS_HDMI_AUDIO=y
CONFIG_OMAP5_DSS_HDMI=y
CONFIG_OMAP5_DSS_HDMI_AUDIO=y
CONFIG_OMAP2_DSS_SDI=y
CONFIG_OMAP2_DSS_DSI=y
CONFIG_OMAP2_DSS_MIN_FCK_PER_PCK=0
CONFIG_OMAP2_DSS_SLEEP_AFTER_VENC_RESET=y

#
# OMAP Display Device Drivers (new device model)
#
CONFIG_DISPLAY_ENCODER_TFP410=m
CONFIG_DISPLAY_ENCODER_TPD12S015=y
CONFIG_DISPLAY_DRA7EVM_ENCODER_TPD12S015=y
CONFIG_DISPLAY_ENCODER_SII9022=y
CONFIG_DISPLAY_ENCODER_SII9022_AUDIO_CODEC=y
CONFIG_DISPLAY_CONNECTOR_DVI=m
CONFIG_DISPLAY_CONNECTOR_HDMI=y
# CONFIG_DISPLAY_CONNECTOR_ANALOG_TV is not set
CONFIG_DISPLAY_PANEL_DPI=y
# CONFIG_DISPLAY_PANEL_DSI_CM is not set
# CONFIG_DISPLAY_PANEL_SONY_ACX565AKM is not set
# CONFIG_DISPLAY_PANEL_LGPHILIPS_LB035Q02 is not set
# CONFIG_DISPLAY_PANEL_SHARP_LS037V7DW01 is not set
# CONFIG_DISPLAY_PANEL_TPO_TD028TTEC1 is not set
# CONFIG_DISPLAY_PANEL_TPO_TD043MTEA1 is not set
# CONFIG_DISPLAY_PANEL_NEC_NL8048HL11 is not set
CONFIG_DISPLAY_PANEL_TLC59108=y
# CONFIG_EXYNOS_VIDEO is not set
# CONFIG_FB_SSD1307 is not set
CONFIG_BACKLIGHT_LCD_SUPPORT=y
CONFIG_LCD_CLASS_DEVICE=y
# CONFIG_LCD_L4F00242T03 is not set
# CONFIG_LCD_LMS283GF05 is not set
# CONFIG_LCD_LTV350QV is not set
# CONFIG_LCD_ILI922X is not set
# CONFIG_LCD_ILI9320 is not set
# CONFIG_LCD_TDO24M is not set
# CONFIG_LCD_VGG2432A4 is not set
CONFIG_LCD_PLATFORM=y
# CONFIG_LCD_S6E63M0 is not set
# CONFIG_LCD_LD9040 is not set
# CONFIG_LCD_AMS369FG06 is not set
# CONFIG_LCD_LMS501KF03 is not set
# CONFIG_LCD_HX8357 is not set
CONFIG_BACKLIGHT_CLASS_DEVICE=y
CONFIG_BACKLIGHT_GENERIC=y
CONFIG_BACKLIGHT_PWM=y
# CONFIG_BACKLIGHT_ADP8860 is not set
# CONFIG_BACKLIGHT_ADP8870 is not set
# CONFIG_BACKLIGHT_LM3630A is not set
# CONFIG_BACKLIGHT_LM3639 is not set
# CONFIG_BACKLIGHT_LP855X is not set
# CONFIG_BACKLIGHT_TPS65217 is not set
CONFIG_BACKLIGHT_GPIO=y
# CONFIG_BACKLIGHT_LV5207LP is not set
# CONFIG_BACKLIGHT_BD6107 is not set
# CONFIG_VGASTATE is not set
# CONFIG_VIDEO_OUTPUT_CONTROL is not set
CONFIG_VIDEOMODE_HELPERS=y
CONFIG_HDMI=y

#
# Console display driver support
#
CONFIG_DUMMY_CONSOLE=y
CONFIG_FRAMEBUFFER_CONSOLE=y
CONFIG_FRAMEBUFFER_CONSOLE_DETECT_PRIMARY=y
CONFIG_FRAMEBUFFER_CONSOLE_ROTATION=y
CONFIG_LOGO=y
CONFIG_LOGO_LINUX_MONO=y
CONFIG_LOGO_LINUX_VGA16=y
CONFIG_LOGO_LINUX_CLUT224=y
CONFIG_SOUND=y
CONFIG_SOUND_OSS_CORE=y
CONFIG_SOUND_OSS_CORE_PRECLAIM=y
CONFIG_SND=y
CONFIG_SND_TIMER=y
CONFIG_SND_PCM=y
CONFIG_SND_DMAENGINE_PCM=y
CONFIG_SND_HWDEP=m
CONFIG_SND_RAWMIDI=m
CONFIG_SND_COMPRESS_OFFLOAD=y
CONFIG_SND_JACK=y
# CONFIG_SND_SEQUENCER is not set
CONFIG_SND_OSSEMUL=y
CONFIG_SND_MIXER_OSS=m
CONFIG_SND_PCM_OSS=m
CONFIG_SND_PCM_OSS_PLUGINS=y
# CONFIG_SND_HRTIMER is not set
# CONFIG_SND_DYNAMIC_MINORS is not set
CONFIG_SND_SUPPORT_OLD_API=y
CONFIG_SND_VERBOSE_PROCFS=y
CONFIG_SND_VERBOSE_PRINTK=y
CONFIG_SND_DEBUG=y
# CONFIG_SND_DEBUG_VERBOSE is not set
# CONFIG_SND_PCM_XRUN_DEBUG is not set
# CONFIG_SND_RAWMIDI_SEQ is not set
# CONFIG_SND_OPL3_LIB_SEQ is not set
# CONFIG_SND_OPL4_LIB_SEQ is not set
# CONFIG_SND_SBAWE_SEQ is not set
# CONFIG_SND_EMU10K1_SEQ is not set
CONFIG_SND_DRIVERS=y
# CONFIG_SND_DUMMY is not set
# CONFIG_SND_ALOOP is not set
# CONFIG_SND_MTPAV is not set
# CONFIG_SND_SERIAL_U16550 is not set
# CONFIG_SND_MPU401 is not set
CONFIG_SND_PCI=y
# CONFIG_SND_AD1889 is not set
# CONFIG_SND_ALS300 is not set
# CONFIG_SND_ALI5451 is not set
# CONFIG_SND_ATIIXP is not set
# CONFIG_SND_ATIIXP_MODEM is not set
# CONFIG_SND_AU8810 is not set
# CONFIG_SND_AU8820 is not set
# CONFIG_SND_AU8830 is not set
# CONFIG_SND_AW2 is not set
# CONFIG_SND_AZT3328 is not set
# CONFIG_SND_BT87X is not set
# CONFIG_SND_CA0106 is not set
# CONFIG_SND_CMIPCI is not set
# CONFIG_SND_OXYGEN is not set
# CONFIG_SND_CS4281 is not set
# CONFIG_SND_CS46XX is not set
# CONFIG_SND_CS5535AUDIO is not set
# CONFIG_SND_CTXFI is not set
# CONFIG_SND_DARLA20 is not set
# CONFIG_SND_GINA20 is not set
# CONFIG_SND_LAYLA20 is not set
# CONFIG_SND_DARLA24 is not set
# CONFIG_SND_GINA24 is not set
# CONFIG_SND_LAYLA24 is not set
# CONFIG_SND_MONA is not set
# CONFIG_SND_MIA is not set
# CONFIG_SND_ECHO3G is not set
# CONFIG_SND_INDIGO is not set
# CONFIG_SND_INDIGOIO is not set
# CONFIG_SND_INDIGODJ is not set
# CONFIG_SND_INDIGOIOX is not set
# CONFIG_SND_INDIGODJX is not set
# CONFIG_SND_EMU10K1 is not set
# CONFIG_SND_EMU10K1X is not set
# CONFIG_SND_ENS1370 is not set
# CONFIG_SND_ENS1371 is not set
# CONFIG_SND_ES1938 is not set
# CONFIG_SND_ES1968 is not set
# CONFIG_SND_FM801 is not set
# CONFIG_SND_HDA_INTEL is not set
# CONFIG_SND_HDSP is not set
# CONFIG_SND_HDSPM is not set
# CONFIG_SND_ICE1712 is not set
# CONFIG_SND_ICE1724 is not set
# CONFIG_SND_INTEL8X0 is not set
# CONFIG_SND_INTEL8X0M is not set
# CONFIG_SND_KORG1212 is not set
# CONFIG_SND_LOLA is not set
# CONFIG_SND_LX6464ES is not set
# CONFIG_SND_MAESTRO3 is not set
# CONFIG_SND_MIXART is not set
# CONFIG_SND_NM256 is not set
# CONFIG_SND_PCXHR is not set
# CONFIG_SND_RIPTIDE is not set
# CONFIG_SND_RME32 is not set
# CONFIG_SND_RME96 is not set
# CONFIG_SND_RME9652 is not set
# CONFIG_SND_SONICVIBES is not set
# CONFIG_SND_TRIDENT is not set
# CONFIG_SND_VIA82XX is not set
# CONFIG_SND_VIA82XX_MODEM is not set
# CONFIG_SND_VIRTUOSO is not set
# CONFIG_SND_VX222 is not set
# CONFIG_SND_YMFPCI is not set
CONFIG_SND_ARM=y
CONFIG_SND_SPI=y
CONFIG_SND_USB=y
CONFIG_SND_USB_AUDIO=m
# CONFIG_SND_USB_UA101 is not set
# CONFIG_SND_USB_CAIAQ is not set
# CONFIG_SND_USB_6FIRE is not set
# CONFIG_SND_USB_HIFACE is not set
CONFIG_SND_SOC=y
# CONFIG_SND_ATMEL_SOC is not set
CONFIG_SND_DAVINCI_SOC_MCASP=y
CONFIG_SND_DAVINCI_SOC_GENERIC_EVM=y
# CONFIG_SND_DESIGNWARE_I2S is not set
CONFIG_SND_OMAP_SOC=y
CONFIG_SND_OMAP_SOC_HDMI_AUDIO=y
CONFIG_SND_OMAP_SOC_DRA7EVM=y
CONFIG_SND_SOC_I2C_AND_SPI=y

#
# CODEC drivers
#
# CONFIG_SND_SOC_ADAU1701 is not set
# CONFIG_SND_SOC_AK4104 is not set
# CONFIG_SND_SOC_AK4554 is not set
# CONFIG_SND_SOC_AK4642 is not set
# CONFIG_SND_SOC_AK5386 is not set
# CONFIG_SND_SOC_CS42L52 is not set
# CONFIG_SND_SOC_CS42L73 is not set
# CONFIG_SND_SOC_CS4270 is not set
# CONFIG_SND_SOC_CS4271 is not set
CONFIG_SND_SOC_HDMI_CODEC=y
# CONFIG_SND_SOC_PCM1681 is not set
# CONFIG_SND_SOC_PCM1792A is not set
# CONFIG_SND_SOC_SGTL5000 is not set
# CONFIG_SND_SOC_SPDIF is not set
# CONFIG_SND_SOC_TAS5086 is not set
CONFIG_SND_SOC_TLV320AIC31XX=y
CONFIG_SND_SOC_TLV320AIC3X=y
# CONFIG_SND_SOC_WM8510 is not set
# CONFIG_SND_SOC_WM8523 is not set
# CONFIG_SND_SOC_WM8580 is not set
# CONFIG_SND_SOC_WM8711 is not set
# CONFIG_SND_SOC_WM8728 is not set
# CONFIG_SND_SOC_WM8731 is not set
# CONFIG_SND_SOC_WM8737 is not set
# CONFIG_SND_SOC_WM8741 is not set
# CONFIG_SND_SOC_WM8750 is not set
# CONFIG_SND_SOC_WM8753 is not set
# CONFIG_SND_SOC_WM8770 is not set
# CONFIG_SND_SOC_WM8776 is not set
# CONFIG_SND_SOC_WM8804 is not set
# CONFIG_SND_SOC_WM8903 is not set
# CONFIG_SND_SOC_WM8962 is not set
# CONFIG_SND_SOC_TPA6130A2 is not set
CONFIG_SND_SIMPLE_CARD=y
# CONFIG_SOUND_PRIME is not set

#
# HID support
#
CONFIG_HID=y
# CONFIG_HID_BATTERY_STRENGTH is not set
# CONFIG_HIDRAW is not set
# CONFIG_UHID is not set
CONFIG_HID_GENERIC=y

#
# Special HID drivers
#
# CONFIG_HID_A4TECH is not set
# CONFIG_HID_ACRUX is not set
# CONFIG_HID_APPLE is not set
# CONFIG_HID_APPLEIR is not set
# CONFIG_HID_AUREAL is not set
# CONFIG_HID_BELKIN is not set
# CONFIG_HID_CHERRY is not set
# CONFIG_HID_CHICONY is not set
# CONFIG_HID_PRODIKEYS is not set
# CONFIG_HID_CYPRESS is not set
# CONFIG_HID_DRAGONRISE is not set
# CONFIG_HID_EMS_FF is not set
# CONFIG_HID_ELECOM is not set
# CONFIG_HID_ELO is not set
# CONFIG_HID_EZKEY is not set
# CONFIG_HID_HOLTEK is not set
# CONFIG_HID_HUION is not set
# CONFIG_HID_KEYTOUCH is not set
# CONFIG_HID_KYE is not set
# CONFIG_HID_UCLOGIC is not set
# CONFIG_HID_WALTOP is not set
# CONFIG_HID_GYRATION is not set
# CONFIG_HID_ICADE is not set
# CONFIG_HID_TWINHAN is not set
# CONFIG_HID_KENSINGTON is not set
# CONFIG_HID_LCPOWER is not set
# CONFIG_HID_LENOVO_TPKBD is not set
# CONFIG_HID_LOGITECH is not set
# CONFIG_HID_MAGICMOUSE is not set
# CONFIG_HID_MICROSOFT is not set
# CONFIG_HID_MONTEREY is not set
# CONFIG_HID_MULTITOUCH is not set
# CONFIG_HID_NTRIG is not set
# CONFIG_HID_ORTEK is not set
# CONFIG_HID_PANTHERLORD is not set
# CONFIG_HID_PETALYNX is not set
# CONFIG_HID_PICOLCD is not set
# CONFIG_HID_PRIMAX is not set
# CONFIG_HID_ROCCAT is not set
# CONFIG_HID_SAITEK is not set
# CONFIG_HID_SAMSUNG is not set
# CONFIG_HID_SONY is not set
# CONFIG_HID_SPEEDLINK is not set
# CONFIG_HID_STEELSERIES is not set
# CONFIG_HID_SUNPLUS is not set
# CONFIG_HID_GREENASIA is not set
# CONFIG_HID_SMARTJOYPLUS is not set
# CONFIG_HID_TIVO is not set
# CONFIG_HID_TOPSEED is not set
# CONFIG_HID_THINGM is not set
# CONFIG_HID_THRUSTMASTER is not set
# CONFIG_HID_WACOM is not set
# CONFIG_HID_WIIMOTE is not set
# CONFIG_HID_XINMO is not set
# CONFIG_HID_ZEROPLUS is not set
# CONFIG_HID_ZYDACRON is not set
# CONFIG_HID_SENSOR_HUB is not set

#
# USB HID support
#
CONFIG_USB_HID=y
# CONFIG_HID_PID is not set
# CONFIG_USB_HIDDEV is not set

#
# I2C HID support
#
# CONFIG_I2C_HID is not set
CONFIG_USB_OHCI_LITTLE_ENDIAN=y
CONFIG_USB_SUPPORT=y
CONFIG_USB_COMMON=y
CONFIG_DRD_LIB=y
CONFIG_USB_ARCH_HAS_HCD=y
CONFIG_USB=y
# CONFIG_USB_DEBUG is not set
CONFIG_USB_ANNOUNCE_NEW_DEVICES=y

#
# Miscellaneous USB options
#
CONFIG_USB_DEFAULT_PERSIST=y
# CONFIG_USB_DYNAMIC_MINORS is not set
# CONFIG_USB_OTG is not set
# CONFIG_USB_OTG_WHITELIST is not set
# CONFIG_USB_OTG_BLACKLIST_HUB is not set
CONFIG_USB_MON=y
# CONFIG_USB_WUSB_CBAF is not set

#
# USB Host Controller Drivers
#
# CONFIG_USB_C67X00_HCD is not set
CONFIG_USB_XHCI_HCD=m
CONFIG_USB_XHCI_PLATFORM=m
CONFIG_USB_EHCI_HCD=y
# CONFIG_USB_EHCI_ROOT_HUB_TT is not set
CONFIG_USB_EHCI_TT_NEWSCHED=y
CONFIG_USB_EHCI_PCI=y
CONFIG_USB_EHCI_HCD_OMAP=y
# CONFIG_USB_EHCI_HCD_PLATFORM is not set
# CONFIG_USB_OXU210HP_HCD is not set
# CONFIG_USB_ISP116X_HCD is not set
# CONFIG_USB_ISP1760_HCD is not set
# CONFIG_USB_ISP1362_HCD is not set
# CONFIG_USB_FUSBH200_HCD is not set
# CONFIG_USB_FOTG210_HCD is not set
# CONFIG_USB_OHCI_HCD is not set
# CONFIG_USB_UHCI_HCD is not set
# CONFIG_USB_SL811_HCD is not set
# CONFIG_USB_R8A66597_HCD is not set
# CONFIG_USB_HCD_TEST_MODE is not set
# CONFIG_USB_RENESAS_USBHS is not set

#
# USB Device Class drivers
#
CONFIG_USB_ACM=m
CONFIG_USB_PRINTER=m
CONFIG_USB_WDM=y
# CONFIG_USB_TMC is not set

#
# NOTE: USB_STORAGE depends on SCSI but BLK_DEV_SD may
#

#
# also be needed; see USB_STORAGE Help for more info
#
CONFIG_USB_STORAGE=y
# CONFIG_USB_STORAGE_DEBUG is not set
# CONFIG_USB_STORAGE_REALTEK is not set
# CONFIG_USB_STORAGE_DATAFAB is not set
# CONFIG_USB_STORAGE_FREECOM is not set
# CONFIG_USB_STORAGE_ISD200 is not set
# CONFIG_USB_STORAGE_USBAT is not set
# CONFIG_USB_STORAGE_SDDR09 is not set
# CONFIG_USB_STORAGE_SDDR55 is not set
# CONFIG_USB_STORAGE_JUMPSHOT is not set
# CONFIG_USB_STORAGE_ALAUDA is not set
# CONFIG_USB_STORAGE_ONETOUCH is not set
# CONFIG_USB_STORAGE_KARMA is not set
# CONFIG_USB_STORAGE_CYPRESS_ATACB is not set
# CONFIG_USB_STORAGE_ENE_UB6250 is not set

#
# USB Imaging devices
#
# CONFIG_USB_MDC800 is not set
# CONFIG_USB_MICROTEK is not set
CONFIG_USB_MUSB_HDRC=m
# CONFIG_USB_MUSB_HOST is not set
# CONFIG_USB_MUSB_GADGET is not set
CONFIG_USB_MUSB_DUAL_ROLE=y
# CONFIG_USB_MUSB_TUSB6010 is not set
CONFIG_USB_MUSB_OMAP2PLUS=m
# CONFIG_USB_MUSB_AM35X is not set
CONFIG_USB_MUSB_DSPS=m
# CONFIG_USB_MUSB_UX500 is not set
CONFIG_USB_MUSB_AM335X_CHILD=m
# CONFIG_USB_INVENTRA_DMA is not set
CONFIG_USB_TI_CPPI41_DMA=y
# CONFIG_MUSB_PIO_ONLY is not set
CONFIG_USB_DWC3=m
# CONFIG_USB_DWC3_HOST is not set
# CONFIG_USB_DWC3_GADGET is not set
CONFIG_USB_DWC3_DUAL_ROLE=y

#
# Platform Glue Driver Support
#
CONFIG_USB_DWC3_OMAP=m
CONFIG_USB_DWC3_PCI=m

#
# Debugging features
#
# CONFIG_USB_DWC3_DEBUG is not set
# CONFIG_DWC3_HOST_USB3_LPM_ENABLE is not set
# CONFIG_USB_DWC2 is not set
# CONFIG_USB_CHIPIDEA is not set

#
# USB port drivers
#
CONFIG_USB_SERIAL=m
# CONFIG_USB_SERIAL_GENERIC is not set
# CONFIG_USB_SERIAL_SIMPLE is not set
# CONFIG_USB_SERIAL_AIRCABLE is not set
# CONFIG_USB_SERIAL_ARK3116 is not set
# CONFIG_USB_SERIAL_BELKIN is not set
# CONFIG_USB_SERIAL_CH341 is not set
# CONFIG_USB_SERIAL_WHITEHEAT is not set
# CONFIG_USB_SERIAL_DIGI_ACCELEPORT is not set
# CONFIG_USB_SERIAL_CP210X is not set
# CONFIG_USB_SERIAL_CYPRESS_M8 is not set
# CONFIG_USB_SERIAL_EMPEG is not set
# CONFIG_USB_SERIAL_FTDI_SIO is not set
# CONFIG_USB_SERIAL_VISOR is not set
# CONFIG_USB_SERIAL_IPAQ is not set
# CONFIG_USB_SERIAL_IR is not set
# CONFIG_USB_SERIAL_EDGEPORT is not set
# CONFIG_USB_SERIAL_EDGEPORT_TI is not set
# CONFIG_USB_SERIAL_F81232 is not set
# CONFIG_USB_SERIAL_GARMIN is not set
# CONFIG_USB_SERIAL_IPW is not set
# CONFIG_USB_SERIAL_IUU is not set
# CONFIG_USB_SERIAL_KEYSPAN_PDA is not set
# CONFIG_USB_SERIAL_KEYSPAN is not set
# CONFIG_USB_SERIAL_KLSI is not set
# CONFIG_USB_SERIAL_KOBIL_SCT is not set
# CONFIG_USB_SERIAL_MCT_U232 is not set
# CONFIG_USB_SERIAL_METRO is not set
# CONFIG_USB_SERIAL_MOS7720 is not set
# CONFIG_USB_SERIAL_MOS7840 is not set
# CONFIG_USB_SERIAL_MXUPORT is not set
# CONFIG_USB_SERIAL_NAVMAN is not set
CONFIG_USB_SERIAL_PL2303=m
# CONFIG_USB_SERIAL_OTI6858 is not set
# CONFIG_USB_SERIAL_QCAUX is not set
# CONFIG_USB_SERIAL_QUALCOMM is not set
# CONFIG_USB_SERIAL_SPCP8X5 is not set
# CONFIG_USB_SERIAL_SAFE is not set
# CONFIG_USB_SERIAL_SIERRAWIRELESS is not set
# CONFIG_USB_SERIAL_SYMBOL is not set
# CONFIG_USB_SERIAL_TI is not set
# CONFIG_USB_SERIAL_CYBERJACK is not set
# CONFIG_USB_SERIAL_XIRCOM is not set
# CONFIG_USB_SERIAL_OPTION is not set
# CONFIG_USB_SERIAL_OMNINET is not set
# CONFIG_USB_SERIAL_OPTICON is not set
# CONFIG_USB_SERIAL_XSENS_MT is not set
# CONFIG_USB_SERIAL_WISHBONE is not set
# CONFIG_USB_SERIAL_ZTE is not set
# CONFIG_USB_SERIAL_SSU100 is not set
# CONFIG_USB_SERIAL_QT2 is not set
# CONFIG_USB_SERIAL_DEBUG is not set

#
# USB Miscellaneous drivers
#
# CONFIG_USB_EMI62 is not set
# CONFIG_USB_EMI26 is not set
# CONFIG_USB_ADUTUX is not set
# CONFIG_USB_SEVSEG is not set
# CONFIG_USB_RIO500 is not set
# CONFIG_USB_LEGOTOWER is not set
# CONFIG_USB_LCD is not set
# CONFIG_USB_LED is not set
# CONFIG_USB_CYPRESS_CY7C63 is not set
# CONFIG_USB_CYTHERM is not set
# CONFIG_USB_IDMOUSE is not set
# CONFIG_USB_FTDI_ELAN is not set
# CONFIG_USB_APPLEDISPLAY is not set
# CONFIG_USB_SISUSBVGA is not set
# CONFIG_USB_LD is not set
# CONFIG_USB_TRANCEVIBRATOR is not set
# CONFIG_USB_IOWARRIOR is not set
CONFIG_USB_TEST=m
# CONFIG_USB_EHSET_TEST_FIXTURE is not set
# CONFIG_USB_ISIGHTFW is not set
# CONFIG_USB_YUREX is not set
# CONFIG_USB_EZUSB_FX2 is not set
# CONFIG_USB_HSIC_USB3503 is not set

#
# USB Physical Layer drivers
#
CONFIG_USB_PHY=y
# CONFIG_USB_OTG_FSM is not set
# CONFIG_USB_OTG_WAKELOCK is not set
CONFIG_NOP_USB_XCEIV=y
CONFIG_AM335X_CONTROL_USB=y
CONFIG_AM335X_PHY_USB=y
# CONFIG_SAMSUNG_USB2PHY is not set
# CONFIG_SAMSUNG_USB3PHY is not set
# CONFIG_USB_GPIO_VBUS is not set
# CONFIG_USB_ISP1301 is not set
# CONFIG_USB_RCAR_PHY is not set
# CONFIG_USB_ULPI is not set
CONFIG_USB_GADGET=y
CONFIG_USB_GADGET_DEBUG=y
# CONFIG_USB_GADGET_VERBOSE is not set
CONFIG_USB_GADGET_DEBUG_FILES=y
CONFIG_USB_GADGET_DEBUG_FS=y
CONFIG_USB_GADGET_VBUS_DRAW=2
CONFIG_USB_GADGET_STORAGE_NUM_BUFFERS=2

#
# USB Peripheral Controller
#
# CONFIG_USB_FOTG210_UDC is not set
# CONFIG_USB_GR_UDC is not set
# CONFIG_USB_R8A66597 is not set
# CONFIG_USB_PXA27X is not set
# CONFIG_USB_S3C_HSOTG is not set
# CONFIG_USB_MV_UDC is not set
# CONFIG_USB_MV_U3D is not set
# CONFIG_USB_M66592 is not set
# CONFIG_USB_AMD5536UDC is not set
# CONFIG_USB_NET2272 is not set
# CONFIG_USB_NET2280 is not set
# CONFIG_USB_GOKU is not set
# CONFIG_USB_EG20T is not set
# CONFIG_USB_DUMMY_HCD is not set
CONFIG_USB_LIBCOMPOSITE=m
CONFIG_USB_F_ACM=m
CONFIG_USB_F_SS_LB=m
CONFIG_USB_U_SERIAL=m
CONFIG_USB_U_ETHER=m
CONFIG_USB_F_SERIAL=m
CONFIG_USB_F_OBEX=m
CONFIG_USB_F_NCM=m
CONFIG_USB_F_ECM=m
CONFIG_USB_F_SUBSET=m
CONFIG_USB_F_RNDIS=m
CONFIG_USB_F_MASS_STORAGE=m
CONFIG_USB_F_FS=m
# CONFIG_USB_CONFIGFS is not set
CONFIG_USB_ZERO=m
CONFIG_USB_AUDIO=m
# CONFIG_GADGET_UAC1 is not set
CONFIG_USB_ETH=m
CONFIG_USB_ETH_RNDIS=y
# CONFIG_USB_ETH_EEM is not set
CONFIG_USB_G_NCM=m
CONFIG_USB_GADGETFS=m
CONFIG_USB_FUNCTIONFS=m
CONFIG_USB_FUNCTIONFS_ETH=y
CONFIG_USB_FUNCTIONFS_RNDIS=y
CONFIG_USB_FUNCTIONFS_GENERIC=y
CONFIG_USB_MASS_STORAGE=m
CONFIG_USB_G_SERIAL=m
CONFIG_USB_MIDI_GADGET=m
CONFIG_USB_G_PRINTER=m
CONFIG_USB_CDC_COMPOSITE=m
CONFIG_USB_G_ACM_MS=m
CONFIG_USB_G_MULTI=m
CONFIG_USB_G_MULTI_RNDIS=y
CONFIG_USB_G_MULTI_CDC=y
CONFIG_USB_G_HID=m
CONFIG_USB_G_DBGP=m
# CONFIG_USB_G_DBGP_PRINTK is not set
CONFIG_USB_G_DBGP_SERIAL=y
CONFIG_USB_G_WEBCAM=m
# CONFIG_UWB is not set
CONFIG_MMC=y
# CONFIG_MMC_DEBUG is not set
CONFIG_MMC_UNSAFE_RESUME=y
# CONFIG_MMC_CLKGATE is not set
# CONFIG_MMC_EMBEDDED_SDIO is not set
# CONFIG_MMC_PARANOID_SD_INIT is not set

#
# MMC/SD/SDIO Card Drivers
#
CONFIG_MMC_BLOCK=y
CONFIG_MMC_BLOCK_MINORS=8
CONFIG_MMC_BLOCK_BOUNCE=y
# CONFIG_MMC_BLOCK_DEFERRED_RESUME is not set
CONFIG_SDIO_UART=y
# CONFIG_MMC_TEST is not set

#
# MMC/SD/SDIO Host Controller Drivers
#
# CONFIG_MMC_SDHCI is not set
# CONFIG_MMC_SDHCI_PXAV3 is not set
# CONFIG_MMC_SDHCI_PXAV2 is not set
CONFIG_MMC_OMAP=y
CONFIG_MMC_OMAP_HS=y
# CONFIG_MMC_TIFM_SD is not set
# CONFIG_MMC_CB710 is not set
# CONFIG_MMC_VIA_SDMMC is not set
# CONFIG_MMC_DW is not set
# CONFIG_MMC_VUB300 is not set
# CONFIG_MMC_USHC is not set
# CONFIG_MEMSTICK is not set
CONFIG_NEW_LEDS=y
CONFIG_LEDS_CLASS=y

#
# LED drivers
#
# CONFIG_LEDS_LM3530 is not set
# CONFIG_LEDS_LM3642 is not set
# CONFIG_LEDS_PCA9532 is not set
CONFIG_LEDS_GPIO=y
# CONFIG_LEDS_LP3944 is not set
# CONFIG_LEDS_LP5521 is not set
# CONFIG_LEDS_LP5523 is not set
# CONFIG_LEDS_LP5562 is not set
# CONFIG_LEDS_LP8501 is not set
# CONFIG_LEDS_PCA955X is not set
# CONFIG_LEDS_PCA963X is not set
# CONFIG_LEDS_PCA9685 is not set
# CONFIG_LEDS_DAC124S085 is not set
# CONFIG_LEDS_PWM is not set
# CONFIG_LEDS_REGULATOR is not set
# CONFIG_LEDS_BD2802 is not set
# CONFIG_LEDS_LT3593 is not set
# CONFIG_LEDS_TCA6507 is not set
# CONFIG_LEDS_LM355x is not set
# CONFIG_LEDS_OT200 is not set
# CONFIG_LEDS_BLINKM is not set

#
# LED Triggers
#
CONFIG_LEDS_TRIGGERS=y
CONFIG_LEDS_TRIGGER_TIMER=y
CONFIG_LEDS_TRIGGER_ONESHOT=y
CONFIG_LEDS_TRIGGER_HEARTBEAT=y
CONFIG_LEDS_TRIGGER_BACKLIGHT=y
CONFIG_LEDS_TRIGGER_CPU=y
CONFIG_LEDS_TRIGGER_GPIO=y
CONFIG_LEDS_TRIGGER_DEFAULT_ON=y

#
# iptables trigger is under Netfilter config (LED target)
#
CONFIG_LEDS_TRIGGER_TRANSIENT=y
CONFIG_LEDS_TRIGGER_CAMERA=y
# CONFIG_SWITCH is not set
# CONFIG_ACCESSIBILITY is not set
# CONFIG_INFINIBAND is not set
# CONFIG_EDAC is not set
CONFIG_RTC_LIB=y
CONFIG_RTC_CLASS=y
CONFIG_RTC_HCTOSYS=y
CONFIG_RTC_SYSTOHC=y
CONFIG_RTC_HCTOSYS_DEVICE="rtc0"
# CONFIG_RTC_DEBUG is not set

#
# RTC interfaces
#
CONFIG_RTC_INTF_SYSFS=y
CONFIG_RTC_INTF_PROC=y
CONFIG_RTC_INTF_DEV=y
# CONFIG_RTC_INTF_DEV_UIE_EMUL is not set
# CONFIG_RTC_DRV_TEST is not set

#
# I2C RTC drivers
#
CONFIG_RTC_DRV_DS1307=y
# CONFIG_RTC_DRV_DS1374 is not set
# CONFIG_RTC_DRV_DS1672 is not set
# CONFIG_RTC_DRV_DS3232 is not set
# CONFIG_RTC_DRV_HYM8563 is not set
# CONFIG_RTC_DRV_MAX6900 is not set
# CONFIG_RTC_DRV_RS5C372 is not set
# CONFIG_RTC_DRV_ISL1208 is not set
# CONFIG_RTC_DRV_ISL12022 is not set
# CONFIG_RTC_DRV_ISL12057 is not set
# CONFIG_RTC_DRV_X1205 is not set
CONFIG_RTC_DRV_PALMAS=y
# CONFIG_RTC_DRV_PCF2127 is not set
# CONFIG_RTC_DRV_PCF8523 is not set
# CONFIG_RTC_DRV_PCF8563 is not set
# CONFIG_RTC_DRV_PCF8583 is not set
# CONFIG_RTC_DRV_M41T80 is not set
# CONFIG_RTC_DRV_BQ32K is not set
# CONFIG_RTC_DRV_TPS65910 is not set
# CONFIG_RTC_DRV_S35390A is not set
# CONFIG_RTC_DRV_FM3130 is not set
# CONFIG_RTC_DRV_RX8581 is not set
# CONFIG_RTC_DRV_RX8025 is not set
# CONFIG_RTC_DRV_EM3027 is not set
# CONFIG_RTC_DRV_RV3029C2 is not set

#
# SPI RTC drivers
#
# CONFIG_RTC_DRV_M41T93 is not set
# CONFIG_RTC_DRV_M41T94 is not set
# CONFIG_RTC_DRV_DS1305 is not set
# CONFIG_RTC_DRV_DS1390 is not set
# CONFIG_RTC_DRV_MAX6902 is not set
# CONFIG_RTC_DRV_R9701 is not set
# CONFIG_RTC_DRV_RS5C348 is not set
# CONFIG_RTC_DRV_DS3234 is not set
# CONFIG_RTC_DRV_PCF2123 is not set
# CONFIG_RTC_DRV_RX4581 is not set

#
# Platform RTC drivers
#
# CONFIG_RTC_DRV_CMOS is not set
# CONFIG_RTC_DRV_DS1286 is not set
# CONFIG_RTC_DRV_DS1511 is not set
# CONFIG_RTC_DRV_DS1553 is not set
# CONFIG_RTC_DRV_DS1742 is not set
# CONFIG_RTC_DRV_STK17TA8 is not set
# CONFIG_RTC_DRV_M48T86 is not set
# CONFIG_RTC_DRV_M48T35 is not set
# CONFIG_RTC_DRV_M48T59 is not set
# CONFIG_RTC_DRV_MSM6242 is not set
# CONFIG_RTC_DRV_BQ4802 is not set
# CONFIG_RTC_DRV_RP5C01 is not set
# CONFIG_RTC_DRV_V3020 is not set
# CONFIG_RTC_DRV_DS2404 is not set

#
# on-CPU RTC drivers
#
CONFIG_RTC_DRV_OMAP=y
# CONFIG_RTC_DRV_SNVS is not set
# CONFIG_RTC_DRV_MOXART is not set

#
# HID Sensor RTC drivers
#
# CONFIG_RTC_DRV_HID_SENSOR_TIME is not set
CONFIG_DMADEVICES=y
# CONFIG_DMADEVICES_DEBUG is not set

#
# DMA Devices
#
# CONFIG_DW_DMAC_CORE is not set
# CONFIG_DW_DMAC is not set
# CONFIG_DW_DMAC_PCI is not set
# CONFIG_TIMB_DMA is not set
CONFIG_TI_EDMA=y
CONFIG_DMA_OMAP=y
CONFIG_TI_CPPI41=y
CONFIG_DMA_ENGINE=y
CONFIG_DMA_VIRTUAL_CHANNELS=y
CONFIG_DMA_OF=y

#
# DMA Clients
#
# CONFIG_ASYNC_TX_DMA is not set
# CONFIG_DMATEST is not set
CONFIG_OMAP_DMA_CROSSBAR=y
# CONFIG_AUXDISPLAY is not set
# CONFIG_UIO is not set
# CONFIG_VFIO is not set
# CONFIG_VIRT_DRIVERS is not set
CONFIG_VIRTIO=m

#
# Virtio drivers
#
# CONFIG_VIRTIO_PCI is not set
# CONFIG_VIRTIO_BALLOON is not set
# CONFIG_VIRTIO_MMIO is not set

#
# Microsoft Hyper-V guest support
#

#
# Xen driver support
#
CONFIG_XEN_BALLOON=y
CONFIG_XEN_SCRUB_PAGES=y
CONFIG_XEN_DEV_EVTCHN=y
CONFIG_XEN_BACKEND=y
CONFIG_XENFS=y
CONFIG_XEN_COMPAT_XENFS=y
CONFIG_XEN_SYS_HYPERVISOR=y
CONFIG_XEN_XENBUS_FRONTEND=y
CONFIG_XEN_GNTDEV=y
CONFIG_XEN_GRANT_DEV_ALLOC=y
CONFIG_SWIOTLB_XEN=y
CONFIG_XEN_PRIVCMD=y
# CONFIG_STAGING is not set
CONFIG_CLKDEV_LOOKUP=y
CONFIG_HAVE_CLK_PREPARE=y
CONFIG_COMMON_CLK=y

#
# Common Clock Framework
#
# CONFIG_COMMON_CLK_SI5351 is not set
# CONFIG_COMMON_CLK_SI570 is not set
# CONFIG_CLK_TWL6040 is not set
# CONFIG_COMMON_CLK_QCOM is not set
CONFIG_HWSPINLOCK=y

#
# Hardware Spinlock drivers
#
CONFIG_HWSPINLOCK_OMAP=y
CONFIG_CLKSRC_OF=y
CONFIG_CLKSRC_MMIO=y
CONFIG_ARM_ARCH_TIMER=y
CONFIG_ARM_ARCH_TIMER_EVTSTREAM=y
CONFIG_MAILBOX=y
CONFIG_OMAP2PLUS_MBOX=y
CONFIG_OMAP_MBOX_KFIFO_SIZE=256
CONFIG_IOMMU_API=y
CONFIG_IOMMU_SUPPORT=y
CONFIG_OF_IOMMU=y
CONFIG_OMAP_IOMMU=y
CONFIG_OMAP_IOVMM=y
CONFIG_OMAP_IOMMU_DEBUG=y
# CONFIG_ARM_SMMU is not set

#
# Remoteproc drivers
#
CONFIG_REMOTEPROC=m
CONFIG_OMAP_REMOTEPROC=m
CONFIG_OMAP_REMOTEPROC_WATCHDOG=y
# CONFIG_STE_MODEM_RPROC is not set
# CONFIG_PRUSS_REMOTEPROC is not set

#
# Rpmsg drivers
#
CONFIG_RPMSG=m
CONFIG_RPMSG_RPC=m
# CONFIG_PM_DEVFREQ is not set
CONFIG_EXTCON=y

#
# Extcon Device Drivers
#
CONFIG_EXTCON_GPIO=y
# CONFIG_EXTCON_ADC_JACK is not set
CONFIG_EXTCON_PALMAS=y
# CONFIG_MEMORY is not set
CONFIG_IIO=m
CONFIG_IIO_BUFFER=y
CONFIG_IIO_BUFFER_CB=y
CONFIG_IIO_KFIFO_BUF=m
CONFIG_IIO_TRIGGER=y
CONFIG_IIO_CONSUMERS_PER_TRIGGER=2

#
# Accelerometers
#
# CONFIG_BMA180 is not set
# CONFIG_IIO_ST_ACCEL_3AXIS is not set
# CONFIG_KXSD9 is not set

#
# Analog to digital converters
#
# CONFIG_AD7266 is not set
# CONFIG_AD7298 is not set
# CONFIG_AD7476 is not set
# CONFIG_AD7791 is not set
# CONFIG_AD7793 is not set
# CONFIG_AD7887 is not set
# CONFIG_AD7923 is not set
# CONFIG_EXYNOS_ADC is not set
# CONFIG_MAX1363 is not set
# CONFIG_MCP320X is not set
# CONFIG_MCP3422 is not set
# CONFIG_NAU7802 is not set
# CONFIG_TI_ADC081C is not set
CONFIG_TI_AM335X_ADC=m

#
# Amplifiers
#
# CONFIG_AD8366 is not set

#
# Hid Sensor IIO Common
#

#
# Digital to analog converters
#
# CONFIG_AD5064 is not set
# CONFIG_AD5360 is not set
# CONFIG_AD5380 is not set
# CONFIG_AD5421 is not set
# CONFIG_AD5446 is not set
# CONFIG_AD5449 is not set
# CONFIG_AD5504 is not set
# CONFIG_AD5624R_SPI is not set
# CONFIG_AD5686 is not set
# CONFIG_AD5755 is not set
# CONFIG_AD5764 is not set
# CONFIG_AD5791 is not set
# CONFIG_AD7303 is not set
# CONFIG_MAX517 is not set
# CONFIG_MCP4725 is not set

#
# Frequency Synthesizers DDS/PLL
#

#
# Clock Generator/Distribution
#
# CONFIG_AD9523 is not set

#
# Phase-Locked Loop (PLL) frequency synthesizers
#
# CONFIG_ADF4350 is not set

#
# Digital gyroscope sensors
#
# CONFIG_ADIS16080 is not set
# CONFIG_ADIS16130 is not set
# CONFIG_ADIS16136 is not set
# CONFIG_ADIS16260 is not set
# CONFIG_ADXRS450 is not set
# CONFIG_IIO_ST_GYRO_3AXIS is not set
# CONFIG_ITG3200 is not set

#
# Humidity sensors
#
# CONFIG_DHT11 is not set

#
# Inertial measurement units
#
# CONFIG_ADIS16400 is not set
# CONFIG_ADIS16480 is not set
# CONFIG_INV_MPU6050_IIO is not set

#
# Light sensors
#
# CONFIG_ADJD_S311 is not set
# CONFIG_APDS9300 is not set
# CONFIG_CM32181 is not set
# CONFIG_CM36651 is not set
# CONFIG_GP2AP020A00F is not set
# CONFIG_TCS3472 is not set
# CONFIG_SENSORS_TSL2563 is not set
# CONFIG_TSL4531 is not set
# CONFIG_VCNL4000 is not set

#
# Magnetometer sensors
#
# CONFIG_AK8975 is not set
# CONFIG_MAG3110 is not set
# CONFIG_IIO_ST_MAGN_3AXIS is not set

#
# Inclinometer sensors
#

#
# Triggers - standalone
#
# CONFIG_IIO_INTERRUPT_TRIGGER is not set
# CONFIG_IIO_SYSFS_TRIGGER is not set

#
# Pressure sensors
#
# CONFIG_MPL3115 is not set
# CONFIG_IIO_ST_PRESS is not set

#
# Temperature sensors
#
# CONFIG_TMP006 is not set
# CONFIG_VME_BUS is not set
CONFIG_PWM=y
CONFIG_PWM_SYSFS=y
# CONFIG_PWM_PCA9685 is not set
CONFIG_IRQCHIP=y
CONFIG_ARM_GIC=y
CONFIG_IRQ_CROSSBAR=y
# CONFIG_IPACK_BUS is not set
# CONFIG_RESET_CONTROLLER is not set
# CONFIG_FMC is not set

#
# PHY Subsystem
#
CONFIG_GENERIC_PHY=y
# CONFIG_PHY_EXYNOS_MIPI_VIDEO is not set
CONFIG_OMAP_CONTROL_PHY=y
CONFIG_OMAP_USB2=y
CONFIG_TI_PIPE3=y
# CONFIG_PHY_EXYNOS_DP_VIDEO is not set
# CONFIG_BCM_KONA_USB2_PHY is not set
# CONFIG_POWERCAP is not set

#
# File systems
#
CONFIG_DCACHE_WORD_ACCESS=y
CONFIG_EXT2_FS=y
# CONFIG_EXT2_FS_XATTR is not set
# CONFIG_EXT2_FS_XIP is not set
CONFIG_EXT3_FS=y
CONFIG_EXT3_DEFAULTS_TO_ORDERED=y
# CONFIG_EXT3_FS_XATTR is not set
CONFIG_EXT4_FS=y
# CONFIG_EXT4_FS_POSIX_ACL is not set
# CONFIG_EXT4_FS_SECURITY is not set
# CONFIG_EXT4_DEBUG is not set
CONFIG_JBD=y
# CONFIG_JBD_DEBUG is not set
CONFIG_JBD2=y
# CONFIG_JBD2_DEBUG is not set
CONFIG_FS_MBCACHE=y
# CONFIG_REISERFS_FS is not set
# CONFIG_JFS_FS is not set
# CONFIG_XFS_FS is not set
# CONFIG_GFS2_FS is not set
# CONFIG_OCFS2_FS is not set
# CONFIG_BTRFS_FS is not set
# CONFIG_NILFS2_FS is not set
CONFIG_FS_POSIX_ACL=y
CONFIG_FILE_LOCKING=y
CONFIG_FSNOTIFY=y
CONFIG_DNOTIFY=y
CONFIG_INOTIFY_USER=y
# CONFIG_FANOTIFY is not set
CONFIG_QUOTA=y
# CONFIG_QUOTA_NETLINK_INTERFACE is not set
CONFIG_PRINT_QUOTA_WARNING=y
# CONFIG_QUOTA_DEBUG is not set
CONFIG_QUOTA_TREE=y
# CONFIG_QFMT_V1 is not set
CONFIG_QFMT_V2=y
CONFIG_QUOTACTL=y
# CONFIG_AUTOFS4_FS is not set
# CONFIG_FUSE_FS is not set

#
# Caches
#
# CONFIG_FSCACHE is not set

#
# CD-ROM/DVD Filesystems
#
# CONFIG_ISO9660_FS is not set
# CONFIG_UDF_FS is not set

#
# DOS/FAT/NT Filesystems
#
CONFIG_FAT_FS=y
CONFIG_MSDOS_FS=y
CONFIG_VFAT_FS=y
CONFIG_FAT_DEFAULT_CODEPAGE=437
CONFIG_FAT_DEFAULT_IOCHARSET="iso8859-1"
# CONFIG_NTFS_FS is not set

#
# Pseudo filesystems
#
CONFIG_PROC_FS=y
CONFIG_PROC_SYSCTL=y
CONFIG_PROC_PAGE_MONITOR=y
CONFIG_SYSFS=y
CONFIG_TMPFS=y
# CONFIG_TMPFS_POSIX_ACL is not set
# CONFIG_TMPFS_XATTR is not set
# CONFIG_HUGETLBFS is not set
# CONFIG_HUGETLB_PAGE is not set
CONFIG_CONFIGFS_FS=m
CONFIG_MISC_FILESYSTEMS=y
# CONFIG_ADFS_FS is not set
# CONFIG_AFFS_FS is not set
# CONFIG_ECRYPT_FS is not set
# CONFIG_HFS_FS is not set
# CONFIG_HFSPLUS_FS is not set
# CONFIG_BEFS_FS is not set
# CONFIG_BFS_FS is not set
# CONFIG_EFS_FS is not set
CONFIG_JFFS2_FS=y
CONFIG_JFFS2_FS_DEBUG=0
CONFIG_JFFS2_FS_WRITEBUFFER=y
# CONFIG_JFFS2_FS_WBUF_VERIFY is not set
CONFIG_JFFS2_SUMMARY=y
CONFIG_JFFS2_FS_XATTR=y
CONFIG_JFFS2_FS_POSIX_ACL=y
CONFIG_JFFS2_FS_SECURITY=y
CONFIG_JFFS2_COMPRESSION_OPTIONS=y
CONFIG_JFFS2_ZLIB=y
CONFIG_JFFS2_LZO=y
CONFIG_JFFS2_RTIME=y
CONFIG_JFFS2_RUBIN=y
# CONFIG_JFFS2_CMODE_NONE is not set
CONFIG_JFFS2_CMODE_PRIORITY=y
# CONFIG_JFFS2_CMODE_SIZE is not set
# CONFIG_JFFS2_CMODE_FAVOURLZO is not set
CONFIG_UBIFS_FS=y
# CONFIG_UBIFS_FS_ADVANCED_COMPR is not set
CONFIG_UBIFS_FS_LZO=y
CONFIG_UBIFS_FS_ZLIB=y
# CONFIG_LOGFS is not set
CONFIG_CRAMFS=y
# CONFIG_SQUASHFS is not set
# CONFIG_VXFS_FS is not set
# CONFIG_MINIX_FS is not set
# CONFIG_OMFS_FS is not set
# CONFIG_HPFS_FS is not set
# CONFIG_QNX4FS_FS is not set
# CONFIG_QNX6FS_FS is not set
# CONFIG_ROMFS_FS is not set
# CONFIG_PSTORE is not set
# CONFIG_SYSV_FS is not set
# CONFIG_UFS_FS is not set
# CONFIG_F2FS_FS is not set
CONFIG_NETWORK_FILESYSTEMS=y
CONFIG_NFS_FS=y
CONFIG_NFS_V2=y
CONFIG_NFS_V3=y
CONFIG_NFS_V3_ACL=y
CONFIG_NFS_V4=y
# CONFIG_NFS_SWAP is not set
# CONFIG_NFS_V4_1 is not set
CONFIG_ROOT_NFS=y
# CONFIG_NFS_USE_LEGACY_DNS is not set
CONFIG_NFS_USE_KERNEL_DNS=y
# CONFIG_NFSD is not set
CONFIG_LOCKD=y
CONFIG_LOCKD_V4=y
CONFIG_NFS_ACL_SUPPORT=y
CONFIG_NFS_COMMON=y
CONFIG_SUNRPC=y
CONFIG_SUNRPC_GSS=y
# CONFIG_SUNRPC_DEBUG is not set
# CONFIG_CEPH_FS is not set
# CONFIG_CIFS is not set
# CONFIG_NCP_FS is not set
# CONFIG_CODA_FS is not set
# CONFIG_AFS_FS is not set
CONFIG_NLS=y
CONFIG_NLS_DEFAULT="iso8859-1"
CONFIG_NLS_CODEPAGE_437=y
# CONFIG_NLS_CODEPAGE_737 is not set
# CONFIG_NLS_CODEPAGE_775 is not set
# CONFIG_NLS_CODEPAGE_850 is not set
# CONFIG_NLS_CODEPAGE_852 is not set
# CONFIG_NLS_CODEPAGE_855 is not set
# CONFIG_NLS_CODEPAGE_857 is not set
# CONFIG_NLS_CODEPAGE_860 is not set
# CONFIG_NLS_CODEPAGE_861 is not set
# CONFIG_NLS_CODEPAGE_862 is not set
# CONFIG_NLS_CODEPAGE_863 is not set
# CONFIG_NLS_CODEPAGE_864 is not set
# CONFIG_NLS_CODEPAGE_865 is not set
# CONFIG_NLS_CODEPAGE_866 is not set
# CONFIG_NLS_CODEPAGE_869 is not set
# CONFIG_NLS_CODEPAGE_936 is not set
# CONFIG_NLS_CODEPAGE_950 is not set
# CONFIG_NLS_CODEPAGE_932 is not set
# CONFIG_NLS_CODEPAGE_949 is not set
# CONFIG_NLS_CODEPAGE_874 is not set
# CONFIG_NLS_ISO8859_8 is not set
# CONFIG_NLS_CODEPAGE_1250 is not set
# CONFIG_NLS_CODEPAGE_1251 is not set
# CONFIG_NLS_ASCII is not set
CONFIG_NLS_ISO8859_1=y
# CONFIG_NLS_ISO8859_2 is not set
# CONFIG_NLS_ISO8859_3 is not set
# CONFIG_NLS_ISO8859_4 is not set
# CONFIG_NLS_ISO8859_5 is not set
# CONFIG_NLS_ISO8859_6 is not set
# CONFIG_NLS_ISO8859_7 is not set
# CONFIG_NLS_ISO8859_9 is not set
# CONFIG_NLS_ISO8859_13 is not set
# CONFIG_NLS_ISO8859_14 is not set
# CONFIG_NLS_ISO8859_15 is not set
# CONFIG_NLS_KOI8_R is not set
# CONFIG_NLS_KOI8_U is not set
# CONFIG_NLS_MAC_ROMAN is not set
# CONFIG_NLS_MAC_CELTIC is not set
# CONFIG_NLS_MAC_CENTEURO is not set
# CONFIG_NLS_MAC_CROATIAN is not set
# CONFIG_NLS_MAC_CYRILLIC is not set
# CONFIG_NLS_MAC_GAELIC is not set
# CONFIG_NLS_MAC_GREEK is not set
# CONFIG_NLS_MAC_ICELAND is not set
# CONFIG_NLS_MAC_INUIT is not set
# CONFIG_NLS_MAC_ROMANIAN is not set
# CONFIG_NLS_MAC_TURKISH is not set
# CONFIG_NLS_UTF8 is not set
# CONFIG_DLM is not set

#
# Kernel hacking
#

#
# printk and dmesg options
#
CONFIG_PRINTK_TIME=y
CONFIG_DEFAULT_MESSAGE_LOGLEVEL=4
# CONFIG_BOOT_PRINTK_DELAY is not set
# CONFIG_DYNAMIC_DEBUG is not set

#
# Compile-time checks and compiler options
#
CONFIG_DEBUG_INFO=y
# CONFIG_DEBUG_INFO_REDUCED is not set
CONFIG_ENABLE_WARN_DEPRECATED=y
CONFIG_ENABLE_MUST_CHECK=y
CONFIG_FRAME_WARN=1024
# CONFIG_STRIP_ASM_SYMS is not set
# CONFIG_READABLE_ASM is not set
# CONFIG_UNUSED_SYMBOLS is not set
CONFIG_DEBUG_FS=y
# CONFIG_HEADERS_CHECK is not set
# CONFIG_DEBUG_SECTION_MISMATCH is not set
CONFIG_FRAME_POINTER=y
# CONFIG_DEBUG_FORCE_WEAK_PER_CPU is not set
CONFIG_MAGIC_SYSRQ=y
CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE=0x1
CONFIG_DEBUG_KERNEL=y

#
# Memory Debugging
#
# CONFIG_DEBUG_PAGEALLOC is not set
# CONFIG_DEBUG_OBJECTS is not set
# CONFIG_DEBUG_SLAB is not set
CONFIG_HAVE_DEBUG_KMEMLEAK=y
# CONFIG_DEBUG_KMEMLEAK is not set
# CONFIG_DEBUG_STACK_USAGE is not set
# CONFIG_DEBUG_VM is not set
# CONFIG_DEBUG_MEMORY_INIT is not set
# CONFIG_DEBUG_PER_CPU_MAPS is not set
# CONFIG_DEBUG_HIGHMEM is not set
# CONFIG_DEBUG_SHIRQ is not set

#
# Debug Lockups and Hangs
#
# CONFIG_LOCKUP_DETECTOR is not set
# CONFIG_DETECT_HUNG_TASK is not set
# CONFIG_PANIC_ON_OOPS is not set
CONFIG_PANIC_ON_OOPS_VALUE=0
CONFIG_PANIC_TIMEOUT=0
# CONFIG_SCHED_DEBUG is not set
# CONFIG_SCHEDSTATS is not set
# CONFIG_TIMER_STATS is not set
CONFIG_DEBUG_PREEMPT=y

#
# Lock Debugging (spinlocks, mutexes, etc...)
#
# CONFIG_DEBUG_RT_MUTEXES is not set
# CONFIG_RT_MUTEX_TESTER is not set
# CONFIG_DEBUG_SPINLOCK is not set
# CONFIG_DEBUG_MUTEXES is not set
# CONFIG_DEBUG_WW_MUTEX_SLOWPATH is not set
# CONFIG_DEBUG_LOCK_ALLOC is not set
# CONFIG_PROVE_LOCKING is not set
# CONFIG_LOCK_STAT is not set
# CONFIG_DEBUG_ATOMIC_SLEEP is not set
# CONFIG_DEBUG_LOCKING_API_SELFTESTS is not set
# CONFIG_STACKTRACE is not set
# CONFIG_DEBUG_KOBJECT is not set
# CONFIG_DEBUG_BUGVERBOSE is not set
# CONFIG_DEBUG_WRITECOUNT is not set
# CONFIG_DEBUG_LIST is not set
# CONFIG_DEBUG_SG is not set
# CONFIG_DEBUG_NOTIFIERS is not set
# CONFIG_DEBUG_CREDENTIALS is not set

#
# RCU Debugging
#
# CONFIG_PROVE_RCU_DELAY is not set
# CONFIG_SPARSE_RCU_POINTER is not set
# CONFIG_RCU_TORTURE_TEST is not set
CONFIG_RCU_CPU_STALL_TIMEOUT=21
CONFIG_RCU_CPU_STALL_VERBOSE=y
# CONFIG_RCU_CPU_STALL_INFO is not set
# CONFIG_RCU_TRACE is not set
# CONFIG_DEBUG_BLOCK_EXT_DEVT is not set
# CONFIG_NOTIFIER_ERROR_INJECTION is not set
# CONFIG_FAULT_INJECTION is not set
CONFIG_HAVE_FUNCTION_TRACER=y
CONFIG_HAVE_FUNCTION_GRAPH_TRACER=y
CONFIG_HAVE_DYNAMIC_FTRACE=y
CONFIG_HAVE_FTRACE_MCOUNT_RECORD=y
CONFIG_HAVE_SYSCALL_TRACEPOINTS=y
CONFIG_HAVE_C_RECORDMCOUNT=y
CONFIG_TRACE_CLOCK=y
CONFIG_RING_BUFFER=y
CONFIG_RING_BUFFER_ALLOW_SWAP=y
CONFIG_TRACING_SUPPORT=y
# CONFIG_FTRACE is not set

#
# Runtime Testing
#
# CONFIG_LKDTM is not set
# CONFIG_TEST_LIST_SORT is not set
# CONFIG_KPROBES_SANITY_TEST is not set
# CONFIG_BACKTRACE_SELF_TEST is not set
# CONFIG_RBTREE_TEST is not set
# CONFIG_INTERVAL_TREE_TEST is not set
# CONFIG_PERCPU_TEST is not set
# CONFIG_ATOMIC64_SELFTEST is not set
# CONFIG_TEST_STRING_HELPERS is not set
# CONFIG_TEST_KSTRTOX is not set
# CONFIG_DMA_API_DEBUG is not set
# CONFIG_TEST_MODULE is not set
# CONFIG_TEST_USER_COPY is not set
# CONFIG_SAMPLES is not set
CONFIG_HAVE_ARCH_KGDB=y
# CONFIG_KGDB is not set
# CONFIG_ARM_PTDUMP is not set
# CONFIG_STRICT_DEVMEM is not set
# CONFIG_ARM_UNWIND is not set
# CONFIG_DEBUG_USER is not set
# CONFIG_DEBUG_LL is not set
CONFIG_DEBUG_LL_INCLUDE="mach/debug-macro.S"
# CONFIG_DEBUG_UART_PL01X is not set
# CONFIG_DEBUG_UART_8250 is not set
CONFIG_UNCOMPRESS_INCLUDE="debug/uncompress.h"
# CONFIG_ARM_KPROBES_TEST is not set
# CONFIG_PID_IN_CONTEXTIDR is not set
# CONFIG_DEBUG_SET_MODULE_RONX is not set

#
# Security options
#
CONFIG_KEYS=y
# CONFIG_PERSISTENT_KEYRINGS is not set
# CONFIG_BIG_KEYS is not set
# CONFIG_ENCRYPTED_KEYS is not set
# CONFIG_KEYS_DEBUG_PROC_KEYS is not set
# CONFIG_SECURITY_DMESG_RESTRICT is not set
CONFIG_SECURITY=y
# CONFIG_SECURITYFS is not set
# CONFIG_SECURITY_NETWORK is not set
# CONFIG_SECURITY_PATH is not set
# CONFIG_SECURITY_SMACK is not set
# CONFIG_SECURITY_TOMOYO is not set
# CONFIG_SECURITY_APPARMOR is not set
# CONFIG_SECURITY_YAMA is not set
# CONFIG_IMA is not set
# CONFIG_EVM is not set
CONFIG_DEFAULT_SECURITY_DAC=y
CONFIG_DEFAULT_SECURITY=""
CONFIG_CRYPTO=y

#
# Crypto core or helper
#
CONFIG_CRYPTO_ALGAPI=y
CONFIG_CRYPTO_ALGAPI2=y
CONFIG_CRYPTO_AEAD=y
CONFIG_CRYPTO_AEAD2=y
CONFIG_CRYPTO_BLKCIPHER=y
CONFIG_CRYPTO_BLKCIPHER2=y
CONFIG_CRYPTO_HASH=y
CONFIG_CRYPTO_HASH2=y
CONFIG_CRYPTO_RNG=y
CONFIG_CRYPTO_RNG2=y
CONFIG_CRYPTO_PCOMP2=y
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_MANAGER2=y
# CONFIG_CRYPTO_USER is not set
CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=y
# CONFIG_CRYPTO_GF128MUL is not set
# CONFIG_CRYPTO_NULL is not set
# CONFIG_CRYPTO_PCRYPT is not set
CONFIG_CRYPTO_WORKQUEUE=y
# CONFIG_CRYPTO_CRYPTD is not set
# CONFIG_CRYPTO_AUTHENC is not set
CONFIG_CRYPTO_TEST=m

#
# Authenticated Encryption with Associated Data
#
CONFIG_CRYPTO_CCM=y
# CONFIG_CRYPTO_GCM is not set
CONFIG_CRYPTO_SEQIV=y

#
# Block modes
#
# CONFIG_CRYPTO_CBC is not set
CONFIG_CRYPTO_CTR=y
# CONFIG_CRYPTO_CTS is not set
CONFIG_CRYPTO_ECB=y
# CONFIG_CRYPTO_LRW is not set
# CONFIG_CRYPTO_PCBC is not set
# CONFIG_CRYPTO_XTS is not set

#
# Hash modes
#
# CONFIG_CRYPTO_CMAC is not set
CONFIG_CRYPTO_HMAC=y
# CONFIG_CRYPTO_XCBC is not set
# CONFIG_CRYPTO_VMAC is not set

#
# Digest
#
CONFIG_CRYPTO_CRC32C=y
# CONFIG_CRYPTO_CRC32 is not set
CONFIG_CRYPTO_CRCT10DIF=y
# CONFIG_CRYPTO_GHASH is not set
# CONFIG_CRYPTO_MD4 is not set
CONFIG_CRYPTO_MD5=y
CONFIG_CRYPTO_MICHAEL_MIC=y
# CONFIG_CRYPTO_RMD128 is not set
# CONFIG_CRYPTO_RMD160 is not set
# CONFIG_CRYPTO_RMD256 is not set
# CONFIG_CRYPTO_RMD320 is not set
CONFIG_CRYPTO_SHA1=y
# CONFIG_CRYPTO_SHA1_ARM is not set
CONFIG_CRYPTO_SHA256=y
CONFIG_CRYPTO_SHA512=y
# CONFIG_CRYPTO_TGR192 is not set
# CONFIG_CRYPTO_WP512 is not set

#
# Ciphers
#
CONFIG_CRYPTO_AES=y
# CONFIG_CRYPTO_AES_ARM is not set
# CONFIG_CRYPTO_ANUBIS is not set
CONFIG_CRYPTO_ARC4=y
# CONFIG_CRYPTO_BLOWFISH is not set
# CONFIG_CRYPTO_CAMELLIA is not set
# CONFIG_CRYPTO_CAST5 is not set
# CONFIG_CRYPTO_CAST6 is not set
CONFIG_CRYPTO_DES=y
# CONFIG_CRYPTO_FCRYPT is not set
# CONFIG_CRYPTO_KHAZAD is not set
# CONFIG_CRYPTO_SALSA20 is not set
# CONFIG_CRYPTO_SEED is not set
# CONFIG_CRYPTO_SERPENT is not set
# CONFIG_CRYPTO_TEA is not set
# CONFIG_CRYPTO_TWOFISH is not set

#
# Compression
#
CONFIG_CRYPTO_DEFLATE=y
# CONFIG_CRYPTO_ZLIB is not set
CONFIG_CRYPTO_LZO=y
# CONFIG_CRYPTO_LZ4 is not set
# CONFIG_CRYPTO_LZ4HC is not set

#
# Random Number Generation
#
# CONFIG_CRYPTO_ANSI_CPRNG is not set
CONFIG_CRYPTO_USER_API=y
CONFIG_CRYPTO_USER_API_HASH=y
CONFIG_CRYPTO_USER_API_SKCIPHER=y
CONFIG_CRYPTO_HW=y
CONFIG_CRYPTO_DEV_OMAP_SHAM=y
CONFIG_CRYPTO_DEV_OMAP_AES=y
CONFIG_CRYPTO_DEV_OMAP_DES=y
# CONFIG_ASYMMETRIC_KEY_TYPE is not set
# CONFIG_BINARY_PRINTF is not set

#
# Library routines
#
CONFIG_BITREVERSE=y
CONFIG_GENERIC_STRNCPY_FROM_USER=y
CONFIG_GENERIC_STRNLEN_USER=y
CONFIG_GENERIC_NET_UTILS=y
CONFIG_GENERIC_PCI_IOMAP=y
CONFIG_GENERIC_IO=y
CONFIG_ARCH_USE_CMPXCHG_LOCKREF=y
CONFIG_CRC_CCITT=y
CONFIG_CRC16=y
CONFIG_CRC_T10DIF=y
CONFIG_CRC_ITU_T=y
CONFIG_CRC32=y
# CONFIG_CRC32_SELFTEST is not set
CONFIG_CRC32_SLICEBY8=y
# CONFIG_CRC32_SLICEBY4 is not set
# CONFIG_CRC32_SARWATE is not set
# CONFIG_CRC32_BIT is not set
CONFIG_CRC7=y
CONFIG_LIBCRC32C=y
# CONFIG_CRC8 is not set
# CONFIG_RANDOM32_SELFTEST is not set
CONFIG_ZLIB_INFLATE=y
CONFIG_ZLIB_DEFLATE=y
CONFIG_LZO_COMPRESS=y
CONFIG_LZO_DECOMPRESS=y
# CONFIG_XZ_DEC is not set
# CONFIG_XZ_DEC_BCJ is not set
CONFIG_DECOMPRESS_GZIP=y
CONFIG_BCH=y
CONFIG_ASSOCIATIVE_ARRAY=y
CONFIG_HAS_IOMEM=y
CONFIG_HAS_IOPORT=y
CONFIG_HAS_DMA=y
CONFIG_CPU_RMAP=y
CONFIG_DQL=y
CONFIG_NLATTR=y
CONFIG_ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE=y
# CONFIG_AVERAGE is not set
# CONFIG_CORDIC is not set
# CONFIG_DDR is not set
CONFIG_OID_REGISTRY=y
CONFIG_FONT_SUPPORT=y
CONFIG_FONTS=y
CONFIG_FONT_8x8=y
CONFIG_FONT_8x16=y
# CONFIG_FONT_6x11 is not set
# CONFIG_FONT_7x14 is not set
# CONFIG_FONT_PEARL_8x8 is not set
# CONFIG_FONT_ACORN_8x8 is not set
# CONFIG_FONT_MINI_4x6 is not set
# CONFIG_FONT_SUN8x16 is not set
# CONFIG_FONT_SUN12x22 is not set
# CONFIG_FONT_10x18 is not set
CONFIG_VIRTUALIZATION=y
# CONFIG_KVM is not set

--------------090505040107040405030200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------090505040107040405030200--


From xen-users-bounces@lists.xen.org Tue Jun 16 16:55:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 16:55:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4u83-0006pt-3U; Tue, 16 Jun 2015 16:54:27 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4t7v-00044Z-Ru
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 15:50:16 +0000
Received: from [85.158.137.68] by server-9.bemta-3.messagelabs.com id
	18/0E-17050-7B540855; Tue, 16 Jun 2015 15:50:15 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-14.tower-31.messagelabs.com!1434469813!14375203!1
X-Originating-IP: [198.47.26.153]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MyA9PiAxNjk4NDE=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 855 invoked from network); 16 Jun 2015 15:50:14 -0000
Received: from devils.ext.ti.com (HELO devils.ext.ti.com) (198.47.26.153)
	by server-14.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 16 Jun 2015 15:50:14 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by devils.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GFo94L000417;
	Tue, 16 Jun 2015 10:50:09 -0500
Received: from DLEE70.ent.ti.com (dlemailx.itg.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GFo9Aa003050;
	Tue, 16 Jun 2015 10:50:09 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 10:50:08 -0500
Message-ID: <558037A3.6000809@ti.com>
Date: Tue, 16 Jun 2015 10:50:11 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com>
In-Reply-To: <558029C0.1020806@ti.com>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 16:54:26 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/16/2015 09:50 AM, Brandon Perez wrote:
> On 06/16/2015 03:50 AM, Ian Campbell wrote:
>> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>>> Hello All,
>>>
>>>      I'm experiencing some issues with booting into a Dom0 Linux Kernel
>>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>>> shown me that the code is stuck in the idle_loop() function
>>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and
>>> there are no scheduled tasklets to run.
>>>
>>>      A little about my setup to start. I'm using uBoot to boot Xen,
>>> which
>>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>>
>>>      After looking through the Xen code, I was unable to find a place
>>> where it explicitly jumps into the Dom0 kernel, which was what I was
>>> expecting to see. Is there somewhere in the source code where this is
>>> the case that I just missed? Or, is the initial jump into the kernel
>>> scheduled as a tasklet? If the latter is the case, then the kernel is
>>> never scheduled as a tasklet in the source code.
>>>
>>>      Any tips on getting out the idle_loop() would be appreciated.
>>> Thanks
>>> in advance for your assistance.
>>
>> Without wishing to sound flippant, the idle loop will be exited when
>> things are not idle, i.e. there is some work to do. If it is idling that
>> would usually imply that every vcpu is sleeping or blocked. There's no
>> tasklets involved in the initial jump to dom0, just a normal return to
>> guest context.
>>
>> IME the most common cause when things appear broken and Xen is just idle
>> is incorrect console= on the dom0 kernel command line or not running a
>> getty in dom0, so you get no output. Both should be configured refer to
>> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
>> least.
>>
>> If that doesn't help then please post full serial logs of your system
>> booting as far as it does, including the u-boot commands and any u-boot
>> scripts which are run, along with your kernel .config.
>>
>> Also, when it is in this idling state you should be able to press the
>> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
>> keys (h for help, q and d give useful cpu and vcpu register state) to
>> see where dom0's vcpus are at, so please include some of those in the
>> logs.
>>
>> A dom0 vcpu address of 0x000000xx often indicates your kernel has
>> crashed early which can be another thing which goes wrong during initial
>> bringup on a new system (although normally more noisily than I am
>> inferring from what you've said here, but without logs its hard to say
>> for sure this isn't happening).
>>
>> It would also be useful to know exactly which SoC you are using.
>>
>> Ian.
>>
>
> Hello Ian,
>
>     The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As
> such, I've been adapting the instructions at
> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
>
>
>     I've attached the booting log, the uBoot commands I run to get the
> system up, and my .config file for the kernel.
>
>     The log stops after "Freed x init memory.", and nothing is printed
> out after that. Also, pressing CTRL-A three times does not bring up a
> Xen prompt, and pressing those keys have no affect.
>
>     It's worth noting that I am able to successfully boot the Linux
> kernel natively with uBoot.
>
>     This may or may not be relevant, but I have stepped through the Xen
> booting using Trace32. What I noticed was that, in the start_xen()
> function (xen/arch/arm/setup.c), the code immediately goes into the
> idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() ->
> idle_loop()). There is only 1 vCPU in my system currently.
>
> Brandon

Ian,

    I was parsing through the logs again, and I noticed that there's an 
error with the console option I'm passing into Xen. I'm getting the 
following lines: "Unable to initialize dtuart: -19" and "Bad console= 
option 'dtuart'".

   This would likely explain why CTRL-A is not working for me. However, 
I'm confused as to why the dtuart option would not work.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 16:55:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 16:55:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4u83-0006q4-Ke; Tue, 16 Jun 2015 16:54:27 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4u47-0006Rt-Gm
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 16:50:23 +0000
Received: from [193.109.254.147] by server-15.bemta-14.messagelabs.com id
	BD/C4-18947-EC350855; Tue, 16 Jun 2015 16:50:22 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-5.tower-27.messagelabs.com!1434473420!19255137!1
X-Originating-IP: [192.94.94.41]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTkyLjk0Ljk0LjQxID0+IDE2NDY4Ng==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 6127 invoked from network); 16 Jun 2015 16:50:22 -0000
Received: from bear.ext.ti.com (HELO bear.ext.ti.com) (192.94.94.41)
	by server-5.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 16 Jun 2015 16:50:22 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by bear.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GGoHwj015915;
	Tue, 16 Jun 2015 11:50:17 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GGoHTk025459;
	Tue, 16 Jun 2015 11:50:17 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 11:50:16 -0500
Message-ID: <558045BB.6040703@ti.com>
Date: Tue, 16 Jun 2015 11:50:19 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
In-Reply-To: <558037A3.6000809@ti.com>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 16:54:26 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/16/2015 10:50 AM, Brandon Perez wrote:
> On 06/16/2015 09:50 AM, Brandon Perez wrote:
>> On 06/16/2015 03:50 AM, Ian Campbell wrote:
>>> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>>>> Hello All,
>>>>
>>>>      I'm experiencing some issues with booting into a Dom0 Linux Kernel
>>>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>>>> shown me that the code is stuck in the idle_loop() function
>>>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs,
>>>> and
>>>> there are no scheduled tasklets to run.
>>>>
>>>>      A little about my setup to start. I'm using uBoot to boot Xen,
>>>> which
>>>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>>>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>>>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>>>
>>>>      After looking through the Xen code, I was unable to find a place
>>>> where it explicitly jumps into the Dom0 kernel, which was what I was
>>>> expecting to see. Is there somewhere in the source code where this is
>>>> the case that I just missed? Or, is the initial jump into the kernel
>>>> scheduled as a tasklet? If the latter is the case, then the kernel is
>>>> never scheduled as a tasklet in the source code.
>>>>
>>>>      Any tips on getting out the idle_loop() would be appreciated.
>>>> Thanks
>>>> in advance for your assistance.
>>>
>>> Without wishing to sound flippant, the idle loop will be exited when
>>> things are not idle, i.e. there is some work to do. If it is idling that
>>> would usually imply that every vcpu is sleeping or blocked. There's no
>>> tasklets involved in the initial jump to dom0, just a normal return to
>>> guest context.
>>>
>>> IME the most common cause when things appear broken and Xen is just idle
>>> is incorrect console= on the dom0 kernel command line or not running a
>>> getty in dom0, so you get no output. Both should be configured refer to
>>> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
>>> least.
>>>
>>> If that doesn't help then please post full serial logs of your system
>>> booting as far as it does, including the u-boot commands and any u-boot
>>> scripts which are run, along with your kernel .config.
>>>
>>> Also, when it is in this idling state you should be able to press the
>>> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
>>> keys (h for help, q and d give useful cpu and vcpu register state) to
>>> see where dom0's vcpus are at, so please include some of those in the
>>> logs.
>>>
>>> A dom0 vcpu address of 0x000000xx often indicates your kernel has
>>> crashed early which can be another thing which goes wrong during initial
>>> bringup on a new system (although normally more noisily than I am
>>> inferring from what you've said here, but without logs its hard to say
>>> for sure this isn't happening).
>>>
>>> It would also be useful to know exactly which SoC you are using.
>>>
>>> Ian.
>>>
>>
>> Hello Ian,
>>
>>     The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As
>> such, I've been adapting the instructions at
>> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
>>
>>
>>
>>     I've attached the booting log, the uBoot commands I run to get the
>> system up, and my .config file for the kernel.
>>
>>     The log stops after "Freed x init memory.", and nothing is printed
>> out after that. Also, pressing CTRL-A three times does not bring up a
>> Xen prompt, and pressing those keys have no affect.
>>
>>     It's worth noting that I am able to successfully boot the Linux
>> kernel natively with uBoot.
>>
>>     This may or may not be relevant, but I have stepped through the Xen
>> booting using Trace32. What I noticed was that, in the start_xen()
>> function (xen/arch/arm/setup.c), the code immediately goes into the
>> idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() ->
>> idle_loop()). There is only 1 vCPU in my system currently.
>>
>> Brandon
>
> Ian,
>
>     I was parsing through the logs again, and I noticed that there's an
> error with the console option I'm passing into Xen. I'm getting the
> following lines: "Unable to initialize dtuart: -19" and "Bad console=
> option 'dtuart'".
>
>    This would likely explain why CTRL-A is not working for me. However,
> I'm confused as to why the dtuart option would not work.
>
> Brandon

Ian,

    I think I figured out what the problem was. For my uBoot args, I 
selected "dtuart=serial2", when I should have selected "dtuart=serial0", 
since this is the correct alias to the UART in my device tree.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 16:55:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 16:55:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4u83-0006q4-Ke; Tue, 16 Jun 2015 16:54:27 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4u47-0006Rt-Gm
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 16:50:23 +0000
Received: from [193.109.254.147] by server-15.bemta-14.messagelabs.com id
	BD/C4-18947-EC350855; Tue, 16 Jun 2015 16:50:22 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-5.tower-27.messagelabs.com!1434473420!19255137!1
X-Originating-IP: [192.94.94.41]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTkyLjk0Ljk0LjQxID0+IDE2NDY4Ng==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 6127 invoked from network); 16 Jun 2015 16:50:22 -0000
Received: from bear.ext.ti.com (HELO bear.ext.ti.com) (192.94.94.41)
	by server-5.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 16 Jun 2015 16:50:22 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by bear.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GGoHwj015915;
	Tue, 16 Jun 2015 11:50:17 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GGoHTk025459;
	Tue, 16 Jun 2015 11:50:17 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 11:50:16 -0500
Message-ID: <558045BB.6040703@ti.com>
Date: Tue, 16 Jun 2015 11:50:19 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
In-Reply-To: <558037A3.6000809@ti.com>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 16:54:26 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/16/2015 10:50 AM, Brandon Perez wrote:
> On 06/16/2015 09:50 AM, Brandon Perez wrote:
>> On 06/16/2015 03:50 AM, Ian Campbell wrote:
>>> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>>>> Hello All,
>>>>
>>>>      I'm experiencing some issues with booting into a Dom0 Linux Kernel
>>>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>>>> shown me that the code is stuck in the idle_loop() function
>>>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs,
>>>> and
>>>> there are no scheduled tasklets to run.
>>>>
>>>>      A little about my setup to start. I'm using uBoot to boot Xen,
>>>> which
>>>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>>>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>>>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>>>
>>>>      After looking through the Xen code, I was unable to find a place
>>>> where it explicitly jumps into the Dom0 kernel, which was what I was
>>>> expecting to see. Is there somewhere in the source code where this is
>>>> the case that I just missed? Or, is the initial jump into the kernel
>>>> scheduled as a tasklet? If the latter is the case, then the kernel is
>>>> never scheduled as a tasklet in the source code.
>>>>
>>>>      Any tips on getting out the idle_loop() would be appreciated.
>>>> Thanks
>>>> in advance for your assistance.
>>>
>>> Without wishing to sound flippant, the idle loop will be exited when
>>> things are not idle, i.e. there is some work to do. If it is idling that
>>> would usually imply that every vcpu is sleeping or blocked. There's no
>>> tasklets involved in the initial jump to dom0, just a normal return to
>>> guest context.
>>>
>>> IME the most common cause when things appear broken and Xen is just idle
>>> is incorrect console= on the dom0 kernel command line or not running a
>>> getty in dom0, so you get no output. Both should be configured refer to
>>> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
>>> least.
>>>
>>> If that doesn't help then please post full serial logs of your system
>>> booting as far as it does, including the u-boot commands and any u-boot
>>> scripts which are run, along with your kernel .config.
>>>
>>> Also, when it is in this idling state you should be able to press the
>>> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
>>> keys (h for help, q and d give useful cpu and vcpu register state) to
>>> see where dom0's vcpus are at, so please include some of those in the
>>> logs.
>>>
>>> A dom0 vcpu address of 0x000000xx often indicates your kernel has
>>> crashed early which can be another thing which goes wrong during initial
>>> bringup on a new system (although normally more noisily than I am
>>> inferring from what you've said here, but without logs its hard to say
>>> for sure this isn't happening).
>>>
>>> It would also be useful to know exactly which SoC you are using.
>>>
>>> Ian.
>>>
>>
>> Hello Ian,
>>
>>     The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As
>> such, I've been adapting the instructions at
>> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
>>
>>
>>
>>     I've attached the booting log, the uBoot commands I run to get the
>> system up, and my .config file for the kernel.
>>
>>     The log stops after "Freed x init memory.", and nothing is printed
>> out after that. Also, pressing CTRL-A three times does not bring up a
>> Xen prompt, and pressing those keys have no affect.
>>
>>     It's worth noting that I am able to successfully boot the Linux
>> kernel natively with uBoot.
>>
>>     This may or may not be relevant, but I have stepped through the Xen
>> booting using Trace32. What I noticed was that, in the start_xen()
>> function (xen/arch/arm/setup.c), the code immediately goes into the
>> idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() ->
>> idle_loop()). There is only 1 vCPU in my system currently.
>>
>> Brandon
>
> Ian,
>
>     I was parsing through the logs again, and I noticed that there's an
> error with the console option I'm passing into Xen. I'm getting the
> following lines: "Unable to initialize dtuart: -19" and "Bad console=
> option 'dtuart'".
>
>    This would likely explain why CTRL-A is not working for me. However,
> I'm confused as to why the dtuart option would not work.
>
> Brandon

Ian,

    I think I figured out what the problem was. For my uBoot args, I 
selected "dtuart=serial2", when I should have selected "dtuart=serial0", 
since this is the correct alias to the UART in my device tree.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 16:55:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 16:55:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4u83-0006pt-3U; Tue, 16 Jun 2015 16:54:27 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4t7v-00044Z-Ru
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 15:50:16 +0000
Received: from [85.158.137.68] by server-9.bemta-3.messagelabs.com id
	18/0E-17050-7B540855; Tue, 16 Jun 2015 15:50:15 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-14.tower-31.messagelabs.com!1434469813!14375203!1
X-Originating-IP: [198.47.26.153]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MyA9PiAxNjk4NDE=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 855 invoked from network); 16 Jun 2015 15:50:14 -0000
Received: from devils.ext.ti.com (HELO devils.ext.ti.com) (198.47.26.153)
	by server-14.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 16 Jun 2015 15:50:14 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by devils.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GFo94L000417;
	Tue, 16 Jun 2015 10:50:09 -0500
Received: from DLEE70.ent.ti.com (dlemailx.itg.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GFo9Aa003050;
	Tue, 16 Jun 2015 10:50:09 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 10:50:08 -0500
Message-ID: <558037A3.6000809@ti.com>
Date: Tue, 16 Jun 2015 10:50:11 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com>
In-Reply-To: <558029C0.1020806@ti.com>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 16:54:26 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/16/2015 09:50 AM, Brandon Perez wrote:
> On 06/16/2015 03:50 AM, Ian Campbell wrote:
>> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>>> Hello All,
>>>
>>>      I'm experiencing some issues with booting into a Dom0 Linux Kernel
>>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>>> shown me that the code is stuck in the idle_loop() function
>>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs, and
>>> there are no scheduled tasklets to run.
>>>
>>>      A little about my setup to start. I'm using uBoot to boot Xen,
>>> which
>>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>>
>>>      After looking through the Xen code, I was unable to find a place
>>> where it explicitly jumps into the Dom0 kernel, which was what I was
>>> expecting to see. Is there somewhere in the source code where this is
>>> the case that I just missed? Or, is the initial jump into the kernel
>>> scheduled as a tasklet? If the latter is the case, then the kernel is
>>> never scheduled as a tasklet in the source code.
>>>
>>>      Any tips on getting out the idle_loop() would be appreciated.
>>> Thanks
>>> in advance for your assistance.
>>
>> Without wishing to sound flippant, the idle loop will be exited when
>> things are not idle, i.e. there is some work to do. If it is idling that
>> would usually imply that every vcpu is sleeping or blocked. There's no
>> tasklets involved in the initial jump to dom0, just a normal return to
>> guest context.
>>
>> IME the most common cause when things appear broken and Xen is just idle
>> is incorrect console= on the dom0 kernel command line or not running a
>> getty in dom0, so you get no output. Both should be configured refer to
>> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
>> least.
>>
>> If that doesn't help then please post full serial logs of your system
>> booting as far as it does, including the u-boot commands and any u-boot
>> scripts which are run, along with your kernel .config.
>>
>> Also, when it is in this idling state you should be able to press the
>> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
>> keys (h for help, q and d give useful cpu and vcpu register state) to
>> see where dom0's vcpus are at, so please include some of those in the
>> logs.
>>
>> A dom0 vcpu address of 0x000000xx often indicates your kernel has
>> crashed early which can be another thing which goes wrong during initial
>> bringup on a new system (although normally more noisily than I am
>> inferring from what you've said here, but without logs its hard to say
>> for sure this isn't happening).
>>
>> It would also be useful to know exactly which SoC you are using.
>>
>> Ian.
>>
>
> Hello Ian,
>
>     The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As
> such, I've been adapting the instructions at
> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
>
>
>     I've attached the booting log, the uBoot commands I run to get the
> system up, and my .config file for the kernel.
>
>     The log stops after "Freed x init memory.", and nothing is printed
> out after that. Also, pressing CTRL-A three times does not bring up a
> Xen prompt, and pressing those keys have no affect.
>
>     It's worth noting that I am able to successfully boot the Linux
> kernel natively with uBoot.
>
>     This may or may not be relevant, but I have stepped through the Xen
> booting using Trace32. What I noticed was that, in the start_xen()
> function (xen/arch/arm/setup.c), the code immediately goes into the
> idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() ->
> idle_loop()). There is only 1 vCPU in my system currently.
>
> Brandon

Ian,

    I was parsing through the logs again, and I noticed that there's an 
error with the console option I'm passing into Xen. I'm getting the 
following lines: "Unable to initialize dtuart: -19" and "Bad console= 
option 'dtuart'".

   This would likely explain why CTRL-A is not working for me. However, 
I'm confused as to why the dtuart option would not work.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 20:30:32 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 20:30:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4xU4-00082R-FD; Tue, 16 Jun 2015 20:29:24 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4wHR-0007l9-Oc
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 19:12:17 +0000
Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id
	3E/DD-31880-11570855; Tue, 16 Jun 2015 19:12:17 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-14.tower-206.messagelabs.com!1434481935!9261149!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11280 invoked from network); 16 Jun 2015 19:12:16 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-14.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 16 Jun 2015 19:12:16 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GJCBWb027590;
	Tue, 16 Jun 2015 14:12:11 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GJCBuc019487;
	Tue, 16 Jun 2015 14:12:11 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 14:12:11 -0500
Message-ID: <558066FD.8050104@ti.com>
Date: Tue, 16 Jun 2015 14:12:13 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com>
In-Reply-To: <558045BB.6040703@ti.com>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 20:29:23 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/16/2015 11:50 AM, Brandon Perez wrote:
> On 06/16/2015 10:50 AM, Brandon Perez wrote:
>> On 06/16/2015 09:50 AM, Brandon Perez wrote:
>>> On 06/16/2015 03:50 AM, Ian Campbell wrote:
>>>> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>>>>> Hello All,
>>>>>
>>>>>      I'm experiencing some issues with booting into a Dom0 Linux
>>>>> Kernel
>>>>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>>>>> shown me that the code is stuck in the idle_loop() function
>>>>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs,
>>>>> and
>>>>> there are no scheduled tasklets to run.
>>>>>
>>>>>      A little about my setup to start. I'm using uBoot to boot Xen,
>>>>> which
>>>>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>>>>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>>>>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>>>>
>>>>>      After looking through the Xen code, I was unable to find a place
>>>>> where it explicitly jumps into the Dom0 kernel, which was what I was
>>>>> expecting to see. Is there somewhere in the source code where this is
>>>>> the case that I just missed? Or, is the initial jump into the kernel
>>>>> scheduled as a tasklet? If the latter is the case, then the kernel is
>>>>> never scheduled as a tasklet in the source code.
>>>>>
>>>>>      Any tips on getting out the idle_loop() would be appreciated.
>>>>> Thanks
>>>>> in advance for your assistance.
>>>>
>>>> Without wishing to sound flippant, the idle loop will be exited when
>>>> things are not idle, i.e. there is some work to do. If it is idling
>>>> that
>>>> would usually imply that every vcpu is sleeping or blocked. There's no
>>>> tasklets involved in the initial jump to dom0, just a normal return to
>>>> guest context.
>>>>
>>>> IME the most common cause when things appear broken and Xen is just
>>>> idle
>>>> is incorrect console= on the dom0 kernel command line or not running a
>>>> getty in dom0, so you get no output. Both should be configured refer to
>>>> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
>>>> least.
>>>>
>>>> If that doesn't help then please post full serial logs of your system
>>>> booting as far as it does, including the u-boot commands and any u-boot
>>>> scripts which are run, along with your kernel .config.
>>>>
>>>> Also, when it is in this idling state you should be able to press the
>>>> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
>>>> keys (h for help, q and d give useful cpu and vcpu register state) to
>>>> see where dom0's vcpus are at, so please include some of those in the
>>>> logs.
>>>>
>>>> A dom0 vcpu address of 0x000000xx often indicates your kernel has
>>>> crashed early which can be another thing which goes wrong during
>>>> initial
>>>> bringup on a new system (although normally more noisily than I am
>>>> inferring from what you've said here, but without logs its hard to say
>>>> for sure this isn't happening).
>>>>
>>>> It would also be useful to know exactly which SoC you are using.
>>>>
>>>> Ian.
>>>>
>>>
>>> Hello Ian,
>>>
>>>     The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As
>>> such, I've been adapting the instructions at
>>> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
>>>
>>>
>>>
>>>
>>>     I've attached the booting log, the uBoot commands I run to get the
>>> system up, and my .config file for the kernel.
>>>
>>>     The log stops after "Freed x init memory.", and nothing is printed
>>> out after that. Also, pressing CTRL-A three times does not bring up a
>>> Xen prompt, and pressing those keys have no affect.
>>>
>>>     It's worth noting that I am able to successfully boot the Linux
>>> kernel natively with uBoot.
>>>
>>>     This may or may not be relevant, but I have stepped through the Xen
>>> booting using Trace32. What I noticed was that, in the start_xen()
>>> function (xen/arch/arm/setup.c), the code immediately goes into the
>>> idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() ->
>>> idle_loop()). There is only 1 vCPU in my system currently.
>>>
>>> Brandon
>>
>> Ian,
>>
>>     I was parsing through the logs again, and I noticed that there's an
>> error with the console option I'm passing into Xen. I'm getting the
>> following lines: "Unable to initialize dtuart: -19" and "Bad console=
>> option 'dtuart'".
>>
>>    This would likely explain why CTRL-A is not working for me. However,
>> I'm confused as to why the dtuart option would not work.
>>
>> Brandon
>
> Ian,
>
>     I think I figured out what the problem was. For my uBoot args, I
> selected "dtuart=serial2", when I should have selected "dtuart=serial0",
> since this is the correct alias to the UART in my device tree.
>
> Brandon

Ian,

    I resolved the error in my boot.log file with respect to the UART 
module, but I'm experiencing the same issue as before.

    Any tips would be appreicated.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 16 20:30:32 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2015 20:30:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z4xU4-00082R-FD; Tue, 16 Jun 2015 20:29:24 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z4wHR-0007l9-Oc
	for xen-users@lists.xen.org; Tue, 16 Jun 2015 19:12:17 +0000
Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id
	3E/DD-31880-11570855; Tue, 16 Jun 2015 19:12:17 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-14.tower-206.messagelabs.com!1434481935!9261149!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11280 invoked from network); 16 Jun 2015 19:12:16 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-14.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 16 Jun 2015 19:12:16 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5GJCBWb027590;
	Tue, 16 Jun 2015 14:12:11 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5GJCBuc019487;
	Tue, 16 Jun 2015 14:12:11 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Tue, 16 Jun 2015 14:12:11 -0500
Message-ID: <558066FD.8050104@ti.com>
Date: Tue, 16 Jun 2015 14:12:13 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com>
In-Reply-To: <558045BB.6040703@ti.com>
X-Originating-IP: [128.247.93.131]
X-Mailman-Approved-At: Tue, 16 Jun 2015 20:29:23 +0000
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/16/2015 11:50 AM, Brandon Perez wrote:
> On 06/16/2015 10:50 AM, Brandon Perez wrote:
>> On 06/16/2015 09:50 AM, Brandon Perez wrote:
>>> On 06/16/2015 03:50 AM, Ian Campbell wrote:
>>>> On Mon, 2015-06-15 at 16:59 -0400, Brandon Perez wrote:
>>>>> Hello All,
>>>>>
>>>>>      I'm experiencing some issues with booting into a Dom0 Linux
>>>>> Kernel
>>>>> on a embedded ARM Cortex A15 processor. Tracing through the code has
>>>>> shown me that the code is stuck in the idle_loop() function
>>>>> (xen/arch/arm/domain.c:41). The function responds to only soft IRQs,
>>>>> and
>>>>> there are no scheduled tasklets to run.
>>>>>
>>>>>      A little about my setup to start. I'm using uBoot to boot Xen,
>>>>> which
>>>>> is running a Linux 3.14 kernel. I'm currently on Xen's master branch,
>>>>> where the Xen version is 4.6-unstable. The commit I'm operating at has
>>>>> the id ecdae1cfaa7f6123decaa1b9d7205c3ff726b941.
>>>>>
>>>>>      After looking through the Xen code, I was unable to find a place
>>>>> where it explicitly jumps into the Dom0 kernel, which was what I was
>>>>> expecting to see. Is there somewhere in the source code where this is
>>>>> the case that I just missed? Or, is the initial jump into the kernel
>>>>> scheduled as a tasklet? If the latter is the case, then the kernel is
>>>>> never scheduled as a tasklet in the source code.
>>>>>
>>>>>      Any tips on getting out the idle_loop() would be appreciated.
>>>>> Thanks
>>>>> in advance for your assistance.
>>>>
>>>> Without wishing to sound flippant, the idle loop will be exited when
>>>> things are not idle, i.e. there is some work to do. If it is idling
>>>> that
>>>> would usually imply that every vcpu is sleeping or blocked. There's no
>>>> tasklets involved in the initial jump to dom0, just a normal return to
>>>> guest context.
>>>>
>>>> IME the most common cause when things appear broken and Xen is just
>>>> idle
>>>> is incorrect console= on the dom0 kernel command line or not running a
>>>> getty in dom0, so you get no output. Both should be configured refer to
>>>> hvc0. Starting with console=hvc0 should get you some dom0 boot logs at
>>>> least.
>>>>
>>>> If that doesn't help then please post full serial logs of your system
>>>> booting as far as it does, including the u-boot commands and any u-boot
>>>> scripts which are run, along with your kernel .config.
>>>>
>>>> Also, when it is in this idling state you should be able to press the
>>>> Xen conswitch key (Ctrl-A by default) 3 times and then use the debug
>>>> keys (h for help, q and d give useful cpu and vcpu register state) to
>>>> see where dom0's vcpus are at, so please include some of those in the
>>>> logs.
>>>>
>>>> A dom0 vcpu address of 0x000000xx often indicates your kernel has
>>>> crashed early which can be another thing which goes wrong during
>>>> initial
>>>> bringup on a new system (although normally more noisily than I am
>>>> inferring from what you've said here, but without logs its hard to say
>>>> for sure this isn't happening).
>>>>
>>>> It would also be useful to know exactly which SoC you are using.
>>>>
>>>> Ian.
>>>>
>>>
>>> Hello Ian,
>>>
>>>     The SoC I'm using is the TI Dra72 (similar to the OMAP5432). As
>>> such, I've been adapting the instructions at
>>> http://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
>>>
>>>
>>>
>>>
>>>     I've attached the booting log, the uBoot commands I run to get the
>>> system up, and my .config file for the kernel.
>>>
>>>     The log stops after "Freed x init memory.", and nothing is printed
>>> out after that. Also, pressing CTRL-A three times does not bring up a
>>> Xen prompt, and pressing those keys have no affect.
>>>
>>>     It's worth noting that I am able to successfully boot the Linux
>>> kernel natively with uBoot.
>>>
>>>     This may or may not be relevant, but I have stepped through the Xen
>>> booting using Trace32. What I noticed was that, in the start_xen()
>>> function (xen/arch/arm/setup.c), the code immediately goes into the
>>> idle_loop() (start_xen() -> switch_stack_and_jump() -> init_done() ->
>>> idle_loop()). There is only 1 vCPU in my system currently.
>>>
>>> Brandon
>>
>> Ian,
>>
>>     I was parsing through the logs again, and I noticed that there's an
>> error with the console option I'm passing into Xen. I'm getting the
>> following lines: "Unable to initialize dtuart: -19" and "Bad console=
>> option 'dtuart'".
>>
>>    This would likely explain why CTRL-A is not working for me. However,
>> I'm confused as to why the dtuart option would not work.
>>
>> Brandon
>
> Ian,
>
>     I think I figured out what the problem was. For my uBoot args, I
> selected "dtuart=serial2", when I should have selected "dtuart=serial0",
> since this is the correct alias to the UART in my device tree.
>
> Brandon

Ian,

    I resolved the error in my boot.log file with respect to the UART 
module, but I'm experiencing the same issue as before.

    Any tips would be appreicated.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 08:45:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 08:45:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z58xK-0002Ic-8x; Wed, 17 Jun 2015 08:44:22 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6035412ff=Ian.Campbell@citrix.com>)
	id 1Z58xI-0002IT-5Z
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 08:44:20 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	E7/5D-16813-36331855; Wed, 17 Jun 2015 08:44:19 +0000
X-Env-Sender: prvs=6035412ff=Ian.Campbell@citrix.com
X-Msg-Ref: server-3.tower-27.messagelabs.com!1434530657!23985670!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13127 invoked from network); 17 Jun 2015 08:44:18 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-3.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 08:44:18 -0000
X-IronPort-AV: E=Sophos;i="5.13,632,1427760000"; d="scan'208";a="275653388"
Message-ID: <1434530654.13744.249.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Brandon Perez <a0225893@ti.com>
Date: Wed, 17 Jun 2015 09:44:14 +0100
In-Reply-To: <558066FD.8050104@ti.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
issues with similar platforms.

http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
the root of this thread and
http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
logs etc, although with a Xen console issue which was subsequently
resolved.

On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>     I resolved the error in my boot.log file with respect to the UART 
> module, but I'm experiencing the same issue as before.
> 
>     Any tips would be appreicated.

Looking at your original log (and assuming fixing the Xen console hasn't
changed anything WRT dom0 output) nothing is jumping out at me as
suspicious in your logs I'm afraid.

One thing which can be useful for debugging is to include in the u-boot
script, right before the bootz:
        fdt chosen
        fdt print /chosen
which will log the actual fdt chosen status which Xen will see
(different versions of u-boot have different subtly broken ideas about
quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
despite looking correct in the script).

I would also suggest that having fixed your Xen console issue you try
the Ctrl-A thing again and try some of the debug keys to see what state
dom0 thinks it is in.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 08:45:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 08:45:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z58xK-0002Ic-8x; Wed, 17 Jun 2015 08:44:22 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6035412ff=Ian.Campbell@citrix.com>)
	id 1Z58xI-0002IT-5Z
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 08:44:20 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	E7/5D-16813-36331855; Wed, 17 Jun 2015 08:44:19 +0000
X-Env-Sender: prvs=6035412ff=Ian.Campbell@citrix.com
X-Msg-Ref: server-3.tower-27.messagelabs.com!1434530657!23985670!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13127 invoked from network); 17 Jun 2015 08:44:18 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-3.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 08:44:18 -0000
X-IronPort-AV: E=Sophos;i="5.13,632,1427760000"; d="scan'208";a="275653388"
Message-ID: <1434530654.13744.249.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Brandon Perez <a0225893@ti.com>
Date: Wed, 17 Jun 2015 09:44:14 +0100
In-Reply-To: <558066FD.8050104@ti.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
issues with similar platforms.

http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
the root of this thread and
http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
logs etc, although with a Xen console issue which was subsequently
resolved.

On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>     I resolved the error in my boot.log file with respect to the UART 
> module, but I'm experiencing the same issue as before.
> 
>     Any tips would be appreicated.

Looking at your original log (and assuming fixing the Xen console hasn't
changed anything WRT dom0 output) nothing is jumping out at me as
suspicious in your logs I'm afraid.

One thing which can be useful for debugging is to include in the u-boot
script, right before the bootz:
        fdt chosen
        fdt print /chosen
which will log the actual fdt chosen status which Xen will see
(different versions of u-boot have different subtly broken ideas about
quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
despite looking correct in the script).

I would also suggest that having fixed your Xen console issue you try
the Ctrl-A thing again and try some of the debug keys to see what state
dom0 thinks it is in.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 08:51:25 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 08:51:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z593x-0004zY-A1; Wed, 17 Jun 2015 08:51:13 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=603653d7e=roger.pau@citrix.com>)
	id 1Z593v-0004yi-NE
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 08:51:11 +0000
Received: from [85.158.139.211] by server-13.bemta-5.messagelabs.com id
	59/23-19853-FF431855; Wed, 17 Jun 2015 08:51:11 +0000
X-Env-Sender: prvs=603653d7e=roger.pau@citrix.com
X-Msg-Ref: server-2.tower-206.messagelabs.com!1434531069!14778831!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29779 invoked from network); 17 Jun 2015 08:51:10 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-2.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 08:51:10 -0000
X-IronPort-AV: E=Sophos;i="5.13,632,1427760000"; d="scan'208";a="275655283"
Message-ID: <558134F5.2050202@citrix.com>
Date: Wed, 17 Jun 2015 10:51:01 +0200
From: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Atom2 <ariel.atom2@web2web.at>, <xen-users@lists.xen.org>
References: <557E0433.9070307@web2web.at>
In-Reply-To: <557E0433.9070307@web2web.at>
X-DLP: MIA1
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

El 15/06/15 a les 0.46, Atom2 ha escrit:
> Hi guys,
> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
> and domUs a spin - unfortunately with not too much success:

Forgot to ask, but what CPU model are you using? I've got very similar
reports from people trying PVH on the SandyBridge family CPUs.

Thanks, Roger.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 08:51:25 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 08:51:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z593x-0004zY-A1; Wed, 17 Jun 2015 08:51:13 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=603653d7e=roger.pau@citrix.com>)
	id 1Z593v-0004yi-NE
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 08:51:11 +0000
Received: from [85.158.139.211] by server-13.bemta-5.messagelabs.com id
	59/23-19853-FF431855; Wed, 17 Jun 2015 08:51:11 +0000
X-Env-Sender: prvs=603653d7e=roger.pau@citrix.com
X-Msg-Ref: server-2.tower-206.messagelabs.com!1434531069!14778831!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29779 invoked from network); 17 Jun 2015 08:51:10 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-2.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 08:51:10 -0000
X-IronPort-AV: E=Sophos;i="5.13,632,1427760000"; d="scan'208";a="275655283"
Message-ID: <558134F5.2050202@citrix.com>
Date: Wed, 17 Jun 2015 10:51:01 +0200
From: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Atom2 <ariel.atom2@web2web.at>, <xen-users@lists.xen.org>
References: <557E0433.9070307@web2web.at>
In-Reply-To: <557E0433.9070307@web2web.at>
X-DLP: MIA1
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

El 15/06/15 a les 0.46, Atom2 ha escrit:
> Hi guys,
> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
> and domUs a spin - unfortunately with not too much success:

Forgot to ask, but what CPU model are you using? I've got very similar
reports from people trying PVH on the SandyBridge family CPUs.

Thanks, Roger.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 12:52:04 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 12:52:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Co5-0001MT-Gr; Wed, 17 Jun 2015 12:51:05 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z5Co2-0001L6-Mp
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 12:51:04 +0000
Received: from [193.109.254.147] by server-16.bemta-14.messagelabs.com id
	88/0C-31650-43D61855; Wed, 17 Jun 2015 12:51:00 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-12.tower-27.messagelabs.com!1434545451!24195162!1
X-Originating-IP: [64.12.143.82]
X-SpamReason: No, hits=0.7 required=7.0 tests=BODY_RANDOM_LONG, UPPERCASE_50_75
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20112 invoked from network); 17 Jun 2015 12:50:51 -0000
Received: from omr-m09.mx.aol.com (HELO omr-m09.mx.aol.com) (64.12.143.82)
	by server-12.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 12:50:51 -0000
Received: from mtaout-aab01.mx.aol.com (mtaout-aab01.mx.aol.com
	[172.26.126.205])
	by omr-m09.mx.aol.com (Outbound Mail Relay) with ESMTP id 0DEC0705AA699;
	Wed, 17 Jun 2015 08:50:51 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-aab01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id B2CE738000083; Wed, 17 Jun 2015 08:50:49 -0400 (EDT)
Message-ID: <1434545488.6996.25.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Wed, 17 Jun 2015 13:51:28 +0100
Content-Type: multipart/mixed; boundary="=-14ZzTVxemXUcuuuJXriu"
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
X-AOL-VSS-INFO: 5700.7163/104498
X-AOL-VSS-CODE: clean
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434545451;
	bh=BVVmrfM4MUAtTxqbAKndtqKC1644yadxkqLk3eG/FIE=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=0zvRTaFDjvHqikRDh5Yvi3OWwdMGqDZ27uRUPl4l5nUxSmNfLS7nmQWaOEKeYZeqS
	16gIkkETGi3B4T7ZAaHjSsJnvKowzu9Xv+HZnGgAc0FUvCiEbZ+nmZlXW7b2P8DxJu
	KcIm73EsqiUs97l4vxZiIcovczAJuuj8QU3GSVJI=
x-aol-sid: 3039ac1a7ecd55816d29139e
X-AOL-IP: 185.25.64.249
Cc: ian.campbell@citrix.com
Subject: [Xen-users] [Fwd: Re:  vfb size]
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=-14ZzTVxemXUcuuuJXriu
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit

Sorry Ian,

I was reading the email I've sent you some days ago and I've found it
terribly confusing, so I am writing back again.

On Fri, 2015-06-12 at 17:37 +0100, Ian Campbell wrote:
> On Fri, 2015-06-12 at 17:21 +0100, pietrop wrote:
> > > What do you mean by "configuring the vncserver manually on the guest"?
> > 
> > I have installed the vncserver package and I have started it manually
> > configuring the desired geometry.

> Right, that's an aside to getting xenfb working then.

> > > vncserver and xenfb are two completely orthogonal things. If you are
> > > running vncserver in the guest then that is what you must configure,
> > > xenfb settings have no impact on it.
> > > 
> > > xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> > > (often qemu), there is no vncserver in the guest associated with xenfb.
> > > 
> > 
> > I did not know that, I'd rather prefer to go with xenfb but I am not
> > getting the desired resolution with it, how can I do that ?
> 
> What sort of guest is this? PV or HVM?
> 

I am following these instructions to verify which kind of guest it is:

http://serverfault.com/questions/511923/determine-which-guest-is-running-on-xen-hvm-or-pv-guest

>From them it results I am running a PV-HVM, Xen is 4.4, please
let me know if that makes any sense since I wanna see if I can
understand something about what I am doing.

I am specifically curious about the PV-HVM category since I thought it'd be possible
to setup PV *or* HVM guest and I wasn't aware of any PV *and* HVM.


> Can you post your config file and your in guest dmesg please as well as
> any related log files from under /var/log/xen (in particular the qemu
> one).

All attached again, including some files missing yesterday.

> 
> Lastly, is xen-fbfront a module or statically configured?
> 

I am attaching the .config.

Sorry about that.

> Ian.
> 


Cheers,
Pietro



--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="dmesg.txt"
Content-Type: text/plain; name="dmesg.txt"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="qemu-dm-pietrop-debian64RfLlog.txt"
Content-Type: text/plain; name="qemu-dm-pietrop-debian64RfLlog.txt"; charset="us-ascii"
Content-Transfer-Encoding: 7bit


--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="xl-pietrop-debian64RfL.log.txt"
Content-Type: text/plain; name="xl-pietrop-debian64RfL.log.txt"; charset="UTF-8"
Content-Transfer-Encoding: base64

V2FpdGluZyBmb3IgZG9tYWluIHBpZXRyb3AtZGViaWFuNjRSZkwgKGRvbWlkIDE5MjIxKSB0byBk
aWUgW3BpZCAzMjM0N10K


--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="config-3.16.0-4-amd64"
Content-Type: text/x-mpsub; name="config-3.16.0-4-amd64"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="pietrop-debian64.cfg"
Content-Type: text/plain; name="pietrop-debian64.cfg"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-14ZzTVxemXUcuuuJXriu
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=-14ZzTVxemXUcuuuJXriu--



From xen-users-bounces@lists.xen.org Wed Jun 17 12:52:04 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 12:52:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Co5-0001MT-Gr; Wed, 17 Jun 2015 12:51:05 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z5Co2-0001L6-Mp
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 12:51:04 +0000
Received: from [193.109.254.147] by server-16.bemta-14.messagelabs.com id
	88/0C-31650-43D61855; Wed, 17 Jun 2015 12:51:00 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-12.tower-27.messagelabs.com!1434545451!24195162!1
X-Originating-IP: [64.12.143.82]
X-SpamReason: No, hits=0.7 required=7.0 tests=BODY_RANDOM_LONG, UPPERCASE_50_75
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20112 invoked from network); 17 Jun 2015 12:50:51 -0000
Received: from omr-m09.mx.aol.com (HELO omr-m09.mx.aol.com) (64.12.143.82)
	by server-12.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 12:50:51 -0000
Received: from mtaout-aab01.mx.aol.com (mtaout-aab01.mx.aol.com
	[172.26.126.205])
	by omr-m09.mx.aol.com (Outbound Mail Relay) with ESMTP id 0DEC0705AA699;
	Wed, 17 Jun 2015 08:50:51 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-aab01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id B2CE738000083; Wed, 17 Jun 2015 08:50:49 -0400 (EDT)
Message-ID: <1434545488.6996.25.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Wed, 17 Jun 2015 13:51:28 +0100
Content-Type: multipart/mixed; boundary="=-14ZzTVxemXUcuuuJXriu"
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
X-AOL-VSS-INFO: 5700.7163/104498
X-AOL-VSS-CODE: clean
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434545451;
	bh=BVVmrfM4MUAtTxqbAKndtqKC1644yadxkqLk3eG/FIE=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=0zvRTaFDjvHqikRDh5Yvi3OWwdMGqDZ27uRUPl4l5nUxSmNfLS7nmQWaOEKeYZeqS
	16gIkkETGi3B4T7ZAaHjSsJnvKowzu9Xv+HZnGgAc0FUvCiEbZ+nmZlXW7b2P8DxJu
	KcIm73EsqiUs97l4vxZiIcovczAJuuj8QU3GSVJI=
x-aol-sid: 3039ac1a7ecd55816d29139e
X-AOL-IP: 185.25.64.249
Cc: ian.campbell@citrix.com
Subject: [Xen-users] [Fwd: Re:  vfb size]
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--=-14ZzTVxemXUcuuuJXriu
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit

Sorry Ian,

I was reading the email I've sent you some days ago and I've found it
terribly confusing, so I am writing back again.

On Fri, 2015-06-12 at 17:37 +0100, Ian Campbell wrote:
> On Fri, 2015-06-12 at 17:21 +0100, pietrop wrote:
> > > What do you mean by "configuring the vncserver manually on the guest"?
> > 
> > I have installed the vncserver package and I have started it manually
> > configuring the desired geometry.

> Right, that's an aside to getting xenfb working then.

> > > vncserver and xenfb are two completely orthogonal things. If you are
> > > running vncserver in the guest then that is what you must configure,
> > > xenfb settings have no impact on it.
> > > 
> > > xenfb corresponds /dev/fb0 in the guest surfaced via a vnc provider
> > > (often qemu), there is no vncserver in the guest associated with xenfb.
> > > 
> > 
> > I did not know that, I'd rather prefer to go with xenfb but I am not
> > getting the desired resolution with it, how can I do that ?
> 
> What sort of guest is this? PV or HVM?
> 

I am following these instructions to verify which kind of guest it is:

http://serverfault.com/questions/511923/determine-which-guest-is-running-on-xen-hvm-or-pv-guest

>From them it results I am running a PV-HVM, Xen is 4.4, please
let me know if that makes any sense since I wanna see if I can
understand something about what I am doing.

I am specifically curious about the PV-HVM category since I thought it'd be possible
to setup PV *or* HVM guest and I wasn't aware of any PV *and* HVM.


> Can you post your config file and your in guest dmesg please as well as
> any related log files from under /var/log/xen (in particular the qemu
> one).

All attached again, including some files missing yesterday.

> 
> Lastly, is xen-fbfront a module or statically configured?
> 

I am attaching the .config.

Sorry about that.

> Ian.
> 


Cheers,
Pietro



--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="dmesg.txt"
Content-Type: text/plain; name="dmesg.txt"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="qemu-dm-pietrop-debian64RfLlog.txt"
Content-Type: text/plain; name="qemu-dm-pietrop-debian64RfLlog.txt"; charset="us-ascii"
Content-Transfer-Encoding: 7bit


--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="xl-pietrop-debian64RfL.log.txt"
Content-Type: text/plain; name="xl-pietrop-debian64RfL.log.txt"; charset="UTF-8"
Content-Transfer-Encoding: base64

V2FpdGluZyBmb3IgZG9tYWluIHBpZXRyb3AtZGViaWFuNjRSZkwgKGRvbWlkIDE5MjIxKSB0byBk
aWUgW3BpZCAzMjM0N10K


--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="config-3.16.0-4-amd64"
Content-Type: text/x-mpsub; name="config-3.16.0-4-amd64"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-14ZzTVxemXUcuuuJXriu
Content-Disposition: attachment; filename="pietrop-debian64.cfg"
Content-Type: text/plain; name="pietrop-debian64.cfg"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-14ZzTVxemXUcuuuJXriu
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--=-14ZzTVxemXUcuuuJXriu--



From xen-users-bounces@lists.xen.org Wed Jun 17 14:12:09 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 14:12:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5E3Y-0001A0-GS; Wed, 17 Jun 2015 14:11:08 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5E3X-00019Z-Ce
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 14:11:07 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	21/62-21074-AFF71855; Wed, 17 Jun 2015 14:11:06 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-8.tower-206.messagelabs.com!1434550263!14893159!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31569 invoked from network); 17 Jun 2015 14:11:04 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-8.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 14:11:04 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HEAqqw007517;
	Wed, 17 Jun 2015 09:10:52 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HEAqvp004340;
	Wed, 17 Jun 2015 09:10:52 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 09:10:51 -0500
Message-ID: <558171DF.4050201@ti.com>
Date: Wed, 17 Jun 2015 09:10:55 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>	
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>	
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com>
In-Reply-To: <1434530654.13744.249.camel@citrix.com>
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/17/2015 04:44 AM, Ian Campbell wrote:
> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
> issues with similar platforms.
>
> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
> the root of this thread and
> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
> logs etc, although with a Xen console issue which was subsequently
> resolved.
>
> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>>      I resolved the error in my boot.log file with respect to the UART
>> module, but I'm experiencing the same issue as before.
>>
>>      Any tips would be appreicated.
>
> Looking at your original log (and assuming fixing the Xen console hasn't
> changed anything WRT dom0 output) nothing is jumping out at me as
> suspicious in your logs I'm afraid.
>
> One thing which can be useful for debugging is to include in the u-boot
> script, right before the bootz:
>          fdt chosen
>          fdt print /chosen
> which will log the actual fdt chosen status which Xen will see
> (different versions of u-boot have different subtly broken ideas about
> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
> despite looking correct in the script).
>
> I would also suggest that having fixed your Xen console issue you try
> the Ctrl-A thing again and try some of the debug keys to see what state
> dom0 thinks it is in.
>
> Ian.
>

Here's the output I see from printing out the chosen node (right before 
boot), which seems to look good to me:

chosen {
         xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug 
ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
         xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
         modules {
                 #address-cells = <0x00000001>;
                 #size-cells = <0x00000001>;
                 module@0 {
                         compatible = "xen,linux-zimage", 
"xen,multiboot-module";
                         reg = <0xa0000000 0x00a00000>;
                 };
         };
};

I am still unable to get the Xen console up with that key combination. 
For whatever reason, my serial output appears to be working (I can 
printk from anywhere), but my serial input does not seem to be functional.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 14:12:09 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 14:12:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5E3Y-0001A0-GS; Wed, 17 Jun 2015 14:11:08 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5E3X-00019Z-Ce
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 14:11:07 +0000
Received: from [85.158.139.211] by server-4.bemta-5.messagelabs.com id
	21/62-21074-AFF71855; Wed, 17 Jun 2015 14:11:06 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-8.tower-206.messagelabs.com!1434550263!14893159!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31569 invoked from network); 17 Jun 2015 14:11:04 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-8.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 14:11:04 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HEAqqw007517;
	Wed, 17 Jun 2015 09:10:52 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HEAqvp004340;
	Wed, 17 Jun 2015 09:10:52 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 09:10:51 -0500
Message-ID: <558171DF.4050201@ti.com>
Date: Wed, 17 Jun 2015 09:10:55 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>	
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>	
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com>
In-Reply-To: <1434530654.13744.249.camel@citrix.com>
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/17/2015 04:44 AM, Ian Campbell wrote:
> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
> issues with similar platforms.
>
> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
> the root of this thread and
> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
> logs etc, although with a Xen console issue which was subsequently
> resolved.
>
> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>>      I resolved the error in my boot.log file with respect to the UART
>> module, but I'm experiencing the same issue as before.
>>
>>      Any tips would be appreicated.
>
> Looking at your original log (and assuming fixing the Xen console hasn't
> changed anything WRT dom0 output) nothing is jumping out at me as
> suspicious in your logs I'm afraid.
>
> One thing which can be useful for debugging is to include in the u-boot
> script, right before the bootz:
>          fdt chosen
>          fdt print /chosen
> which will log the actual fdt chosen status which Xen will see
> (different versions of u-boot have different subtly broken ideas about
> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
> despite looking correct in the script).
>
> I would also suggest that having fixed your Xen console issue you try
> the Ctrl-A thing again and try some of the debug keys to see what state
> dom0 thinks it is in.
>
> Ian.
>

Here's the output I see from printing out the chosen node (right before 
boot), which seems to look good to me:

chosen {
         xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug 
ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
         xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
         modules {
                 #address-cells = <0x00000001>;
                 #size-cells = <0x00000001>;
                 module@0 {
                         compatible = "xen,linux-zimage", 
"xen,multiboot-module";
                         reg = <0xa0000000 0x00a00000>;
                 };
         };
};

I am still unable to get the Xen console up with that key combination. 
For whatever reason, my serial output appears to be working (I can 
printk from anywhere), but my serial input does not seem to be functional.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 14:51:02 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 14:51:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Efh-0001cm-VF; Wed, 17 Jun 2015 14:50:33 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5Efg-0001cZ-Jc
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 14:50:32 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	57/7B-13517-73981855; Wed, 17 Jun 2015 14:50:31 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434552625!17201848!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27668 invoked from network); 17 Jun 2015 14:50:27 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 14:50:27 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HEoGrE011704;
	Wed, 17 Jun 2015 09:50:16 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HEoGVU029233;
	Wed, 17 Jun 2015 09:50:16 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 09:50:15 -0500
Message-ID: <55817B1B.5020200@ti.com>
Date: Wed, 17 Jun 2015 09:50:19 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>	
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>	
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com> <558171DF.4050201@ti.com>
In-Reply-To: <558171DF.4050201@ti.com>
Content-Type: multipart/mixed; boundary="------------030401080306010805030804"
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--------------030401080306010805030804
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit

On 06/17/2015 09:10 AM, Brandon Perez wrote:
> On 06/17/2015 04:44 AM, Ian Campbell wrote:
>> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
>> issues with similar platforms.
>>
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
>> the root of this thread and
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
>> logs etc, although with a Xen console issue which was subsequently
>> resolved.
>>
>> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>>>      I resolved the error in my boot.log file with respect to the UART
>>> module, but I'm experiencing the same issue as before.
>>>
>>>      Any tips would be appreicated.
>>
>> Looking at your original log (and assuming fixing the Xen console hasn't
>> changed anything WRT dom0 output) nothing is jumping out at me as
>> suspicious in your logs I'm afraid.
>>
>> One thing which can be useful for debugging is to include in the u-boot
>> script, right before the bootz:
>>          fdt chosen
>>          fdt print /chosen
>> which will log the actual fdt chosen status which Xen will see
>> (different versions of u-boot have different subtly broken ideas about
>> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
>> despite looking correct in the script).
>>
>> I would also suggest that having fixed your Xen console issue you try
>> the Ctrl-A thing again and try some of the debug keys to see what state
>> dom0 thinks it is in.
>>
>> Ian.
>>
>
> Here's the output I see from printing out the chosen node (right before
> boot), which seems to look good to me:
>
> chosen {
>          xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug
> ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
>          xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
>          modules {
>                  #address-cells = <0x00000001>;
>                  #size-cells = <0x00000001>;
>                  module@0 {
>                          compatible = "xen,linux-zimage",
> "xen,multiboot-module";
>                          reg = <0xa0000000 0x00a00000>;
>                  };
>          };
> };
>
> I am still unable to get the Xen console up with that key combination.
> For whatever reason, my serial output appears to be working (I can
> printk from anywhere), but my serial input does not seem to be functional.
>
> Brandon

I figured out what the issue was with my serial input. I was using a 
device tree that had the incorrect SPI channel number for the serial 
input interrupt. It was 99, instead of 104, which it should have been 
(in the dts file, it was 67 instead of 72, as the vector numbers are 
offset by 32 due to PPIs).

I was able to get the register dump (using the 'd' command). I've 
attached it.

Brandon

--------------030401080306010805030804
Content-Type: text/plain; charset="UTF-8"; name="reg.dump"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="reg.dump"
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--------------030401080306010805030804
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------030401080306010805030804--


From xen-users-bounces@lists.xen.org Wed Jun 17 14:51:02 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 14:51:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Efh-0001cm-VF; Wed, 17 Jun 2015 14:50:33 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5Efg-0001cZ-Jc
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 14:50:32 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	57/7B-13517-73981855; Wed, 17 Jun 2015 14:50:31 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434552625!17201848!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27668 invoked from network); 17 Jun 2015 14:50:27 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 14:50:27 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HEoGrE011704;
	Wed, 17 Jun 2015 09:50:16 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HEoGVU029233;
	Wed, 17 Jun 2015 09:50:16 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 09:50:15 -0500
Message-ID: <55817B1B.5020200@ti.com>
Date: Wed, 17 Jun 2015 09:50:19 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>	
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>	
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com> <558171DF.4050201@ti.com>
In-Reply-To: <558171DF.4050201@ti.com>
Content-Type: multipart/mixed; boundary="------------030401080306010805030804"
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--------------030401080306010805030804
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit

On 06/17/2015 09:10 AM, Brandon Perez wrote:
> On 06/17/2015 04:44 AM, Ian Campbell wrote:
>> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
>> issues with similar platforms.
>>
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
>> the root of this thread and
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
>> logs etc, although with a Xen console issue which was subsequently
>> resolved.
>>
>> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>>>      I resolved the error in my boot.log file with respect to the UART
>>> module, but I'm experiencing the same issue as before.
>>>
>>>      Any tips would be appreicated.
>>
>> Looking at your original log (and assuming fixing the Xen console hasn't
>> changed anything WRT dom0 output) nothing is jumping out at me as
>> suspicious in your logs I'm afraid.
>>
>> One thing which can be useful for debugging is to include in the u-boot
>> script, right before the bootz:
>>          fdt chosen
>>          fdt print /chosen
>> which will log the actual fdt chosen status which Xen will see
>> (different versions of u-boot have different subtly broken ideas about
>> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
>> despite looking correct in the script).
>>
>> I would also suggest that having fixed your Xen console issue you try
>> the Ctrl-A thing again and try some of the debug keys to see what state
>> dom0 thinks it is in.
>>
>> Ian.
>>
>
> Here's the output I see from printing out the chosen node (right before
> boot), which seems to look good to me:
>
> chosen {
>          xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug
> ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
>          xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
>          modules {
>                  #address-cells = <0x00000001>;
>                  #size-cells = <0x00000001>;
>                  module@0 {
>                          compatible = "xen,linux-zimage",
> "xen,multiboot-module";
>                          reg = <0xa0000000 0x00a00000>;
>                  };
>          };
> };
>
> I am still unable to get the Xen console up with that key combination.
> For whatever reason, my serial output appears to be working (I can
> printk from anywhere), but my serial input does not seem to be functional.
>
> Brandon

I figured out what the issue was with my serial input. I was using a 
device tree that had the incorrect SPI channel number for the serial 
input interrupt. It was 99, instead of 104, which it should have been 
(in the dts file, it was 67 instead of 72, as the vector numbers are 
offset by 32 due to PPIs).

I was able to get the register dump (using the 'd' command). I've 
attached it.

Brandon

--------------030401080306010805030804
Content-Type: text/plain; charset="UTF-8"; name="reg.dump"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="reg.dump"

KFhFTikgKioqIFNlcmlhbCBpbnB1dCAtPiBYZW4gKHR5cGUgJ0NUUkwtYScgdGhyZWUgdGlt
ZXMgdG8gc3dpdGNoIGlucHV0IHRvIERPTTApCihYRU4pICdkJyBwcmVzc2VkIC0+IGR1bXBp
bmcgcmVnaXN0ZXJzCihYRU4pCihYRU4pICoqKiBEdW1waW5nIENQVTAgaG9zdCBzdGF0ZTog
KioqCihYRU4pIC0tLS1bIFhlbi00LjYtdW5zdGFibGUgIGFybTMyICBkZWJ1Zz15ICBUYWlu
dGVkOiAgICBDIF0tLS0tCihYRU4pIENQVTogICAgMAooWEVOKSBQQzogICAgIDAwMjJkYTk4
IF9zcGluX3VubG9ja19pcnErMHg0OC8weDU0CihYRU4pIENQU1I6ICAgMjAwMDAwNWEgTU9E
RTpIeXBlcnZpc29yCihYRU4pICAgICAgUjA6IDAwMzAwNDAwIFIxOiAwMDAwMDAwMCBSMjog
MDAwMDAwMDAgUjM6IDAwMDAwMDAwCihYRU4pICAgICAgUjQ6IDAwMDBjMzUwIFI1OiAwMDAw
MDAwMCBSNjogNDAwM2ZkNTggUjc6IDAwMzAwNDAwCihYRU4pICAgICAgUjg6IDAwOTg5Njgw
IFI5OiAwMDAwMDAwMCBSMTA6MDAwMDAwMDAgUjExOjQwMDBmZWRjIFIxMjozYjlhY2EwMAoo
WEVOKSBIWVA6IFNQOiA0MDAwZmVkOCBMUjogMDAyMzBhY2MKKFhFTikKKFhFTikgICBWVENS
X0VMMjogODAwMDM1NTgKKFhFTikgIFZUVEJSX0VMMjogMDAwMTAwMDBiZmYwMjAwMAooWEVO
KQooWEVOKSAgU0NUTFJfRUwyOiAzMGNkMTg3ZgooWEVOKSAgICBIQ1JfRUwyOiAwMDAwMDAw
MDAwMzg2NDNmCihYRU4pICBUVEJSMF9FTDI6IDAwMDAwMDAwYmZlZjgwMDAKKFhFTikKKFhF
TikgICAgRVNSX0VMMjogMDAwMDAwMDAKKFhFTikgIEhQRkFSX0VMMjogMDAwMDAwMDAwMDAw
MDAwMAooWEVOKSAgICAgIEhERkFSOiAwMDAwMDAwMAooWEVOKSAgICAgIEhJRkFSOiAwMDAw
MDAwMAooWEVOKQooWEVOKSBYZW4gc3RhY2sgdHJhY2UgZnJvbSBzcD00MDAwZmVkODoKKFhF
TikgICAgNDAwMGZmMDQgNDAwMGZmMDQgMDAyMzA4ODQgMDAwMDAwMDAgMDAyYzYwMDAgMDAy
YzlmZjAgMDAyNzdiODAgMDAzMDE2MTQKKFhFTikgICAgMDAyZmUyNDggMDAwMDAwMDAgNDAw
MGZmMmMgMDAyMmNlNWMgNjAwMDAwNWEgMDAzMDE2MTQgMDAzMDE2MTQgMDAzMDE2MTQKKFhF
TikgICAgMDAzMDE2MTQgMDAzMDAzZGMgMDAyNzQ0NGMgMDAwMGUyNTggNDAwMGZmMzQgMDAy
MmNlYzAgNDAwMGZmNTQgMDAyNDY3ODAKKFhFTikgICAgNDAwMGZmNTggMDAyNzdiOTAgMDAw
MDAwODAgMDAyNzdiODAgMDAyZmUyNDggMDAwMDAwMDEgNDAwMGZmNGMgMDAyNTJkZDAKKFhF
TikgICAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAw
MDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAKKFhFTikgICAgMDAwMDAwMDAgMDAwMDAwMDAgMDAw
MDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAKKFhF
TikgICAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAw
MDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAKKFhFTikgICAgMDAwMDAwMDAgMDAwMDAwMDAgMDAw
MDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAKKFhF
TikgICAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAgMDAw
MDAwMDAgMDAwMDAwMDAgMDAwMDAwMDAKKFhFTikgICAgMDAwMDAwMDAgMDAwMDAwMDAKKFhF
TikgWGVuIGNhbGwgdHJhY2U6CihYRU4pICAgIFs8MDAyMmRhOTg+XSBfc3Bpbl91bmxvY2tf
aXJxKzB4NDgvMHg1NCAoUEMpCihYRU4pICAgIFs8MDAyMzBhY2M+XSB0aW1lcl9zb2Z0aXJx
X2FjdGlvbisweDI0OC8weDI2MCAoTFIpCihYRU4pICAgIFs8NDAwMGZmMDQ+XSA0MDAwZmYw
NAooWEVOKSAgICBbPDAwMjJjZTVjPl0gX19kb19zb2Z0aXJxKzB4YmMvMHhjMAooWEVOKSAg
ICBbPDAwMjJjZWMwPl0gZG9fc29mdGlycSsweDE0LzB4MTgKKFhFTikgICAgWzwwMDI0Njc4
MD5dIGlkbGVfbG9vcCsweDExOC8weDExYwooWEVOKSAgICBbPDAwMjUyZGQwPl0gaW5pdF9k
b25lKzB4MTAvMHgxNAooWEVOKQoK
--------------030401080306010805030804
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------030401080306010805030804--


From xen-users-bounces@lists.xen.org Wed Jun 17 15:07:53 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 15:07:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Evz-00058o-3V; Wed, 17 Jun 2015 15:07:23 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6035412ff=Ian.Campbell@citrix.com>)
	id 1Z5Evx-00058X-VX
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 15:07:22 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	5E/BC-32733-62D81855; Wed, 17 Jun 2015 15:07:18 +0000
X-Env-Sender: prvs=6035412ff=Ian.Campbell@citrix.com
X-Msg-Ref: server-16.tower-27.messagelabs.com!1434553635!16637834!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 5493 invoked from network); 17 Jun 2015 15:07:16 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-16.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 15:07:16 -0000
X-IronPort-AV: E=Sophos;i="5.13,633,1427760000"; d="scan'208";a="272902317"
Message-ID: <1434553477.28264.6.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Brandon Perez <a0225893@ti.com>
Date: Wed, 17 Jun 2015 16:04:37 +0100
In-Reply-To: <55817B1B.5020200@ti.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com> <558171DF.4050201@ti.com>
	<55817B1B.5020200@ti.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-17 at 09:50 -0400, Brandon Perez wrote:
> On 06/17/2015 09:10 AM, Brandon Perez wrote:
> > On 06/17/2015 04:44 AM, Ian Campbell wrote:
> >> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
> >> issues with similar platforms.
> >>
> >> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
> >> the root of this thread and
> >> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
> >> logs etc, although with a Xen console issue which was subsequently
> >> resolved.
> >>
> >> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
> >>>      I resolved the error in my boot.log file with respect to the UART
> >>> module, but I'm experiencing the same issue as before.
> >>>
> >>>      Any tips would be appreicated.
> >>
> >> Looking at your original log (and assuming fixing the Xen console hasn't
> >> changed anything WRT dom0 output) nothing is jumping out at me as
> >> suspicious in your logs I'm afraid.
> >>
> >> One thing which can be useful for debugging is to include in the u-boot
> >> script, right before the bootz:
> >>          fdt chosen
> >>          fdt print /chosen
> >> which will log the actual fdt chosen status which Xen will see
> >> (different versions of u-boot have different subtly broken ideas about
> >> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
> >> despite looking correct in the script).
> >>
> >> I would also suggest that having fixed your Xen console issue you try
> >> the Ctrl-A thing again and try some of the debug keys to see what state
> >> dom0 thinks it is in.
> >>
> >> Ian.
> >>
> >
> > Here's the output I see from printing out the chosen node (right before
> > boot), which seems to look good to me:
> >
> > chosen {
> >          xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug
> > ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
> >          xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
> >          modules {
> >                  #address-cells = <0x00000001>;
> >                  #size-cells = <0x00000001>;
> >                  module@0 {
> >                          compatible = "xen,linux-zimage",
> > "xen,multiboot-module";
> >                          reg = <0xa0000000 0x00a00000>;
> >                  };
> >          };
> > };
> >
> > I am still unable to get the Xen console up with that key combination.
> > For whatever reason, my serial output appears to be working (I can
> > printk from anywhere), but my serial input does not seem to be functional.
> >
> > Brandon
> 
> I figured out what the issue was with my serial input. I was using a 
> device tree that had the incorrect SPI channel number for the serial 
> input interrupt. It was 99, instead of 104, which it should have been 
> (in the dts file, it was 67 instead of 72, as the vector numbers are 
> offset by 32 due to PPIs).

Great.

> I was able to get the register dump (using the 'd' command). I've 
> attached it.

Can you try 'q' and '0' (zero) as well please.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 15:07:53 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 15:07:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Evz-00058o-3V; Wed, 17 Jun 2015 15:07:23 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6035412ff=Ian.Campbell@citrix.com>)
	id 1Z5Evx-00058X-VX
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 15:07:22 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	5E/BC-32733-62D81855; Wed, 17 Jun 2015 15:07:18 +0000
X-Env-Sender: prvs=6035412ff=Ian.Campbell@citrix.com
X-Msg-Ref: server-16.tower-27.messagelabs.com!1434553635!16637834!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 5493 invoked from network); 17 Jun 2015 15:07:16 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-16.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 15:07:16 -0000
X-IronPort-AV: E=Sophos;i="5.13,633,1427760000"; d="scan'208";a="272902317"
Message-ID: <1434553477.28264.6.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Brandon Perez <a0225893@ti.com>
Date: Wed, 17 Jun 2015 16:04:37 +0100
In-Reply-To: <55817B1B.5020200@ti.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com> <558171DF.4050201@ti.com>
	<55817B1B.5020200@ti.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-17 at 09:50 -0400, Brandon Perez wrote:
> On 06/17/2015 09:10 AM, Brandon Perez wrote:
> > On 06/17/2015 04:44 AM, Ian Campbell wrote:
> >> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
> >> issues with similar platforms.
> >>
> >> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
> >> the root of this thread and
> >> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
> >> logs etc, although with a Xen console issue which was subsequently
> >> resolved.
> >>
> >> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
> >>>      I resolved the error in my boot.log file with respect to the UART
> >>> module, but I'm experiencing the same issue as before.
> >>>
> >>>      Any tips would be appreicated.
> >>
> >> Looking at your original log (and assuming fixing the Xen console hasn't
> >> changed anything WRT dom0 output) nothing is jumping out at me as
> >> suspicious in your logs I'm afraid.
> >>
> >> One thing which can be useful for debugging is to include in the u-boot
> >> script, right before the bootz:
> >>          fdt chosen
> >>          fdt print /chosen
> >> which will log the actual fdt chosen status which Xen will see
> >> (different versions of u-boot have different subtly broken ideas about
> >> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
> >> despite looking correct in the script).
> >>
> >> I would also suggest that having fixed your Xen console issue you try
> >> the Ctrl-A thing again and try some of the debug keys to see what state
> >> dom0 thinks it is in.
> >>
> >> Ian.
> >>
> >
> > Here's the output I see from printing out the chosen node (right before
> > boot), which seems to look good to me:
> >
> > chosen {
> >          xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug
> > ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
> >          xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
> >          modules {
> >                  #address-cells = <0x00000001>;
> >                  #size-cells = <0x00000001>;
> >                  module@0 {
> >                          compatible = "xen,linux-zimage",
> > "xen,multiboot-module";
> >                          reg = <0xa0000000 0x00a00000>;
> >                  };
> >          };
> > };
> >
> > I am still unable to get the Xen console up with that key combination.
> > For whatever reason, my serial output appears to be working (I can
> > printk from anywhere), but my serial input does not seem to be functional.
> >
> > Brandon
> 
> I figured out what the issue was with my serial input. I was using a 
> device tree that had the incorrect SPI channel number for the serial 
> input interrupt. It was 99, instead of 104, which it should have been 
> (in the dts file, it was 67 instead of 72, as the vector numbers are 
> offset by 32 due to PPIs).

Great.

> I was able to get the register dump (using the 'd' command). I've 
> attached it.

Can you try 'q' and '0' (zero) as well please.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 15:31:00 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 15:31:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5FIO-00017J-8V; Wed, 17 Jun 2015 15:30:32 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5FIN-000174-7o
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 15:30:31 +0000
Received: from [193.109.254.147] by server-7.bemta-14.messagelabs.com id
	6A/16-01469-69291855; Wed, 17 Jun 2015 15:30:30 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-7.tower-27.messagelabs.com!1434555028!24215715!1
X-Originating-IP: [192.94.94.40]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTkyLjk0Ljk0LjQwID0+IDE3MDg0MQ==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27990 invoked from network); 17 Jun 2015 15:30:29 -0000
Received: from arroyo.ext.ti.com (HELO arroyo.ext.ti.com) (192.94.94.40)
	by server-7.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 15:30:29 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by arroyo.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HFUGga018573;
	Wed, 17 Jun 2015 10:30:16 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HFUFOo006603;
	Wed, 17 Jun 2015 10:30:16 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 10:30:14 -0500
Message-ID: <5581847A.8040605@ti.com>
Date: Wed, 17 Jun 2015 10:30:18 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>		
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>		
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>	
	<1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com>	 <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com>
In-Reply-To: <1434553477.28264.6.camel@citrix.com>
Content-Type: multipart/mixed; boundary="------------060401030106060005070507"
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--------------060401030106060005070507
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit

On 06/17/2015 11:04 AM, Ian Campbell wrote:
> On Wed, 2015-06-17 at 09:50 -0400, Brandon Perez wrote:
>> On 06/17/2015 09:10 AM, Brandon Perez wrote:
>>> On 06/17/2015 04:44 AM, Ian Campbell wrote:
>>>> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
>>>> issues with similar platforms.
>>>>
>>>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
>>>> the root of this thread and
>>>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
>>>> logs etc, although with a Xen console issue which was subsequently
>>>> resolved.
>>>>
>>>> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>>>>>       I resolved the error in my boot.log file with respect to the UART
>>>>> module, but I'm experiencing the same issue as before.
>>>>>
>>>>>       Any tips would be appreicated.
>>>>
>>>> Looking at your original log (and assuming fixing the Xen console hasn't
>>>> changed anything WRT dom0 output) nothing is jumping out at me as
>>>> suspicious in your logs I'm afraid.
>>>>
>>>> One thing which can be useful for debugging is to include in the u-boot
>>>> script, right before the bootz:
>>>>           fdt chosen
>>>>           fdt print /chosen
>>>> which will log the actual fdt chosen status which Xen will see
>>>> (different versions of u-boot have different subtly broken ideas about
>>>> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
>>>> despite looking correct in the script).
>>>>
>>>> I would also suggest that having fixed your Xen console issue you try
>>>> the Ctrl-A thing again and try some of the debug keys to see what state
>>>> dom0 thinks it is in.
>>>>
>>>> Ian.
>>>>
>>>
>>> Here's the output I see from printing out the chosen node (right before
>>> boot), which seems to look good to me:
>>>
>>> chosen {
>>>           xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug
>>> ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
>>>           xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
>>>           modules {
>>>                   #address-cells = <0x00000001>;
>>>                   #size-cells = <0x00000001>;
>>>                   module@0 {
>>>                           compatible = "xen,linux-zimage",
>>> "xen,multiboot-module";
>>>                           reg = <0xa0000000 0x00a00000>;
>>>                   };
>>>           };
>>> };
>>>
>>> I am still unable to get the Xen console up with that key combination.
>>> For whatever reason, my serial output appears to be working (I can
>>> printk from anywhere), but my serial input does not seem to be functional.
>>>
>>> Brandon
>>
>> I figured out what the issue was with my serial input. I was using a
>> device tree that had the incorrect SPI channel number for the serial
>> input interrupt. It was 99, instead of 104, which it should have been
>> (in the dts file, it was 67 instead of 72, as the vector numbers are
>> offset by 32 due to PPIs).
>
> Great.
>
>> I was able to get the register dump (using the 'd' command). I've
>> attached it.
>
> Can you try 'q' and '0' (zero) as well please.
>
> Ian.
>

The console and keyhandler are receiving 'q' and '0', but nothing is 
happening/being printed out. I suspect this is because they are 
scheduled as tasklets, and are never getting a chance to run.

Opening the debugger, it seems like I'm stuck doing timer softirqs and 
handling timer interrupts continually. I'm going to double check the
timer settings in my device tree.

So, I just forced those two keyhandling functions to run on the 
keypress. I've attached the output from both of those.

Brandon



--------------060401030106060005070507
Content-Type: text/plain; charset="UTF-8"; name="hwdom_reg.dump"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="hwdom_reg.dump"
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--------------060401030106060005070507
Content-Type: text/plain; charset="UTF-8"; name="domain.dump"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="domain.dump"
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--------------060401030106060005070507
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------060401030106060005070507--


From xen-users-bounces@lists.xen.org Wed Jun 17 15:31:00 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 15:31:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5FIO-00017J-8V; Wed, 17 Jun 2015 15:30:32 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5FIN-000174-7o
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 15:30:31 +0000
Received: from [193.109.254.147] by server-7.bemta-14.messagelabs.com id
	6A/16-01469-69291855; Wed, 17 Jun 2015 15:30:30 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-7.tower-27.messagelabs.com!1434555028!24215715!1
X-Originating-IP: [192.94.94.40]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTkyLjk0Ljk0LjQwID0+IDE3MDg0MQ==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27990 invoked from network); 17 Jun 2015 15:30:29 -0000
Received: from arroyo.ext.ti.com (HELO arroyo.ext.ti.com) (192.94.94.40)
	by server-7.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 15:30:29 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by arroyo.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HFUGga018573;
	Wed, 17 Jun 2015 10:30:16 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HFUFOo006603;
	Wed, 17 Jun 2015 10:30:16 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 10:30:14 -0500
Message-ID: <5581847A.8040605@ti.com>
Date: Wed, 17 Jun 2015 10:30:18 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>		
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>		
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>	
	<1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com>	 <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com>
In-Reply-To: <1434553477.28264.6.camel@citrix.com>
Content-Type: multipart/mixed; boundary="------------060401030106060005070507"
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--------------060401030106060005070507
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit

On 06/17/2015 11:04 AM, Ian Campbell wrote:
> On Wed, 2015-06-17 at 09:50 -0400, Brandon Perez wrote:
>> On 06/17/2015 09:10 AM, Brandon Perez wrote:
>>> On 06/17/2015 04:44 AM, Ian Campbell wrote:
>>>> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
>>>> issues with similar platforms.
>>>>
>>>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
>>>> the root of this thread and
>>>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
>>>> logs etc, although with a Xen console issue which was subsequently
>>>> resolved.
>>>>
>>>> On Tue, 2015-06-16 at 14:12 -0400, Brandon Perez wrote:
>>>>>       I resolved the error in my boot.log file with respect to the UART
>>>>> module, but I'm experiencing the same issue as before.
>>>>>
>>>>>       Any tips would be appreicated.
>>>>
>>>> Looking at your original log (and assuming fixing the Xen console hasn't
>>>> changed anything WRT dom0 output) nothing is jumping out at me as
>>>> suspicious in your logs I'm afraid.
>>>>
>>>> One thing which can be useful for debugging is to include in the u-boot
>>>> script, right before the bootz:
>>>>           fdt chosen
>>>>           fdt print /chosen
>>>> which will log the actual fdt chosen status which Xen will see
>>>> (different versions of u-boot have different subtly broken ideas about
>>>> quoting stuff, so e.g. your dom0_bootargs setting might end up wrong
>>>> despite looking correct in the script).
>>>>
>>>> I would also suggest that having fixed your Xen console issue you try
>>>> the Ctrl-A thing again and try some of the debug keys to see what state
>>>> dom0 thinks it is in.
>>>>
>>>> Ian.
>>>>
>>>
>>> Here's the output I see from printing out the chosen node (right before
>>> boot), which seems to look good to me:
>>>
>>> chosen {
>>>           xen,dom0-bootargs = "console=hvc0 earlyprintk=xen debug
>>> ignore_loglevel root=/dev/mmcblk0p2 rw rootwait fixrtc";
>>>           xen,xen-bootargs = "sync_console console=dtuart dtuart=serial0";
>>>           modules {
>>>                   #address-cells = <0x00000001>;
>>>                   #size-cells = <0x00000001>;
>>>                   module@0 {
>>>                           compatible = "xen,linux-zimage",
>>> "xen,multiboot-module";
>>>                           reg = <0xa0000000 0x00a00000>;
>>>                   };
>>>           };
>>> };
>>>
>>> I am still unable to get the Xen console up with that key combination.
>>> For whatever reason, my serial output appears to be working (I can
>>> printk from anywhere), but my serial input does not seem to be functional.
>>>
>>> Brandon
>>
>> I figured out what the issue was with my serial input. I was using a
>> device tree that had the incorrect SPI channel number for the serial
>> input interrupt. It was 99, instead of 104, which it should have been
>> (in the dts file, it was 67 instead of 72, as the vector numbers are
>> offset by 32 due to PPIs).
>
> Great.
>
>> I was able to get the register dump (using the 'd' command). I've
>> attached it.
>
> Can you try 'q' and '0' (zero) as well please.
>
> Ian.
>

The console and keyhandler are receiving 'q' and '0', but nothing is 
happening/being printed out. I suspect this is because they are 
scheduled as tasklets, and are never getting a chance to run.

Opening the debugger, it seems like I'm stuck doing timer softirqs and 
handling timer interrupts continually. I'm going to double check the
timer settings in my device tree.

So, I just forced those two keyhandling functions to run on the 
keypress. I've attached the output from both of those.

Brandon



--------------060401030106060005070507
Content-Type: text/plain; charset="UTF-8"; name="hwdom_reg.dump"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="hwdom_reg.dump"
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--------------060401030106060005070507
Content-Type: text/plain; charset="UTF-8"; name="domain.dump"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="domain.dump"

KFhFTikgJ3EnIHByZXNzZWQgLT4gZHVtcGluZyBkb21haW4gaW5mbyAobm93PTB4MDowMDAw
MDAwMCkKKFhFTikgR2VuZXJhbCBpbmZvcm1hdGlvbiBmb3IgZG9tYWluIDA6CihYRU4pICAg
ICByZWZjbnQ9MyBkeWluZz0wIHBhdXNlX2NvdW50PTAKKFhFTikgICAgIG5yX3BhZ2VzPTMy
NzY4IHhlbmhlYXBfcGFnZXM9NSBzaGFyZWRfcGFnZXM9MCBwYWdlZF9wYWdlcz0wIGRpcnR5
X2NwdXM9e30gbWF4X3BhZ2VzPTQyOTQ5Njc1CihYRU4pICAgICBoYW5kbGU9MDAwMDAwMDAt
MDAwMC0wMDAwLTAwMDAtMDAwMDAwMDAwMDAwIHZtX2Fzc2lzdD0wMDAwMDAwMAooWEVOKSBw
Mm0gbWFwcGluZ3MgZm9yIGRvbWFpbiAwICh2bWlkIDEpOgooWEVOKSAgIDFHIG1hcHBpbmdz
OiAwIChzaGF0dGVyZWQgMCkKKFhFTikgICAyTSBtYXBwaW5nczogMTgyIChzaGF0dGVyZWQg
MCkKKFhFTikgICA0SyBtYXBwaW5nczogNTQxCihYRU4pIFJhbmdlc2V0cyBiZWxvbmdpbmcg
dG8gZG9tYWluIDA6CihYRU4pICAgICBJbnRlcnJ1cHRzIHsgMzMsIDM2LCAzOC00MiwgNDct
NDgsIDUyLTUzLCA1NS02MiwgNjQtNzUsIDc4LTc5LCA4MSwgODMtODQsIDg3LTg5LCA5Mi05
MywgMTAzfQooWEVOKSAgICAgSS9PIE1lbW9yeSB7IDAtMSwgMjAwMDEtMjAwMDMsIDMwMDAx
LTMwMDAzLCA0MDgwMC00MDg0OCwgNDBkMDAtNDBkMDMsIDQ0MDAwLTQ1MDAxLCA0ODAyMC00
OH0KKFhFTikgTk9ERSBhZmZpbml0eSBmb3IgZG9tYWluIDA6IFswXQooWEVOKSBWQ1BVIGlu
Zm9ybWF0aW9uIGFuZCBjYWxsYmFja3MgZm9yIGRvbWFpbiAwOgooWEVOKSAgICAgVkNQVTA6
IENQVTAgW2hhcz1GXSBwb2xsPTAgdXBjYWxsX3BlbmQ9MDAgdXBjYWxsX21hc2s9MDEgZGly
dHlfY3B1cz17fQooWEVOKSAgICAgY3B1X2hhcmRfYWZmaW5pdHk9ezAtMTI3fSBjcHVfc29m
dF9hZmZpbml0eT17MC0xMjd9CihYRU4pICAgICBwYXVzZV9jb3VudD0wIHBhdXNlX2ZsYWdz
PTAKKFhFTikgR0lDSF9MUnMgKHZjcHUgMCkgbWFzaz0wCihYRU4pICAgIFZDUFVfTFJbMF09
MAooWEVOKSAgICBWQ1BVX0xSWzFdPTAKKFhFTikgICAgVkNQVV9MUlsyXT0wCihYRU4pICAg
IFZDUFVfTFJbM109MAooWEVOKSAgICAgTm8gcGVyaW9kaWMgdGltZXIKKFhFTikgTm90aWZ5
aW5nIGd1ZXN0IDA6MCAodmlycSAxLCBwb3J0IDApCgo=
--------------060401030106060005070507
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--------------060401030106060005070507--


From xen-users-bounces@lists.xen.org Wed Jun 17 16:12:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 16:12:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Fvv-0007w3-VW; Wed, 17 Jun 2015 16:11:23 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=603f4e4a0=julien.grall@citrix.com>)
	id 1Z5Fvt-0007vV-S6
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 16:11:21 +0000
Received: from [193.109.254.147] by server-15.bemta-14.messagelabs.com id
	72/78-18947-92C91855; Wed, 17 Jun 2015 16:11:21 +0000
X-Env-Sender: prvs=603f4e4a0=julien.grall@citrix.com
X-Msg-Ref: server-4.tower-27.messagelabs.com!1434557479!23534353!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29683 invoked from network); 17 Jun 2015 16:11:20 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-4.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 16:11:20 -0000
X-IronPort-AV: E=Sophos;i="5.13,633,1427760000"; d="scan'208";a="272938008"
Message-ID: <55819BE1.2010501@citrix.com>
Date: Wed, 17 Jun 2015 17:10:09 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Icedove/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>, Brandon Perez <a0225893@ti.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com>
	<558037A3.6000809@ti.com>	<558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
In-Reply-To: <1434530654.13744.249.camel@citrix.com>
X-DLP: MIA2
Cc: Artem Mygaiev <artem.mygaiev@globallogic.com>,
	Lars Kurth <lars.kurth.xen@gmail.com>,
	Andrii Anisov <andrii.anisov@globallogic.com>,
	Chen Baozi <cbz@baozis.org>, xen-users@lists.xen.org,
	alex.agizim@globallogic.com
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

On 17/06/15 09:44, Ian Campbell wrote:
> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
> issues with similar platforms.

I'm CC-ing Global logic who upstream the port of DRA7 on Xen.

We got several people asking question around DRA7 board with various
issue ([1], [2]). The documentation to boot Xen on this board is very
limited [3], can someone from GL update the wiki page to point to the
basics: U-boot with HYP URL, U-boot script, kernel version, device tree?

It would also be good to provide limitations [4] of the current port.

> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
> the root of this thread and
> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
> logs etc, although with a Xen console issue which was subsequently
> resolved.

Several pointers to issue on J6: [1], [2]. But I'm not sure if the bug
is similar.

Regards,

[1]
http://lists.xen.org/archives/html/embedded-pv-devel/2015-05/msg00003.html
[2]
http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00000.html
[3]
http://wiki.xen.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
[4]
http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00002.html

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 16:12:15 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 16:12:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Fvv-0007w3-VW; Wed, 17 Jun 2015 16:11:23 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=603f4e4a0=julien.grall@citrix.com>)
	id 1Z5Fvt-0007vV-S6
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 16:11:21 +0000
Received: from [193.109.254.147] by server-15.bemta-14.messagelabs.com id
	72/78-18947-92C91855; Wed, 17 Jun 2015 16:11:21 +0000
X-Env-Sender: prvs=603f4e4a0=julien.grall@citrix.com
X-Msg-Ref: server-4.tower-27.messagelabs.com!1434557479!23534353!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29683 invoked from network); 17 Jun 2015 16:11:20 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-4.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 16:11:20 -0000
X-IronPort-AV: E=Sophos;i="5.13,633,1427760000"; d="scan'208";a="272938008"
Message-ID: <55819BE1.2010501@citrix.com>
Date: Wed, 17 Jun 2015 17:10:09 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Icedove/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>, Brandon Perez <a0225893@ti.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com>
	<558037A3.6000809@ti.com>	<558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
In-Reply-To: <1434530654.13744.249.camel@citrix.com>
X-DLP: MIA2
Cc: Artem Mygaiev <artem.mygaiev@globallogic.com>,
	Lars Kurth <lars.kurth.xen@gmail.com>,
	Andrii Anisov <andrii.anisov@globallogic.com>,
	Chen Baozi <cbz@baozis.org>, xen-users@lists.xen.org,
	alex.agizim@globallogic.com
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

On 17/06/15 09:44, Ian Campbell wrote:
> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
> issues with similar platforms.

I'm CC-ing Global logic who upstream the port of DRA7 on Xen.

We got several people asking question around DRA7 board with various
issue ([1], [2]). The documentation to boot Xen on this board is very
limited [3], can someone from GL update the wiki page to point to the
basics: U-boot with HYP URL, U-boot script, kernel version, device tree?

It would also be good to provide limitations [4] of the current port.

> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
> the root of this thread and
> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
> logs etc, although with a Xen console issue which was subsequently
> resolved.

Several pointers to issue on J6: [1], [2]. But I'm not sure if the bug
is similar.

Regards,

[1]
http://lists.xen.org/archives/html/embedded-pv-devel/2015-05/msg00003.html
[2]
http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00000.html
[3]
http://wiki.xen.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
[4]
http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00002.html

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 19:13:06 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 19:13:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Il2-000438-CT; Wed, 17 Jun 2015 19:12:20 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <artem.mygaiev@globallogic.com>) id 1Z5Fz3-00006k-53
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 16:14:37 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	F2/F0-08244-BEC91855; Wed, 17 Jun 2015 16:14:35 +0000
X-Env-Sender: artem.mygaiev@globallogic.com
X-Msg-Ref: server-14.tower-206.messagelabs.com!1434557673!9550049!1
X-Originating-IP: [209.85.213.54]
X-SpamReason: No, hits=0.8 required=7.0 tests=BODY_RANDOM_LONG,
  RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 17595 invoked from network); 17 Jun 2015 16:14:34 -0000
Received: from mail-yh0-f54.google.com (HELO mail-yh0-f54.google.com)
	(209.85.213.54)
	by server-14.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 16:14:34 -0000
Received: by yhan67 with SMTP id n67so37171621yha.3
	for <xen-users@lists.xen.org>; Wed, 17 Jun 2015 09:14:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=globallogic.com; s=google;
	h=mime-version:in-reply-to:references:from:date:message-id:subject:to
	:cc:content-type;
	bh=O805rIwIpeTA0aMwX4bD3x6HEQPKjmP2A+zGCYe47us=;
	b=fnH9cULJqhcVzWHDb2rqlySDWq3rrRGoc281UzF5TNtSbmKuf9+/g+nIm0gpDGZ2OH
	lWLdrZt3Q1xKCzByQ4FnBDvNJaXhwBzU4KzCXpiUm0xYFzJduRGvyPgS5WrZ8BEhoTWz
	LfuzaUCT07koweQKinHki8Azva9v0YL64Q9Zk=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:from:date
	:message-id:subject:to:cc:content-type;
	bh=O805rIwIpeTA0aMwX4bD3x6HEQPKjmP2A+zGCYe47us=;
	b=X363PMugetNjDNhfljfRkTi9AALnRHJ8sM7npcQwyupkX7LDB6UhvHOSxkTMsUJP/g
	ndrsHMzsDKSEXnLhnwKBouKb/98L6yRh8cBdYNAS5yywOqpTfos1u0rbKBoTUPJGLEQi
	7csh+wc4e0cXgVx+m2a+AKbIhLW7yYBcxQX/K4fUX/GPlqj5QRtrl+6oudsaP6WWj0UG
	mMwqFFaxuXKcKHdHoMmR4BeQsX5vcqHYY8nbXdwBNpUN0za/+OEhcnwDmP1OIUKsJBDF
	kT9x2DFQeaHwsWHKhPgsGc+nK9D93hqprk9prmmo0BA1pRiURkPMPChxYWkLb1RwZ4EB
	NZsg==
X-Gm-Message-State: ALoCoQlPwvqgmtjgfq8+K43p4FSGQpwmpVnfivg1sMk3EYe+tOTR2hBLvsQSgzVB1LVrnMYfMA9d
X-Received: by 10.52.126.11 with SMTP id mu11mr5381769vdb.8.1434557673301;
	Wed, 17 Jun 2015 09:14:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.31.147.5 with HTTP; Wed, 17 Jun 2015 09:14:12 -0700 (PDT)
In-Reply-To: <55819BE1.2010501@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<55819BE1.2010501@citrix.com>
From: Artem Mygaiev <artem.mygaiev@globallogic.com>
Date: Wed, 17 Jun 2015 19:14:12 +0300
Message-ID: <CALQdcALgTpx3PO5sFxw-kCxzzWt=kBG2jVh7J1iJGKSH0dtbSQ@mail.gmail.com>
To: Julien Grall <julien.grall@citrix.com>
X-Mailman-Approved-At: Wed, 17 Jun 2015 19:12:19 +0000
Cc: Ian Campbell <ian.campbell@citrix.com>,
	Lars Kurth <lars.kurth.xen@gmail.com>, Chen Baozi <cbz@baozis.org>,
	Andrii Anisov <andrii.anisov@globallogic.com>,
	Brandon Perez <a0225893@ti.com>, xen-users@lists.xen.org,
	Alex Agizim <alex.agizim@globallogic.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello Julien, all

These days we are now in the middle of the release, please excuse us
for possible delays - we are under huge pressure... Our team will get
back on this as soon as possible, stay tuned!

Best regards,
Artem

On Wed, Jun 17, 2015 at 7:10 PM, Julien Grall <julien.grall@citrix.com> wrote:
> Hello,
>
> On 17/06/15 09:44, Ian Campbell wrote:
>> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
>> issues with similar platforms.
>
> I'm CC-ing Global logic who upstream the port of DRA7 on Xen.
>
> We got several people asking question around DRA7 board with various
> issue ([1], [2]). The documentation to boot Xen on this board is very
> limited [3], can someone from GL update the wiki page to point to the
> basics: U-boot with HYP URL, U-boot script, kernel version, device tree?
>
> It would also be good to provide limitations [4] of the current port.
>
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
>> the root of this thread and
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
>> logs etc, although with a Xen console issue which was subsequently
>> resolved.
>
> Several pointers to issue on J6: [1], [2]. But I'm not sure if the bug
> is similar.
>
> Regards,
>
> [1]
> http://lists.xen.org/archives/html/embedded-pv-devel/2015-05/msg00003.html
> [2]
> http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00000.html
> [3]
> http://wiki.xen.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
> [4]
> http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00002.html
>
> --
> Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 19:13:06 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 19:13:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Il2-000438-CT; Wed, 17 Jun 2015 19:12:20 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <artem.mygaiev@globallogic.com>) id 1Z5Fz3-00006k-53
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 16:14:37 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	F2/F0-08244-BEC91855; Wed, 17 Jun 2015 16:14:35 +0000
X-Env-Sender: artem.mygaiev@globallogic.com
X-Msg-Ref: server-14.tower-206.messagelabs.com!1434557673!9550049!1
X-Originating-IP: [209.85.213.54]
X-SpamReason: No, hits=0.8 required=7.0 tests=BODY_RANDOM_LONG,
  RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 17595 invoked from network); 17 Jun 2015 16:14:34 -0000
Received: from mail-yh0-f54.google.com (HELO mail-yh0-f54.google.com)
	(209.85.213.54)
	by server-14.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 16:14:34 -0000
Received: by yhan67 with SMTP id n67so37171621yha.3
	for <xen-users@lists.xen.org>; Wed, 17 Jun 2015 09:14:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=globallogic.com; s=google;
	h=mime-version:in-reply-to:references:from:date:message-id:subject:to
	:cc:content-type;
	bh=O805rIwIpeTA0aMwX4bD3x6HEQPKjmP2A+zGCYe47us=;
	b=fnH9cULJqhcVzWHDb2rqlySDWq3rrRGoc281UzF5TNtSbmKuf9+/g+nIm0gpDGZ2OH
	lWLdrZt3Q1xKCzByQ4FnBDvNJaXhwBzU4KzCXpiUm0xYFzJduRGvyPgS5WrZ8BEhoTWz
	LfuzaUCT07koweQKinHki8Azva9v0YL64Q9Zk=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:from:date
	:message-id:subject:to:cc:content-type;
	bh=O805rIwIpeTA0aMwX4bD3x6HEQPKjmP2A+zGCYe47us=;
	b=X363PMugetNjDNhfljfRkTi9AALnRHJ8sM7npcQwyupkX7LDB6UhvHOSxkTMsUJP/g
	ndrsHMzsDKSEXnLhnwKBouKb/98L6yRh8cBdYNAS5yywOqpTfos1u0rbKBoTUPJGLEQi
	7csh+wc4e0cXgVx+m2a+AKbIhLW7yYBcxQX/K4fUX/GPlqj5QRtrl+6oudsaP6WWj0UG
	mMwqFFaxuXKcKHdHoMmR4BeQsX5vcqHYY8nbXdwBNpUN0za/+OEhcnwDmP1OIUKsJBDF
	kT9x2DFQeaHwsWHKhPgsGc+nK9D93hqprk9prmmo0BA1pRiURkPMPChxYWkLb1RwZ4EB
	NZsg==
X-Gm-Message-State: ALoCoQlPwvqgmtjgfq8+K43p4FSGQpwmpVnfivg1sMk3EYe+tOTR2hBLvsQSgzVB1LVrnMYfMA9d
X-Received: by 10.52.126.11 with SMTP id mu11mr5381769vdb.8.1434557673301;
	Wed, 17 Jun 2015 09:14:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.31.147.5 with HTTP; Wed, 17 Jun 2015 09:14:12 -0700 (PDT)
In-Reply-To: <55819BE1.2010501@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<55819BE1.2010501@citrix.com>
From: Artem Mygaiev <artem.mygaiev@globallogic.com>
Date: Wed, 17 Jun 2015 19:14:12 +0300
Message-ID: <CALQdcALgTpx3PO5sFxw-kCxzzWt=kBG2jVh7J1iJGKSH0dtbSQ@mail.gmail.com>
To: Julien Grall <julien.grall@citrix.com>
X-Mailman-Approved-At: Wed, 17 Jun 2015 19:12:19 +0000
Cc: Ian Campbell <ian.campbell@citrix.com>,
	Lars Kurth <lars.kurth.xen@gmail.com>, Chen Baozi <cbz@baozis.org>,
	Andrii Anisov <andrii.anisov@globallogic.com>,
	Brandon Perez <a0225893@ti.com>, xen-users@lists.xen.org,
	Alex Agizim <alex.agizim@globallogic.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello Julien, all

These days we are now in the middle of the release, please excuse us
for possible delays - we are under huge pressure... Our team will get
back on this as soon as possible, stay tuned!

Best regards,
Artem

On Wed, Jun 17, 2015 at 7:10 PM, Julien Grall <julien.grall@citrix.com> wrote:
> Hello,
>
> On 17/06/15 09:44, Ian Campbell wrote:
>> CC-ing Baozi who wrote the OMAP wiki page and may have some insight into
>> issues with similar platforms.
>
> I'm CC-ing Global logic who upstream the port of DRA7 on Xen.
>
> We got several people asking question around DRA7 board with various
> issue ([1], [2]). The documentation to boot Xen on this board is very
> limited [3], can someone from GL update the wiki page to point to the
> basics: U-boot with HYP URL, U-boot script, kernel version, device tree?
>
> It would also be good to provide limitations [4] of the current port.
>
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00057.html is
>> the root of this thread and
>> http://lists.xen.org/archives/html/xen-users/2015-06/msg00062.html has
>> logs etc, although with a Xen console issue which was subsequently
>> resolved.
>
> Several pointers to issue on J6: [1], [2]. But I'm not sure if the bug
> is similar.
>
> Regards,
>
> [1]
> http://lists.xen.org/archives/html/embedded-pv-devel/2015-05/msg00003.html
> [2]
> http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00000.html
> [3]
> http://wiki.xen.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
> [4]
> http://lists.xen.org/archives/html/embedded-pv-devel/2015-06/msg00002.html
>
> --
> Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 19:16:11 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 19:16:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Iog-0004ho-5s; Wed, 17 Jun 2015 19:16:06 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=603f4e4a0=julien.grall@citrix.com>)
	id 1Z5Ioe-0004hf-QX
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 19:16:04 +0000
Received: from [85.158.137.68] by server-2.bemta-3.messagelabs.com id
	B9/E9-00727-377C1855; Wed, 17 Jun 2015 19:16:03 +0000
X-Env-Sender: prvs=603f4e4a0=julien.grall@citrix.com
X-Msg-Ref: server-15.tower-31.messagelabs.com!1434568561!17137212!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7717 invoked from network); 17 Jun 2015 19:16:03 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 19:16:03 -0000
X-IronPort-AV: E=Sophos;i="5.13,634,1427760000"; d="scan'208";a="273015016"
Message-ID: <5581C74A.3030800@citrix.com>
Date: Wed, 17 Jun 2015 20:15:22 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Brandon Perez <a0225893@ti.com>, Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com>	<558171DF.4050201@ti.com>
	<55817B1B.5020200@ti.com>	<1434553477.28264.6.camel@citrix.com>
	<5581847A.8040605@ti.com>
In-Reply-To: <5581847A.8040605@ti.com>
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello Brandon,

On 17/06/2015 15:30, Brandon Perez wrote:
> The console and keyhandler are receiving 'q' and '0', but nothing is
> happening/being printed out. I suspect this is because they are
> scheduled as tasklets, and are never getting a chance to run.
>
> Opening the debugger, it seems like I'm stuck doing timer softirqs and
> handling timer interrupts continually. I'm going to double check the
> timer settings in my device tree.

Looking to your first log [1], it seems that CNTFRQ is not set correctly:

Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz

The CNTFRQ register should be set by the firmware/bootloader. Does the 
Linux kernel is booting on baremetal with the same firmware/bootloader?

If yes, do you use the same device tree?

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 19:16:11 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 19:16:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5Iog-0004ho-5s; Wed, 17 Jun 2015 19:16:06 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=603f4e4a0=julien.grall@citrix.com>)
	id 1Z5Ioe-0004hf-QX
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 19:16:04 +0000
Received: from [85.158.137.68] by server-2.bemta-3.messagelabs.com id
	B9/E9-00727-377C1855; Wed, 17 Jun 2015 19:16:03 +0000
X-Env-Sender: prvs=603f4e4a0=julien.grall@citrix.com
X-Msg-Ref: server-15.tower-31.messagelabs.com!1434568561!17137212!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7717 invoked from network); 17 Jun 2015 19:16:03 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-15.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	17 Jun 2015 19:16:03 -0000
X-IronPort-AV: E=Sophos;i="5.13,634,1427760000"; d="scan'208";a="273015016"
Message-ID: <5581C74A.3030800@citrix.com>
Date: Wed, 17 Jun 2015 20:15:22 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Brandon Perez <a0225893@ti.com>, Ian Campbell <ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com> <1434441054.3342.108.camel@citrix.com>
	<558029C0.1020806@ti.com> <558037A3.6000809@ti.com>
	<558045BB.6040703@ti.com> <558066FD.8050104@ti.com>
	<1434530654.13744.249.camel@citrix.com>	<558171DF.4050201@ti.com>
	<55817B1B.5020200@ti.com>	<1434553477.28264.6.camel@citrix.com>
	<5581847A.8040605@ti.com>
In-Reply-To: <5581847A.8040605@ti.com>
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello Brandon,

On 17/06/2015 15:30, Brandon Perez wrote:
> The console and keyhandler are receiving 'q' and '0', but nothing is
> happening/being printed out. I suspect this is because they are
> scheduled as tasklets, and are never getting a chance to run.
>
> Opening the debugger, it seems like I'm stuck doing timer softirqs and
> handling timer interrupts continually. I'm going to double check the
> timer settings in my device tree.

Looking to your first log [1], it seems that CNTFRQ is not set correctly:

Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz

The CNTFRQ register should be set by the firmware/bootloader. Does the 
Linux kernel is booting on baremetal with the same firmware/bootloader?

If yes, do you use the same device tree?

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 21:01:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 21:01:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5KS1-0003ZN-IU; Wed, 17 Jun 2015 21:00:49 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5KS0-0003Yz-HC
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 21:00:48 +0000
Received: from [193.109.254.147] by server-10.bemta-14.messagelabs.com id
	46/2F-30151-FFFD1855; Wed, 17 Jun 2015 21:00:47 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-14.tower-27.messagelabs.com!1434574845!24324298!1
X-Originating-IP: [192.94.94.41]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTkyLjk0Ljk0LjQxID0+IDE2NDY4Ng==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1860 invoked from network); 17 Jun 2015 21:00:47 -0000
Received: from bear.ext.ti.com (HELO bear.ext.ti.com) (192.94.94.41)
	by server-14.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 21:00:47 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by bear.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HL0Zre012139;
	Wed, 17 Jun 2015 16:00:35 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HL0ZCM031287;
	Wed, 17 Jun 2015 16:00:35 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 16:00:35 -0500
Message-ID: <5581D1E6.9030402@ti.com>
Date: Wed, 17 Jun 2015 16:00:38 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Julien Grall <julien.grall@citrix.com>, Ian Campbell
	<ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com>
	<1434441054.3342.108.camel@citrix.com>			<558029C0.1020806@ti.com>
	<558037A3.6000809@ti.com>			<558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com>		<1434530654.13744.249.camel@citrix.com>	<558171DF.4050201@ti.com>	
	<55817B1B.5020200@ti.com>	<1434553477.28264.6.camel@citrix.com>
	<5581847A.8040605@ti.com> <5581C74A.3030800@citrix.com>
In-Reply-To: <5581C74A.3030800@citrix.com>
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/17/2015 03:15 PM, Julien Grall wrote:
> Hello Brandon,
>
> On 17/06/2015 15:30, Brandon Perez wrote:
>> The console and keyhandler are receiving 'q' and '0', but nothing is
>> happening/being printed out. I suspect this is because they are
>> scheduled as tasklets, and are never getting a chance to run.
>>
>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
>> handling timer interrupts continually. I'm going to double check the
>> timer settings in my device tree.
>
> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
>
> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
>
> The CNTFRQ register should be set by the firmware/bootloader. Does the
> Linux kernel is booting on baremetal with the same firmware/bootloader?
>
> If yes, do you use the same device tree?
>
> Regards,
>

Hi Julien,

     Good catch! That seems to have been the issue. To answer your 
questions, yes the kernel is booting with same firmware, bootloader, and 
device tree as Xen.

     The real issue actually stems from the uBoot code, which was not 
properly setting the CNTFRQ register (which was indeed 0).

     The CNTFRQ register being 0 lead to a whole slew of issues, the 
primary of which being was that the timer interrupt ran extremely often, 
causing progress in preemptable sections of code to be extremely slow.

    This prevented the kernel from ever getting to boot because the 
SCHEDULE SOFTIRQ was never getting a chance to run, because there would 
always be a timer SOFTIRQ taking precedence over it.

    This has resolved the issue, at least for Xen.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 21:01:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 21:01:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5KS1-0003ZN-IU; Wed, 17 Jun 2015 21:00:49 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5KS0-0003Yz-HC
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 21:00:48 +0000
Received: from [193.109.254.147] by server-10.bemta-14.messagelabs.com id
	46/2F-30151-FFFD1855; Wed, 17 Jun 2015 21:00:47 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-14.tower-27.messagelabs.com!1434574845!24324298!1
X-Originating-IP: [192.94.94.41]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTkyLjk0Ljk0LjQxID0+IDE2NDY4Ng==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1860 invoked from network); 17 Jun 2015 21:00:47 -0000
Received: from bear.ext.ti.com (HELO bear.ext.ti.com) (192.94.94.41)
	by server-14.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 21:00:47 -0000
Received: from dflxv15.itg.ti.com ([128.247.5.124])
	by bear.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5HL0Zre012139;
	Wed, 17 Jun 2015 16:00:35 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5HL0ZCM031287;
	Wed, 17 Jun 2015 16:00:35 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Wed, 17 Jun 2015 16:00:35 -0500
Message-ID: <5581D1E6.9030402@ti.com>
Date: Wed, 17 Jun 2015 16:00:38 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Julien Grall <julien.grall@citrix.com>, Ian Campbell
	<ian.campbell@citrix.com>
References: <557F3CB3.90908@ti.com>
	<1434441054.3342.108.camel@citrix.com>			<558029C0.1020806@ti.com>
	<558037A3.6000809@ti.com>			<558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com>		<1434530654.13744.249.camel@citrix.com>	<558171DF.4050201@ti.com>	
	<55817B1B.5020200@ti.com>	<1434553477.28264.6.camel@citrix.com>
	<5581847A.8040605@ti.com> <5581C74A.3030800@citrix.com>
In-Reply-To: <5581C74A.3030800@citrix.com>
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/17/2015 03:15 PM, Julien Grall wrote:
> Hello Brandon,
>
> On 17/06/2015 15:30, Brandon Perez wrote:
>> The console and keyhandler are receiving 'q' and '0', but nothing is
>> happening/being printed out. I suspect this is because they are
>> scheduled as tasklets, and are never getting a chance to run.
>>
>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
>> handling timer interrupts continually. I'm going to double check the
>> timer settings in my device tree.
>
> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
>
> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
>
> The CNTFRQ register should be set by the firmware/bootloader. Does the
> Linux kernel is booting on baremetal with the same firmware/bootloader?
>
> If yes, do you use the same device tree?
>
> Regards,
>

Hi Julien,

     Good catch! That seems to have been the issue. To answer your 
questions, yes the kernel is booting with same firmware, bootloader, and 
device tree as Xen.

     The real issue actually stems from the uBoot code, which was not 
properly setting the CNTFRQ register (which was indeed 0).

     The CNTFRQ register being 0 lead to a whole slew of issues, the 
primary of which being was that the timer interrupt ran extremely often, 
causing progress in preemptable sections of code to be extremely slow.

    This prevented the kernel from ever getting to boot because the 
SCHEDULE SOFTIRQ was never getting a chance to run, because there would 
always be a timer SOFTIRQ taking precedence over it.

    This has resolved the issue, at least for Xen.

Brandon

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 23:14:53 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 23:14:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5MWx-0004sE-QA; Wed, 17 Jun 2015 23:14:03 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z5MWv-0004rx-O7
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 23:14:02 +0000
Received: from [85.158.137.68] by server-7.bemta-3.messagelabs.com id
	D1/D9-06457-93FF1855; Wed, 17 Jun 2015 23:14:01 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434582840!17316738!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20025 invoked from network); 17 Jun 2015 23:14:00 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 23:14:00 -0000
Received: from justin.univie.ac.at ([131.130.3.111] helo=justin.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MWs-0002ny-Tp; Thu, 18 Jun 2015 01:13:58 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by justin.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MWs-00021E-NN; Thu, 18 Jun 2015 01:13:58 +0200
Message-ID: <5581FF33.3030409@web2web.at>
Date: Thu, 18 Jun 2015 01:13:55 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>, 
	xen-users@lists.xen.org
References: <557E0433.9070307@web2web.at> <557E7FD7.40103@citrix.com>
	<557ECDAB.2050206@web2web.at> <557FDE0D.9030300@citrix.com>
In-Reply-To: <557FDE0D.9030300@citrix.com>
Content-Length: 1271
X-Univie-Virus-Scan: scanned by ClamAV on justin.univie.ac.at
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="windows-1252"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Roger,

Am 16.06.15 um 10:27 schrieb Roger Pau Monn=E9:
>>>> It, however, appears that the pvh dom0 compared to the standard dom0
>>>> consumes _significantly_ more CPU time as shown by "xl info" from with=
in
>>>> dom0 - which to me seems counter-intuitive given my (limited)
>>>> understanding of what pvh tries to achieve.
>> Any idea about that ...
> No, we are not yet at the point of doing performance measurements, not
> until the ABI is finished, then we can start speaking about performance.
> FWIW I have some old PVH/PV/PVHVM performance comparison here:
>
> http://xenbits.xen.org/people/royger/talks/fosdem2014.pdf
Thanks for that pointer - it was an interesting read. The part of the =

presentation you are referring to, however, mainly concentrates on =

performance and not CPU utilization which isn't necessarily the same.
My observation was only indicating that the CPU utilization seemed to be =

higher with pvh on dom0 compared to dom0's standard mode; I couldn't =

comment on any performance numbers (i.e. whether the system was slower) =

as I was nowhere near 100% CPU utilization on my system.

Thanks again Atom2

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 23:14:53 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 23:14:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5MWx-0004sE-QA; Wed, 17 Jun 2015 23:14:03 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z5MWv-0004rx-O7
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 23:14:02 +0000
Received: from [85.158.137.68] by server-7.bemta-3.messagelabs.com id
	D1/D9-06457-93FF1855; Wed, 17 Jun 2015 23:14:01 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-11.tower-31.messagelabs.com!1434582840!17316738!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20025 invoked from network); 17 Jun 2015 23:14:00 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-11.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 23:14:00 -0000
Received: from justin.univie.ac.at ([131.130.3.111] helo=justin.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MWs-0002ny-Tp; Thu, 18 Jun 2015 01:13:58 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by justin.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MWs-00021E-NN; Thu, 18 Jun 2015 01:13:58 +0200
Message-ID: <5581FF33.3030409@web2web.at>
Date: Thu, 18 Jun 2015 01:13:55 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>, 
	xen-users@lists.xen.org
References: <557E0433.9070307@web2web.at> <557E7FD7.40103@citrix.com>
	<557ECDAB.2050206@web2web.at> <557FDE0D.9030300@citrix.com>
In-Reply-To: <557FDE0D.9030300@citrix.com>
Content-Length: 1271
X-Univie-Virus-Scan: scanned by ClamAV on justin.univie.ac.at
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="windows-1252"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Roger,

Am 16.06.15 um 10:27 schrieb Roger Pau Monn=E9:
>>>> It, however, appears that the pvh dom0 compared to the standard dom0
>>>> consumes _significantly_ more CPU time as shown by "xl info" from with=
in
>>>> dom0 - which to me seems counter-intuitive given my (limited)
>>>> understanding of what pvh tries to achieve.
>> Any idea about that ...
> No, we are not yet at the point of doing performance measurements, not
> until the ABI is finished, then we can start speaking about performance.
> FWIW I have some old PVH/PV/PVHVM performance comparison here:
>
> http://xenbits.xen.org/people/royger/talks/fosdem2014.pdf
Thanks for that pointer - it was an interesting read. The part of the =

presentation you are referring to, however, mainly concentrates on =

performance and not CPU utilization which isn't necessarily the same.
My observation was only indicating that the CPU utilization seemed to be =

higher with pvh on dom0 compared to dom0's standard mode; I couldn't =

comment on any performance numbers (i.e. whether the system was slower) =

as I was nowhere near 100% CPU utilization on my system.

Thanks again Atom2

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 23:15:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 23:15:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5MXz-00052L-De; Wed, 17 Jun 2015 23:15:07 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z5MXx-00051x-NY
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 23:15:05 +0000
Received: from [193.109.254.147] by server-2.bemta-14.messagelabs.com id
	16/43-31258-97FF1855; Wed, 17 Jun 2015 23:15:05 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-8.tower-27.messagelabs.com!1434582904!24357825!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11513 invoked from network); 17 Jun 2015 23:15:04 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-8.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 23:15:04 -0000
Received: from justin.univie.ac.at ([131.130.3.111] helo=justin.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MXv-0002y8-Uu; Thu, 18 Jun 2015 01:15:03 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by justin.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MXv-00025F-QW; Thu, 18 Jun 2015 01:15:03 +0200
Message-ID: <5581FF74.1090300@web2web.at>
Date: Thu, 18 Jun 2015 01:15:00 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>, 
	xen-users@lists.xen.org
References: <557E0433.9070307@web2web.at> <558134F5.2050202@citrix.com>
In-Reply-To: <558134F5.2050202@citrix.com>
Content-Length: 911
X-Univie-Virus-Scan: scanned by ClamAV on justin.univie.ac.at
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="windows-1252"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Roger,
Am 17.06.15 um 10:51 schrieb Roger Pau Monn=E9:
> Hello,
>
> El 15/06/15 a les 0.46, Atom2 ha escrit:
>> Hi guys,
>> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
>> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
>> and domUs a spin - unfortunately with not too much success:
> Forgot to ask, but what CPU model are you using? I've got very similar
> reports from people trying PVH on the SandyBridge family CPUs.
It's a Xeon E3-1260L, commonly known to be part of the SandyBridge =

family of CPUs, using a C206 chipset on the motherboard.
Is there anything I can help with getting to the grounds of this issue =

with SandyBriged CPUs? I am happy to run patches against my 4.5 XEN version.
> Thanks, Roger.
>
Thanks Atom2

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 17 23:15:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2015 23:15:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5MXz-00052L-De; Wed, 17 Jun 2015 23:15:07 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <ariel.atom2@web2web.at>) id 1Z5MXx-00051x-NY
	for xen-users@lists.xen.org; Wed, 17 Jun 2015 23:15:05 +0000
Received: from [193.109.254.147] by server-2.bemta-14.messagelabs.com id
	16/43-31258-97FF1855; Wed, 17 Jun 2015 23:15:05 +0000
X-Env-Sender: ariel.atom2@web2web.at
X-Msg-Ref: server-8.tower-27.messagelabs.com!1434582904!24357825!1
X-Originating-IP: [131.130.3.115]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTMxLjEzMC4zLjExNSA9PiA0NTM2Mw==\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11513 invoked from network); 17 Jun 2015 23:15:04 -0000
Received: from grace.univie.ac.at (HELO grace.univie.ac.at) (131.130.3.115)
	by server-8.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 17 Jun 2015 23:15:04 -0000
Received: from justin.univie.ac.at ([131.130.3.111] helo=justin.univie.ac.at)
	by grace.univie.ac.at with esmtps
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MXv-0002y8-Uu; Thu, 18 Jun 2015 01:15:03 +0200
Received: from zeus.herrenhauspark.com ([92.243.35.23] helo=[192.168.19.62])
	by justin.univie.ac.at with esmtpsa
	(TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85)
	(envelope-from <ariel.atom2@web2web.at>)
	id 1Z5MXv-00025F-QW; Thu, 18 Jun 2015 01:15:03 +0200
Message-ID: <5581FF74.1090300@web2web.at>
Date: Thu, 18 Jun 2015 01:15:00 +0200
From: Atom2 <ariel.atom2@web2web.at>
User-Agent: Mozilla/5.0 (Windows NT 6.1;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: =?windows-1252?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>, 
	xen-users@lists.xen.org
References: <557E0433.9070307@web2web.at> <558134F5.2050202@citrix.com>
In-Reply-To: <558134F5.2050202@citrix.com>
Content-Length: 911
X-Univie-Virus-Scan: scanned by ClamAV on justin.univie.ac.at
Subject: Re: [Xen-users] issues with pvh mode for dom0 and domU on xen 4.5.0
 / kernel 3.18.9
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="windows-1252"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Roger,
Am 17.06.15 um 10:51 schrieb Roger Pau Monn=E9:
> Hello,
>
> El 15/06/15 a les 0.46, Atom2 ha escrit:
>> Hi guys,
>> I recently switched from xen 4.4.2 to 4.5.0 after it became stable on
>> gentoo (kernel version is 3.18.9) and thought I'd give pvh for both dom0
>> and domUs a spin - unfortunately with not too much success:
> Forgot to ask, but what CPU model are you using? I've got very similar
> reports from people trying PVH on the SandyBridge family CPUs.
It's a Xeon E3-1260L, commonly known to be part of the SandyBridge =

family of CPUs, using a C206 chipset on the motherboard.
Is there anything I can help with getting to the grounds of this issue =

with SandyBriged CPUs? I am happy to run patches against my 4.5 XEN version.
> Thanks, Roger.
>
Thanks Atom2

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 02:22:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 02:22:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5PRp-00063e-OB; Thu, 18 Jun 2015 02:20:57 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <cbz@baozis.org>) id 1Z5Ogy-0000J6-JL
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 01:32:32 +0000
Received: from [85.158.139.211] by server-7.bemta-5.messagelabs.com id
	D7/70-23096-FAF12855; Thu, 18 Jun 2015 01:32:31 +0000
X-Env-Sender: cbz@baozis.org
X-Msg-Ref: server-4.tower-206.messagelabs.com!1434591148!15052336!1
X-Originating-IP: [192.241.220.20]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13726 invoked from network); 18 Jun 2015 01:32:30 -0000
Received: from baozis.org (HELO baozis.org) (192.241.220.20)
	by server-4.tower-206.messagelabs.com with DHE-RSA-AES128-SHA encrypted
	SMTP; 18 Jun 2015 01:32:30 -0000
Received: from [220.202.153.52] (helo=cbz-thinkpad)
	by baozis.org with esmtpsa (TLS1.2:RSA_AES_128_CBC_SHA1:128)
	(Exim 4.82) (envelope-from <cbz@baozis.org>)
	id 1Z5Ogr-0002lm-7k; Thu, 18 Jun 2015 02:32:25 +0100
Received: from cbz by cbz-thinkpad with local (Exim 4.84)
	(envelope-from <cbz@baozis.org>)
	id 1Z5Oha-0007Wp-LL; Thu, 18 Jun 2015 09:33:10 +0800
Date: Thu, 18 Jun 2015 09:33:00 +0800
From: Chen Baozi <cbz@baozis.org>
To: Brandon Perez <a0225893@ti.com>
Message-ID: <20150618013300.GA21320@cbz-thinkpad>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <5581D1E6.9030402@ti.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Mailman-Approved-At: Thu, 18 Jun 2015 02:20:57 +0000
Cc: Julien Grall <julien.grall@citrix.com>, xen-users@lists.xen.org,
	Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Brandon,

On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
> On 06/17/2015 03:15 PM, Julien Grall wrote:
> >Hello Brandon,
> >
> >On 17/06/2015 15:30, Brandon Perez wrote:
> >>The console and keyhandler are receiving 'q' and '0', but nothing is
> >>happening/being printed out. I suspect this is because they are
> >>scheduled as tasklets, and are never getting a chance to run.
> >>
> >>Opening the debugger, it seems like I'm stuck doing timer softirqs and
> >>handling timer interrupts continually. I'm going to double check the
> >>timer settings in my device tree.
> >
> >Looking to your first log [1], it seems that CNTFRQ is not set correctly:
> >
> >Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
> >
> >The CNTFRQ register should be set by the firmware/bootloader. Does the
> >Linux kernel is booting on baremetal with the same firmware/bootloader?
> >
> >If yes, do you use the same device tree?
> >
> >Regards,
> >
> 
> Hi Julien,
> 
>     Good catch! That seems to have been the issue. To answer your questions,
> yes the kernel is booting with same firmware, bootloader, and device tree as
> Xen.
> 
>     The real issue actually stems from the uBoot code, which was not
> properly setting the CNTFRQ register (which was indeed 0).
> 
>     The CNTFRQ register being 0 lead to a whole slew of issues, the primary
> of which being was that the timer interrupt ran extremely often, causing
> progress in preemptable sections of code to be extremely slow.

This reminds me that I have had a similar issue when doing OMAP5432 enablement.
IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
is not actually used during platform initialisation in linux kernel. Maybe
it would be a good idea to have a check whether your SoC has the same
implementation?

Cheers,

Baozi.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 02:22:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 02:22:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5PRp-00063e-OB; Thu, 18 Jun 2015 02:20:57 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <cbz@baozis.org>) id 1Z5Ogy-0000J6-JL
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 01:32:32 +0000
Received: from [85.158.139.211] by server-7.bemta-5.messagelabs.com id
	D7/70-23096-FAF12855; Thu, 18 Jun 2015 01:32:31 +0000
X-Env-Sender: cbz@baozis.org
X-Msg-Ref: server-4.tower-206.messagelabs.com!1434591148!15052336!1
X-Originating-IP: [192.241.220.20]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13726 invoked from network); 18 Jun 2015 01:32:30 -0000
Received: from baozis.org (HELO baozis.org) (192.241.220.20)
	by server-4.tower-206.messagelabs.com with DHE-RSA-AES128-SHA encrypted
	SMTP; 18 Jun 2015 01:32:30 -0000
Received: from [220.202.153.52] (helo=cbz-thinkpad)
	by baozis.org with esmtpsa (TLS1.2:RSA_AES_128_CBC_SHA1:128)
	(Exim 4.82) (envelope-from <cbz@baozis.org>)
	id 1Z5Ogr-0002lm-7k; Thu, 18 Jun 2015 02:32:25 +0100
Received: from cbz by cbz-thinkpad with local (Exim 4.84)
	(envelope-from <cbz@baozis.org>)
	id 1Z5Oha-0007Wp-LL; Thu, 18 Jun 2015 09:33:10 +0800
Date: Thu, 18 Jun 2015 09:33:00 +0800
From: Chen Baozi <cbz@baozis.org>
To: Brandon Perez <a0225893@ti.com>
Message-ID: <20150618013300.GA21320@cbz-thinkpad>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <5581D1E6.9030402@ti.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Mailman-Approved-At: Thu, 18 Jun 2015 02:20:57 +0000
Cc: Julien Grall <julien.grall@citrix.com>, xen-users@lists.xen.org,
	Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Brandon,

On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
> On 06/17/2015 03:15 PM, Julien Grall wrote:
> >Hello Brandon,
> >
> >On 17/06/2015 15:30, Brandon Perez wrote:
> >>The console and keyhandler are receiving 'q' and '0', but nothing is
> >>happening/being printed out. I suspect this is because they are
> >>scheduled as tasklets, and are never getting a chance to run.
> >>
> >>Opening the debugger, it seems like I'm stuck doing timer softirqs and
> >>handling timer interrupts continually. I'm going to double check the
> >>timer settings in my device tree.
> >
> >Looking to your first log [1], it seems that CNTFRQ is not set correctly:
> >
> >Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
> >
> >The CNTFRQ register should be set by the firmware/bootloader. Does the
> >Linux kernel is booting on baremetal with the same firmware/bootloader?
> >
> >If yes, do you use the same device tree?
> >
> >Regards,
> >
> 
> Hi Julien,
> 
>     Good catch! That seems to have been the issue. To answer your questions,
> yes the kernel is booting with same firmware, bootloader, and device tree as
> Xen.
> 
>     The real issue actually stems from the uBoot code, which was not
> properly setting the CNTFRQ register (which was indeed 0).
> 
>     The CNTFRQ register being 0 lead to a whole slew of issues, the primary
> of which being was that the timer interrupt ran extremely often, causing
> progress in preemptable sections of code to be extremely slow.

This reminds me that I have had a similar issue when doing OMAP5432 enablement.
IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
is not actually used during platform initialisation in linux kernel. Maybe
it would be a good idea to have a check whether your SoC has the same
implementation?

Cheers,

Baozi.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 09:42:25 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 09:42:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WK2-00048N-6P; Thu, 18 Jun 2015 09:41:22 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604ce3b75=julien.grall@citrix.com>)
	id 1Z5WK0-00047t-Cf
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 09:41:20 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	E2/A9-16813-F3292855; Thu, 18 Jun 2015 09:41:19 +0000
X-Env-Sender: prvs=604ce3b75=julien.grall@citrix.com
X-Msg-Ref: server-15.tower-27.messagelabs.com!1434620477!24493470!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12253 invoked from network); 18 Jun 2015 09:41:18 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-15.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 09:41:18 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="276113530"
Message-ID: <5582923A.3030900@citrix.com>
Date: Thu, 18 Jun 2015 10:41:14 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Chen Baozi <cbz@baozis.org>, Brandon Perez <a0225893@ti.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad>
In-Reply-To: <20150618013300.GA21320@cbz-thinkpad>
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Chen,

On 18/06/2015 02:33, Chen Baozi wrote:

> On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
>> On 06/17/2015 03:15 PM, Julien Grall wrote:
>>> Hello Brandon,
>>>
>>> On 17/06/2015 15:30, Brandon Perez wrote:
>>>> The console and keyhandler are receiving 'q' and '0', but nothing is
>>>> happening/being printed out. I suspect this is because they are
>>>> scheduled as tasklets, and are never getting a chance to run.
>>>>
>>>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
>>>> handling timer interrupts continually. I'm going to double check the
>>>> timer settings in my device tree.
>>>
>>> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
>>>
>>> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
>>>
>>> The CNTFRQ register should be set by the firmware/bootloader. Does the
>>> Linux kernel is booting on baremetal with the same firmware/bootloader?
>>>
>>> If yes, do you use the same device tree?
>>>
>>> Regards,
>>>
>>
>> Hi Julien,
>>
>>      Good catch! That seems to have been the issue. To answer your questions,
>> yes the kernel is booting with same firmware, bootloader, and device tree as
>> Xen.
>>
>>      The real issue actually stems from the uBoot code, which was not
>> properly setting the CNTFRQ register (which was indeed 0).
>>
>>      The CNTFRQ register being 0 lead to a whole slew of issues, the primary
>> of which being was that the timer interrupt ran extremely often, causing
>> progress in preemptable sections of code to be extremely slow.
>
> This reminds me that I have had a similar issue when doing OMAP5432 enablement.
> IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
> is not actually used during platform initialisation in linux kernel. Maybe
> it would be a good idea to have a check whether your SoC has the same
> implementation?

How did you resolve it on OMAP5432? Does Xen get the timer frequency 
from the property "clock-frequency"?

I'm wondering if we should get the frequency from the OMAP5 specific 
timer register rather than modifying U-boot and/or the DT.

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 09:42:25 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 09:42:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WK2-00048N-6P; Thu, 18 Jun 2015 09:41:22 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604ce3b75=julien.grall@citrix.com>)
	id 1Z5WK0-00047t-Cf
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 09:41:20 +0000
Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id
	E2/A9-16813-F3292855; Thu, 18 Jun 2015 09:41:19 +0000
X-Env-Sender: prvs=604ce3b75=julien.grall@citrix.com
X-Msg-Ref: server-15.tower-27.messagelabs.com!1434620477!24493470!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12253 invoked from network); 18 Jun 2015 09:41:18 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-15.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 09:41:18 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="276113530"
Message-ID: <5582923A.3030900@citrix.com>
Date: Thu, 18 Jun 2015 10:41:14 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Chen Baozi <cbz@baozis.org>, Brandon Perez <a0225893@ti.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad>
In-Reply-To: <20150618013300.GA21320@cbz-thinkpad>
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Chen,

On 18/06/2015 02:33, Chen Baozi wrote:

> On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
>> On 06/17/2015 03:15 PM, Julien Grall wrote:
>>> Hello Brandon,
>>>
>>> On 17/06/2015 15:30, Brandon Perez wrote:
>>>> The console and keyhandler are receiving 'q' and '0', but nothing is
>>>> happening/being printed out. I suspect this is because they are
>>>> scheduled as tasklets, and are never getting a chance to run.
>>>>
>>>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
>>>> handling timer interrupts continually. I'm going to double check the
>>>> timer settings in my device tree.
>>>
>>> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
>>>
>>> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
>>>
>>> The CNTFRQ register should be set by the firmware/bootloader. Does the
>>> Linux kernel is booting on baremetal with the same firmware/bootloader?
>>>
>>> If yes, do you use the same device tree?
>>>
>>> Regards,
>>>
>>
>> Hi Julien,
>>
>>      Good catch! That seems to have been the issue. To answer your questions,
>> yes the kernel is booting with same firmware, bootloader, and device tree as
>> Xen.
>>
>>      The real issue actually stems from the uBoot code, which was not
>> properly setting the CNTFRQ register (which was indeed 0).
>>
>>      The CNTFRQ register being 0 lead to a whole slew of issues, the primary
>> of which being was that the timer interrupt ran extremely often, causing
>> progress in preemptable sections of code to be extremely slow.
>
> This reminds me that I have had a similar issue when doing OMAP5432 enablement.
> IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
> is not actually used during platform initialisation in linux kernel. Maybe
> it would be a good idea to have a check whether your SoC has the same
> implementation?

How did you resolve it on OMAP5432? Does Xen get the timer frequency 
from the property "clock-frequency"?

I'm wondering if we should get the frequency from the OMAP5 specific 
timer register rather than modifying U-boot and/or the DT.

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 09:51:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 09:51:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WTU-0005G5-V9; Thu, 18 Jun 2015 09:51:08 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604cfbd4c=Ian.Campbell@citrix.com>)
	id 1Z5WTU-0005Fq-3J
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 09:51:08 +0000
Received: from [85.158.137.68] by server-8.bemta-3.messagelabs.com id
	63/0F-10593-B8492855; Thu, 18 Jun 2015 09:51:07 +0000
X-Env-Sender: prvs=604cfbd4c=Ian.Campbell@citrix.com
X-Msg-Ref: server-12.tower-31.messagelabs.com!1434621059!17398956!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13345 invoked from network); 18 Jun 2015 09:51:06 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-12.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 09:51:06 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="273223115"
Message-ID: <1434621056.28264.34.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Julien Grall <julien.grall@citrix.com>
Date: Thu, 18 Jun 2015 10:50:56 +0100
In-Reply-To: <5582923A.3030900@citrix.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>,
	Brandon Perez <a0225893@ti.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, 2015-06-18 at 10:41 +0100, Julien Grall wrote:
> Hi Chen,
> 
> On 18/06/2015 02:33, Chen Baozi wrote:
> 
> > On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
> >> On 06/17/2015 03:15 PM, Julien Grall wrote:
> >>> Hello Brandon,
> >>>
> >>> On 17/06/2015 15:30, Brandon Perez wrote:
> >>>> The console and keyhandler are receiving 'q' and '0', but nothing is
> >>>> happening/being printed out. I suspect this is because they are
> >>>> scheduled as tasklets, and are never getting a chance to run.
> >>>>
> >>>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
> >>>> handling timer interrupts continually. I'm going to double check the
> >>>> timer settings in my device tree.
> >>>
> >>> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
> >>>
> >>> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
> >>>
> >>> The CNTFRQ register should be set by the firmware/bootloader. Does the
> >>> Linux kernel is booting on baremetal with the same firmware/bootloader?
> >>>
> >>> If yes, do you use the same device tree?
> >>>
> >>> Regards,
> >>>
> >>
> >> Hi Julien,
> >>
> >>      Good catch! That seems to have been the issue. To answer your questions,
> >> yes the kernel is booting with same firmware, bootloader, and device tree as
> >> Xen.
> >>
> >>      The real issue actually stems from the uBoot code, which was not
> >> properly setting the CNTFRQ register (which was indeed 0).
> >>
> >>      The CNTFRQ register being 0 lead to a whole slew of issues, the primary
> >> of which being was that the timer interrupt ran extremely often, causing
> >> progress in preemptable sections of code to be extremely slow.
> >
> > This reminds me that I have had a similar issue when doing OMAP5432 enablement.
> > IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
> > is not actually used during platform initialisation in linux kernel. Maybe
> > it would be a good idea to have a check whether your SoC has the same
> > implementation?
> 
> How did you resolve it on OMAP5432? Does Xen get the timer frequency 
> from the property "clock-frequency"?
> 
> I'm wondering if we should get the frequency from the OMAP5 specific 
> timer register rather than modifying U-boot and/or the DT.

Independently from that we should complain very loudly if CNTFRQ is 0 on
any processor and a better value hasn't been supplied in the firmware
tables.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 09:51:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 09:51:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WTU-0005G5-V9; Thu, 18 Jun 2015 09:51:08 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604cfbd4c=Ian.Campbell@citrix.com>)
	id 1Z5WTU-0005Fq-3J
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 09:51:08 +0000
Received: from [85.158.137.68] by server-8.bemta-3.messagelabs.com id
	63/0F-10593-B8492855; Thu, 18 Jun 2015 09:51:07 +0000
X-Env-Sender: prvs=604cfbd4c=Ian.Campbell@citrix.com
X-Msg-Ref: server-12.tower-31.messagelabs.com!1434621059!17398956!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13345 invoked from network); 18 Jun 2015 09:51:06 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-12.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 09:51:06 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="273223115"
Message-ID: <1434621056.28264.34.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Julien Grall <julien.grall@citrix.com>
Date: Thu, 18 Jun 2015 10:50:56 +0100
In-Reply-To: <5582923A.3030900@citrix.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>,
	Brandon Perez <a0225893@ti.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, 2015-06-18 at 10:41 +0100, Julien Grall wrote:
> Hi Chen,
> 
> On 18/06/2015 02:33, Chen Baozi wrote:
> 
> > On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
> >> On 06/17/2015 03:15 PM, Julien Grall wrote:
> >>> Hello Brandon,
> >>>
> >>> On 17/06/2015 15:30, Brandon Perez wrote:
> >>>> The console and keyhandler are receiving 'q' and '0', but nothing is
> >>>> happening/being printed out. I suspect this is because they are
> >>>> scheduled as tasklets, and are never getting a chance to run.
> >>>>
> >>>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
> >>>> handling timer interrupts continually. I'm going to double check the
> >>>> timer settings in my device tree.
> >>>
> >>> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
> >>>
> >>> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
> >>>
> >>> The CNTFRQ register should be set by the firmware/bootloader. Does the
> >>> Linux kernel is booting on baremetal with the same firmware/bootloader?
> >>>
> >>> If yes, do you use the same device tree?
> >>>
> >>> Regards,
> >>>
> >>
> >> Hi Julien,
> >>
> >>      Good catch! That seems to have been the issue. To answer your questions,
> >> yes the kernel is booting with same firmware, bootloader, and device tree as
> >> Xen.
> >>
> >>      The real issue actually stems from the uBoot code, which was not
> >> properly setting the CNTFRQ register (which was indeed 0).
> >>
> >>      The CNTFRQ register being 0 lead to a whole slew of issues, the primary
> >> of which being was that the timer interrupt ran extremely often, causing
> >> progress in preemptable sections of code to be extremely slow.
> >
> > This reminds me that I have had a similar issue when doing OMAP5432 enablement.
> > IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
> > is not actually used during platform initialisation in linux kernel. Maybe
> > it would be a good idea to have a check whether your SoC has the same
> > implementation?
> 
> How did you resolve it on OMAP5432? Does Xen get the timer frequency 
> from the property "clock-frequency"?
> 
> I'm wondering if we should get the frequency from the OMAP5 specific 
> timer register rather than modifying U-boot and/or the DT.

Independently from that we should complain very loudly if CNTFRQ is 0 on
any processor and a better value hasn't been supplied in the firmware
tables.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 09:53:30 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 09:53:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WVh-0005lt-LW; Thu, 18 Jun 2015 09:53:25 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604ce3b75=julien.grall@citrix.com>)
	id 1Z5WVf-0005lX-RC
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 09:53:23 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	41/08-32733-31592855; Thu, 18 Jun 2015 09:53:23 +0000
X-Env-Sender: prvs=604ce3b75=julien.grall@citrix.com
X-Msg-Ref: server-6.tower-27.messagelabs.com!1434621201!24484378!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2602 invoked from network); 18 Jun 2015 09:53:22 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-6.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 09:53:22 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="276116855"
Message-ID: <5582950E.6050709@citrix.com>
Date: Thu, 18 Jun 2015 10:53:18 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
	<1434621056.28264.34.camel@citrix.com>
In-Reply-To: <1434621056.28264.34.camel@citrix.com>
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>,
	Brandon Perez <a0225893@ti.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org



On 18/06/2015 10:50, Ian Campbell wrote:
> Independently from that we should complain very loudly if CNTFRQ is 0 on
> any processor and a better value hasn't been supplied in the firmware
> tables.

I can do a follow-up of 
http://lists.xen.org/archives/html/xen-devel/2015-06/msg00456.html

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 09:53:30 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 09:53:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WVh-0005lt-LW; Thu, 18 Jun 2015 09:53:25 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604ce3b75=julien.grall@citrix.com>)
	id 1Z5WVf-0005lX-RC
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 09:53:23 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	41/08-32733-31592855; Thu, 18 Jun 2015 09:53:23 +0000
X-Env-Sender: prvs=604ce3b75=julien.grall@citrix.com
X-Msg-Ref: server-6.tower-27.messagelabs.com!1434621201!24484378!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2602 invoked from network); 18 Jun 2015 09:53:22 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-6.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 09:53:22 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="276116855"
Message-ID: <5582950E.6050709@citrix.com>
Date: Thu, 18 Jun 2015 10:53:18 +0100
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Ian Campbell <ian.campbell@citrix.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
	<1434621056.28264.34.camel@citrix.com>
In-Reply-To: <1434621056.28264.34.camel@citrix.com>
X-DLP: MIA1
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>,
	Brandon Perez <a0225893@ti.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org



On 18/06/2015 10:50, Ian Campbell wrote:
> Independently from that we should complain very loudly if CNTFRQ is 0 on
> any processor and a better value hasn't been supplied in the firmware
> tables.

I can do a follow-up of 
http://lists.xen.org/archives/html/xen-devel/2015-06/msg00456.html

Regards,

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 10:07:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 10:07:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WjQ-0008Am-Cv; Thu, 18 Jun 2015 10:07:36 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604cfbd4c=Ian.Campbell@citrix.com>)
	id 1Z5WjP-0008AG-1r
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 10:07:35 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	76/67-32733-66892855; Thu, 18 Jun 2015 10:07:34 +0000
X-Env-Sender: prvs=604cfbd4c=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-27.messagelabs.com!1434622051!13074247!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14216 invoked from network); 18 Jun 2015 10:07:33 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 10:07:33 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="273227547"
Message-ID: <1434621921.28264.35.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Julien Grall <julien.grall@citrix.com>
Date: Thu, 18 Jun 2015 11:05:21 +0100
In-Reply-To: <5582950E.6050709@citrix.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
	<1434621056.28264.34.camel@citrix.com> <5582950E.6050709@citrix.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>,
	Brandon Perez <a0225893@ti.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, 2015-06-18 at 10:53 +0100, Julien Grall wrote:
> 
> On 18/06/2015 10:50, Ian Campbell wrote:
> > Independently from that we should complain very loudly if CNTFRQ is 0 on
> > any processor and a better value hasn't been supplied in the firmware
> > tables.
> 
> I can do a follow-up of 
> http://lists.xen.org/archives/html/xen-devel/2015-06/msg00456.html

Please!



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 10:07:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 10:07:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5WjQ-0008Am-Cv; Thu, 18 Jun 2015 10:07:36 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=604cfbd4c=Ian.Campbell@citrix.com>)
	id 1Z5WjP-0008AG-1r
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 10:07:35 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	76/67-32733-66892855; Thu, 18 Jun 2015 10:07:34 +0000
X-Env-Sender: prvs=604cfbd4c=Ian.Campbell@citrix.com
X-Msg-Ref: server-5.tower-27.messagelabs.com!1434622051!13074247!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14216 invoked from network); 18 Jun 2015 10:07:33 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-5.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	18 Jun 2015 10:07:33 -0000
X-IronPort-AV: E=Sophos;i="5.13,638,1427760000"; d="scan'208";a="273227547"
Message-ID: <1434621921.28264.35.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Julien Grall <julien.grall@citrix.com>
Date: Thu, 18 Jun 2015 11:05:21 +0100
In-Reply-To: <5582950E.6050709@citrix.com>
References: <558037A3.6000809@ti.com> <558045BB.6040703@ti.com>
	<558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
	<1434621056.28264.34.camel@citrix.com> <5582950E.6050709@citrix.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org, Chen Baozi <cbz@baozis.org>,
	Brandon Perez <a0225893@ti.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, 2015-06-18 at 10:53 +0100, Julien Grall wrote:
> 
> On 18/06/2015 10:50, Ian Campbell wrote:
> > Independently from that we should complain very loudly if CNTFRQ is 0 on
> > any processor and a better value hasn't been supplied in the firmware
> > tables.
> 
> I can do a follow-up of 
> http://lists.xen.org/archives/html/xen-devel/2015-06/msg00456.html

Please!



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 14:31:17 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 14:31:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5apb-0001YG-2R; Thu, 18 Jun 2015 14:30:15 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5apZ-0001Xx-Lc
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 14:30:13 +0000
Received: from [85.158.139.211] by server-2.bemta-5.messagelabs.com id
	26/82-31304-3F5D2855; Thu, 18 Jun 2015 14:30:11 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-9.tower-206.messagelabs.com!1434637810!15227393!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22301 invoked from network); 18 Jun 2015 14:30:11 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-9.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 18 Jun 2015 14:30:11 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5IEU17C016829;
	Thu, 18 Jun 2015 09:30:01 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5IEU1p9004271;
	Thu, 18 Jun 2015 09:30:01 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Thu, 18 Jun 2015 09:30:00 -0500
Message-ID: <5582C7DD.4000006@ti.com>
Date: Thu, 18 Jun 2015 09:30:05 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Chen Baozi <cbz@baozis.org>, Julien Grall <julien.grall@citrix.com>
References: <558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
	<20150618110253.GA17506@cbz-thinkpad>
In-Reply-To: <20150618110253.GA17506@cbz-thinkpad>
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/18/2015 07:02 AM, Chen Baozi wrote:
> On Thu, Jun 18, 2015 at 10:41:14AM +0100, Julien Grall wrote:
>> Hi Chen,
>>
>> On 18/06/2015 02:33, Chen Baozi wrote:
>>
>>> On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
>>>> On 06/17/2015 03:15 PM, Julien Grall wrote:
>>>>> Hello Brandon,
>>>>>
>>>>> On 17/06/2015 15:30, Brandon Perez wrote:
>>>>>> The console and keyhandler are receiving 'q' and '0', but nothing is
>>>>>> happening/being printed out. I suspect this is because they are
>>>>>> scheduled as tasklets, and are never getting a chance to run.
>>>>>>
>>>>>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
>>>>>> handling timer interrupts continually. I'm going to double check the
>>>>>> timer settings in my device tree.
>>>>>
>>>>> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
>>>>>
>>>>> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
>>>>>
>>>>> The CNTFRQ register should be set by the firmware/bootloader. Does the
>>>>> Linux kernel is booting on baremetal with the same firmware/bootloader?
>>>>>
>>>>> If yes, do you use the same device tree?
>>>>>
>>>>> Regards,
>>>>>
>>>>
>>>> Hi Julien,
>>>>
>>>>      Good catch! That seems to have been the issue. To answer your questions,
>>>> yes the kernel is booting with same firmware, bootloader, and device tree as
>>>> Xen.
>>>>
>>>>      The real issue actually stems from the uBoot code, which was not
>>>> properly setting the CNTFRQ register (which was indeed 0).
>>>>
>>>>      The CNTFRQ register being 0 lead to a whole slew of issues, the primary
>>>> of which being was that the timer interrupt ran extremely often, causing
>>>> progress in preemptable sections of code to be extremely slow.
>>>
>>> This reminds me that I have had a similar issue when doing OMAP5432 enablement.
>>> IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
>>> is not actually used during platform initialisation in linux kernel. Maybe
>>> it would be a good idea to have a check whether your SoC has the same
>>> implementation?
>>
>> How did you resolve it on OMAP5432?
>
> Well, it didn't make much trouble on the Xen side at that time. (I just have
> had some vague memory on that, so may not be accurate.) What should be taken
> care is it would effect dom0 linux initialization (e.g., should made a 1:1
> mapping for dom0 to let it initialise memory-mapped register correctly).
>
> Cheers,
>
> Baozi.
>
>
>
>

     The SoC I'm actually using is a DRA72 chip, which is similar, but 
not exactly the same as the OMAP5432. There are several external timers 
on this chip, but the timer controlled by the CNTFRQ is on the ARM 
Cortex core itself. The timer is used by Linux kernel during system 
initialization.

     On my SoC, there is special ROM code that performs the initial 
system bootup, and passes control to uBoot initially. This code runs in 
Secure mode, and so, to make changes to registers such as CNTFRQ, I have 
to make calls to their API via SMC calls. For whatever reason, they 
didn't setup CNTFRQ properly whenever they booted the system, so I had 
to make an SMC call to properly initialize the register.

    Once I changed the CNTFRQ register, my boot stopped having issues, 
and I was able to successfully jump to the kernel.

Brandon


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 18 14:31:17 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2015 14:31:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5apb-0001YG-2R; Thu, 18 Jun 2015 14:30:15 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <b-perez1@ti.com>) id 1Z5apZ-0001Xx-Lc
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 14:30:13 +0000
Received: from [85.158.139.211] by server-2.bemta-5.messagelabs.com id
	26/82-31304-3F5D2855; Thu, 18 Jun 2015 14:30:11 +0000
X-Env-Sender: b-perez1@ti.com
X-Msg-Ref: server-9.tower-206.messagelabs.com!1434637810!15227393!1
X-Originating-IP: [198.47.26.152]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMTk4LjQ3LjI2LjE1MiA9PiAxNjQ5NzY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22301 invoked from network); 18 Jun 2015 14:30:11 -0000
Received: from comal.ext.ti.com (HELO comal.ext.ti.com) (198.47.26.152)
	by server-9.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 18 Jun 2015 14:30:11 -0000
Received: from dlelxv90.itg.ti.com ([172.17.2.17])
	by comal.ext.ti.com (8.13.7/8.13.7) with ESMTP id t5IEU17C016829;
	Thu, 18 Jun 2015 09:30:01 -0500
Received: from DLEE70.ent.ti.com (dlee70.ent.ti.com [157.170.170.113])
	by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id t5IEU1p9004271;
	Thu, 18 Jun 2015 09:30:01 -0500
Received: from [128.247.93.131] (128.247.93.131) by DLEE70.ent.ti.com
	(157.170.170.113) with Microsoft SMTP Server id 14.3.224.2;
	Thu, 18 Jun 2015 09:30:00 -0500
Message-ID: <5582C7DD.4000006@ti.com>
Date: Thu, 18 Jun 2015 09:30:05 -0400
From: Brandon Perez <a0225893@ti.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Chen Baozi <cbz@baozis.org>, Julien Grall <julien.grall@citrix.com>
References: <558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
	<20150618110253.GA17506@cbz-thinkpad>
In-Reply-To: <20150618110253.GA17506@cbz-thinkpad>
X-Originating-IP: [128.247.93.131]
Cc: xen-users@lists.xen.org, Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On 06/18/2015 07:02 AM, Chen Baozi wrote:
> On Thu, Jun 18, 2015 at 10:41:14AM +0100, Julien Grall wrote:
>> Hi Chen,
>>
>> On 18/06/2015 02:33, Chen Baozi wrote:
>>
>>> On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
>>>> On 06/17/2015 03:15 PM, Julien Grall wrote:
>>>>> Hello Brandon,
>>>>>
>>>>> On 17/06/2015 15:30, Brandon Perez wrote:
>>>>>> The console and keyhandler are receiving 'q' and '0', but nothing is
>>>>>> happening/being printed out. I suspect this is because they are
>>>>>> scheduled as tasklets, and are never getting a chance to run.
>>>>>>
>>>>>> Opening the debugger, it seems like I'm stuck doing timer softirqs and
>>>>>> handling timer interrupts continually. I'm going to double check the
>>>>>> timer settings in my device tree.
>>>>>
>>>>> Looking to your first log [1], it seems that CNTFRQ is not set correctly:
>>>>>
>>>>> Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
>>>>>
>>>>> The CNTFRQ register should be set by the firmware/bootloader. Does the
>>>>> Linux kernel is booting on baremetal with the same firmware/bootloader?
>>>>>
>>>>> If yes, do you use the same device tree?
>>>>>
>>>>> Regards,
>>>>>
>>>>
>>>> Hi Julien,
>>>>
>>>>      Good catch! That seems to have been the issue. To answer your questions,
>>>> yes the kernel is booting with same firmware, bootloader, and device tree as
>>>> Xen.
>>>>
>>>>      The real issue actually stems from the uBoot code, which was not
>>>> properly setting the CNTFRQ register (which was indeed 0).
>>>>
>>>>      The CNTFRQ register being 0 lead to a whole slew of issues, the primary
>>>> of which being was that the timer interrupt ran extremely often, causing
>>>> progress in preemptable sections of code to be extremely slow.
>>>
>>> This reminds me that I have had a similar issue when doing OMAP5432 enablement.
>>> IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
>>> is not actually used during platform initialisation in linux kernel. Maybe
>>> it would be a good idea to have a check whether your SoC has the same
>>> implementation?
>>
>> How did you resolve it on OMAP5432?
>
> Well, it didn't make much trouble on the Xen side at that time. (I just have
> had some vague memory on that, so may not be accurate.) What should be taken
> care is it would effect dom0 linux initialization (e.g., should made a 1:1
> mapping for dom0 to let it initialise memory-mapped register correctly).
>
> Cheers,
>
> Baozi.
>
>
>
>

     The SoC I'm actually using is a DRA72 chip, which is similar, but 
not exactly the same as the OMAP5432. There are several external timers 
on this chip, but the timer controlled by the CNTFRQ is on the ARM 
Cortex core itself. The timer is used by Linux kernel during system 
initialization.

     On my SoC, there is special ROM code that performs the initial 
system bootup, and passes control to uBoot initially. This code runs in 
Secure mode, and so, to make changes to registers such as CNTFRQ, I have 
to make calls to their API via SMC calls. For whatever reason, they 
didn't setup CNTFRQ properly whenever they booted the system, so I had 
to make an SMC call to properly initialize the register.

    Once I changed the CNTFRQ register, my boot stopped having issues, 
and I was able to successfully jump to the kernel.

Brandon


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 04:59:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 04:59:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5oNw-00017S-Ez; Fri, 19 Jun 2015 04:58:36 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <andrew.stuart@supercoders.com.au>)
	id 1Z5oNu-00017N-4z
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 04:58:34 +0000
Received: from [85.158.137.68] by server-12.bemta-3.messagelabs.com id
	75/E8-02952-971A3855; Fri, 19 Jun 2015 04:58:33 +0000
X-Env-Sender: andrew.stuart@supercoders.com.au
X-Msg-Ref: server-9.tower-31.messagelabs.com!1434689911!14020286!1
X-Originating-IP: [54.215.13.78]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32644 invoked from network); 19 Jun 2015 04:58:32 -0000
Received: from mail.supercoders.com.au (HELO mail.supercoders.com.au)
	(54.215.13.78) by server-9.tower-31.messagelabs.com with SMTP;
	19 Jun 2015 04:58:32 -0000
Received: from [192.168.1.103] (CPE-124-188-46-221.dqzd1.win.bigpond.net.au
	[124.188.46.221])
	by mail.supercoders.com.au (Postfix) with ESMTPS id 1CD0A60202
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 04:58:30 +0000 (UTC)
From: Andrew Stuart <andrew.stuart@supercoders.com.au>
Message-Id: <A0EE25F0-113C-4268-8655-4E78E244CF4D@supercoders.com.au>
Date: Fri, 19 Jun 2015 14:58:28 +1000
To: xen-users@lists.xen.org
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
X-Mailer: Apple Mail (2.2098)
Subject: [Xen-users] Compiling from source on NetBSD fails
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Fri Jun 19 04:59:55 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 04:59:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5oNw-00017S-Ez; Fri, 19 Jun 2015 04:58:36 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <andrew.stuart@supercoders.com.au>)
	id 1Z5oNu-00017N-4z
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 04:58:34 +0000
Received: from [85.158.137.68] by server-12.bemta-3.messagelabs.com id
	75/E8-02952-971A3855; Fri, 19 Jun 2015 04:58:33 +0000
X-Env-Sender: andrew.stuart@supercoders.com.au
X-Msg-Ref: server-9.tower-31.messagelabs.com!1434689911!14020286!1
X-Originating-IP: [54.215.13.78]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32644 invoked from network); 19 Jun 2015 04:58:32 -0000
Received: from mail.supercoders.com.au (HELO mail.supercoders.com.au)
	(54.215.13.78) by server-9.tower-31.messagelabs.com with SMTP;
	19 Jun 2015 04:58:32 -0000
Received: from [192.168.1.103] (CPE-124-188-46-221.dqzd1.win.bigpond.net.au
	[124.188.46.221])
	by mail.supercoders.com.au (Postfix) with ESMTPS id 1CD0A60202
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 04:58:30 +0000 (UTC)
From: Andrew Stuart <andrew.stuart@supercoders.com.au>
Message-Id: <A0EE25F0-113C-4268-8655-4E78E244CF4D@supercoders.com.au>
Date: Fri, 19 Jun 2015 14:58:28 +1000
To: xen-users@lists.xen.org
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
X-Mailer: Apple Mail (2.2098)
Subject: [Xen-users] Compiling from source on NetBSD fails
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Fri Jun 19 05:09:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 05:09:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5oYE-0002AZ-O0; Fri, 19 Jun 2015 05:09:14 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <andrew.stuart@supercoders.com.au>)
	id 1Z5oYD-0002AT-GT
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 05:09:13 +0000
Received: from [85.158.137.68] by server-15.bemta-3.messagelabs.com id
	07/3D-28408-8F3A3855; Fri, 19 Jun 2015 05:09:12 +0000
X-Env-Sender: andrew.stuart@supercoders.com.au
X-Msg-Ref: server-14.tower-31.messagelabs.com!1434690551!15306987!1
X-Originating-IP: [54.215.13.78]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15819 invoked from network); 19 Jun 2015 05:09:12 -0000
Received: from mail.supercoders.com.au (HELO mail.supercoders.com.au)
	(54.215.13.78) by server-14.tower-31.messagelabs.com with SMTP;
	19 Jun 2015 05:09:12 -0000
Received: from [192.168.1.103] (CPE-124-188-46-221.dqzd1.win.bigpond.net.au
	[124.188.46.221])
	by mail.supercoders.com.au (Postfix) with ESMTPS id EE9E260202
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 05:09:10 +0000 (UTC)
From: Andrew Stuart <andrew.stuart@supercoders.com.au>
Message-Id: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
Date: Fri, 19 Jun 2015 15:09:08 +1000
To: xen-users@lists.xen.org
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
X-Mailer: Apple Mail (2.2098)
Subject: [Xen-users] NetBSD - how to get the public headers and libs for Xen?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

T24gdWJ1bnR1IGl04oCZcyBhcyBlYXN5IGFzCgphcHQtZ2V0IGluc3RhbGwgbGlieGVuLWRldgoK
QnV0IG5vdyBJIHdhbnQgdG8gY29tcGlsZSBzb21lIGNvZGUgb24gTmV0QlNEIHdoaWNoIGRlcGVu
ZHMgb24gdGhvc2Ugc2FtZSBoZWFkZXJzLgoKQ2FuIHNvbWVvbmUgcGxlYXNlIGRpcmVjdCBtZSB0
byB3aGVyZSBJIGNhbiBnZXQgdGhlIFhlbiBoZWFkZXJzIGFuZCBsaWJzIGZvciBOZXRCU0Q/Cgp0
aGFua3MKCmFzCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
Clhlbi11c2VycyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJzQGxpc3RzLnhlbi5vcmcKaHR0cDovL2xp
c3RzLnhlbi5vcmcveGVuLXVzZXJz

From xen-users-bounces@lists.xen.org Fri Jun 19 05:09:28 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 05:09:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5oYE-0002AZ-O0; Fri, 19 Jun 2015 05:09:14 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <andrew.stuart@supercoders.com.au>)
	id 1Z5oYD-0002AT-GT
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 05:09:13 +0000
Received: from [85.158.137.68] by server-15.bemta-3.messagelabs.com id
	07/3D-28408-8F3A3855; Fri, 19 Jun 2015 05:09:12 +0000
X-Env-Sender: andrew.stuart@supercoders.com.au
X-Msg-Ref: server-14.tower-31.messagelabs.com!1434690551!15306987!1
X-Originating-IP: [54.215.13.78]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15819 invoked from network); 19 Jun 2015 05:09:12 -0000
Received: from mail.supercoders.com.au (HELO mail.supercoders.com.au)
	(54.215.13.78) by server-14.tower-31.messagelabs.com with SMTP;
	19 Jun 2015 05:09:12 -0000
Received: from [192.168.1.103] (CPE-124-188-46-221.dqzd1.win.bigpond.net.au
	[124.188.46.221])
	by mail.supercoders.com.au (Postfix) with ESMTPS id EE9E260202
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 05:09:10 +0000 (UTC)
From: Andrew Stuart <andrew.stuart@supercoders.com.au>
Message-Id: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
Date: Fri, 19 Jun 2015 15:09:08 +1000
To: xen-users@lists.xen.org
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
X-Mailer: Apple Mail (2.2098)
Subject: [Xen-users] NetBSD - how to get the public headers and libs for Xen?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

T24gdWJ1bnR1IGl04oCZcyBhcyBlYXN5IGFzCgphcHQtZ2V0IGluc3RhbGwgbGlieGVuLWRldgoK
QnV0IG5vdyBJIHdhbnQgdG8gY29tcGlsZSBzb21lIGNvZGUgb24gTmV0QlNEIHdoaWNoIGRlcGVu
ZHMgb24gdGhvc2Ugc2FtZSBoZWFkZXJzLgoKQ2FuIHNvbWVvbmUgcGxlYXNlIGRpcmVjdCBtZSB0
byB3aGVyZSBJIGNhbiBnZXQgdGhlIFhlbiBoZWFkZXJzIGFuZCBsaWJzIGZvciBOZXRCU0Q/Cgp0
aGFua3MKCmFzCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
Clhlbi11c2VycyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJzQGxpc3RzLnhlbi5vcmcKaHR0cDovL2xp
c3RzLnhlbi5vcmcveGVuLXVzZXJz

From xen-users-bounces@lists.xen.org Fri Jun 19 08:06:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 08:06:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5rJ6-00062G-Lv; Fri, 19 Jun 2015 08:05:48 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6055698ae=Ian.Campbell@citrix.com>)
	id 1Z5rJ5-00062A-Q5
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 08:05:47 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	57/05-13517-B5DC3855; Fri, 19 Jun 2015 08:05:47 +0000
X-Env-Sender: prvs=6055698ae=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-31.messagelabs.com!1434701145!14069615!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 9238 invoked from network); 19 Jun 2015 08:05:46 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	19 Jun 2015 08:05:46 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427760000"; d="scan'208";a="273645916"
Message-ID: <1434701141.3342.131.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Andrew Stuart <andrew.stuart@supercoders.com.au>
Date: Fri, 19 Jun 2015 09:05:41 +0100
In-Reply-To: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
References: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
Organization: Citrix
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] NetBSD - how to get the public headers and libs for
 Xen?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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=

From xen-users-bounces@lists.xen.org Fri Jun 19 08:06:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 08:06:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5rJ6-00062G-Lv; Fri, 19 Jun 2015 08:05:48 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6055698ae=Ian.Campbell@citrix.com>)
	id 1Z5rJ5-00062A-Q5
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 08:05:47 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	57/05-13517-B5DC3855; Fri, 19 Jun 2015 08:05:47 +0000
X-Env-Sender: prvs=6055698ae=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-31.messagelabs.com!1434701145!14069615!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 9238 invoked from network); 19 Jun 2015 08:05:46 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	19 Jun 2015 08:05:46 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427760000"; d="scan'208";a="273645916"
Message-ID: <1434701141.3342.131.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Andrew Stuart <andrew.stuart@supercoders.com.au>
Date: Fri, 19 Jun 2015 09:05:41 +0100
In-Reply-To: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
References: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
Organization: Citrix
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] NetBSD - how to get the public headers and libs for
 Xen?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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=

From xen-users-bounces@lists.xen.org Fri Jun 19 08:24:43 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 08:24:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5rb5-0007XS-Fi; Fri, 19 Jun 2015 08:24:23 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6054e4102=roger.pau@citrix.com>)
	id 1Z5rb3-0007XN-Vm
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 08:24:22 +0000
Received: from [193.109.254.147] by server-2.bemta-14.messagelabs.com id
	C2/7B-31258-5B1D3855; Fri, 19 Jun 2015 08:24:21 +0000
X-Env-Sender: prvs=6054e4102=roger.pau@citrix.com
X-Msg-Ref: server-14.tower-27.messagelabs.com!1434702259!24814552!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1236 invoked from network); 19 Jun 2015 08:24:20 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-14.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	19 Jun 2015 08:24:20 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427760000"; d="scan'208";a="273649541"
Message-ID: <5583D1B0.1030206@citrix.com>
Date: Fri, 19 Jun 2015 10:24:16 +0200
From: =?UTF-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Andrew Stuart <andrew.stuart@supercoders.com.au>, <xen-users@lists.xen.org>
References: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
In-Reply-To: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
Content-Length: 904
X-DLP: MIA2
Subject: Re: [Xen-users] NetBSD - how to get the public headers and libs for
 Xen?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

RWwgMTkvMDYvMTUgYSBsZXMgNy4wOSwgQW5kcmV3IFN0dWFydCBoYSBlc2NyaXQ6Cj4gT24gdWJ1
bnR1IGl04oCZcyBhcyBlYXN5IGFzCj4gCj4gYXB0LWdldCBpbnN0YWxsIGxpYnhlbi1kZXYKPiAK
PiBCdXQgbm93IEkgd2FudCB0byBjb21waWxlIHNvbWUgY29kZSBvbiBOZXRCU0Qgd2hpY2ggZGVw
ZW5kcyBvbiB0aG9zZSBzYW1lIGhlYWRlcnMuCj4gCj4gQ2FuIHNvbWVvbmUgcGxlYXNlIGRpcmVj
dCBtZSB0byB3aGVyZSBJIGNhbiBnZXQgdGhlIFhlbiBoZWFkZXJzIGFuZCBsaWJzIGZvciBOZXRC
U0Q/CgpZb3Ugc2hvdWxkIGdldCB0aGUgaGVhZGVycyB3aGVuIGluc3RhbGxpbmcgYW55IG9mIHRo
ZSBzeXN1dGlscy94ZW50b29scyoKcG9ydHMgKEkgd291bGQgcmVjb21tZW5kIHhlbnRvb2xzNDUp
OgoKaHR0cDovL2N2c3dlYi5uZXRic2Qub3JnL2JzZHdlYi5jZ2kvfmNoZWNrb3V0fi9wa2dzcmMv
c3lzdXRpbHMveGVudG9vbHM0NS9QTElTVD9yZXY9MS4xJmNvbnRlbnQtdHlwZT10ZXh0L3BsYWlu
Jm9ubHlfd2l0aF90YWc9TUFJTgoKUm9nZXIuCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlz
dHMueGVuLm9yZwpodHRwOi8vbGlzdHMueGVuLm9yZy94ZW4tdXNlcnM=

From xen-users-bounces@lists.xen.org Fri Jun 19 08:24:43 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 08:24:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5rb5-0007XS-Fi; Fri, 19 Jun 2015 08:24:23 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6054e4102=roger.pau@citrix.com>)
	id 1Z5rb3-0007XN-Vm
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 08:24:22 +0000
Received: from [193.109.254.147] by server-2.bemta-14.messagelabs.com id
	C2/7B-31258-5B1D3855; Fri, 19 Jun 2015 08:24:21 +0000
X-Env-Sender: prvs=6054e4102=roger.pau@citrix.com
X-Msg-Ref: server-14.tower-27.messagelabs.com!1434702259!24814552!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1236 invoked from network); 19 Jun 2015 08:24:20 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-14.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	19 Jun 2015 08:24:20 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427760000"; d="scan'208";a="273649541"
Message-ID: <5583D1B0.1030206@citrix.com>
Date: Fri, 19 Jun 2015 10:24:16 +0200
From: =?UTF-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= <roger.pau@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Andrew Stuart <andrew.stuart@supercoders.com.au>, <xen-users@lists.xen.org>
References: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
In-Reply-To: <7EC832B4-1CD3-46A2-B8D0-100E284C23ED@supercoders.com.au>
Content-Length: 904
X-DLP: MIA2
Subject: Re: [Xen-users] NetBSD - how to get the public headers and libs for
 Xen?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Fri Jun 19 09:38:22 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 09:38:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5sjx-00052N-KH; Fri, 19 Jun 2015 09:37:37 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6055698ae=Ian.Campbell@citrix.com>)
	id 1Z5sjv-000524-KZ
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 09:37:35 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	13/0F-03895-ED2E3855; Fri, 19 Jun 2015 09:37:34 +0000
X-Env-Sender: prvs=6055698ae=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-31.messagelabs.com!1434706653!14107417!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2797 invoked from network); 19 Jun 2015 09:37:34 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	19 Jun 2015 09:37:34 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427760000"; d="scan'208";a="273663871"
Message-ID: <1434706650.28264.60.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Andrew Stuart <andrew.stuart@supercoders.com.au>
Date: Fri, 19 Jun 2015 10:37:30 +0100
In-Reply-To: <A0EE25F0-113C-4268-8655-4E78E244CF4D@supercoders.com.au>
References: <A0EE25F0-113C-4268-8655-4E78E244CF4D@supercoders.com.au>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Compiling from source on NetBSD fails
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-19 at 14:58 +1000, Andrew Stuart wrote:

> Can anyone please suggest what might be wrong?
> [...]
> gcc  -DPIC -O1 -fno-omit-frame-pointer -m64 -g -fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes -Wdeclaration-after-statement   -O0 -g3 -D__XEN_TOOLS__ -MMD -MF .xs.opic.d -fno-optimize-sibling-calls  -Werror -I. -I/root/xen/tools/xenstore/../../tools/ -I./include -I/root/xen/tools/xenstore/../../tools/libxc/include -I/root/xen/tools/xenstore/../../tools/include -DXEN_LIB_STORED="\"/var/lib/xenstored\"" -fno-optimize-sibling-calls -DUSE_PTHREAD  -fPIC -c -o xs.opic xs.c  -I/usr/pkg/include
> xs.c: In function 'xs_watch':
> xs.c:742:40: error: 'PTHREAD_STACK_MIN' undeclared (first use in this function)

I think xs.c needs to include <limits.h> to get this definition but it
is only including <pthreads.h> right now. I suppose on Linux and FreeBSD
(which I know work) it gets included incidentally somewhere else along
the lines.

I conclude this because although
http://pubs.opengroup.org/onlinepubs/009695399/functions/pthread_attr_setstacksize.html
mentions PTHREAD_STACK_MIN it doesn't actually mention that including
<pthread.h> will define it, but links to <limits.h>
http://pubs.opengroup.org/onlinepubs/009695399/basedefs/limits.h.html
which does.

So, please could you try adding a #include <limits.h> to
tools/xenstore/xs.c and report back, or even better if it works submit
it as a patch (http://wiki.xen.org/wiki/Submitting_Xen_Patches gives
some guidance on the process).

Thanks,
Ian.


> xs.c:742:40: note: each undeclared identifier is reported only once for each function it appears in
> /root/xen/tools/xenstore/../../tools/Rules.mk:104: recipe for target 'xs.opic' failed
> gmake[3]: *** [xs.opic] Error 1
> gmake[3]: Leaving directory '/root/xen/tools/xenstore'
> /root/xen/tools/../tools/Rules.mk:123: recipe for target 'subdir-install-xenstore' failed
> gmake[2]: *** [subdir-install-xenstore] Error 2
> gmake[2]: Leaving directory '/root/xen/tools'
> /root/xen/tools/../tools/Rules.mk:118: recipe for target 'subdirs-install' failed
> gmake[1]: *** [subdirs-install] Error 2
> gmake[1]: Leaving directory '/root/xen/tools'
> Makefile:100: recipe for target 'install-tools' failed
> gmake: *** [install-tools] Error 2
> -bash-4.3#
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 09:38:22 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 09:38:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5sjx-00052N-KH; Fri, 19 Jun 2015 09:37:37 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6055698ae=Ian.Campbell@citrix.com>)
	id 1Z5sjv-000524-KZ
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 09:37:35 +0000
Received: from [85.158.137.68] by server-10.bemta-3.messagelabs.com id
	13/0F-03895-ED2E3855; Fri, 19 Jun 2015 09:37:34 +0000
X-Env-Sender: prvs=6055698ae=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-31.messagelabs.com!1434706653!14107417!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2797 invoked from network); 19 Jun 2015 09:37:34 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-9.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	19 Jun 2015 09:37:34 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427760000"; d="scan'208";a="273663871"
Message-ID: <1434706650.28264.60.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Andrew Stuart <andrew.stuart@supercoders.com.au>
Date: Fri, 19 Jun 2015 10:37:30 +0100
In-Reply-To: <A0EE25F0-113C-4268-8655-4E78E244CF4D@supercoders.com.au>
References: <A0EE25F0-113C-4268-8655-4E78E244CF4D@supercoders.com.au>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Compiling from source on NetBSD fails
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Fri, 2015-06-19 at 14:58 +1000, Andrew Stuart wrote:

> Can anyone please suggest what might be wrong?
> [...]
> gcc  -DPIC -O1 -fno-omit-frame-pointer -m64 -g -fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes -Wdeclaration-after-statement   -O0 -g3 -D__XEN_TOOLS__ -MMD -MF .xs.opic.d -fno-optimize-sibling-calls  -Werror -I. -I/root/xen/tools/xenstore/../../tools/ -I./include -I/root/xen/tools/xenstore/../../tools/libxc/include -I/root/xen/tools/xenstore/../../tools/include -DXEN_LIB_STORED="\"/var/lib/xenstored\"" -fno-optimize-sibling-calls -DUSE_PTHREAD  -fPIC -c -o xs.opic xs.c  -I/usr/pkg/include
> xs.c: In function 'xs_watch':
> xs.c:742:40: error: 'PTHREAD_STACK_MIN' undeclared (first use in this function)

I think xs.c needs to include <limits.h> to get this definition but it
is only including <pthreads.h> right now. I suppose on Linux and FreeBSD
(which I know work) it gets included incidentally somewhere else along
the lines.

I conclude this because although
http://pubs.opengroup.org/onlinepubs/009695399/functions/pthread_attr_setstacksize.html
mentions PTHREAD_STACK_MIN it doesn't actually mention that including
<pthread.h> will define it, but links to <limits.h>
http://pubs.opengroup.org/onlinepubs/009695399/basedefs/limits.h.html
which does.

So, please could you try adding a #include <limits.h> to
tools/xenstore/xs.c and report back, or even better if it works submit
it as a patch (http://wiki.xen.org/wiki/Submitting_Xen_Patches gives
some guidance on the process).

Thanks,
Ian.


> xs.c:742:40: note: each undeclared identifier is reported only once for each function it appears in
> /root/xen/tools/xenstore/../../tools/Rules.mk:104: recipe for target 'xs.opic' failed
> gmake[3]: *** [xs.opic] Error 1
> gmake[3]: Leaving directory '/root/xen/tools/xenstore'
> /root/xen/tools/../tools/Rules.mk:123: recipe for target 'subdir-install-xenstore' failed
> gmake[2]: *** [subdir-install-xenstore] Error 2
> gmake[2]: Leaving directory '/root/xen/tools'
> /root/xen/tools/../tools/Rules.mk:118: recipe for target 'subdirs-install' failed
> gmake[1]: *** [subdirs-install] Error 2
> gmake[1]: Leaving directory '/root/xen/tools'
> Makefile:100: recipe for target 'install-tools' failed
> gmake: *** [install-tools] Error 2
> -bash-4.3#
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 13:10:45 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 13:10:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5w3H-0000dz-Jv; Fri, 19 Jun 2015 13:09:47 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <cbz@baozis.org>) id 1Z5XaE-0007IX-2t
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 11:02:10 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	B0/D7-08244-135A2855; Thu, 18 Jun 2015 11:02:09 +0000
X-Env-Sender: cbz@baozis.org
X-Msg-Ref: server-13.tower-206.messagelabs.com!1434625327!15190568!1
X-Originating-IP: [192.241.220.20]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22729 invoked from network); 18 Jun 2015 11:02:08 -0000
Received: from baozis.org (HELO baozis.org) (192.241.220.20)
	by server-13.tower-206.messagelabs.com with DHE-RSA-AES128-SHA
	encrypted SMTP; 18 Jun 2015 11:02:08 -0000
Received: from [43.250.200.27] (helo=cbz-thinkpad)
	by baozis.org with esmtpsa (TLS1.2:RSA_AES_128_CBC_SHA1:128)
	(Exim 4.82) (envelope-from <cbz@baozis.org>)
	id 1Z5Xa8-0007Nc-J8; Thu, 18 Jun 2015 12:02:05 +0100
Received: from cbz by cbz-thinkpad with local (Exim 4.84)
	(envelope-from <cbz@baozis.org>)
	id 1Z5Xb5-0004ip-6H; Thu, 18 Jun 2015 19:03:03 +0800
Date: Thu, 18 Jun 2015 19:02:53 +0800
From: Chen Baozi <cbz@baozis.org>
To: Julien Grall <julien.grall@citrix.com>
Message-ID: <20150618110253.GA17506@cbz-thinkpad>
References: <558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <5582923A.3030900@citrix.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Mailman-Approved-At: Fri, 19 Jun 2015 13:09:46 +0000
Cc: xen-users@lists.xen.org, Brandon Perez <a0225893@ti.com>,
	Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, Jun 18, 2015 at 10:41:14AM +0100, Julien Grall wrote:
> Hi Chen,
> 
> On 18/06/2015 02:33, Chen Baozi wrote:
> 
> >On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
> >>On 06/17/2015 03:15 PM, Julien Grall wrote:
> >>>Hello Brandon,
> >>>
> >>>On 17/06/2015 15:30, Brandon Perez wrote:
> >>>>The console and keyhandler are receiving 'q' and '0', but nothing is
> >>>>happening/being printed out. I suspect this is because they are
> >>>>scheduled as tasklets, and are never getting a chance to run.
> >>>>
> >>>>Opening the debugger, it seems like I'm stuck doing timer softirqs and
> >>>>handling timer interrupts continually. I'm going to double check the
> >>>>timer settings in my device tree.
> >>>
> >>>Looking to your first log [1], it seems that CNTFRQ is not set correctly:
> >>>
> >>>Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
> >>>
> >>>The CNTFRQ register should be set by the firmware/bootloader. Does the
> >>>Linux kernel is booting on baremetal with the same firmware/bootloader?
> >>>
> >>>If yes, do you use the same device tree?
> >>>
> >>>Regards,
> >>>
> >>
> >>Hi Julien,
> >>
> >>     Good catch! That seems to have been the issue. To answer your questions,
> >>yes the kernel is booting with same firmware, bootloader, and device tree as
> >>Xen.
> >>
> >>     The real issue actually stems from the uBoot code, which was not
> >>properly setting the CNTFRQ register (which was indeed 0).
> >>
> >>     The CNTFRQ register being 0 lead to a whole slew of issues, the primary
> >>of which being was that the timer interrupt ran extremely often, causing
> >>progress in preemptable sections of code to be extremely slow.
> >
> >This reminds me that I have had a similar issue when doing OMAP5432 enablement.
> >IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
> >is not actually used during platform initialisation in linux kernel. Maybe
> >it would be a good idea to have a check whether your SoC has the same
> >implementation?
> 
> How did you resolve it on OMAP5432?

Well, it didn't make much trouble on the Xen side at that time. (I just have
had some vague memory on that, so may not be accurate.) What should be taken
care is it would effect dom0 linux initialization (e.g., should made a 1:1
mapping for dom0 to let it initialise memory-mapped register correctly).

Cheers,

Baozi.





_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 13:10:45 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 13:10:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5w3H-0000dz-Jv; Fri, 19 Jun 2015 13:09:47 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <cbz@baozis.org>) id 1Z5XaE-0007IX-2t
	for xen-users@lists.xen.org; Thu, 18 Jun 2015 11:02:10 +0000
Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id
	B0/D7-08244-135A2855; Thu, 18 Jun 2015 11:02:09 +0000
X-Env-Sender: cbz@baozis.org
X-Msg-Ref: server-13.tower-206.messagelabs.com!1434625327!15190568!1
X-Originating-IP: [192.241.220.20]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22729 invoked from network); 18 Jun 2015 11:02:08 -0000
Received: from baozis.org (HELO baozis.org) (192.241.220.20)
	by server-13.tower-206.messagelabs.com with DHE-RSA-AES128-SHA
	encrypted SMTP; 18 Jun 2015 11:02:08 -0000
Received: from [43.250.200.27] (helo=cbz-thinkpad)
	by baozis.org with esmtpsa (TLS1.2:RSA_AES_128_CBC_SHA1:128)
	(Exim 4.82) (envelope-from <cbz@baozis.org>)
	id 1Z5Xa8-0007Nc-J8; Thu, 18 Jun 2015 12:02:05 +0100
Received: from cbz by cbz-thinkpad with local (Exim 4.84)
	(envelope-from <cbz@baozis.org>)
	id 1Z5Xb5-0004ip-6H; Thu, 18 Jun 2015 19:03:03 +0800
Date: Thu, 18 Jun 2015 19:02:53 +0800
From: Chen Baozi <cbz@baozis.org>
To: Julien Grall <julien.grall@citrix.com>
Message-ID: <20150618110253.GA17506@cbz-thinkpad>
References: <558066FD.8050104@ti.com> <1434530654.13744.249.camel@citrix.com>
	<558171DF.4050201@ti.com> <55817B1B.5020200@ti.com>
	<1434553477.28264.6.camel@citrix.com> <5581847A.8040605@ti.com>
	<5581C74A.3030800@citrix.com> <5581D1E6.9030402@ti.com>
	<20150618013300.GA21320@cbz-thinkpad> <5582923A.3030900@citrix.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <5582923A.3030900@citrix.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Mailman-Approved-At: Fri, 19 Jun 2015 13:09:46 +0000
Cc: xen-users@lists.xen.org, Brandon Perez <a0225893@ti.com>,
	Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [Xen-users] [Xen-Users] Issues Booting Dom0 on ARM Cortex A15
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Thu, Jun 18, 2015 at 10:41:14AM +0100, Julien Grall wrote:
> Hi Chen,
> 
> On 18/06/2015 02:33, Chen Baozi wrote:
> 
> >On Wed, Jun 17, 2015 at 04:00:38PM -0400, Brandon Perez wrote:
> >>On 06/17/2015 03:15 PM, Julien Grall wrote:
> >>>Hello Brandon,
> >>>
> >>>On 17/06/2015 15:30, Brandon Perez wrote:
> >>>>The console and keyhandler are receiving 'q' and '0', but nothing is
> >>>>happening/being printed out. I suspect this is because they are
> >>>>scheduled as tasklets, and are never getting a chance to run.
> >>>>
> >>>>Opening the debugger, it seems like I'm stuck doing timer softirqs and
> >>>>handling timer interrupts continually. I'm going to double check the
> >>>>timer settings in my device tree.
> >>>
> >>>Looking to your first log [1], it seems that CNTFRQ is not set correctly:
> >>>
> >>>Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 0 KHz
> >>>
> >>>The CNTFRQ register should be set by the firmware/bootloader. Does the
> >>>Linux kernel is booting on baremetal with the same firmware/bootloader?
> >>>
> >>>If yes, do you use the same device tree?
> >>>
> >>>Regards,
> >>>
> >>
> >>Hi Julien,
> >>
> >>     Good catch! That seems to have been the issue. To answer your questions,
> >>yes the kernel is booting with same firmware, bootloader, and device tree as
> >>Xen.
> >>
> >>     The real issue actually stems from the uBoot code, which was not
> >>properly setting the CNTFRQ register (which was indeed 0).
> >>
> >>     The CNTFRQ register being 0 lead to a whole slew of issues, the primary
> >>of which being was that the timer interrupt ran extremely often, causing
> >>progress in preemptable sections of code to be extremely slow.
> >
> >This reminds me that I have had a similar issue when doing OMAP5432 enablement.
> >IIRC, OMAP5 uses a different platform register for system timer, and CNTFRQ
> >is not actually used during platform initialisation in linux kernel. Maybe
> >it would be a good idea to have a check whether your SoC has the same
> >implementation?
> 
> How did you resolve it on OMAP5432?

Well, it didn't make much trouble on the Xen side at that time. (I just have
had some vague memory on that, so may not be accurate.) What should be taken
care is it would effect dom0 linux initialization (e.g., should made a 1:1
mapping for dom0 to let it initialise memory-mapped register correctly).

Cheers,

Baozi.





_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 14:04:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 14:04:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5wtN-0005DG-9T; Fri, 19 Jun 2015 14:03:37 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z5wtM-0005DA-5r
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 14:03:36 +0000
Received: from [193.109.254.147] by server-11.bemta-14.messagelabs.com id
	C9/15-30658-73124855; Fri, 19 Jun 2015 14:03:35 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1434722614!24911692!1
X-Originating-IP: [64.12.143.81]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 25634 invoked from network); 19 Jun 2015 14:03:34 -0000
Received: from omr-m07.mx.aol.com (HELO omr-m07.mx.aol.com) (64.12.143.81)
	by server-2.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 19 Jun 2015 14:03:34 -0000
Received: from mtaout-maa01.mx.aol.com (mtaout-maa01.mx.aol.com
	[172.26.222.141])
	by omr-m07.mx.aol.com (Outbound Mail Relay) with ESMTP id D92DC700362E2
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 10:03:33 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-maa01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id 2C49A38000088
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 10:03:33 -0400 (EDT)
Message-ID: <1434722648.6996.37.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Fri, 19 Jun 2015 15:04:08 +0100
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434722613;
	bh=ZbYILqkT2Cbwhc00yBi1cxsDGPnItNqPPYZjTt0pupM=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=miKvB/LGfscidSlnRPxLq+tlhXPLfvW3LLtdMpepnm9zTwXaZggoJH3RbDuRZXFvE
	D+dz/ISPziPVor+vqLpA2EhXcbh5P5RDD5XjXAHN7i+4ioh30EXeYw59jh6CtuevZl
	OKyTr27yvIVij92RFVwE4O1p5MITf5e1wYYRHugE=
x-aol-sid: 3039ac1ade8d55842135287f
X-AOL-IP: 185.25.64.249
Subject: [Xen-users] USB Passthrough XEN 4.4
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi all,

I am running XEN 4.4 and I am using the tool 'xl' to do all the needed
common operations like start/stop/reboot virtual machines; I'd need to
setup an USB passthrough and I am reading the related instructions from
the page :

http://wiki.xenproject.org/wiki/Xen_USB_Passthrough

Following the chapter 'Host USB in xl' it looks like the only support
available is 'emulated USB', which as stated earlier in the same page is
available only for HVM guest, I am pretty sure I am running a PV guest.

Does that mean I can't configure USB passthrough on my system ?

I have given those instructions a go but I can't see any USB
devices/controller on my guest system.

Instead I get an unable to initialize libusb: -99

am I obliged to go for a PCI passthrough ?

Thanks,
Pietro





_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 14:04:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 14:04:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5wtN-0005DG-9T; Fri, 19 Jun 2015 14:03:37 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pulsarpietro@aol.com>) id 1Z5wtM-0005DA-5r
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 14:03:36 +0000
Received: from [193.109.254.147] by server-11.bemta-14.messagelabs.com id
	C9/15-30658-73124855; Fri, 19 Jun 2015 14:03:35 +0000
X-Env-Sender: pulsarpietro@aol.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1434722614!24911692!1
X-Originating-IP: [64.12.143.81]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 25634 invoked from network); 19 Jun 2015 14:03:34 -0000
Received: from omr-m07.mx.aol.com (HELO omr-m07.mx.aol.com) (64.12.143.81)
	by server-2.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 19 Jun 2015 14:03:34 -0000
Received: from mtaout-maa01.mx.aol.com (mtaout-maa01.mx.aol.com
	[172.26.222.141])
	by omr-m07.mx.aol.com (Outbound Mail Relay) with ESMTP id D92DC700362E2
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 10:03:33 -0400 (EDT)
Received: from pietro-debian64.eng.citrite.net (unknown [185.25.64.249])
	(using TLSv1 with cipher AES128-SHA (128/128 bits))
	(No client certificate requested)
	by mtaout-maa01.mx.aol.com (MUA/Third Party Client Interface) with
	ESMTPSA id 2C49A38000088
	for <xen-users@lists.xen.org>; Fri, 19 Jun 2015 10:03:33 -0400 (EDT)
Message-ID: <1434722648.6996.37.camel@aol.com>
From: pietrop <pulsarpietro@aol.com>
To: xen-users@lists.xen.org
Date: Fri, 19 Jun 2015 15:04:08 +0100
X-Mailer: Evolution 3.12.9-1+b1 
Mime-Version: 1.0
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com;
	s=20140625; t=1434722613;
	bh=ZbYILqkT2Cbwhc00yBi1cxsDGPnItNqPPYZjTt0pupM=;
	h=From:To:Subject:Message-ID:Date:Mime-Version:Content-Type;
	b=miKvB/LGfscidSlnRPxLq+tlhXPLfvW3LLtdMpepnm9zTwXaZggoJH3RbDuRZXFvE
	D+dz/ISPziPVor+vqLpA2EhXcbh5P5RDD5XjXAHN7i+4ioh30EXeYw59jh6CtuevZl
	OKyTr27yvIVij92RFVwE4O1p5MITf5e1wYYRHugE=
x-aol-sid: 3039ac1ade8d55842135287f
X-AOL-IP: 185.25.64.249
Subject: [Xen-users] USB Passthrough XEN 4.4
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi all,

I am running XEN 4.4 and I am using the tool 'xl' to do all the needed
common operations like start/stop/reboot virtual machines; I'd need to
setup an USB passthrough and I am reading the related instructions from
the page :

http://wiki.xenproject.org/wiki/Xen_USB_Passthrough

Following the chapter 'Host USB in xl' it looks like the only support
available is 'emulated USB', which as stated earlier in the same page is
available only for HVM guest, I am pretty sure I am running a PV guest.

Does that mean I can't configure USB passthrough on my system ?

I have given those instructions a go but I can't see any USB
devices/controller on my guest system.

Instead I get an unable to initialize libusb: -99

am I obliged to go for a PCI passthrough ?

Thanks,
Pietro





_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 14:05:51 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 14:05:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5wvT-0005Ie-UE; Fri, 19 Jun 2015 14:05:47 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Rajkumar.Bhargodeo@symphonyteleca.com>)
	id 1Z5wvT-0005IX-96
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 14:05:47 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	D7/C2-13047-AB124855; Fri, 19 Jun 2015 14:05:46 +0000
X-Env-Sender: Rajkumar.Bhargodeo@symphonyteleca.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1434722740!24916843!1
X-Originating-IP: [203.82.250.137]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14033 invoked from network); 19 Jun 2015 14:05:42 -0000
Received: from inpu00inbound.symphonyteleca.com (HELO
	inpu00inbound.symphonyteleca.com) (203.82.250.137)
	by server-9.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 19 Jun 2015 14:05:42 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427740200"; 
   d="scan'208";a="1833895"
Received: from inpu00exv005.symphonyteleca.com ([10.55.2.162])
	by inpu00outbound.symphonyteleca.com with ESMTP/TLS/AES128-SHA;
	19 Jun 2015 19:35:39 +0530
Received: from INPU00EXP001.Symphonyteleca.com ([fe80::1497:6df0:36d3:d14a])
	by INPU00EXV005.symphonyteleca.com ([::1]) with mapi id 14.03.0195.001;
	Fri, 19 Jun 2015 19:35:39 +0530
From: Rajkumar Bhargodeo <Rajkumar.Bhargodeo@Symphonyteleca.com>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Thread-Topic: Win 2k3 VM restarting continuously.
Thread-Index: AdCqmQRqGeCMWNlQQaibZ+AO8TCNpQ==
Date: Fri, 19 Jun 2015 14:05:37 +0000
Message-ID: <AA5094591B10A6478DD8149CB26237DD316304BB@INPU00EXP001.symphonyteleca.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.52.35.55]
x-exclaimer-md-config: 2016ff6d-6ae2-4638-9324-ce0c4b8647b0
MIME-Version: 1.0
Subject: [Xen-users] Win 2k3 VM restarting continuously.
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

We have a dom0 system running Xen v4.1.

There are two virtual machines running on this platform one is a windows 2003 server and other is a RHEL server.

We have installed PV drivers(0.9.11.13) on Windows server.
Issue is that Windows server keeps restarting every 30 Min with the event "unexpected shutdown occurred". 
A dump is created C:\windows\memory.dmp when system restarts. When I open the dump in WinDbg and execute command !analyze -v output as below is produced. I have the dump if someone wants to have a look at it I can send it to him/her. When we attempted to install 0.11.0.373 version of drivers system was not coming up and entire setup had to be re-installed.

I would appreciate any help or guidance in resolving this issue.



Command output:
================================================================================

ADDITIONAL_DEBUG_TEXT:  
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

MODULE_NAME: xennet

FAULTING_MODULE: e0800000 nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4954cba2

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid

FAULTING_IP: 
nt!RtlUnwind+d9b
e0878abb cc              int     3

TRAP_FRAME:  e089a0a0 -- (.trap 0xffffffffe089a0a0) ErrCode = 00000000
eax=00000002 ebx=e089a188 ecx=e0873810 edx=00000056 esi=e0873811 edi=00000002
eip=e0878abc esp=e089a114 ebp=e089a128 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00000206
nt!RtlUnwind+0xd9c:
e0878abc 5b              pop     ebx
Resetting default scope

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x8E

CURRENT_IRQL:  0

ASSERT_DATA:  total_length <= xi->config_mtu + XN_HDR_SIZE

ASSERT_FILE_LOCATION:  c:\projects\win-pvdrivers.hg\xennet\xennet_rx.c at Line 744

LAST_CONTROL_TRANSFER:  from e082d820 to e0827c83

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
e089a128 e0878b31 00000002 e0873810 00000056 nt!RtlUnwind+0xd9c
e089a144 e08720bc e089a158 e089a160 f50a0600 nt!RtlUnwind+0xe11
e089a168 e08738ec e0873810 e089a188 00000002 nt!DbgPrompt+0x3c e089a45c f509acf9 f50a0600 f50a0520 000002e8 nt!RtlAssert+0x5c
e089a5a8 e0832110 fd416984 fd413000 00000000 xennet+0x6cf9
e089a600 e088de4f 00000000 0000000e 00000000 nt!ZwYieldExecution+0x248c
e089db40 00000000 e089db48 e089db48 e089db50 nt!KiDispatchInterrupt+0x32f


STACK_COMMAND:  .trap 0xffffffffe089a0a0 ; kb

FOLLOWUP_IP: 
xennet+6cf9
f509acf9 c785ccfeffff00000000 mov dword ptr [ebp-134h],0

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  xennet+6cf9

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  xennet.sys

FAILURE_BUCKET_ID:  0x8E_xennet+6cf9

BUCKET_ID:  0x8E_xennet+6cf9

Followup: MachineOwner


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 19 14:05:51 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 19 Jun 2015 14:05:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z5wvT-0005Ie-UE; Fri, 19 Jun 2015 14:05:47 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Rajkumar.Bhargodeo@symphonyteleca.com>)
	id 1Z5wvT-0005IX-96
	for xen-users@lists.xen.org; Fri, 19 Jun 2015 14:05:47 +0000
Received: from [193.109.254.147] by server-6.bemta-14.messagelabs.com id
	D7/C2-13047-AB124855; Fri, 19 Jun 2015 14:05:46 +0000
X-Env-Sender: Rajkumar.Bhargodeo@symphonyteleca.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1434722740!24916843!1
X-Originating-IP: [203.82.250.137]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14033 invoked from network); 19 Jun 2015 14:05:42 -0000
Received: from inpu00inbound.symphonyteleca.com (HELO
	inpu00inbound.symphonyteleca.com) (203.82.250.137)
	by server-9.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 19 Jun 2015 14:05:42 -0000
X-IronPort-AV: E=Sophos;i="5.13,643,1427740200"; 
   d="scan'208";a="1833895"
Received: from inpu00exv005.symphonyteleca.com ([10.55.2.162])
	by inpu00outbound.symphonyteleca.com with ESMTP/TLS/AES128-SHA;
	19 Jun 2015 19:35:39 +0530
Received: from INPU00EXP001.Symphonyteleca.com ([fe80::1497:6df0:36d3:d14a])
	by INPU00EXV005.symphonyteleca.com ([::1]) with mapi id 14.03.0195.001;
	Fri, 19 Jun 2015 19:35:39 +0530
From: Rajkumar Bhargodeo <Rajkumar.Bhargodeo@Symphonyteleca.com>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Thread-Topic: Win 2k3 VM restarting continuously.
Thread-Index: AdCqmQRqGeCMWNlQQaibZ+AO8TCNpQ==
Date: Fri, 19 Jun 2015 14:05:37 +0000
Message-ID: <AA5094591B10A6478DD8149CB26237DD316304BB@INPU00EXP001.symphonyteleca.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.52.35.55]
x-exclaimer-md-config: 2016ff6d-6ae2-4638-9324-ce0c4b8647b0
MIME-Version: 1.0
Subject: [Xen-users] Win 2k3 VM restarting continuously.
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hello,

We have a dom0 system running Xen v4.1.

There are two virtual machines running on this platform one is a windows 2003 server and other is a RHEL server.

We have installed PV drivers(0.9.11.13) on Windows server.
Issue is that Windows server keeps restarting every 30 Min with the event "unexpected shutdown occurred". 
A dump is created C:\windows\memory.dmp when system restarts. When I open the dump in WinDbg and execute command !analyze -v output as below is produced. I have the dump if someone wants to have a look at it I can send it to him/her. When we attempted to install 0.11.0.373 version of drivers system was not coming up and entire setup had to be re-installed.

I would appreciate any help or guidance in resolving this issue.



Command output:
================================================================================

ADDITIONAL_DEBUG_TEXT:  
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

MODULE_NAME: xennet

FAULTING_MODULE: e0800000 nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4954cba2

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid

FAULTING_IP: 
nt!RtlUnwind+d9b
e0878abb cc              int     3

TRAP_FRAME:  e089a0a0 -- (.trap 0xffffffffe089a0a0) ErrCode = 00000000
eax=00000002 ebx=e089a188 ecx=e0873810 edx=00000056 esi=e0873811 edi=00000002
eip=e0878abc esp=e089a114 ebp=e089a128 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00000206
nt!RtlUnwind+0xd9c:
e0878abc 5b              pop     ebx
Resetting default scope

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x8E

CURRENT_IRQL:  0

ASSERT_DATA:  total_length <= xi->config_mtu + XN_HDR_SIZE

ASSERT_FILE_LOCATION:  c:\projects\win-pvdrivers.hg\xennet\xennet_rx.c at Line 744

LAST_CONTROL_TRANSFER:  from e082d820 to e0827c83

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
e089a128 e0878b31 00000002 e0873810 00000056 nt!RtlUnwind+0xd9c
e089a144 e08720bc e089a158 e089a160 f50a0600 nt!RtlUnwind+0xe11
e089a168 e08738ec e0873810 e089a188 00000002 nt!DbgPrompt+0x3c e089a45c f509acf9 f50a0600 f50a0520 000002e8 nt!RtlAssert+0x5c
e089a5a8 e0832110 fd416984 fd413000 00000000 xennet+0x6cf9
e089a600 e088de4f 00000000 0000000e 00000000 nt!ZwYieldExecution+0x248c
e089db40 00000000 e089db48 e089db48 e089db50 nt!KiDispatchInterrupt+0x32f


STACK_COMMAND:  .trap 0xffffffffe089a0a0 ; kb

FOLLOWUP_IP: 
xennet+6cf9
f509acf9 c785ccfeffff00000000 mov dword ptr [ebp-134h],0

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  xennet+6cf9

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  xennet.sys

FAILURE_BUCKET_ID:  0x8E_xennet+6cf9

BUCKET_ID:  0x8E_xennet+6cf9

Followup: MachineOwner


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sat Jun 20 07:25:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 20 Jun 2015 07:25:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z6D8m-0004z9-R0; Sat, 20 Jun 2015 07:24:36 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Manfred.Haertel@rz-online.de>) id 1Z6D8k-0004z4-MG
	for xen-users@lists.xen.org; Sat, 20 Jun 2015 07:24:34 +0000
Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id
	41/9C-25925-13515855; Sat, 20 Jun 2015 07:24:33 +0000
X-Env-Sender: Manfred.Haertel@rz-online.de
X-Msg-Ref: server-15.tower-206.messagelabs.com!1434785072!12269397!1
X-Originating-IP: [212.7.160.41]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1635 invoked from network); 20 Jun 2015 07:24:32 -0000
Received: from mout01.rz-online.net (HELO mout01.rz-online.net) (212.7.160.41)
	by server-15.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 20 Jun 2015 07:24:32 -0000
Received: from donald.local (212-7-162-117.ktk-ip.de [212.7.162.117])
	by mout01.rz-online.net (8.14.0/8.12.10) with ESMTP id t5K7OVvc003252
	for <xen-users@lists.xen.org>; Sat, 20 Jun 2015 09:24:31 +0200
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
	by donald.local (Postfix) with ESMTP id 34E6FA172B
	for <xen-users@lists.xen.org>; Sat, 20 Jun 2015 09:24:12 +0200 (CEST)
Message-ID: <5585151C.5020903@rz-online.de>
Date: Sat, 20 Jun 2015 09:24:12 +0200
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:36.0) Gecko/20100101 Firefox/36.0 SeaMonkey/2.33.1
MIME-Version: 1.0
To: xen-users@lists.xen.org
Content-Length: 2363
Subject: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

SSdtIHRyeWluZyB0byBoYXZlIHR3byBkaWZmZXJlbnQgdmVyc2lvbnMgb2YgWGVuIG9uIHRoZSBz
YW1lIGNvbXB1dGVyIC0gCnRoZSBzdGFibGUgb24gcHJvdmlkZWQgYnkgbXkgTGludXggZGlzdHJp
YnV0aW9uIGFuZCBhbm90aGVyIG9uZSBjb21waWxlZCAKYnkgbXlzZWxmLgoKVGhyZWUgcG9pbnRz
IHdlcmUgcmVsYXRpdmVseSBlYXN5OgoKKiBTdGFydCB0aGUgYWx0ZXJuYXRlIFhlbiBrZXJuZWw6
IENvcHkgaXQgdG8gL2Jvb3QvIChvciBldmVuIGVsc2V3aGVyZSkgCmFuZCBtYWtlIGFub3RoZXIg
ZW50cnkgaW4gZ3J1YjIgc3RhcnRpbmcgdGhpcyBrZXJuZWwuCgoqIFByb3ZpZGVyIHRoZSBhbHRl
cm5hdGUgdG9vbHMgKHhsIGV0Yy4pOiBDb21waWxlIFhlbiB3aXRoCgouL2NvbmZpZ3VyZSAtLXBy
ZWZpeD0vc29tZS9vZGQvZGlyIC0tZW5hYmxlLXJwYXRoCgplbmFibGUtcnBhdGggaXMgaW1wb3J0
YW50IGZvciBsb2FkaW5nIHRoZSBhcHByb3ByaWF0ZSAoYWx0ZXJuYXRlKSAKbGlicmFyaWVzLCBu
b3QgdGhlIGxpYnJhcmllcyBmcm9tIC91c3IvbGliNjQKCiogc3RhcnR1cCBzY3JpcHQgL2V0Yy9p
bml0LmQveGVuY29tbW9uczogQXZvaWQgWGVuIGZyb20gc3RhcnRlZCAKYXV0b21hdGljYWxseSBh
dCBib290IHRpbWUgYW5kIHByb3ZpZGUgYW4gYWx0ZXJuYXRlIHhlbmNvbW1vbnMgc2NyaXB0IAp3
aGljaCBzdGFydHMgeGVuc3RvcmVkLCBxZW11IGV0Yy4gZnJvbSAvc29tZS9vZGQvZGlyIC4gSSBo
YXZlIHRvIHVzZSB0aGUgCmFwcHJvcHJpYXRlIHN0YXJ0dXAgc2NyaXB0IGFjY29yZGluZyB0byB0
aGUgbG9hZGVkIGh5cGVydmlzb3IuCgpUaGUgcHJvYmxlbSBJIGhhdmUgbm93IGlzIHRoYXQgdGhl
IGNvbXBsZXRlIFhlbiBiYWNrZW5kIGhhbmRsaW5nIGluIHRoIApEb20wIGlzIGRvbmUgYnkgdWRl
diAoaG0sIGRpZG4ndCBrbm93IHRoYXQgYmVmb3JlIC0gc28gYW5vdGhlciBsZXNzb24gCmxlYXJu
ZWQpLgoKVGhlcmUgaXMgYSBYZW4gc3BlY2lmaWMgcnVsZXMgZmlsZSBvbiAvZXRjL3VkZXYuZC9y
dWxlcywgd2hpY2ggY2FsbHMgCnNjcmlwdHMgZnJvbSAvZXRjL3hlbi9zY3JpcHRzIChhbmQgdGhl
eSB1c2UgdGhlIHN5c3RlbSBwcm92aWRlZCAKeGVuc3RvcmUtcmVhZCBldGMuKSwgYW5kIEkgaGF2
ZSBhbm90aGVyIGFsdGVybmF0ZSBydWxlcyBmaWxlIGZyb20gdGhlIAphbHRlcm5hdGUgWGVuIHZl
cnNpb24sIHdoaWNoIHNob3VsZCBjYWxsIGRpZmZlcmVudCBzY3JpcHRzIGZyb20gCi9zb21lL29k
ZC9kaXIvZXRjL3hlbi9zY3JpcHRzIC4KCkhvdyB0byBjaG9vc2UgYmV0d2VlbiB0aGUgdHdvIGNh
c2VzPwoKSSB0aGluayB0aGUgdWRldiBydWxlcyBhcmUgbG9hZGVkIHZlcnkgZWFybHkgYXQgc3Rh
cnR1cCwgYnV0IEkgYW0gbm8gCmV4cGVydCBvbiB1ZGV2LiBIb3cgdG8gY2hhbmdlIHRoZW0gYXQg
cnVudGltZT8KCk9yLCBtb3JlIGdlbmVyYWxseSwgd2hhdCdzIHRoZSBiZXN0IHN0cmF0ZWd5IHRv
IHNvbHZlIHRoaXMgcHJvYmxlbT8KCi0tIApNYW5mcmVkIEjDpHJ0ZWwsIERCM0hNICAgIG1haWx0
bzpNYW5mcmVkLkhhZXJ0ZWxAcnotb25saW5lLmRlCiAgICAgICAgICAgICAgICAgICAgICAgICAg
aHR0cDovL3J6LWhvbWUuZGUvbWhhZXJ0ZWwKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fClhlbi11c2VycyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJzQGxpc3Rz
Lnhlbi5vcmcKaHR0cDovL2xpc3RzLnhlbi5vcmcveGVuLXVzZXJz

From xen-users-bounces@lists.xen.org Sat Jun 20 07:25:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 20 Jun 2015 07:25:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z6D8m-0004z9-R0; Sat, 20 Jun 2015 07:24:36 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Manfred.Haertel@rz-online.de>) id 1Z6D8k-0004z4-MG
	for xen-users@lists.xen.org; Sat, 20 Jun 2015 07:24:34 +0000
Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id
	41/9C-25925-13515855; Sat, 20 Jun 2015 07:24:33 +0000
X-Env-Sender: Manfred.Haertel@rz-online.de
X-Msg-Ref: server-15.tower-206.messagelabs.com!1434785072!12269397!1
X-Originating-IP: [212.7.160.41]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 1635 invoked from network); 20 Jun 2015 07:24:32 -0000
Received: from mout01.rz-online.net (HELO mout01.rz-online.net) (212.7.160.41)
	by server-15.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 20 Jun 2015 07:24:32 -0000
Received: from donald.local (212-7-162-117.ktk-ip.de [212.7.162.117])
	by mout01.rz-online.net (8.14.0/8.12.10) with ESMTP id t5K7OVvc003252
	for <xen-users@lists.xen.org>; Sat, 20 Jun 2015 09:24:31 +0200
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
	by donald.local (Postfix) with ESMTP id 34E6FA172B
	for <xen-users@lists.xen.org>; Sat, 20 Jun 2015 09:24:12 +0200 (CEST)
Message-ID: <5585151C.5020903@rz-online.de>
Date: Sat, 20 Jun 2015 09:24:12 +0200
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:36.0) Gecko/20100101 Firefox/36.0 SeaMonkey/2.33.1
MIME-Version: 1.0
To: xen-users@lists.xen.org
Content-Length: 2363
Subject: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Sun Jun 21 14:01:30 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 21 Jun 2015 14:01:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z6fnC-0002JM-6d; Sun, 21 Jun 2015 14:00:14 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Manfred.Haertel@rz-online.de>) id 1Z6fnB-0002JH-M0
	for xen-users@lists.xen.org; Sun, 21 Jun 2015 14:00:13 +0000
Received: from [85.158.139.211] by server-17.bemta-5.messagelabs.com id
	F5/D2-01139-C63C6855; Sun, 21 Jun 2015 14:00:12 +0000
X-Env-Sender: Manfred.Haertel@rz-online.de
X-Msg-Ref: server-11.tower-206.messagelabs.com!1434895212!11639708!1
X-Originating-IP: [212.7.160.42]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 24549 invoked from network); 21 Jun 2015 14:00:12 -0000
Received: from mout02.rz-online.net (HELO mout02.rz-online.net) (212.7.160.42)
	by server-11.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 21 Jun 2015 14:00:12 -0000
Received: from donald.local (212-7-162-78.ktk-ip.de [212.7.162.78])
	by mout02.rz-online.net (8.14.0/8.12.10) with ESMTP id t5LE0Br1020385
	for <xen-users@lists.xen.org>; Sun, 21 Jun 2015 16:00:11 +0200
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
	by donald.local (Postfix) with ESMTP id 528B6A0446
	for <xen-users@lists.xen.org>; Sun, 21 Jun 2015 15:48:01 +0200 (CEST)
Message-ID: <5586C091.20006@rz-online.de>
Date: Sun, 21 Jun 2015 15:48:01 +0200
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:36.0) Gecko/20100101 Firefox/36.0 SeaMonkey/2.33.1
MIME-Version: 1.0
To: xen-users@lists.xen.org
References: <5585151C.5020903@rz-online.de>
In-Reply-To: <5585151C.5020903@rz-online.de>
Content-Length:1127
Subject: Re: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Sun Jun 21 14:01:30 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 21 Jun 2015 14:01:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z6fnC-0002JM-6d; Sun, 21 Jun 2015 14:00:14 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Manfred.Haertel@rz-online.de>) id 1Z6fnB-0002JH-M0
	for xen-users@lists.xen.org; Sun, 21 Jun 2015 14:00:13 +0000
Received: from [85.158.139.211] by server-17.bemta-5.messagelabs.com id
	F5/D2-01139-C63C6855; Sun, 21 Jun 2015 14:00:12 +0000
X-Env-Sender: Manfred.Haertel@rz-online.de
X-Msg-Ref: server-11.tower-206.messagelabs.com!1434895212!11639708!1
X-Originating-IP: [212.7.160.42]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 24549 invoked from network); 21 Jun 2015 14:00:12 -0000
Received: from mout02.rz-online.net (HELO mout02.rz-online.net) (212.7.160.42)
	by server-11.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 21 Jun 2015 14:00:12 -0000
Received: from donald.local (212-7-162-78.ktk-ip.de [212.7.162.78])
	by mout02.rz-online.net (8.14.0/8.12.10) with ESMTP id t5LE0Br1020385
	for <xen-users@lists.xen.org>; Sun, 21 Jun 2015 16:00:11 +0200
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
	by donald.local (Postfix) with ESMTP id 528B6A0446
	for <xen-users@lists.xen.org>; Sun, 21 Jun 2015 15:48:01 +0200 (CEST)
Message-ID: <5586C091.20006@rz-online.de>
Date: Sun, 21 Jun 2015 15:48:01 +0200
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:36.0) Gecko/20100101 Firefox/36.0 SeaMonkey/2.33.1
MIME-Version: 1.0
To: xen-users@lists.xen.org
References: <5585151C.5020903@rz-online.de>
In-Reply-To: <5585151C.5020903@rz-online.de>
Content-Length:1127
Subject: Re: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

TWFuZnJlZCBIYWVydGVsLCBEQjNITSBzY2hyaWViOgoKPiBUaGVyZSBpcyBhIFhlbiBzcGVjaWZp
YyBydWxlcyBmaWxlIG9uIC9ldGMvdWRldi5kL3J1bGVzLCB3aGljaCBjYWxscwo+IHNjcmlwdHMg
ZnJvbSAvZXRjL3hlbi9zY3JpcHRzIChhbmQgdGhleSB1c2UgdGhlIHN5c3RlbSBwcm92aWRlZAo+
IHhlbnN0b3JlLXJlYWQgZXRjLiksIGFuZCBJIGhhdmUgYW5vdGhlciBhbHRlcm5hdGUgcnVsZXMg
ZmlsZSBmcm9tIHRoZQo+IGFsdGVybmF0ZSBYZW4gdmVyc2lvbiwgd2hpY2ggc2hvdWxkIGNhbGwg
ZGlmZmVyZW50IHNjcmlwdHMgZnJvbQo+IC9zb21lL29kZC9kaXIvZXRjL3hlbi9zY3JpcHRzIC4K
Pgo+IEhvdyB0byBjaG9vc2UgYmV0d2VlbiB0aGUgdHdvIGNhc2VzPwoKSSBmb3VuZCBvdXQgdGhh
dCB0aGUgYmVzdCB3YXkgdG8gY2hvb3NlIHRoZSBzY3JpcHRzIGlzIHRvIHVzZSB0aGUgc2NyaXB0
IApwYXJhbWV0ZXIgaW4gdGhlIHZpZiBhbmQgZGlzayBjb25maWd1cmF0aW9uIGFuZCB0byBsZXQg
aXQgcG9pbnQgdG8gdGhlIApjb3JyZWN0IGxvY2F0aW9uIG9yIG1heSBiZSB0byBhIHdyYXBwZXIg
dG8gZml4IHRoZSAkUEFUSC4KCi0tIApNYW5mcmVkIEjDpHJ0ZWwsIERCM0hNICAgIG1haWx0bzpN
YW5mcmVkLkhhZXJ0ZWxAcnotb25saW5lLmRlCiAgICAgICAgICAgICAgICAgICAgICAgICAgaHR0
cDovL3J6LWhvbWUuZGUvbWhhZXJ0ZWwKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fClhlbi11c2VycyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJzQGxpc3RzLnhl
bi5vcmcKaHR0cDovL2xpc3RzLnhlbi5vcmcveGVuLXVzZXJz

From xen-users-bounces@lists.xen.org Mon Jun 22 08:53:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Jun 2015 08:53:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z6xT9-0000WH-Mp; Mon, 22 Jun 2015 08:52:43 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=608cb09a5=Ian.Campbell@citrix.com>)
	id 1Z6xT8-0000WC-EQ
	for xen-users@lists.xen.org; Mon, 22 Jun 2015 08:52:42 +0000
Received: from [193.109.254.147] by server-12.bemta-14.messagelabs.com id
	84/63-18733-9DCC7855; Mon, 22 Jun 2015 08:52:41 +0000
X-Env-Sender: prvs=608cb09a5=Ian.Campbell@citrix.com
X-Msg-Ref: server-4.tower-27.messagelabs.com!1434963159!24664542!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12097 invoked from network); 22 Jun 2015 08:52:41 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-4.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	22 Jun 2015 08:52:41 -0000
X-IronPort-AV: E=Sophos;i="5.13,658,1427760000"; d="scan'208";a="277214356"
Message-ID: <1434963130.28264.144.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
Date: Mon, 22 Jun 2015 09:52:10 +0100
In-Reply-To: <5585151C.5020903@rz-online.de>
References: <5585151C.5020903@rz-online.de>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Sat, 2015-06-20 at 09:24 +0200, Manfred Haertel, DB3HM wrote:
[...]
> The problem I have now is that the complete Xen backend handling in th 
> Dom0 is done by udev (hm, didn't know that before - so another lesson 
> learned).

Looks like you've solved it but FYI starting from some recent version
(maybe 4.4? Don't quite remember) the hotplug scripts are called
directly from the libxl based toolstack and not via udev.

You'll be able to tell if this is the case for you because the udev
rules will contains 'ENV{UDEV_CALL}="1"' which gives the scripts the
signal to not run if libxl is in use.

The solution is the same though.

BTW, for newer versions of Xen it _might_ work to configure
--sysconfdir=/some/thing/etc, although it probably hasn't been well
tested in that configuration so you might find some sharper edges.

> I think the udev rules are loaded very early at startup, but I am no 
> expert on udev. How to change them at runtime?

FWIW you can run "udevadm --reload-rules" (or something like that) to
cause /etc/udev/rules.d to be rescanned/reloaded. That's probably not
useful to you now though.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 22 08:53:54 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Jun 2015 08:53:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z6xT9-0000WH-Mp; Mon, 22 Jun 2015 08:52:43 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=608cb09a5=Ian.Campbell@citrix.com>)
	id 1Z6xT8-0000WC-EQ
	for xen-users@lists.xen.org; Mon, 22 Jun 2015 08:52:42 +0000
Received: from [193.109.254.147] by server-12.bemta-14.messagelabs.com id
	84/63-18733-9DCC7855; Mon, 22 Jun 2015 08:52:41 +0000
X-Env-Sender: prvs=608cb09a5=Ian.Campbell@citrix.com
X-Msg-Ref: server-4.tower-27.messagelabs.com!1434963159!24664542!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12097 invoked from network); 22 Jun 2015 08:52:41 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-4.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	22 Jun 2015 08:52:41 -0000
X-IronPort-AV: E=Sophos;i="5.13,658,1427760000"; d="scan'208";a="277214356"
Message-ID: <1434963130.28264.144.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
Date: Mon, 22 Jun 2015 09:52:10 +0100
In-Reply-To: <5585151C.5020903@rz-online.de>
References: <5585151C.5020903@rz-online.de>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Sat, 2015-06-20 at 09:24 +0200, Manfred Haertel, DB3HM wrote:
[...]
> The problem I have now is that the complete Xen backend handling in th 
> Dom0 is done by udev (hm, didn't know that before - so another lesson 
> learned).

Looks like you've solved it but FYI starting from some recent version
(maybe 4.4? Don't quite remember) the hotplug scripts are called
directly from the libxl based toolstack and not via udev.

You'll be able to tell if this is the case for you because the udev
rules will contains 'ENV{UDEV_CALL}="1"' which gives the scripts the
signal to not run if libxl is in use.

The solution is the same though.

BTW, for newer versions of Xen it _might_ work to configure
--sysconfdir=/some/thing/etc, although it probably hasn't been well
tested in that configuration so you might find some sharper edges.

> I think the udev rules are loaded very early at startup, but I am no 
> expert on udev. How to change them at runtime?

FWIW you can run "udevadm --reload-rules" (or something like that) to
cause /etc/udev/rules.d to be rescanned/reloaded. That's probably not
useful to you now though.

Ian.



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 22 17:46:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Jun 2015 17:46:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z75mN-0008OC-PG; Mon, 22 Jun 2015 17:45:07 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Manfred.Haertel@rz-online.de>) id 1Z75mM-0008O3-Db
	for xen-users@lists.xen.org; Mon, 22 Jun 2015 17:45:06 +0000
Received: from [85.158.139.211] by server-3.bemta-5.messagelabs.com id
	02/04-05081-1A948855; Mon, 22 Jun 2015 17:45:05 +0000
X-Env-Sender: Manfred.Haertel@rz-online.de
X-Msg-Ref: server-16.tower-206.messagelabs.com!1434995105!13171360!1
X-Originating-IP: [212.7.160.42]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30529 invoked from network); 22 Jun 2015 17:45:05 -0000
Received: from mout02.rz-online.net (HELO mout02.rz-online.net) (212.7.160.42)
	by server-16.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 22 Jun 2015 17:45:05 -0000
Received: from donald.local (212-7-162-241.ktk-ip.de [212.7.162.241])
	by mout02.rz-online.net (8.14.0/8.12.10) with ESMTP id t5MHj4Td005011
	for <xen-users@lists.xen.org>; Mon, 22 Jun 2015 19:45:04 +0200
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
	by donald.local (Postfix) with ESMTP id 9A381A0524
	for <xen-users@lists.xen.org>; Mon, 22 Jun 2015 19:44:54 +0200 (CEST)
Message-ID: <55884996.9090400@rz-online.de>
Date: Mon, 22 Jun 2015 19:44:54 +0200
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:36.0) Gecko/20100101 Firefox/36.0 SeaMonkey/2.33.1
MIME-Version: 1.0
To: xen-users@lists.xen.org
References: <5585151C.5020903@rz-online.de>
	<1434963130.28264.144.camel@citrix.com>
In-Reply-To: <1434963130.28264.144.camel@citrix.com>
Content-Length: 832
Subject: Re: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Ian Campbell schrieb:

> BTW, for newer versions of Xen it _might_ work to configure
> --sysconfdir=3D/some/thing/etc, although it probably hasn't been well
> tested in that configuration so you might find some sharper edges.

I tried it, and it worked perfectly. I added also =

--localstatedir=3D/my/odd/dir/var, this also works and nothing is placed =

on /var now. Even /my/odd/dir/etc/init.d/xencommons start seems to work =

without any additional work and starts all daemons from the appropriate =

directories. So I'm satisfied now with my setup. :-)

Thanks for your help!

-- =

Manfred H=E4rtel, DB3HM    mailto:Manfred.Haertel@rz-online.de
                          http://rz-home.de/mhaertel

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 22 17:46:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Jun 2015 17:46:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z75mN-0008OC-PG; Mon, 22 Jun 2015 17:45:07 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <Manfred.Haertel@rz-online.de>) id 1Z75mM-0008O3-Db
	for xen-users@lists.xen.org; Mon, 22 Jun 2015 17:45:06 +0000
Received: from [85.158.139.211] by server-3.bemta-5.messagelabs.com id
	02/04-05081-1A948855; Mon, 22 Jun 2015 17:45:05 +0000
X-Env-Sender: Manfred.Haertel@rz-online.de
X-Msg-Ref: server-16.tower-206.messagelabs.com!1434995105!13171360!1
X-Originating-IP: [212.7.160.42]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30529 invoked from network); 22 Jun 2015 17:45:05 -0000
Received: from mout02.rz-online.net (HELO mout02.rz-online.net) (212.7.160.42)
	by server-16.tower-206.messagelabs.com with DHE-RSA-AES256-SHA
	encrypted SMTP; 22 Jun 2015 17:45:05 -0000
Received: from donald.local (212-7-162-241.ktk-ip.de [212.7.162.241])
	by mout02.rz-online.net (8.14.0/8.12.10) with ESMTP id t5MHj4Td005011
	for <xen-users@lists.xen.org>; Mon, 22 Jun 2015 19:45:04 +0200
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
	by donald.local (Postfix) with ESMTP id 9A381A0524
	for <xen-users@lists.xen.org>; Mon, 22 Jun 2015 19:44:54 +0200 (CEST)
Message-ID: <55884996.9090400@rz-online.de>
Date: Mon, 22 Jun 2015 19:44:54 +0200
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:36.0) Gecko/20100101 Firefox/36.0 SeaMonkey/2.33.1
MIME-Version: 1.0
To: xen-users@lists.xen.org
References: <5585151C.5020903@rz-online.de>
	<1434963130.28264.144.camel@citrix.com>
In-Reply-To: <1434963130.28264.144.camel@citrix.com>
Content-Length: 832
Subject: Re: [Xen-users] Two different versions of Xen on the same Dom0?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Ian Campbell schrieb:

> BTW, for newer versions of Xen it _might_ work to configure
> --sysconfdir=3D/some/thing/etc, although it probably hasn't been well
> tested in that configuration so you might find some sharper edges.

I tried it, and it worked perfectly. I added also =

--localstatedir=3D/my/odd/dir/var, this also works and nothing is placed =

on /var now. Even /my/odd/dir/etc/init.d/xencommons start seems to work =

without any additional work and starts all daemons from the appropriate =

directories. So I'm satisfied now with my setup. :-)

Thanks for your help!

-- =

Manfred H=E4rtel, DB3HM    mailto:Manfred.Haertel@rz-online.de
                          http://rz-home.de/mhaertel

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 23 04:02:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Jun 2015 04:02:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7FOw-0006Ql-UJ; Tue, 23 Jun 2015 04:01:34 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <russell.pavlicek.xen@gmail.com>)
	id 1Z7FOu-0006QE-83; Tue, 23 Jun 2015 04:01:32 +0000
Received: from [193.109.254.147] by server-10.bemta-14.messagelabs.com id
	D2/C3-30151-A1AD8855; Tue, 23 Jun 2015 04:01:30 +0000
X-Env-Sender: russell.pavlicek.xen@gmail.com
X-Msg-Ref: server-14.tower-27.messagelabs.com!1435032089!25750335!1
X-Originating-IP: [74.125.82.43]
X-SpamReason: No, hits=2.1 required=7.0 tests=RCVD_BY_IP,
  SUSPICIOUS_RECIPS
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31380 invoked from network); 23 Jun 2015 04:01:29 -0000
Received: from mail-wg0-f43.google.com (HELO mail-wg0-f43.google.com)
	(74.125.82.43)
	by server-14.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	23 Jun 2015 04:01:29 -0000
Received: by wguu7 with SMTP id u7so84809235wgu.3;
	Mon, 22 Jun 2015 21:01:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:sender:date:message-id:subject:from:to:content-type;
	bh=1We2VqdoGfvSXAg3r4nzaklUDhZj/s1BQDpWKf0Zg+4=;
	b=a+V8t60nZ7rcXfM2cbVTbDD6LY5/DZg9DumKqS4vWfzup79GMSH80O0lA3q7oNDF1r
	UDHqhU35UAuLXcQKdUDrsAebJI/LJCK3daIXqsXyjHc5JKpFwDYFbMa1AmQE3sCoa6+d
	zOfHPYkjVNK5O8bUE1sp/H2j4j/iF8XtExAmYuxTzYlKfdV2dRMfLwOJFSZkREIgMfeX
	G4veKvTAw8azuTGeo6pBztyGyBHcQ3SN64UFDvOb1lroHNSfwM5LGiqeDSOje2feM10/
	D5Lk9208fsB7ciriErbZK3oAvinazkyVur2oSy3tNsgQcuq2jt5i81chLIgTWoX1aKHy
	xwUA==
MIME-Version: 1.0
X-Received: by 10.194.209.130 with SMTP id mm2mr55428574wjc.64.1435032089695; 
	Mon, 22 Jun 2015 21:01:29 -0700 (PDT)
Received: by 10.194.81.99 with HTTP; Mon, 22 Jun 2015 21:01:29 -0700 (PDT)
Date: Tue, 23 Jun 2015 00:01:29 -0400
X-Google-Sender-Auth: AqAUcuNbXC9nOjHEsmLtOFo4z7A
Message-ID: <CAHehzX2t9GBhT8fqnBPMnfXag4rML=Ainq36LAkaB1XaR5RfhA@mail.gmail.com>
From: Russ Pavlicek <russell.pavlicek@xenproject.org>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>,
	xen-devel <xen-devel@lists.xenproject.org>, 
	xs-devel@lists.xenserver.org, xen-api@lists.xen.org, 
	mirageos-devel@lists.xenproject.org
Subject: [Xen-users] Xen Project Document Day is tomorrow, June 24!
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Our next Document Day is this Wednesday.  This month, we'd like to
catch up with the latest advances in the project.  Some topics to
address include:
- Mirage OS: we need current information about Mirage, with links to
key pages on the Mirage wiki
- XAPI: The latest docs from the XenServer crew need to be referenced
from our wiki
- Unikernels: Beyond Mirage OS, lots of other Unikernels leverage Xen
Project; we need them properly linked in to our wiki
- Raisin: the new effort has a new wiki page which needs review
- anything else which need to be brought up to date

All the information you need to participate in Document Day is here:

http://wiki.xenproject.org/wiki/Xen_Document_Days

Also take a look at the current TODO list to see other items which
need attention:

http://wiki.xenproject.org/wiki/Xen_Document_Days/TODO

Please think about how you can help out.  If you haven't requested
to be made a Wiki editor, save time and do it now so you are ready to
go on Document Day.  Just fill out the form below:

http://xenproject.org/component/content/article/100-misc/145-request-to-be-made-a-wiki-editor.html

We hope to see you Wednesday in #xendocs!

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 23 04:02:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Jun 2015 04:02:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7FOw-0006Ql-UJ; Tue, 23 Jun 2015 04:01:34 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <russell.pavlicek.xen@gmail.com>)
	id 1Z7FOu-0006QE-83; Tue, 23 Jun 2015 04:01:32 +0000
Received: from [193.109.254.147] by server-10.bemta-14.messagelabs.com id
	D2/C3-30151-A1AD8855; Tue, 23 Jun 2015 04:01:30 +0000
X-Env-Sender: russell.pavlicek.xen@gmail.com
X-Msg-Ref: server-14.tower-27.messagelabs.com!1435032089!25750335!1
X-Originating-IP: [74.125.82.43]
X-SpamReason: No, hits=2.1 required=7.0 tests=RCVD_BY_IP,
  SUSPICIOUS_RECIPS
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 31380 invoked from network); 23 Jun 2015 04:01:29 -0000
Received: from mail-wg0-f43.google.com (HELO mail-wg0-f43.google.com)
	(74.125.82.43)
	by server-14.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	23 Jun 2015 04:01:29 -0000
Received: by wguu7 with SMTP id u7so84809235wgu.3;
	Mon, 22 Jun 2015 21:01:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:sender:date:message-id:subject:from:to:content-type;
	bh=1We2VqdoGfvSXAg3r4nzaklUDhZj/s1BQDpWKf0Zg+4=;
	b=a+V8t60nZ7rcXfM2cbVTbDD6LY5/DZg9DumKqS4vWfzup79GMSH80O0lA3q7oNDF1r
	UDHqhU35UAuLXcQKdUDrsAebJI/LJCK3daIXqsXyjHc5JKpFwDYFbMa1AmQE3sCoa6+d
	zOfHPYkjVNK5O8bUE1sp/H2j4j/iF8XtExAmYuxTzYlKfdV2dRMfLwOJFSZkREIgMfeX
	G4veKvTAw8azuTGeo6pBztyGyBHcQ3SN64UFDvOb1lroHNSfwM5LGiqeDSOje2feM10/
	D5Lk9208fsB7ciriErbZK3oAvinazkyVur2oSy3tNsgQcuq2jt5i81chLIgTWoX1aKHy
	xwUA==
MIME-Version: 1.0
X-Received: by 10.194.209.130 with SMTP id mm2mr55428574wjc.64.1435032089695; 
	Mon, 22 Jun 2015 21:01:29 -0700 (PDT)
Received: by 10.194.81.99 with HTTP; Mon, 22 Jun 2015 21:01:29 -0700 (PDT)
Date: Tue, 23 Jun 2015 00:01:29 -0400
X-Google-Sender-Auth: AqAUcuNbXC9nOjHEsmLtOFo4z7A
Message-ID: <CAHehzX2t9GBhT8fqnBPMnfXag4rML=Ainq36LAkaB1XaR5RfhA@mail.gmail.com>
From: Russ Pavlicek <russell.pavlicek@xenproject.org>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>,
	xen-devel <xen-devel@lists.xenproject.org>, 
	xs-devel@lists.xenserver.org, xen-api@lists.xen.org, 
	mirageos-devel@lists.xenproject.org
Subject: [Xen-users] Xen Project Document Day is tomorrow, June 24!
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Our next Document Day is this Wednesday.  This month, we'd like to
catch up with the latest advances in the project.  Some topics to
address include:
- Mirage OS: we need current information about Mirage, with links to
key pages on the Mirage wiki
- XAPI: The latest docs from the XenServer crew need to be referenced
from our wiki
- Unikernels: Beyond Mirage OS, lots of other Unikernels leverage Xen
Project; we need them properly linked in to our wiki
- Raisin: the new effort has a new wiki page which needs review
- anything else which need to be brought up to date

All the information you need to participate in Document Day is here:

http://wiki.xenproject.org/wiki/Xen_Document_Days

Also take a look at the current TODO list to see other items which
need attention:

http://wiki.xenproject.org/wiki/Xen_Document_Days/TODO

Please think about how you can help out.  If you haven't requested
to be made a Wiki editor, save time and do it now so you are ready to
go on Document Day.  Just fill out the form below:

http://xenproject.org/component/content/article/100-misc/145-request-to-be-made-a-wiki-editor.html

We hope to see you Wednesday in #xendocs!

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 24 03:47:07 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 03:47:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7bdc-00047a-3v; Wed, 24 Jun 2015 03:46:12 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <russell.pavlicek.xen@gmail.com>)
	id 1Z7bda-000474-A1; Wed, 24 Jun 2015 03:46:10 +0000
Received: from [85.158.137.68] by server-15.bemta-3.messagelabs.com id
	2D/0B-28408-1082A855; Wed, 24 Jun 2015 03:46:09 +0000
X-Env-Sender: russell.pavlicek.xen@gmail.com
X-Msg-Ref: server-6.tower-31.messagelabs.com!1435117567!14723422!1
X-Originating-IP: [74.125.82.53]
X-SpamReason: No, hits=2.1 required=7.0 tests=RCVD_BY_IP,
  SUSPICIOUS_RECIPS
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16578 invoked from network); 24 Jun 2015 03:46:07 -0000
Received: from mail-wg0-f53.google.com (HELO mail-wg0-f53.google.com)
	(74.125.82.53)
	by server-6.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	24 Jun 2015 03:46:07 -0000
Received: by wgbhy7 with SMTP id hy7so25050454wgb.2;
	Tue, 23 Jun 2015 20:46:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:sender:in-reply-to:references:date:message-id:subject
	:from:to:cc:content-type;
	bh=Q/QKJsZLEtS31P4U31ChiJF9hqcLITrbnyZKw9yiRU0=;
	b=gza9HsL1PqgxiYSk1zk4Xg9UAu/skcHlAc4ykOzZ7rJyFkUeXh1BptSaqIwlbcV/Xi
	1dQh/w/rZDrBG+o+wn3sZ6WCLczMQr7FT3KAG4Fccqe94tjRsLjgEbmdw/TUuPrwKqvS
	jVET0KfISWDWLNWiztjUjpTBHD188H6FjsLjZwLrnV14MLq0MD3Zwcjlhcqlvjkl2398
	LBRRZvIm5sLPGwhR2PavJspX6Pyp6U/L0BotJud6bqBsRoILWGzsBUBCri5KxSRWOSJn
	Drx9uZCxXg0zArnLD4nbfmkICEpwxOi27Z80hGohLXcBQQZDWT6vSew95q6IT7kT9mHk
	783g==
MIME-Version: 1.0
X-Received: by 10.180.72.179 with SMTP id e19mr700849wiv.53.1435117567176;
	Tue, 23 Jun 2015 20:46:07 -0700 (PDT)
Received: by 10.194.81.99 with HTTP; Tue, 23 Jun 2015 20:46:07 -0700 (PDT)
In-Reply-To: <CAHehzX2t9GBhT8fqnBPMnfXag4rML=Ainq36LAkaB1XaR5RfhA@mail.gmail.com>
References: <CAHehzX2t9GBhT8fqnBPMnfXag4rML=Ainq36LAkaB1XaR5RfhA@mail.gmail.com>
Date: Tue, 23 Jun 2015 23:46:07 -0400
X-Google-Sender-Auth: pgvQ12Jji25rewAcR0IWw2UwKFY
Message-ID: <CAHehzX01ZhE9yyuYQDs0RZL4k=VqfztkLcepYMkJybUkNkPWeA@mail.gmail.com>
From: Russ Pavlicek <russell.pavlicek@xenproject.org>
To: Russ Pavlicek <russell.pavlicek@xenproject.org>
Cc: xen-api@lists.xen.org, "xen-users@lists.xen.org" <xen-users@lists.xen.org>,
	xs-devel@lists.xenserver.org, mirageos-devel@lists.xenproject.org,
	xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [Xen-users] Xen Project Document Day is tomorrow, June 24!
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Document Day is here!  Join us in #xendocs on Freenode IRC and help us
make us our Wiki even better!

On Tue, Jun 23, 2015 at 12:01 AM, Russ Pavlicek
<russell.pavlicek@xenproject.org> wrote:
> Our next Document Day is this Wednesday.  This month, we'd like to
> catch up with the latest advances in the project.  Some topics to
> address include:
> - Mirage OS: we need current information about Mirage, with links to
> key pages on the Mirage wiki
> - XAPI: The latest docs from the XenServer crew need to be referenced
> from our wiki
> - Unikernels: Beyond Mirage OS, lots of other Unikernels leverage Xen
> Project; we need them properly linked in to our wiki
> - Raisin: the new effort has a new wiki page which needs review
> - anything else which need to be brought up to date
>
> All the information you need to participate in Document Day is here:
>
> http://wiki.xenproject.org/wiki/Xen_Document_Days
>
> Also take a look at the current TODO list to see other items which
> need attention:
>
> http://wiki.xenproject.org/wiki/Xen_Document_Days/TODO
>
> Please think about how you can help out.  If you haven't requested
> to be made a Wiki editor, save time and do it now so you are ready to
> go on Document Day.  Just fill out the form below:
>
> http://xenproject.org/component/content/article/100-misc/145-request-to-be-made-a-wiki-editor.html
>
> We hope to see you Wednesday in #xendocs!

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 24 03:47:07 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 03:47:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7bdc-00047a-3v; Wed, 24 Jun 2015 03:46:12 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <russell.pavlicek.xen@gmail.com>)
	id 1Z7bda-000474-A1; Wed, 24 Jun 2015 03:46:10 +0000
Received: from [85.158.137.68] by server-15.bemta-3.messagelabs.com id
	2D/0B-28408-1082A855; Wed, 24 Jun 2015 03:46:09 +0000
X-Env-Sender: russell.pavlicek.xen@gmail.com
X-Msg-Ref: server-6.tower-31.messagelabs.com!1435117567!14723422!1
X-Originating-IP: [74.125.82.53]
X-SpamReason: No, hits=2.1 required=7.0 tests=RCVD_BY_IP,
  SUSPICIOUS_RECIPS
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16578 invoked from network); 24 Jun 2015 03:46:07 -0000
Received: from mail-wg0-f53.google.com (HELO mail-wg0-f53.google.com)
	(74.125.82.53)
	by server-6.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	24 Jun 2015 03:46:07 -0000
Received: by wgbhy7 with SMTP id hy7so25050454wgb.2;
	Tue, 23 Jun 2015 20:46:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:sender:in-reply-to:references:date:message-id:subject
	:from:to:cc:content-type;
	bh=Q/QKJsZLEtS31P4U31ChiJF9hqcLITrbnyZKw9yiRU0=;
	b=gza9HsL1PqgxiYSk1zk4Xg9UAu/skcHlAc4ykOzZ7rJyFkUeXh1BptSaqIwlbcV/Xi
	1dQh/w/rZDrBG+o+wn3sZ6WCLczMQr7FT3KAG4Fccqe94tjRsLjgEbmdw/TUuPrwKqvS
	jVET0KfISWDWLNWiztjUjpTBHD188H6FjsLjZwLrnV14MLq0MD3Zwcjlhcqlvjkl2398
	LBRRZvIm5sLPGwhR2PavJspX6Pyp6U/L0BotJud6bqBsRoILWGzsBUBCri5KxSRWOSJn
	Drx9uZCxXg0zArnLD4nbfmkICEpwxOi27Z80hGohLXcBQQZDWT6vSew95q6IT7kT9mHk
	783g==
MIME-Version: 1.0
X-Received: by 10.180.72.179 with SMTP id e19mr700849wiv.53.1435117567176;
	Tue, 23 Jun 2015 20:46:07 -0700 (PDT)
Received: by 10.194.81.99 with HTTP; Tue, 23 Jun 2015 20:46:07 -0700 (PDT)
In-Reply-To: <CAHehzX2t9GBhT8fqnBPMnfXag4rML=Ainq36LAkaB1XaR5RfhA@mail.gmail.com>
References: <CAHehzX2t9GBhT8fqnBPMnfXag4rML=Ainq36LAkaB1XaR5RfhA@mail.gmail.com>
Date: Tue, 23 Jun 2015 23:46:07 -0400
X-Google-Sender-Auth: pgvQ12Jji25rewAcR0IWw2UwKFY
Message-ID: <CAHehzX01ZhE9yyuYQDs0RZL4k=VqfztkLcepYMkJybUkNkPWeA@mail.gmail.com>
From: Russ Pavlicek <russell.pavlicek@xenproject.org>
To: Russ Pavlicek <russell.pavlicek@xenproject.org>
Cc: xen-api@lists.xen.org, "xen-users@lists.xen.org" <xen-users@lists.xen.org>,
	xs-devel@lists.xenserver.org, mirageos-devel@lists.xenproject.org,
	xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [Xen-users] Xen Project Document Day is tomorrow, June 24!
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Document Day is here!  Join us in #xendocs on Freenode IRC and help us
make us our Wiki even better!

On Tue, Jun 23, 2015 at 12:01 AM, Russ Pavlicek
<russell.pavlicek@xenproject.org> wrote:
> Our next Document Day is this Wednesday.  This month, we'd like to
> catch up with the latest advances in the project.  Some topics to
> address include:
> - Mirage OS: we need current information about Mirage, with links to
> key pages on the Mirage wiki
> - XAPI: The latest docs from the XenServer crew need to be referenced
> from our wiki
> - Unikernels: Beyond Mirage OS, lots of other Unikernels leverage Xen
> Project; we need them properly linked in to our wiki
> - Raisin: the new effort has a new wiki page which needs review
> - anything else which need to be brought up to date
>
> All the information you need to participate in Document Day is here:
>
> http://wiki.xenproject.org/wiki/Xen_Document_Days
>
> Also take a look at the current TODO list to see other items which
> need attention:
>
> http://wiki.xenproject.org/wiki/Xen_Document_Days/TODO
>
> Please think about how you can help out.  If you haven't requested
> to be made a Wiki editor, save time and do it now so you are ready to
> go on Document Day.  Just fill out the form below:
>
> http://xenproject.org/component/content/article/100-misc/145-request-to-be-made-a-wiki-editor.html
>
> We hope to see you Wednesday in #xendocs!

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 24 09:21:27 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 09:21:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7gqp-00069C-4N; Wed, 24 Jun 2015 09:20:11 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <lists@babilen5.org>) id 1Z7gqm-000697-UV
	for xen-users@lists.xen.org; Wed, 24 Jun 2015 09:20:09 +0000
Received: from [85.158.139.211] by server-5.bemta-5.messagelabs.com id
	63/FE-19215-8467A855; Wed, 24 Jun 2015 09:20:08 +0000
X-Env-Sender: lists@babilen5.org
X-Msg-Ref: server-2.tower-206.messagelabs.com!1435137607!16478409!1
X-Originating-IP: [217.70.183.195]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMjE3LjcwLjE4My4xOTUgPT4gMzc4NjI=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16706 invoked from network); 24 Jun 2015 09:20:07 -0000
Received: from relay3-d.mail.gandi.net (HELO relay3-d.mail.gandi.net)
	(217.70.183.195)
	by server-2.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 24 Jun 2015 09:20:07 -0000
Received: from localhost (unknown [IPv6:2001:470:51ee:1:6af7:28ff:feb4:3bd8])
	(Authenticated sender: lists@babilen5.org)
	by relay3-d.mail.gandi.net (Postfix) with ESMTPSA id D2A17A8D7D
	for <xen-users@lists.xen.org>; Wed, 24 Jun 2015 11:20:06 +0200 (CEST)
Date: Wed, 24 Jun 2015 11:20:04 +0200
From: Wolodja Wentland <lists@babilen5.org>
To: xen-users@lists.xen.org
Message-ID: <20150624092004.GF10880@bezdomny.local>
MIME-Version: 1.0
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: [Xen-users] [BUG?] Frequent Xen domain crashes with 4.1
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4974313767631077316=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--===============4974313767631077316==
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="Mjqg7Yu+0hL22rav"
Content-Disposition: inline


--Mjqg7Yu+0hL22rav
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hello,

we are seeing frequent (once a week maybe) domain crashes in our infrastruc=
ture
and I would appreciate it a lot if we could be given some input on how to d=
eal
with them (or even gather additional information).

It might very well turn out that upgrading to a newer Xen version is the on=
ly
way to address them, but if this problem is known and can be dealt with eas=
ily
then we would prefer to do that for the time being.

The domains are all running on Debian wheezy hosts with the following Xen
packages installed:

    libxen-4.1                         4.1.4-3+deb7u8
    libxenstore3.0                     4.1.4-3+deb7u8
    xen-hypervisor-4.1-amd64           4.1.4-3+deb7u8
    xen-linux-system-3.2.0-4-amd64     3.2.68-1+deb7u2
    xen-linux-system-amd64             3.2+46
    xen-system-amd64                   4.1.4-3+deb7u8
    xen-tools                          4.3.1-1
    xen-utils-4.1                      4.1.4-3+deb7u8
    xen-utils-common                   4.1.4-3+deb7u8
    xenstore-utils                     4.1.4-3+deb7u8

The hardware they are running on are standard Dell R720 and R730 boxes with
specs such as (let me know if you need more):

    R720xd

    cpu_model: Intel(R) Xeon(R) CPU E5-2670
    kernelrelease: 3.16.0-0.bpo.4-amd64

    R730

    cpu_model: Intel(R) Xeon(R) CPU E5-2697 v2
    kernelrelease: 3.16.0-0.bpo.4-amd64

The crashes we see are being reported in the xend log as:

    [$TIMESTAMP] WARNING (XendDomainInfo:2061) Domain has crashed: name=3D$=
DOMAIN_ID id=3D$ID

And we managed to get some output from the domains from 'xm console':

    --- snip ---
    [2180673.760082] INFO: rcu_bh detected stall on CPU 7 (t=3D0 jiffies)
    [2180673.760105] sending NMI to all CPUs:
    [2180673.760130] BUG: unable to handle kernel paging request at fffffff=
fff5fb310
    [2180673.760143] IP: [<ffffffff81027fd2>] native_apic_mem_write+0x2/0x9
    [2180673.760161] PGD 1607067 PUD 1608067 PMD 172e067 PTE 0
    [2180673.760175] Oops: 0002 1 SMP
    [2180673.760184] CPU 7
    [2180673.760188] Modules linked in: xt_multiport iptable_filter ip_tabl=
es
    x_tables nfsd nfs nfs_acl auth_rpcgss fscache lockd sunrpc evdev corete=
mp
    snd_pcm snd_page_alloc crc32c_intel ghash_clmulni_intel snd_timer snd
    aesni_intel aes_x86_64 soundcore aes_generic pcspkr cryptd ext4 crc16 j=
bd2
    mbcache xen_blkfront xen_netfront
    [2180673.760260]
    [2180673.760269] Pid: 0, comm: swapper/7 Not tainted 3.2.0-4-amd64 #1 D=
ebian
    3.2.68-1+deb7u1
    [2180673.760284] RIP: e030:[<ffffffff81027fd2>] [<ffffffff81027fd2>]
    native_apic_mem_write+0x2/0x9
    [2180673.760305] RSP: e02b:ffff8801ffdc3c90 EFLAGS: 00010086
    [2180673.760313] RAX: 0000000000000000 RBX: ffffffff816800e0 RCX:
    00000000000005e1
    [2180673.760323] RDX: 0000000000000000 RSI: 00000000ff000000 RDI:
    0000000000000310
    [2180673.760334] RBP: 0000000000000002 R08: 0000000000000000 R09:
    0000000000000000
    [2180673.760389] R10: 0000000000000000 R11: 7fffffffffffffff R12:
    0000000000000800
    [2180673.760403] R13: 00000000000000ff R14: ffff8801ffdcda78 R15:
    ffffffff8106c53c
    [2180673.760427] FS: 00007f57831a6700(0000) GS:ffff8801ffdc0000(0000)
    knlGS:0000000000000000
    [2180673.760444] CS: e033 DS: 002b ES: 002b CR0: 000000008005003b
    [2180673.760453] CR2: ffffffffff5fb310 CR3: 00000001f3f9c000 CR4:
    0000000000002660
    [2180673.760462] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
    0000000000000000
    [2180673.760476] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
    0000000000000400
    [2180673.760489] Process swapper/7 (pid: 0, threadinfo ffff8801f6c98000=
, task
    ffff8801f6c70840)
    [2180673.760499] Stack:
    [2180673.760504] ffffffff8102820b 0000000000000000 0000000000002710
    ffffffff81620080
    [2180673.760529] ffffffff81620180 ffff8801ffdc3df0 ffffffff8102514e
    ffff8801ffdcdcb0
    [2180673.760549] ffffffff8109648c 0000000000000000 0043b339e8537589
    0000000000000000
    [2180673.760569] Call Trace:
    [2180673.760577] <IRQ>
    [2180673.760591] [<ffffffff8102820b>] ? _flat_send_IPI_mask+0x4b/0x78
    [2180673.760608] [<ffffffff8102514e>] ? arch_trigger_all_cpu_backtrace+=
0x4d/0x7b
    [2180673.760627] [<ffffffff8109648c>] ? __rcu_pending+0x82/0x358
    [2180673.760653] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.760677] [<ffffffff81096aae>] ? rcu_check_callbacks+0xaf/0xcc
    [2180673.760694] [<ffffffff81052dba>] ? update_process_times+0x31/0x63
    [2180673.760710] [<ffffffff8106c5a6>] ? tick_sched_timer+0x6a/0x90
    [2180673.760722] [<ffffffff81062736>] ? __run_hrtimer+0xac/0x135
    [2180673.760732] [<ffffffff81062e20>] ? hrtimer_interrupt+0xd7/0x1b1
    [2180673.760744] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2180673.760757] [<ffffffff81095543>] ? arch_local_irq_restore+0x7/0x8
    [2180673.760767] [<ffffffff81095edf>]
    ? check_for_new_grace_period.isra.25+0x98/0xa3
    [2180673.760779] [<ffffffff8109150d>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2180673.760791] [<ffffffff8121d25e>] ? disable_pirq+0x2/0x2
    [2180673.760799] [<ffffffff8121ce48>] ? info_for_irq+0x7/0x17
    [2180673.760810] [<ffffffff81093b57>] ? handle_percpu_irq+0x3a/0x4f
    [2180673.760820] [<ffffffff8121d08a>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2180673.760831] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2180673.760842] [<ffffffff81064254>] ? sched_clock_idle_wakeup_event+0=
xf/0x17
    [2180673.760854] [<ffffffff8121e5bc>] ? xen_evtchn_do_upcall+0x22/0x32
    [2180673.760867] [<ffffffff813583fe>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2180673.760875] <EOI>
    [2180673.760883] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2180673.760892] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2180673.760903] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2180673.760915] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2180673.760927] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2180673.760938] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    [2180673.760946] Code: 00 74 18 48 8d 74 24 0c bf 1b 00 00 00 e8 ab fb =
ff ff f6
    c4 04 0f 95 c0 0f b6 c0 48 83 c4 10 c3 90 ff 14 25 d8 57 61 81 c3 89 ff=
 <89> b7
    00 b0 5f ff c3 89 ff 8b 87 00 b0 5f ff c3 48 8b 07 25 ff
    [2180673.761038] RIP [<ffffffff81027fd2>] native_apic_mem_write+0x2/0x9
    [2180673.761050] RSP <ffff8801ffdc3c90>
    [2180673.761056] CR2: ffffffffff5fb310
    [2180673.761068] --[ end trace 1cfa73b4ca2dbc07 ]--
    [2180673.761077] Kernel panic - not syncing: Fatal exception in interru=
pt
    [2180673.761087] Pid: 0, comm: swapper/7 Tainted: G D 3.2.0-4-amd64 #1 =
Debian
    3.2.68-1+deb7u1
    [2180673.761098] Call Trace:
    [2180673.761103] <IRQ> [<ffffffff8134a661>] ? panic+0x95/0x1a2
    [2180673.761120] [<ffffffff810713b7>] ? arch_local_irq_disable+0x7/0x8
    [2180673.761131] [<ffffffff81351107>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2180673.761143] [<ffffffff81351fcc>] ? oops_end+0xa9/0xb6
    [2180673.761153] [<ffffffff81349f8a>] ? no_context+0x1ff/0x20e
    [2180673.761162] [<ffffffff81349818>] ? pmd_val+0x7/0x8
    [2180673.761171] [<ffffffff81349837>] ? pte_offset_kernel+0x16/0x35
    [2180673.761180] [<ffffffff81353fc9>] ? do_page_fault+0x1b6/0x345
    [2180673.761192] [<ffffffff8123abf6>] ? vt_console_print+0x280/0x296
    [2180673.761203] [<ffffffff8102bb5c>] ? pvclock_clocksource_read+0x42/0=
xb2
    [2180673.761213] [<ffffffff810713b7>] ? arch_local_irq_disable+0x7/0x8
    [2180673.761222] [<ffffffff810713c9>] ? arch_local_irq_save+0x11/0x17
    [2180673.761232] [<ffffffff813510c9>] ? _raw_spin_lock_irqsave+0x9/0x25
    [2180673.761242] [<ffffffff810639ef>] ? up+0xb/0x34
    [2180673.761250] [<ffffffff810713af>] ? arch_local_irq_restore+0x7/0x8
    [2180673.761260] [<ffffffff81351107>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2180673.761272] [<ffffffff8104768b>] ? console_unlock+0x1f7/0x206
    [2180673.761283] [<ffffffff81351107>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2180673.761294] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.761304] [<ffffffff813516d5>] ? page_fault+0x25/0x30
    [2180673.761313] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.761324] [<ffffffff81027fd2>] ? native_apic_mem_write+0x2/0x9
    [2180673.761336] [<ffffffff8102820b>] ? _flat_send_IPI_mask+0x4b/0x78
    [2180673.761347] [<ffffffff8102514e>] ? arch_trigger_all_cpu_backtrace+=
0x4d/0x7b
    [2180673.761358] [<ffffffff8109648c>] ? __rcu_pending+0x82/0x358
    [2180673.761410] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.761427] [<ffffffff81096aae>] ? rcu_check_callbacks+0xaf/0xcc
    [2180673.761443] [<ffffffff81052dba>] ? update_process_times+0x31/0x63
    [2180673.761458] [<ffffffff8106c5a6>] ? tick_sched_timer+0x6a/0x90
    [2180673.761470] [<ffffffff81062736>] ? __run_hrtimer+0xac/0x135
    [2180673.761481] [<ffffffff81062e20>] ? hrtimer_interrupt+0xd7/0x1b1
    [2180673.761492] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2180673.761503] [<ffffffff81095543>] ? arch_local_irq_restore+0x7/0x8
    [2180673.761515] [<ffffffff81095edf>]
    ? check_for_new_grace_period.isra.25+0x98/0xa3
    [2180673.761527] [<ffffffff8109150d>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2180673.761537] [<ffffffff8121d25e>] ? disable_pirq+0x2/0x2
    [2180673.761547] [<ffffffff8121ce48>] ? info_for_irq+0x7/0x17
    [2180673.761558] [<ffffffff81093b57>] ? handle_percpu_irq+0x3a/0x4f
    [2180673.761567] [<ffffffff8121d08a>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2180673.761578] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2180673.761589] [<ffffffff81064254>] ? sched_clock_idle_wakeup_event+0=
xf/0x17
    [2180673.761603] [<ffffffff8121e5bc>] ? xen_evtchn_do_upcall+0x22/0x32
    [2180673.761614] [<ffffffff813583fe>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2180673.761621] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x10=
00
    [2180673.761634] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2180673.761645] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2180673.761655] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2180673.761666] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2180673.761675] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    --- snip ---

or


    --- snip ---
    [2281134.304094] INFO: rcu_bh detected stall on CPU 5 (t=3D0 jiffies)
    [2281134.304116] sending NMI to all CPUs:
    [2281134.304141] BUG: unable to handle kernel paging request at
    ffffffffff5fb310
    [2281134.304153] IP: [<ffffffff81027fb2>] native_apic_mem_write+0x2/0x9
    [2281134.304172] PGD 1607067 PUD 1608067 PMD 172d067 PTE 0
    [2281134.304185] Oops: 0002 1 SMP=20
    [2281134.304195] CPU 5=20
    [2281134.304199] Modules linked in: xt_tcpudp xt_multiport iptable_filt=
er
    ip_tables x_tables coretemp evdev crc32c_intel ghash_clmulni_intel snd_=
pcm
    snd_page_alloc aesni_intel snd_timer aes_x86_64 snd aes_generic cryptd
    soundcore pcspkr ext4 crc16 jbd2 mbcache xen_netfront xen_blkfront
    [2281134.304262]=20
    [2281134.304272] Pid: 0, comm: swapper/5 Not tainted 3.2.0-4-amd64 #1 D=
ebian
    3.2.65-1+deb7u2=20
    [2281134.304291] RIP: e030:[<ffffffff81027fb2>] [<ffffffff81027fb2>]
    native_apic_mem_write+0x2/0x9
    [2281134.304314] RSP: e02b:ffff8801ffd43c90 EFLAGS: 00010086
    [2281134.304326] RAX: 0000000000000000 RBX: ffffffff81680060 RCX:
    000000000000022f
    [2281134.304340] RDX: 0000000000000000 RSI: 00000000ff000000 RDI:
    0000000000000310
    [2281134.304354] RBP: 0000000000000002 R08: 0000000000000000 R09:
    0000000000000000
    [2281134.304369] R10: 0000000000000000 R11: 7fffffffffffffff R12:
    0000000000000800
    [2281134.304382] R13: 00000000000000ff R14: ffff8801ffd4da78 R15:
    ffffffff8106c4b4
    [2281134.304410] FS: 00007f08ed8b8740(0000) GS:ffff8801ffd40000(0000)
    knlGS:0000000000000000
    [2281134.304426] CS: e033 DS: 002b ES: 002b CR0: 000000008005003b
    [2281134.304438] CR2: ffffffffff5fb310 CR3: 00000001583e2000 CR4:
    0000000000002660
    [2281134.304454] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
    0000000000000000
    [2281134.304469] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
    0000000000000400
    [2281134.304486] Process swapper/5 (pid: 0, threadinfo ffff8801f6c90000,
    task ffff8801f6c6f800)
    [2281134.304505] Stack:
    [2281134.304512] ffffffff810281eb 0000000000000000 0000000000002710
    ffffffff81620080
    [2281134.304537] ffffffff81620180 ffff8801ffd43df0 ffffffff8102512e
    ffff8801ffd4dcb0
    [2281134.304562] ffffffff810963b8 ffffffff810069aa 0114b8bb8aa723c9
    ffffffff81013e64
    [2281134.304629] Call Trace:
    [2281134.304638] <IRQ>=20
    [2281134.304654] [<ffffffff810281eb>] ? _flat_send_IPI_mask+0x4b/0x78
    [2281134.304690] [<ffffffff8102512e>]
    ? arch_trigger_all_cpu_backtrace+0x4d/0x7b
    [2281134.304711] [<ffffffff810963b8>] ? __rcu_pending+0x82/0x358
    [2281134.304725] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.304737] [<ffffffff81013e64>] ? sched_clock+0x5/0x8
    [2281134.304754] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.304765] [<ffffffff810969da>] ? rcu_check_callbacks+0xaf/0xcc
    [2281134.304778] [<ffffffff81052d66>] ? update_process_times+0x31/0x63
    [2281134.304790] [<ffffffff8106c51e>] ? tick_sched_timer+0x6a/0x90
    [2281134.304801] [<ffffffff810626e2>] ? __run_hrtimer+0xac/0x135
    [2281134.304812] [<ffffffff81062dcc>] ? hrtimer_interrupt+0xd7/0x1b1
    [2281134.304823] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2281134.304837] [<ffffffff81244e09>] ? get_cycles+0x5/0x8
    [2281134.304847] [<ffffffff81245cbb>] ? add_interrupt_randomness+0x38/0=
x155
    [2281134.304858] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.304870] [<ffffffff81091445>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2281134.304881] [<ffffffff8121d04a>] ? disable_pirq+0x2/0x2
    [2281134.304894] [<ffffffff8121cc34>] ? info_for_irq+0x7/0x17
    [2281134.304909] [<ffffffff81093a8f>] ? handle_percpu_irq+0x3a/0x4f
    [2281134.304925] [<ffffffff8121ce76>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2281134.304941] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.304958] [<ffffffff81064200>]
    ? sched_clock_idle_wakeup_event+0xf/0x17
    [2281134.304975] [<ffffffff8121e3a8>] ? xen_evtchn_do_upcall+0x22/0x32
    [2281134.304996] [<ffffffff8135823e>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2281134.305009] <EOI>=20
    [2281134.305022] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305036] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305053] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2281134.305069] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2281134.305086] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2281134.305099] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    [2281134.305112] Code: 00 74 18 48 8d 74 24 0c bf 1b 00 00 00 e8 ab fb =
ff ff
    f6 c4 04 0f 95 c0 0f b6 c0 48 83 c4 10 c3 90 ff 14 25 d8 57 61 81 c3 89=
 ff
    <89> b7 00 b0 5f ff c3 89 ff 8b 87 00 b0 5f ff c3 48 8b 07 25 ff=20
    [2281134.305213] RIP [<ffffffff81027fb2>] native_apic_mem_write+0x2/0x9
    [2281134.305226] RSP <ffff8801ffd43c90>
    [2281134.305231] CR2: ffffffffff5fb310
    [2281134.305244] --[ end trace a9674388af60c44e ]--
    [2281134.305252] Kernel panic - not syncing: Fatal exception in interru=
pt
    [2281134.305263] Pid: 0, comm: swapper/5 Tainted: G D 3.2.0-4-amd64 #1
    Debian 3.2.65-1+deb7u2
    [2281134.305273] Call Trace:
    [2281134.305278] <IRQ> [<ffffffff8134a53c>] ? panic+0x95/0x1a2
    [2281134.305295] [<ffffffff8107132f>] ? arch_local_irq_disable+0x7/0x8
    [2281134.305307] [<ffffffff81350f2f>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2281134.305318] [<ffffffff81351dcc>] ? oops_end+0xa9/0xb6
    [2281134.305329] [<ffffffff81349e7b>] ? no_context+0x1ff/0x20e
    [2281134.305339] [<ffffffff81349709>] ? pmd_val+0x7/0x8
    [2281134.305348] [<ffffffff81349728>] ? pte_offset_kernel+0x16/0x35
    [2281134.305358] [<ffffffff81353dca>] ? do_page_fault+0x1b6/0x345
    [2281134.305370] [<ffffffff8123a9ce>] ? vt_console_print+0x280/0x296
    [2281134.305384] [<ffffffff8102bb5c>] ? pvclock_clocksource_read+0x42/0=
xb2
    [2281134.305393] [<ffffffff8107132f>] ? arch_local_irq_disable+0x7/0x8
    [2281134.305404] [<ffffffff81071341>] ? arch_local_irq_save+0x11/0x17
    [2281134.305416] [<ffffffff81350ef1>] ? _raw_spin_lock_irqsave+0x9/0x25
    [2281134.305427] [<ffffffff8106399b>] ? up+0xb/0x34
    [2281134.305436] [<ffffffff81071327>] ? arch_local_irq_restore+0x7/0x8
    [2281134.305447] [<ffffffff81350f2f>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2281134.305460] [<ffffffff8104764f>] ? console_unlock+0x1f7/0x206
    [2281134.305470] [<ffffffff81350f2f>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2281134.305482] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.305494] [<ffffffff813514d5>] ? page_fault+0x25/0x30
    [2281134.305503] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.305514] [<ffffffff81027fb2>] ? native_apic_mem_write+0x2/0x9
    [2281134.305525] [<ffffffff810281eb>] ? _flat_send_IPI_mask+0x4b/0x78
    [2281134.305537] [<ffffffff8102512e>]
    ? arch_trigger_all_cpu_backtrace+0x4d/0x7b
    [2281134.305547] [<ffffffff810963b8>] ? __rcu_pending+0x82/0x358
    [2281134.305557] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.305567] [<ffffffff81013e64>] ? sched_clock+0x5/0x8
    [2281134.305577] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.305586] [<ffffffff810969da>] ? rcu_check_callbacks+0xaf/0xcc
    [2281134.305596] [<ffffffff81052d66>] ? update_process_times+0x31/0x63
    [2281134.305606] [<ffffffff8106c51e>] ? tick_sched_timer+0x6a/0x90
    [2281134.305618] [<ffffffff810626e2>] ? __run_hrtimer+0xac/0x135
    [2281134.305629] [<ffffffff81062dcc>] ? hrtimer_interrupt+0xd7/0x1b1
    [2281134.305641] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2281134.305656] [<ffffffff81244e09>] ? get_cycles+0x5/0x8
    [2281134.305669] [<ffffffff81245cbb>] ? add_interrupt_randomness+0x38/0=
x155
    [2281134.305682] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305697] [<ffffffff81091445>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2281134.305712] [<ffffffff8121d04a>] ? disable_pirq+0x2/0x2
    [2281134.305726] [<ffffffff8121cc34>] ? info_for_irq+0x7/0x17
    [2281134.305741] [<ffffffff81093a8f>] ? handle_percpu_irq+0x3a/0x4f
    [2281134.305756] [<ffffffff8121ce76>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2281134.305772] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.305788] [<ffffffff81064200>]
    ? sched_clock_idle_wakeup_event+0xf/0x17
    [2281134.305805] [<ffffffff8121e3a8>] ? xen_evtchn_do_upcall+0x22/0x32
    [2281134.305820] [<ffffffff8135823e>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2281134.305830] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x10=
00
    [2281134.305843] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305855] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2281134.311297] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2281134.311297] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2281134.311297] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    --- snip ---

Most crashes look like the above, but in another instance we saw the follow=
ing
which might very well be a different bug:

    --- snip ---
    [827708.124149] [sched_delayed] sched: RT throttling activated
    [1225904.780170] general protection fault: 0000 [#1] SMP=20
    [1225904.780193] Modules linked in: veth bridge stp llc xt_multiport au=
fs(C) ip6table_filter ip6_tables xt_nat ipt_MASQUERADE xt_addrtype iptable_=
nat nf_nat_ipv4 nf_nat xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntr=
ack iptable_filter ip_tables x_tables nf_conntrack x86_pkg_temp_thermal the=
rmal_sys coretemp crct10dif_pclmul crct10dif_common crc32_pclmul ghash_clmu=
lni_intel aesni_intel aes_x86_64 lrw gf128mul evdev glue_helper ablk_helper=
 pcspkr cryptd ext4 crc16 mbcache jbd2 xen_blkfront xen_netfront crc32c_int=
el
    [1225904.780273] CPU: 3 PID: 0 Comm: swapper/3 Tainted: G         C    =
3.16.0-0.bpo.4-amd64 #1 Debian 3.16.7-ckt4-3~bpo70+1
    [1225904.780285] task: ffff8800fa3c13b0 ti: ffff8800fa3c4000 task.ti: f=
fff8800fa3c4000
    [1225904.780293] RIP: e030:[<ffffffff8107bbb8>]  [<ffffffff8107bbb8>] g=
et_next_timer_interrupt+0x158/0x250
    [1225904.780314] RSP: e02b:ffff8800fa3c7df0  EFLAGS: 00010092
    [1225904.780320] RAX: 6c6261736944202e RBX: 0000000112435014 RCX: ffff8=
800f9cad130
    [1225904.780327] RDX: 00000001124350f4 RSI: 0000000000000001 RDI: 00000=
00000000010
    [1225904.780335] RBP: 0000000112434fac R08: 0000000000000010 R09: ffff8=
800f9cad030
    [1225904.780342] R10: 0000000000000000 R11: 0000000001124350 R12: 00000=
00152434fab
    [1225904.780350] R13: ffff8800f9cac000 R14: 0000000000000040 R15: 00000=
00112434fac
    [1225904.780365] FS:  00007f910476d740(0000) GS:ffff8800ff2c0000(0000) =
knlGS:0000000000000000
    [1225904.780373] CS:  e033 DS: 002b ES: 002b CR0: 000000008005003b
    [1225904.780379] CR2: 00007f7503391fd0 CR3: 00000000f847d000 CR4: 00000=
00000002660
    [1225904.780387] Stack:
    [1225904.780391]  ffffffff8100b430 0000000000000000 ffff8800f9cad030 ff=
ff8800f9cad430
    [1225904.780402]  ffff8800f9cad830 ffff8800f9cadc30 ffff8800ff2cda80 00=
045af432f2e0c1
    [1225904.780413]  00045af432f0bb00 ffff8800ff2cae40 0000000000000000 ff=
ffffff810db76d
    [1225904.780423] Call Trace:
    [1225904.780435]  [<ffffffff8100b430>] ? xen_clocksource_read+0x20/0x30
    [1225904.780449]  [<ffffffff810db76d>] ? __tick_nohz_idle_enter+0x26d/0=
x4a0
    [1225904.780459]  [<ffffffff810dbc1d>] ? tick_nohz_idle_enter+0x3d/0x70
    [1225904.780469]  [<ffffffff810b15c2>] ? cpu_startup_entry+0x92/0x4b0
    [1225904.780479]  [<ffffffff8100b139>] ? xen_force_evtchn_callback+0x9/=
0x10
    [1225904.780486]  [<ffffffff8100ba12>] ? check_events+0x12/0x20
    [1225904.780493] Code: 89 d8 41 83 e0 3f 44 89 c7 66 2e 0f 1f 84 00 00 =
00 00 00 48 63 cf 48 c1 e1 04 4c 01 c9 48 8b 01 48 39 c8 74 24 66 0f 1f 44 =
00 00 <f6> 40 18 01 75 10 48 8b 50 10 be 01 00 00 00 48 39 da 48 0f 48=20
    [1225904.780563] RIP  [<ffffffff8107bbb8>] get_next_timer_interrupt+0x1=
58/0x250
    [1225904.780573]  RSP <ffff8800fa3c7df0>
    [1225904.780583] ---[ end trace 2fcf00f1694e8f18 ]---
    [1225904.780591] Kernel panic - not syncing: Attempted to kill the idle=
 task!
    [1225904.780616] Kernel Offset: 0x0 from 0xffffffff81000000 (relocation=
 range: 0xffffffff80000000-0xffffffff9fffffff)
    --- snip ---

What information would be required for a proper bug report or how can we de=
al
with these instances of "sudden cloud death syndrome".
--=20
Wolodja Wentland <lists@babilen5.org>

4096R/CAF14EFC
081C B7CD FF04 2BA9 94EA  36B2 8B7F 7D30 CAF1 4EFC

--Mjqg7Yu+0hL22rav
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=86mz
-----END PGP SIGNATURE-----

--Mjqg7Yu+0hL22rav--


--===============4974313767631077316==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============4974313767631077316==--


From xen-users-bounces@lists.xen.org Wed Jun 24 09:21:27 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 09:21:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7gqp-00069C-4N; Wed, 24 Jun 2015 09:20:11 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <lists@babilen5.org>) id 1Z7gqm-000697-UV
	for xen-users@lists.xen.org; Wed, 24 Jun 2015 09:20:09 +0000
Received: from [85.158.139.211] by server-5.bemta-5.messagelabs.com id
	63/FE-19215-8467A855; Wed, 24 Jun 2015 09:20:08 +0000
X-Env-Sender: lists@babilen5.org
X-Msg-Ref: server-2.tower-206.messagelabs.com!1435137607!16478409!1
X-Originating-IP: [217.70.183.195]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMjE3LjcwLjE4My4xOTUgPT4gMzc4NjI=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16706 invoked from network); 24 Jun 2015 09:20:07 -0000
Received: from relay3-d.mail.gandi.net (HELO relay3-d.mail.gandi.net)
	(217.70.183.195)
	by server-2.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 24 Jun 2015 09:20:07 -0000
Received: from localhost (unknown [IPv6:2001:470:51ee:1:6af7:28ff:feb4:3bd8])
	(Authenticated sender: lists@babilen5.org)
	by relay3-d.mail.gandi.net (Postfix) with ESMTPSA id D2A17A8D7D
	for <xen-users@lists.xen.org>; Wed, 24 Jun 2015 11:20:06 +0200 (CEST)
Date: Wed, 24 Jun 2015 11:20:04 +0200
From: Wolodja Wentland <lists@babilen5.org>
To: xen-users@lists.xen.org
Message-ID: <20150624092004.GF10880@bezdomny.local>
MIME-Version: 1.0
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: [Xen-users] [BUG?] Frequent Xen domain crashes with 4.1
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4974313767631077316=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--===============4974313767631077316==
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="Mjqg7Yu+0hL22rav"
Content-Disposition: inline


--Mjqg7Yu+0hL22rav
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hello,

we are seeing frequent (once a week maybe) domain crashes in our infrastruc=
ture
and I would appreciate it a lot if we could be given some input on how to d=
eal
with them (or even gather additional information).

It might very well turn out that upgrading to a newer Xen version is the on=
ly
way to address them, but if this problem is known and can be dealt with eas=
ily
then we would prefer to do that for the time being.

The domains are all running on Debian wheezy hosts with the following Xen
packages installed:

    libxen-4.1                         4.1.4-3+deb7u8
    libxenstore3.0                     4.1.4-3+deb7u8
    xen-hypervisor-4.1-amd64           4.1.4-3+deb7u8
    xen-linux-system-3.2.0-4-amd64     3.2.68-1+deb7u2
    xen-linux-system-amd64             3.2+46
    xen-system-amd64                   4.1.4-3+deb7u8
    xen-tools                          4.3.1-1
    xen-utils-4.1                      4.1.4-3+deb7u8
    xen-utils-common                   4.1.4-3+deb7u8
    xenstore-utils                     4.1.4-3+deb7u8

The hardware they are running on are standard Dell R720 and R730 boxes with
specs such as (let me know if you need more):

    R720xd

    cpu_model: Intel(R) Xeon(R) CPU E5-2670
    kernelrelease: 3.16.0-0.bpo.4-amd64

    R730

    cpu_model: Intel(R) Xeon(R) CPU E5-2697 v2
    kernelrelease: 3.16.0-0.bpo.4-amd64

The crashes we see are being reported in the xend log as:

    [$TIMESTAMP] WARNING (XendDomainInfo:2061) Domain has crashed: name=3D$=
DOMAIN_ID id=3D$ID

And we managed to get some output from the domains from 'xm console':

    --- snip ---
    [2180673.760082] INFO: rcu_bh detected stall on CPU 7 (t=3D0 jiffies)
    [2180673.760105] sending NMI to all CPUs:
    [2180673.760130] BUG: unable to handle kernel paging request at fffffff=
fff5fb310
    [2180673.760143] IP: [<ffffffff81027fd2>] native_apic_mem_write+0x2/0x9
    [2180673.760161] PGD 1607067 PUD 1608067 PMD 172e067 PTE 0
    [2180673.760175] Oops: 0002 1 SMP
    [2180673.760184] CPU 7
    [2180673.760188] Modules linked in: xt_multiport iptable_filter ip_tabl=
es
    x_tables nfsd nfs nfs_acl auth_rpcgss fscache lockd sunrpc evdev corete=
mp
    snd_pcm snd_page_alloc crc32c_intel ghash_clmulni_intel snd_timer snd
    aesni_intel aes_x86_64 soundcore aes_generic pcspkr cryptd ext4 crc16 j=
bd2
    mbcache xen_blkfront xen_netfront
    [2180673.760260]
    [2180673.760269] Pid: 0, comm: swapper/7 Not tainted 3.2.0-4-amd64 #1 D=
ebian
    3.2.68-1+deb7u1
    [2180673.760284] RIP: e030:[<ffffffff81027fd2>] [<ffffffff81027fd2>]
    native_apic_mem_write+0x2/0x9
    [2180673.760305] RSP: e02b:ffff8801ffdc3c90 EFLAGS: 00010086
    [2180673.760313] RAX: 0000000000000000 RBX: ffffffff816800e0 RCX:
    00000000000005e1
    [2180673.760323] RDX: 0000000000000000 RSI: 00000000ff000000 RDI:
    0000000000000310
    [2180673.760334] RBP: 0000000000000002 R08: 0000000000000000 R09:
    0000000000000000
    [2180673.760389] R10: 0000000000000000 R11: 7fffffffffffffff R12:
    0000000000000800
    [2180673.760403] R13: 00000000000000ff R14: ffff8801ffdcda78 R15:
    ffffffff8106c53c
    [2180673.760427] FS: 00007f57831a6700(0000) GS:ffff8801ffdc0000(0000)
    knlGS:0000000000000000
    [2180673.760444] CS: e033 DS: 002b ES: 002b CR0: 000000008005003b
    [2180673.760453] CR2: ffffffffff5fb310 CR3: 00000001f3f9c000 CR4:
    0000000000002660
    [2180673.760462] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
    0000000000000000
    [2180673.760476] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
    0000000000000400
    [2180673.760489] Process swapper/7 (pid: 0, threadinfo ffff8801f6c98000=
, task
    ffff8801f6c70840)
    [2180673.760499] Stack:
    [2180673.760504] ffffffff8102820b 0000000000000000 0000000000002710
    ffffffff81620080
    [2180673.760529] ffffffff81620180 ffff8801ffdc3df0 ffffffff8102514e
    ffff8801ffdcdcb0
    [2180673.760549] ffffffff8109648c 0000000000000000 0043b339e8537589
    0000000000000000
    [2180673.760569] Call Trace:
    [2180673.760577] <IRQ>
    [2180673.760591] [<ffffffff8102820b>] ? _flat_send_IPI_mask+0x4b/0x78
    [2180673.760608] [<ffffffff8102514e>] ? arch_trigger_all_cpu_backtrace+=
0x4d/0x7b
    [2180673.760627] [<ffffffff8109648c>] ? __rcu_pending+0x82/0x358
    [2180673.760653] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.760677] [<ffffffff81096aae>] ? rcu_check_callbacks+0xaf/0xcc
    [2180673.760694] [<ffffffff81052dba>] ? update_process_times+0x31/0x63
    [2180673.760710] [<ffffffff8106c5a6>] ? tick_sched_timer+0x6a/0x90
    [2180673.760722] [<ffffffff81062736>] ? __run_hrtimer+0xac/0x135
    [2180673.760732] [<ffffffff81062e20>] ? hrtimer_interrupt+0xd7/0x1b1
    [2180673.760744] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2180673.760757] [<ffffffff81095543>] ? arch_local_irq_restore+0x7/0x8
    [2180673.760767] [<ffffffff81095edf>]
    ? check_for_new_grace_period.isra.25+0x98/0xa3
    [2180673.760779] [<ffffffff8109150d>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2180673.760791] [<ffffffff8121d25e>] ? disable_pirq+0x2/0x2
    [2180673.760799] [<ffffffff8121ce48>] ? info_for_irq+0x7/0x17
    [2180673.760810] [<ffffffff81093b57>] ? handle_percpu_irq+0x3a/0x4f
    [2180673.760820] [<ffffffff8121d08a>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2180673.760831] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2180673.760842] [<ffffffff81064254>] ? sched_clock_idle_wakeup_event+0=
xf/0x17
    [2180673.760854] [<ffffffff8121e5bc>] ? xen_evtchn_do_upcall+0x22/0x32
    [2180673.760867] [<ffffffff813583fe>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2180673.760875] <EOI>
    [2180673.760883] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2180673.760892] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2180673.760903] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2180673.760915] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2180673.760927] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2180673.760938] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    [2180673.760946] Code: 00 74 18 48 8d 74 24 0c bf 1b 00 00 00 e8 ab fb =
ff ff f6
    c4 04 0f 95 c0 0f b6 c0 48 83 c4 10 c3 90 ff 14 25 d8 57 61 81 c3 89 ff=
 <89> b7
    00 b0 5f ff c3 89 ff 8b 87 00 b0 5f ff c3 48 8b 07 25 ff
    [2180673.761038] RIP [<ffffffff81027fd2>] native_apic_mem_write+0x2/0x9
    [2180673.761050] RSP <ffff8801ffdc3c90>
    [2180673.761056] CR2: ffffffffff5fb310
    [2180673.761068] --[ end trace 1cfa73b4ca2dbc07 ]--
    [2180673.761077] Kernel panic - not syncing: Fatal exception in interru=
pt
    [2180673.761087] Pid: 0, comm: swapper/7 Tainted: G D 3.2.0-4-amd64 #1 =
Debian
    3.2.68-1+deb7u1
    [2180673.761098] Call Trace:
    [2180673.761103] <IRQ> [<ffffffff8134a661>] ? panic+0x95/0x1a2
    [2180673.761120] [<ffffffff810713b7>] ? arch_local_irq_disable+0x7/0x8
    [2180673.761131] [<ffffffff81351107>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2180673.761143] [<ffffffff81351fcc>] ? oops_end+0xa9/0xb6
    [2180673.761153] [<ffffffff81349f8a>] ? no_context+0x1ff/0x20e
    [2180673.761162] [<ffffffff81349818>] ? pmd_val+0x7/0x8
    [2180673.761171] [<ffffffff81349837>] ? pte_offset_kernel+0x16/0x35
    [2180673.761180] [<ffffffff81353fc9>] ? do_page_fault+0x1b6/0x345
    [2180673.761192] [<ffffffff8123abf6>] ? vt_console_print+0x280/0x296
    [2180673.761203] [<ffffffff8102bb5c>] ? pvclock_clocksource_read+0x42/0=
xb2
    [2180673.761213] [<ffffffff810713b7>] ? arch_local_irq_disable+0x7/0x8
    [2180673.761222] [<ffffffff810713c9>] ? arch_local_irq_save+0x11/0x17
    [2180673.761232] [<ffffffff813510c9>] ? _raw_spin_lock_irqsave+0x9/0x25
    [2180673.761242] [<ffffffff810639ef>] ? up+0xb/0x34
    [2180673.761250] [<ffffffff810713af>] ? arch_local_irq_restore+0x7/0x8
    [2180673.761260] [<ffffffff81351107>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2180673.761272] [<ffffffff8104768b>] ? console_unlock+0x1f7/0x206
    [2180673.761283] [<ffffffff81351107>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2180673.761294] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.761304] [<ffffffff813516d5>] ? page_fault+0x25/0x30
    [2180673.761313] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.761324] [<ffffffff81027fd2>] ? native_apic_mem_write+0x2/0x9
    [2180673.761336] [<ffffffff8102820b>] ? _flat_send_IPI_mask+0x4b/0x78
    [2180673.761347] [<ffffffff8102514e>] ? arch_trigger_all_cpu_backtrace+=
0x4d/0x7b
    [2180673.761358] [<ffffffff8109648c>] ? __rcu_pending+0x82/0x358
    [2180673.761410] [<ffffffff8106c53c>] ? tick_nohz_handler+0xd0/0xd0
    [2180673.761427] [<ffffffff81096aae>] ? rcu_check_callbacks+0xaf/0xcc
    [2180673.761443] [<ffffffff81052dba>] ? update_process_times+0x31/0x63
    [2180673.761458] [<ffffffff8106c5a6>] ? tick_sched_timer+0x6a/0x90
    [2180673.761470] [<ffffffff81062736>] ? __run_hrtimer+0xac/0x135
    [2180673.761481] [<ffffffff81062e20>] ? hrtimer_interrupt+0xd7/0x1b1
    [2180673.761492] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2180673.761503] [<ffffffff81095543>] ? arch_local_irq_restore+0x7/0x8
    [2180673.761515] [<ffffffff81095edf>]
    ? check_for_new_grace_period.isra.25+0x98/0xa3
    [2180673.761527] [<ffffffff8109150d>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2180673.761537] [<ffffffff8121d25e>] ? disable_pirq+0x2/0x2
    [2180673.761547] [<ffffffff8121ce48>] ? info_for_irq+0x7/0x17
    [2180673.761558] [<ffffffff81093b57>] ? handle_percpu_irq+0x3a/0x4f
    [2180673.761567] [<ffffffff8121d08a>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2180673.761578] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2180673.761589] [<ffffffff81064254>] ? sched_clock_idle_wakeup_event+0=
xf/0x17
    [2180673.761603] [<ffffffff8121e5bc>] ? xen_evtchn_do_upcall+0x22/0x32
    [2180673.761614] [<ffffffff813583fe>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2180673.761621] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x10=
00
    [2180673.761634] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2180673.761645] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2180673.761655] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2180673.761666] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2180673.761675] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    --- snip ---

or


    --- snip ---
    [2281134.304094] INFO: rcu_bh detected stall on CPU 5 (t=3D0 jiffies)
    [2281134.304116] sending NMI to all CPUs:
    [2281134.304141] BUG: unable to handle kernel paging request at
    ffffffffff5fb310
    [2281134.304153] IP: [<ffffffff81027fb2>] native_apic_mem_write+0x2/0x9
    [2281134.304172] PGD 1607067 PUD 1608067 PMD 172d067 PTE 0
    [2281134.304185] Oops: 0002 1 SMP=20
    [2281134.304195] CPU 5=20
    [2281134.304199] Modules linked in: xt_tcpudp xt_multiport iptable_filt=
er
    ip_tables x_tables coretemp evdev crc32c_intel ghash_clmulni_intel snd_=
pcm
    snd_page_alloc aesni_intel snd_timer aes_x86_64 snd aes_generic cryptd
    soundcore pcspkr ext4 crc16 jbd2 mbcache xen_netfront xen_blkfront
    [2281134.304262]=20
    [2281134.304272] Pid: 0, comm: swapper/5 Not tainted 3.2.0-4-amd64 #1 D=
ebian
    3.2.65-1+deb7u2=20
    [2281134.304291] RIP: e030:[<ffffffff81027fb2>] [<ffffffff81027fb2>]
    native_apic_mem_write+0x2/0x9
    [2281134.304314] RSP: e02b:ffff8801ffd43c90 EFLAGS: 00010086
    [2281134.304326] RAX: 0000000000000000 RBX: ffffffff81680060 RCX:
    000000000000022f
    [2281134.304340] RDX: 0000000000000000 RSI: 00000000ff000000 RDI:
    0000000000000310
    [2281134.304354] RBP: 0000000000000002 R08: 0000000000000000 R09:
    0000000000000000
    [2281134.304369] R10: 0000000000000000 R11: 7fffffffffffffff R12:
    0000000000000800
    [2281134.304382] R13: 00000000000000ff R14: ffff8801ffd4da78 R15:
    ffffffff8106c4b4
    [2281134.304410] FS: 00007f08ed8b8740(0000) GS:ffff8801ffd40000(0000)
    knlGS:0000000000000000
    [2281134.304426] CS: e033 DS: 002b ES: 002b CR0: 000000008005003b
    [2281134.304438] CR2: ffffffffff5fb310 CR3: 00000001583e2000 CR4:
    0000000000002660
    [2281134.304454] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
    0000000000000000
    [2281134.304469] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
    0000000000000400
    [2281134.304486] Process swapper/5 (pid: 0, threadinfo ffff8801f6c90000,
    task ffff8801f6c6f800)
    [2281134.304505] Stack:
    [2281134.304512] ffffffff810281eb 0000000000000000 0000000000002710
    ffffffff81620080
    [2281134.304537] ffffffff81620180 ffff8801ffd43df0 ffffffff8102512e
    ffff8801ffd4dcb0
    [2281134.304562] ffffffff810963b8 ffffffff810069aa 0114b8bb8aa723c9
    ffffffff81013e64
    [2281134.304629] Call Trace:
    [2281134.304638] <IRQ>=20
    [2281134.304654] [<ffffffff810281eb>] ? _flat_send_IPI_mask+0x4b/0x78
    [2281134.304690] [<ffffffff8102512e>]
    ? arch_trigger_all_cpu_backtrace+0x4d/0x7b
    [2281134.304711] [<ffffffff810963b8>] ? __rcu_pending+0x82/0x358
    [2281134.304725] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.304737] [<ffffffff81013e64>] ? sched_clock+0x5/0x8
    [2281134.304754] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.304765] [<ffffffff810969da>] ? rcu_check_callbacks+0xaf/0xcc
    [2281134.304778] [<ffffffff81052d66>] ? update_process_times+0x31/0x63
    [2281134.304790] [<ffffffff8106c51e>] ? tick_sched_timer+0x6a/0x90
    [2281134.304801] [<ffffffff810626e2>] ? __run_hrtimer+0xac/0x135
    [2281134.304812] [<ffffffff81062dcc>] ? hrtimer_interrupt+0xd7/0x1b1
    [2281134.304823] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2281134.304837] [<ffffffff81244e09>] ? get_cycles+0x5/0x8
    [2281134.304847] [<ffffffff81245cbb>] ? add_interrupt_randomness+0x38/0=
x155
    [2281134.304858] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.304870] [<ffffffff81091445>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2281134.304881] [<ffffffff8121d04a>] ? disable_pirq+0x2/0x2
    [2281134.304894] [<ffffffff8121cc34>] ? info_for_irq+0x7/0x17
    [2281134.304909] [<ffffffff81093a8f>] ? handle_percpu_irq+0x3a/0x4f
    [2281134.304925] [<ffffffff8121ce76>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2281134.304941] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.304958] [<ffffffff81064200>]
    ? sched_clock_idle_wakeup_event+0xf/0x17
    [2281134.304975] [<ffffffff8121e3a8>] ? xen_evtchn_do_upcall+0x22/0x32
    [2281134.304996] [<ffffffff8135823e>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2281134.305009] <EOI>=20
    [2281134.305022] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305036] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305053] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2281134.305069] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2281134.305086] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2281134.305099] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    [2281134.305112] Code: 00 74 18 48 8d 74 24 0c bf 1b 00 00 00 e8 ab fb =
ff ff
    f6 c4 04 0f 95 c0 0f b6 c0 48 83 c4 10 c3 90 ff 14 25 d8 57 61 81 c3 89=
 ff
    <89> b7 00 b0 5f ff c3 89 ff 8b 87 00 b0 5f ff c3 48 8b 07 25 ff=20
    [2281134.305213] RIP [<ffffffff81027fb2>] native_apic_mem_write+0x2/0x9
    [2281134.305226] RSP <ffff8801ffd43c90>
    [2281134.305231] CR2: ffffffffff5fb310
    [2281134.305244] --[ end trace a9674388af60c44e ]--
    [2281134.305252] Kernel panic - not syncing: Fatal exception in interru=
pt
    [2281134.305263] Pid: 0, comm: swapper/5 Tainted: G D 3.2.0-4-amd64 #1
    Debian 3.2.65-1+deb7u2
    [2281134.305273] Call Trace:
    [2281134.305278] <IRQ> [<ffffffff8134a53c>] ? panic+0x95/0x1a2
    [2281134.305295] [<ffffffff8107132f>] ? arch_local_irq_disable+0x7/0x8
    [2281134.305307] [<ffffffff81350f2f>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2281134.305318] [<ffffffff81351dcc>] ? oops_end+0xa9/0xb6
    [2281134.305329] [<ffffffff81349e7b>] ? no_context+0x1ff/0x20e
    [2281134.305339] [<ffffffff81349709>] ? pmd_val+0x7/0x8
    [2281134.305348] [<ffffffff81349728>] ? pte_offset_kernel+0x16/0x35
    [2281134.305358] [<ffffffff81353dca>] ? do_page_fault+0x1b6/0x345
    [2281134.305370] [<ffffffff8123a9ce>] ? vt_console_print+0x280/0x296
    [2281134.305384] [<ffffffff8102bb5c>] ? pvclock_clocksource_read+0x42/0=
xb2
    [2281134.305393] [<ffffffff8107132f>] ? arch_local_irq_disable+0x7/0x8
    [2281134.305404] [<ffffffff81071341>] ? arch_local_irq_save+0x11/0x17
    [2281134.305416] [<ffffffff81350ef1>] ? _raw_spin_lock_irqsave+0x9/0x25
    [2281134.305427] [<ffffffff8106399b>] ? up+0xb/0x34
    [2281134.305436] [<ffffffff81071327>] ? arch_local_irq_restore+0x7/0x8
    [2281134.305447] [<ffffffff81350f2f>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2281134.305460] [<ffffffff8104764f>] ? console_unlock+0x1f7/0x206
    [2281134.305470] [<ffffffff81350f2f>] ? _raw_spin_unlock_irqrestore+0xe=
/0xf
    [2281134.305482] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.305494] [<ffffffff813514d5>] ? page_fault+0x25/0x30
    [2281134.305503] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.305514] [<ffffffff81027fb2>] ? native_apic_mem_write+0x2/0x9
    [2281134.305525] [<ffffffff810281eb>] ? _flat_send_IPI_mask+0x4b/0x78
    [2281134.305537] [<ffffffff8102512e>]
    ? arch_trigger_all_cpu_backtrace+0x4d/0x7b
    [2281134.305547] [<ffffffff810963b8>] ? __rcu_pending+0x82/0x358
    [2281134.305557] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.305567] [<ffffffff81013e64>] ? sched_clock+0x5/0x8
    [2281134.305577] [<ffffffff8106c4b4>] ? tick_nohz_handler+0xd0/0xd0
    [2281134.305586] [<ffffffff810969da>] ? rcu_check_callbacks+0xaf/0xcc
    [2281134.305596] [<ffffffff81052d66>] ? update_process_times+0x31/0x63
    [2281134.305606] [<ffffffff8106c51e>] ? tick_sched_timer+0x6a/0x90
    [2281134.305618] [<ffffffff810626e2>] ? __run_hrtimer+0xac/0x135
    [2281134.305629] [<ffffffff81062dcc>] ? hrtimer_interrupt+0xd7/0x1b1
    [2281134.305641] [<ffffffff810068b9>] ? xen_timer_interrupt+0x28/0xfc
    [2281134.305656] [<ffffffff81244e09>] ? get_cycles+0x5/0x8
    [2281134.305669] [<ffffffff81245cbb>] ? add_interrupt_randomness+0x38/0=
x155
    [2281134.305682] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305697] [<ffffffff81091445>] ? handle_irq_event_percpu+0x50/0x=
17d
    [2281134.305712] [<ffffffff8121d04a>] ? disable_pirq+0x2/0x2
    [2281134.305726] [<ffffffff8121cc34>] ? info_for_irq+0x7/0x17
    [2281134.305741] [<ffffffff81093a8f>] ? handle_percpu_irq+0x3a/0x4f
    [2281134.305756] [<ffffffff8121ce76>] ? __xen_evtchn_do_upcall+0xd3/0x2=
87
    [2281134.305772] [<ffffffff810069aa>] ? xen_clocksource_read+0x1d/0x1f
    [2281134.305788] [<ffffffff81064200>]
    ? sched_clock_idle_wakeup_event+0xf/0x17
    [2281134.305805] [<ffffffff8121e3a8>] ? xen_evtchn_do_upcall+0x22/0x32
    [2281134.305820] [<ffffffff8135823e>] ? xen_do_hypervisor_callback+0x1e=
/0x30
    [2281134.305830] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x10=
00
    [2281134.305843] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
    [2281134.305855] [<ffffffff8100675a>] ? xen_safe_halt+0xc/0x13
    [2281134.311297] [<ffffffff81014938>] ? default_idle+0x47/0x7f
    [2281134.311297] [<ffffffff8100d24c>] ? cpu_idle+0xaf/0xf2
    [2281134.311297] [<ffffffff81006cc9>] ? xen_irq_enable_direct_reloc+0x4=
/0x4
    --- snip ---

Most crashes look like the above, but in another instance we saw the follow=
ing
which might very well be a different bug:

    --- snip ---
    [827708.124149] [sched_delayed] sched: RT throttling activated
    [1225904.780170] general protection fault: 0000 [#1] SMP=20
    [1225904.780193] Modules linked in: veth bridge stp llc xt_multiport au=
fs(C) ip6table_filter ip6_tables xt_nat ipt_MASQUERADE xt_addrtype iptable_=
nat nf_nat_ipv4 nf_nat xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntr=
ack iptable_filter ip_tables x_tables nf_conntrack x86_pkg_temp_thermal the=
rmal_sys coretemp crct10dif_pclmul crct10dif_common crc32_pclmul ghash_clmu=
lni_intel aesni_intel aes_x86_64 lrw gf128mul evdev glue_helper ablk_helper=
 pcspkr cryptd ext4 crc16 mbcache jbd2 xen_blkfront xen_netfront crc32c_int=
el
    [1225904.780273] CPU: 3 PID: 0 Comm: swapper/3 Tainted: G         C    =
3.16.0-0.bpo.4-amd64 #1 Debian 3.16.7-ckt4-3~bpo70+1
    [1225904.780285] task: ffff8800fa3c13b0 ti: ffff8800fa3c4000 task.ti: f=
fff8800fa3c4000
    [1225904.780293] RIP: e030:[<ffffffff8107bbb8>]  [<ffffffff8107bbb8>] g=
et_next_timer_interrupt+0x158/0x250
    [1225904.780314] RSP: e02b:ffff8800fa3c7df0  EFLAGS: 00010092
    [1225904.780320] RAX: 6c6261736944202e RBX: 0000000112435014 RCX: ffff8=
800f9cad130
    [1225904.780327] RDX: 00000001124350f4 RSI: 0000000000000001 RDI: 00000=
00000000010
    [1225904.780335] RBP: 0000000112434fac R08: 0000000000000010 R09: ffff8=
800f9cad030
    [1225904.780342] R10: 0000000000000000 R11: 0000000001124350 R12: 00000=
00152434fab
    [1225904.780350] R13: ffff8800f9cac000 R14: 0000000000000040 R15: 00000=
00112434fac
    [1225904.780365] FS:  00007f910476d740(0000) GS:ffff8800ff2c0000(0000) =
knlGS:0000000000000000
    [1225904.780373] CS:  e033 DS: 002b ES: 002b CR0: 000000008005003b
    [1225904.780379] CR2: 00007f7503391fd0 CR3: 00000000f847d000 CR4: 00000=
00000002660
    [1225904.780387] Stack:
    [1225904.780391]  ffffffff8100b430 0000000000000000 ffff8800f9cad030 ff=
ff8800f9cad430
    [1225904.780402]  ffff8800f9cad830 ffff8800f9cadc30 ffff8800ff2cda80 00=
045af432f2e0c1
    [1225904.780413]  00045af432f0bb00 ffff8800ff2cae40 0000000000000000 ff=
ffffff810db76d
    [1225904.780423] Call Trace:
    [1225904.780435]  [<ffffffff8100b430>] ? xen_clocksource_read+0x20/0x30
    [1225904.780449]  [<ffffffff810db76d>] ? __tick_nohz_idle_enter+0x26d/0=
x4a0
    [1225904.780459]  [<ffffffff810dbc1d>] ? tick_nohz_idle_enter+0x3d/0x70
    [1225904.780469]  [<ffffffff810b15c2>] ? cpu_startup_entry+0x92/0x4b0
    [1225904.780479]  [<ffffffff8100b139>] ? xen_force_evtchn_callback+0x9/=
0x10
    [1225904.780486]  [<ffffffff8100ba12>] ? check_events+0x12/0x20
    [1225904.780493] Code: 89 d8 41 83 e0 3f 44 89 c7 66 2e 0f 1f 84 00 00 =
00 00 00 48 63 cf 48 c1 e1 04 4c 01 c9 48 8b 01 48 39 c8 74 24 66 0f 1f 44 =
00 00 <f6> 40 18 01 75 10 48 8b 50 10 be 01 00 00 00 48 39 da 48 0f 48=20
    [1225904.780563] RIP  [<ffffffff8107bbb8>] get_next_timer_interrupt+0x1=
58/0x250
    [1225904.780573]  RSP <ffff8800fa3c7df0>
    [1225904.780583] ---[ end trace 2fcf00f1694e8f18 ]---
    [1225904.780591] Kernel panic - not syncing: Attempted to kill the idle=
 task!
    [1225904.780616] Kernel Offset: 0x0 from 0xffffffff81000000 (relocation=
 range: 0xffffffff80000000-0xffffffff9fffffff)
    --- snip ---

What information would be required for a proper bug report or how can we de=
al
with these instances of "sudden cloud death syndrome".
--=20
Wolodja Wentland <lists@babilen5.org>

4096R/CAF14EFC
081C B7CD FF04 2BA9 94EA  36B2 8B7F 7D30 CAF1 4EFC

--Mjqg7Yu+0hL22rav
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=86mz
-----END PGP SIGNATURE-----

--Mjqg7Yu+0hL22rav--


--===============4974313767631077316==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============4974313767631077316==--


From xen-users-bounces@lists.xen.org Wed Jun 24 09:48:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 09:48:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7hHm-0000Go-6r; Wed, 24 Jun 2015 09:48:02 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6101d5925=Ian.Campbell@citrix.com>)
	id 1Z7hHj-0000FA-QE
	for xen-users@lists.xen.org; Wed, 24 Jun 2015 09:47:59 +0000
Received: from [85.158.137.68] by server-12.bemta-3.messagelabs.com id
	DC/96-02952-FCC7A855; Wed, 24 Jun 2015 09:47:59 +0000
X-Env-Sender: prvs=6101d5925=Ian.Campbell@citrix.com
X-Msg-Ref: server-14.tower-31.messagelabs.com!1435139277!16833174!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 8376 invoked from network); 24 Jun 2015 09:47:58 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-14.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	24 Jun 2015 09:47:58 -0000
X-IronPort-AV: E=Sophos;i="5.13,671,1427760000"; d="scan'208";a="278019775"
Message-ID: <1435139275.28264.281.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Wolodja Wentland <lists@babilen5.org>
Date: Wed, 24 Jun 2015 10:47:55 +0100
In-Reply-To: <20150624092004.GF10880@bezdomny.local>
References: <20150624092004.GF10880@bezdomny.local>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [BUG?] Frequent Xen domain crashes with 4.1
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-24 at 11:20 +0200, Wolodja Wentland wrote:
> Hello,
> 
> we are seeing frequent (once a week maybe) domain crashes in our infrastructure
> and I would appreciate it a lot if we could be given some input on how to deal
> with them (or even gather additional information).
> 
> It might very well turn out that upgrading to a newer Xen version is the only
> way to address them, but if this problem is known and can be dealt with easily
> then we would prefer to do that for the time being.

According to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758622
(which looks similar) it was suggested to me at one point that a
microcode update might be the answer.

In terms of upgrading I'd be inclined to try and newer domU kernel
version before upgrading Xen, since it seems on the face of it to be an
internal domU issue.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 24 09:48:47 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 09:48:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7hHm-0000Go-6r; Wed, 24 Jun 2015 09:48:02 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=6101d5925=Ian.Campbell@citrix.com>)
	id 1Z7hHj-0000FA-QE
	for xen-users@lists.xen.org; Wed, 24 Jun 2015 09:47:59 +0000
Received: from [85.158.137.68] by server-12.bemta-3.messagelabs.com id
	DC/96-02952-FCC7A855; Wed, 24 Jun 2015 09:47:59 +0000
X-Env-Sender: prvs=6101d5925=Ian.Campbell@citrix.com
X-Msg-Ref: server-14.tower-31.messagelabs.com!1435139277!16833174!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 8376 invoked from network); 24 Jun 2015 09:47:58 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-14.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	24 Jun 2015 09:47:58 -0000
X-IronPort-AV: E=Sophos;i="5.13,671,1427760000"; d="scan'208";a="278019775"
Message-ID: <1435139275.28264.281.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Wolodja Wentland <lists@babilen5.org>
Date: Wed, 24 Jun 2015 10:47:55 +0100
In-Reply-To: <20150624092004.GF10880@bezdomny.local>
References: <20150624092004.GF10880@bezdomny.local>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: xen-users@lists.xen.org
Subject: Re: [Xen-users] [BUG?] Frequent Xen domain crashes with 4.1
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-24 at 11:20 +0200, Wolodja Wentland wrote:
> Hello,
> 
> we are seeing frequent (once a week maybe) domain crashes in our infrastructure
> and I would appreciate it a lot if we could be given some input on how to deal
> with them (or even gather additional information).
> 
> It might very well turn out that upgrading to a newer Xen version is the only
> way to address them, but if this problem is known and can be dealt with easily
> then we would prefer to do that for the time being.

According to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758622
(which looks similar) it was suggested to me at one point that a
microcode update might be the answer.

In terms of upgrading I'd be inclined to try and newer domU kernel
version before upgrading Xen, since it seems on the face of it to be an
internal domU issue.

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Wed Jun 24 11:36:11 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 11:36:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7ixU-0000N2-R4; Wed, 24 Jun 2015 11:35:12 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <lists@babilen5.org>) id 1Z7ixT-0000Mx-3M
	for xen-users@lists.xen.org; Wed, 24 Jun 2015 11:35:11 +0000
Received: from [193.109.254.147] by server-15.bemta-14.messagelabs.com id
	24/7B-18947-EE59A855; Wed, 24 Jun 2015 11:35:10 +0000
X-Env-Sender: lists@babilen5.org
X-Msg-Ref: server-10.tower-27.messagelabs.com!1435145709!26193284!1
X-Originating-IP: [217.70.183.196]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMjE3LjcwLjE4My4xOTYgPT4gMzk1MTY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4573 invoked from network); 24 Jun 2015 11:35:09 -0000
Received: from relay4-d.mail.gandi.net (HELO relay4-d.mail.gandi.net)
	(217.70.183.196)
	by server-10.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 24 Jun 2015 11:35:09 -0000
Received: from localhost (unknown [IPv6:2001:470:51ee:1:6af7:28ff:feb4:3bd8])
	(Authenticated sender: lists@babilen5.org)
	by relay4-d.mail.gandi.net (Postfix) with ESMTPSA id 14132172077
	for <xen-users@lists.xen.org>; Wed, 24 Jun 2015 13:35:08 +0200 (CEST)
Date: Wed, 24 Jun 2015 13:35:06 +0200
From: Wolodja Wentland <lists@babilen5.org>
To: xen-users@lists.xen.org
Message-ID: <20150624113506.GA15710@bezdomny.local>
References: <20150624092004.GF10880@bezdomny.local>
	<1435139275.28264.281.camel@citrix.com>
MIME-Version: 1.0
In-Reply-To: <1435139275.28264.281.camel@citrix.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: Re: [Xen-users] [BUG?] Frequent Xen domain crashes with 4.1
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6571420214878719864=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--===============6571420214878719864==
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="PEIAKu/WMn1b1Hv9"
Content-Disposition: inline


--PEIAKu/WMn1b1Hv9
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Jun 24, 2015 at 10:47 +0100, Ian Campbell wrote:

> According to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=3D758622
> (which looks similar) it was suggested to me at one point that a
> microcode update might be the answer.
>=20
> In terms of upgrading I'd be inclined to try and newer domU kernel
> version before upgrading Xen, since it seems on the face of it to be an
> internal domU issue.

Thank you Ian for your prompt response. These systems are, unfortunately, in
production which makes it tricky to reboot them, but I will investigate how
kernel, BIOS and microcode upgrades influence the situation.
--=20
Wolodja Wentland <lists@babilen5.org>

4096R/CAF14EFC
081C B7CD FF04 2BA9 94EA  36B2 8B7F 7D30 CAF1 4EFC

--PEIAKu/WMn1b1Hv9
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9UPm
-----END PGP SIGNATURE-----

--PEIAKu/WMn1b1Hv9--


--===============6571420214878719864==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6571420214878719864==--


From xen-users-bounces@lists.xen.org Wed Jun 24 11:36:11 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 11:36:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7ixU-0000N2-R4; Wed, 24 Jun 2015 11:35:12 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <lists@babilen5.org>) id 1Z7ixT-0000Mx-3M
	for xen-users@lists.xen.org; Wed, 24 Jun 2015 11:35:11 +0000
Received: from [193.109.254.147] by server-15.bemta-14.messagelabs.com id
	24/7B-18947-EE59A855; Wed, 24 Jun 2015 11:35:10 +0000
X-Env-Sender: lists@babilen5.org
X-Msg-Ref: server-10.tower-27.messagelabs.com!1435145709!26193284!1
X-Originating-IP: [217.70.183.196]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogMjE3LjcwLjE4My4xOTYgPT4gMzk1MTY=\n
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4573 invoked from network); 24 Jun 2015 11:35:09 -0000
Received: from relay4-d.mail.gandi.net (HELO relay4-d.mail.gandi.net)
	(217.70.183.196)
	by server-10.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 24 Jun 2015 11:35:09 -0000
Received: from localhost (unknown [IPv6:2001:470:51ee:1:6af7:28ff:feb4:3bd8])
	(Authenticated sender: lists@babilen5.org)
	by relay4-d.mail.gandi.net (Postfix) with ESMTPSA id 14132172077
	for <xen-users@lists.xen.org>; Wed, 24 Jun 2015 13:35:08 +0200 (CEST)
Date: Wed, 24 Jun 2015 13:35:06 +0200
From: Wolodja Wentland <lists@babilen5.org>
To: xen-users@lists.xen.org
Message-ID: <20150624113506.GA15710@bezdomny.local>
References: <20150624092004.GF10880@bezdomny.local>
	<1435139275.28264.281.camel@citrix.com>
MIME-Version: 1.0
In-Reply-To: <1435139275.28264.281.camel@citrix.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: Re: [Xen-users] [BUG?] Frequent Xen domain crashes with 4.1
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6571420214878719864=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org


--===============6571420214878719864==
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="PEIAKu/WMn1b1Hv9"
Content-Disposition: inline


--PEIAKu/WMn1b1Hv9
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Jun 24, 2015 at 10:47 +0100, Ian Campbell wrote:

> According to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=3D758622
> (which looks similar) it was suggested to me at one point that a
> microcode update might be the answer.
>=20
> In terms of upgrading I'd be inclined to try and newer domU kernel
> version before upgrading Xen, since it seems on the face of it to be an
> internal domU issue.

Thank you Ian for your prompt response. These systems are, unfortunately, in
production which makes it tricky to reboot them, but I will investigate how
kernel, BIOS and microcode upgrades influence the situation.
--=20
Wolodja Wentland <lists@babilen5.org>

4096R/CAF14EFC
081C B7CD FF04 2BA9 94EA  36B2 8B7F 7D30 CAF1 4EFC

--PEIAKu/WMn1b1Hv9
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9UPm
-----END PGP SIGNATURE-----

--PEIAKu/WMn1b1Hv9--


--===============6571420214878719864==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6571420214878719864==--


From xen-users-bounces@lists.xen.org Wed Jun 24 17:39:41 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 17:39:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7odB-0008BW-Au; Wed, 24 Jun 2015 17:38:37 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <brandon@thinkhuge.net>) id 1Z7od9-0008BP-QI
	for Xen-users@lists.xen.org; Wed, 24 Jun 2015 17:38:36 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	93/33-23832-B1BEA855; Wed, 24 Jun 2015 17:38:35 +0000
X-Env-Sender: brandon@thinkhuge.net
X-Msg-Ref: server-8.tower-31.messagelabs.com!1435167512!19422956!1
X-Originating-IP: [209.85.220.48]
X-SpamReason: No, hits=0.0 required=7.0 tests=HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 23049 invoked from network); 24 Jun 2015 17:38:33 -0000
Received: from mail-pa0-f48.google.com (HELO mail-pa0-f48.google.com)
	(209.85.220.48)
	by server-8.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	24 Jun 2015 17:38:33 -0000
Received: by pabvl15 with SMTP id vl15so33147887pab.1
	for <Xen-users@lists.xen.org>; Wed, 24 Jun 2015 10:38:32 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:from:to:subject:date:message-id:mime-version
	:content-type:thread-index:content-language;
	bh=XEhNUGWNoPDaJxEqOVImS4aTFI8Q23CjWDPEuYUSL0w=;
	b=iOUZattwpw3Wi7fy7nMDMfOXoJ/kls70l6aOStzflmXYVTu4a8Kqr+wRES0uNXYZGu
	IVp8Ts1gZ38l3WdZ/LiuPy1V801Bzr0CCs90mlBftr+3HjXnpIR8TKp9r678u3fJtFjv
	onpwUdot1Sd6jOc5Wnx+JIaXEr68QJ23VpIe7v0Jjft2vLhTdQQ9cNG7tcT3/x9maHeM
	O4jEoKp1vB/Zmw1f1A4RcHu2D5bePG0WJSTa70Vxf0ULG05rKHj/QV5s56BZxaGDd1/z
	veCK3UZ/lc3OgkbJEcXR5gmswrVy6yt+X8hoctDE/OTzEqfQmxsNEbOfp+Ad47pGBD/N
	xyJQ==
X-Gm-Message-State: ALoCoQnsM547P7cAh6q4pJiXxSwmMB26OcPB0B5ilW8CeEMlzpBqus90NuWNcaP1btNW0frju2g3
X-Received: by 10.70.44.199 with SMTP id g7mr82057131pdm.27.1435167512103;
	Wed, 24 Jun 2015 10:38:32 -0700 (PDT)
Received: from mercury (ip70-189-227-212.lv.lv.cox.net. [70.189.227.212])
	by mx.google.com with ESMTPSA id
	ry2sm27351077pbb.83.2015.06.24.10.38.29 for <Xen-users@lists.xen.org>
	(version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
	Wed, 24 Jun 2015 10:38:30 -0700 (PDT)
From: "brandon" <brandon@thinkhuge.net>
To: <Xen-users@lists.xen.org>
Date: Wed, 24 Jun 2015 10:38:27 -0700
Message-ID: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdCupExdRhV8QuuqTqC4Sx1zVp6rLA==
Content-Language: en-us
Subject: [Xen-users] virsh/libvirt to Xen 4 XL problem
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8355777894223652941=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multipart message in MIME format.

--===============8355777894223652941==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_02AB_01D0AE69.E903E4D0"
Content-Language: en-us

This is a multipart message in MIME format.

------=_NextPart_000_02AB_01D0AE69.E903E4D0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

 

I am trying to get virsh/libvirt to work with my Xen 4.4.2 converted to
running XL toolstack.   As shown below when I do a simple virsh list I get
blank results though I have two guest VMs running.  Libxl driver pkg is
installed.

 

What do I need to do to get virsh/libvirt working with Xen4 XL?

 

Any help is very appreciated.

 

--

 

[root@xenhost1 ~]# xl list

Name                                        ID   Mem VCPUs      State
Time(s)

Domain-0                                     0  1024     4     r-----
997.8

vm102                                        1  2047     1     -b----
120.9

vm103                                        2  2047     1     r-----
1731.0

 

[root@xenhost1 ~]# virsh list

Id    Name                           State

----------------------------------------------------

 

[root@xenhost1 ~]#

 

[root@xenhost1 ~]# virsh -c xen:/// list

Id    Name                           State

----------------------------------------------------

[root@xenhost1 ~]#

 

--

[root@xenhost1 ~]# xl info

host                   : xenhost1.xxxxxxxxx.us

release                : 3.10.68-11.el6.centos.alt.x86_64

version                : #1 SMP Fri Feb 6 10:40:16 CST 2015

machine                : x86_64

nr_cpus                : 4

max_cpu_id             : 7

nr_nodes               : 1

cores_per_socket       : 2

threads_per_core       : 1

cpu_mhz                : 2999

hw_caps                :
bfebfbff:20100800:00000000:00000100:0000e4bd:00000000:00000001:00000000

virt_caps              : hvm

total_memory           : 32765

free_memory            : 27268

sharing_freed_memory   : 0

sharing_used_memory    : 0

outstanding_claims     : 0

free_cpus              : 0

xen_major              : 4

xen_minor              : 4

xen_extra              : .2-4.el6

xen_version            : 4.4.2-4.el6

xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
hvm-3.0-x86_32p hvm-3.0-x86_64

xen_scheduler          : credit

xen_pagesize           : 4096

platform_params        : virt_start=0xffff800000000000

xen_changeset          : Thu Apr 23 15:06:13 2015 +0100 git:7e7c01e-dirty

xen_commandline        : dom0_mem=1024M,max:1536M loglvl=all
guest_loglvl=all

cc_compiler            : gcc (GCC) 4.4.7 20120313 (Red Hat 4.4.7-11)

cc_compile_by          : mockbuild

cc_compile_domain      : centos.org

cc_compile_date        : Thu Jun 11 12:16:40 UTC 2015

xend_config_format     : 4

 

--

[root@xenhost1 ~]# rpm -qa|grep libvirt

libvirt-daemon-config-nwfilter-1.2.10-3.el6.x86_64

libvirt-daemon-driver-interface-1.2.10-3.el6.x86_64

libvirt-daemon-driver-network-1.2.10-3.el6.x86_64

libvirt-1.2.10-3.el6.x86_64

libvirt-client-1.2.10-3.el6.x86_64

libvirt-daemon-driver-nwfilter-1.2.10-3.el6.x86_64

libvirt-daemon-driver-libxl-1.2.10-3.el6.x86_64

libvirt-daemon-driver-storage-1.2.10-3.el6.x86_64

libvirt-daemon-driver-secret-1.2.10-3.el6.x86_64

libvirt-daemon-driver-qemu-1.2.10-3.el6.x86_64

libvirt-daemon-driver-lxc-1.2.10-3.el6.x86_64

libvirt-daemon-1.2.10-3.el6.x86_64

libvirt-daemon-driver-xen-1.2.10-3.el6.x86_64

libvirt-daemon-driver-nodedev-1.2.10-3.el6.x86_64

libvirt-daemon-config-network-1.2.10-3.el6.x86_64

[root@xenhost1 ~]#


------=_NextPart_000_02AB_01D0AE69.E903E4D0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal>Hi,<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I am trying =
to get virsh/libvirt to work with my Xen 4.4.2 converted to running XL =
toolstack.&nbsp;&nbsp; As shown below when I do a simple virsh list I =
get blank results though I have two guest VMs running.&nbsp; Libxl =
driver pkg is installed.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>What do I =
need to do to get virsh/libvirt working with Xen4 XL?<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Any help is =
very appreciated.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>--<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]# xl list<o:p></o:p></p><p =
class=3DMsoNormal>Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ID&nbsp;&nbsp; Mem =
VCPUs&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; State&nbsp;&nbsp; =
Time(s)<o:p></o:p></p><p =
class=3DMsoNormal>Domain-0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;0&nbsp; 1024&nbsp;&nbsp;&nbsp;&nbsp; 4&nbsp;&nbsp;&nbsp;&nbsp; =
r-----&nbsp;&nbsp;&nbsp;&nbsp; 997.8<o:p></o:p></p><p =
class=3DMsoNormal>vm102&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1&nbsp; =
2047&nbsp;&nbsp;&nbsp;&nbsp; 1&nbsp;&nbsp;&nbsp;&nbsp; =
-b----&nbsp;&nbsp;&nbsp;&nbsp; 120.9<o:p></o:p></p><p =
class=3DMsoNormal>vm103&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2&nbsp; =
2047&nbsp;&nbsp;&nbsp;&nbsp; 1&nbsp;&nbsp;&nbsp;&nbsp; =
r-----&nbsp;&nbsp;&nbsp; 1731.0<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]# virsh list<o:p></o:p></p><p =
class=3DMsoNormal> Id&nbsp;&nbsp;&nbsp; =
Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; State<o:p></o:p></p><p =
class=3DMsoNormal>----------------------------------------------------<o:=
p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]#<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]# virsh -c xen:/// =
list<o:p></o:p></p><p class=3DMsoNormal> Id&nbsp;&nbsp;&nbsp; =
Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; State<o:p></o:p></p><p =
class=3DMsoNormal>----------------------------------------------------<o:=
p></o:p></p><p class=3DMsoNormal>[root@xenhost1 ~]#<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>--<o:p></o:p></p><p class=3DMsoNormal>[root@xenhost1 =
~]# xl info<o:p></o:p></p><p =
class=3DMsoNormal>host&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
xenhost1.xxxxxxxxx.us<o:p></o:p></p><p =
class=3DMsoNormal>release&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
3.10.68-11.el6.centos.alt.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>version&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : #1 SMP Fri Feb 6 10:40:16 =
CST 2015<o:p></o:p></p><p =
class=3DMsoNormal>machine&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : x86_64<o:p></o:p></p><p =
class=3DMsoNormal>nr_cpus&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 4<o:p></o:p></p><p =
class=3DMsoNormal>max_cpu_id&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; : 7<o:p></o:p></p><p =
class=3DMsoNormal>nr_nodes&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 1<o:p></o:p></p><p =
class=3DMsoNormal>cores_per_socket&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
2<o:p></o:p></p><p =
class=3DMsoNormal>threads_per_core&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
1<o:p></o:p></p><p =
class=3DMsoNormal>cpu_mhz&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 2999<o:p></o:p></p><p =
class=3DMsoNormal>hw_caps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
bfebfbff:20100800:00000000:00000100:0000e4bd:00000000:00000001:00000000<o=
:p></o:p></p><p =
class=3DMsoNormal>virt_caps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : hvm<o:p></o:p></p><p =
class=3DMsoNormal>total_memory&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; : 32765<o:p></o:p></p><p =
class=3DMsoNormal>free_memory&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp; : 27268<o:p></o:p></p><p =
class=3DMsoNormal>sharing_freed_memory&nbsp;&nbsp; : 0<o:p></o:p></p><p =
class=3DMsoNormal>sharing_used_memory&nbsp;&nbsp;&nbsp; : =
0<o:p></o:p></p><p =
class=3DMsoNormal>outstanding_claims&nbsp;&nbsp;&nbsp;&nbsp; : =
0<o:p></o:p></p><p =
class=3DMsoNormal>free_cpus&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 0<o:p></o:p></p><p =
class=3DMsoNormal>xen_major&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 4<o:p></o:p></p><p =
class=3DMsoNormal>xen_minor&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 4<o:p></o:p></p><p =
class=3DMsoNormal>xen_extra&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : .2-4.el6<o:p></o:p></p><p =
class=3DMsoNormal>xen_version&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; &nbsp;&nbsp;: 4.4.2-4.el6<o:p></o:p></p><p =
class=3DMsoNormal>xen_caps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : xen-3.0-x86_64 xen-3.0-x86_32p =
hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64<o:p></o:p></p><p =
class=3DMsoNormal>xen_scheduler&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; : credit<o:p></o:p></p><p =
class=3DMsoNormal>xen_pagesize&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; : 4096<o:p></o:p></p><p =
class=3DMsoNormal>platform_params&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; : virt_start=3D0xffff800000000000<o:p></o:p></p><p =
class=3DMsoNormal>xen_changeset&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
 &nbsp;&nbsp;: Thu Apr 23 15:06:13 2015 +0100 =
git:7e7c01e-dirty<o:p></o:p></p><p =
class=3DMsoNormal>xen_commandline&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; : dom0_mem=3D1024M,max:1536M loglvl=3Dall =
guest_loglvl=3Dall<o:p></o:p></p><p =
class=3DMsoNormal>cc_compiler&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp; : gcc (GCC) 4.4.7 20120313 (Red Hat =
4.4.7-11)<o:p></o:p></p><p =
class=3DMsoNormal>cc_compile_by&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; : mockbuild<o:p></o:p></p><p =
class=3DMsoNormal>cc_compile_domain&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
centos.org<o:p></o:p></p><p =
class=3DMsoNormal>cc_compile_date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; : Thu Jun 11 12:16:40 UTC 2015<o:p></o:p></p><p =
class=3DMsoNormal>xend_config_format&nbsp;&nbsp;&nbsp;&nbsp; : =
4<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>--<o:p></o:p></p><p class=3DMsoNormal>[root@xenhost1 =
~]# rpm -qa|grep libvirt<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-config-nwfilter-1.2.10-3.el6.x86_64<o:p>=
</o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-interface-1.2.10-3.el6.x86_64<o:p=
></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-network-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p =
class=3DMsoNormal>libvirt-1.2.10-3.el6.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-client-1.2.10-3.el6.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-nwfilter-1.2.10-3.el6.x86_64<o:p>=
</o:p></p><p class=3DMsoNormal><span =
style=3D'color:red'>libvirt-daemon-driver-libxl-1.2.10-3.el6.x86_64<o:p><=
/o:p></span></p><p =
class=3DMsoNormal>libvirt-daemon-driver-storage-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-secret-1.2.10-3.el6.x86_64<o:p></=
o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-qemu-1.2.10-3.el6.x86_64<o:p></o:=
p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-lxc-1.2.10-3.el6.x86_64<o:p></o:p=
></p><p =
class=3DMsoNormal>libvirt-daemon-1.2.10-3.el6.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-xen-1.2.10-3.el6.x86_64<o:p></o:p=
></p><p =
class=3DMsoNormal>libvirt-daemon-driver-nodedev-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p =
class=3DMsoNormal>libvirt-daemon-config-network-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p class=3DMsoNormal>[root@xenhost1 =
~]#<o:p></o:p></p></div></body></html>
------=_NextPart_000_02AB_01D0AE69.E903E4D0--



--===============8355777894223652941==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8355777894223652941==--



From xen-users-bounces@lists.xen.org Wed Jun 24 17:39:41 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2015 17:39:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z7odB-0008BW-Au; Wed, 24 Jun 2015 17:38:37 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <brandon@thinkhuge.net>) id 1Z7od9-0008BP-QI
	for Xen-users@lists.xen.org; Wed, 24 Jun 2015 17:38:36 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	93/33-23832-B1BEA855; Wed, 24 Jun 2015 17:38:35 +0000
X-Env-Sender: brandon@thinkhuge.net
X-Msg-Ref: server-8.tower-31.messagelabs.com!1435167512!19422956!1
X-Originating-IP: [209.85.220.48]
X-SpamReason: No, hits=0.0 required=7.0 tests=HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 23049 invoked from network); 24 Jun 2015 17:38:33 -0000
Received: from mail-pa0-f48.google.com (HELO mail-pa0-f48.google.com)
	(209.85.220.48)
	by server-8.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	24 Jun 2015 17:38:33 -0000
Received: by pabvl15 with SMTP id vl15so33147887pab.1
	for <Xen-users@lists.xen.org>; Wed, 24 Jun 2015 10:38:32 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:from:to:subject:date:message-id:mime-version
	:content-type:thread-index:content-language;
	bh=XEhNUGWNoPDaJxEqOVImS4aTFI8Q23CjWDPEuYUSL0w=;
	b=iOUZattwpw3Wi7fy7nMDMfOXoJ/kls70l6aOStzflmXYVTu4a8Kqr+wRES0uNXYZGu
	IVp8Ts1gZ38l3WdZ/LiuPy1V801Bzr0CCs90mlBftr+3HjXnpIR8TKp9r678u3fJtFjv
	onpwUdot1Sd6jOc5Wnx+JIaXEr68QJ23VpIe7v0Jjft2vLhTdQQ9cNG7tcT3/x9maHeM
	O4jEoKp1vB/Zmw1f1A4RcHu2D5bePG0WJSTa70Vxf0ULG05rKHj/QV5s56BZxaGDd1/z
	veCK3UZ/lc3OgkbJEcXR5gmswrVy6yt+X8hoctDE/OTzEqfQmxsNEbOfp+Ad47pGBD/N
	xyJQ==
X-Gm-Message-State: ALoCoQnsM547P7cAh6q4pJiXxSwmMB26OcPB0B5ilW8CeEMlzpBqus90NuWNcaP1btNW0frju2g3
X-Received: by 10.70.44.199 with SMTP id g7mr82057131pdm.27.1435167512103;
	Wed, 24 Jun 2015 10:38:32 -0700 (PDT)
Received: from mercury (ip70-189-227-212.lv.lv.cox.net. [70.189.227.212])
	by mx.google.com with ESMTPSA id
	ry2sm27351077pbb.83.2015.06.24.10.38.29 for <Xen-users@lists.xen.org>
	(version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
	Wed, 24 Jun 2015 10:38:30 -0700 (PDT)
From: "brandon" <brandon@thinkhuge.net>
To: <Xen-users@lists.xen.org>
Date: Wed, 24 Jun 2015 10:38:27 -0700
Message-ID: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdCupExdRhV8QuuqTqC4Sx1zVp6rLA==
Content-Language: en-us
Subject: [Xen-users] virsh/libvirt to Xen 4 XL problem
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8355777894223652941=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multipart message in MIME format.

--===============8355777894223652941==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_02AB_01D0AE69.E903E4D0"
Content-Language: en-us

This is a multipart message in MIME format.

------=_NextPart_000_02AB_01D0AE69.E903E4D0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

 

I am trying to get virsh/libvirt to work with my Xen 4.4.2 converted to
running XL toolstack.   As shown below when I do a simple virsh list I get
blank results though I have two guest VMs running.  Libxl driver pkg is
installed.

 

What do I need to do to get virsh/libvirt working with Xen4 XL?

 

Any help is very appreciated.

 

--

 

[root@xenhost1 ~]# xl list

Name                                        ID   Mem VCPUs      State
Time(s)

Domain-0                                     0  1024     4     r-----
997.8

vm102                                        1  2047     1     -b----
120.9

vm103                                        2  2047     1     r-----
1731.0

 

[root@xenhost1 ~]# virsh list

Id    Name                           State

----------------------------------------------------

 

[root@xenhost1 ~]#

 

[root@xenhost1 ~]# virsh -c xen:/// list

Id    Name                           State

----------------------------------------------------

[root@xenhost1 ~]#

 

--

[root@xenhost1 ~]# xl info

host                   : xenhost1.xxxxxxxxx.us

release                : 3.10.68-11.el6.centos.alt.x86_64

version                : #1 SMP Fri Feb 6 10:40:16 CST 2015

machine                : x86_64

nr_cpus                : 4

max_cpu_id             : 7

nr_nodes               : 1

cores_per_socket       : 2

threads_per_core       : 1

cpu_mhz                : 2999

hw_caps                :
bfebfbff:20100800:00000000:00000100:0000e4bd:00000000:00000001:00000000

virt_caps              : hvm

total_memory           : 32765

free_memory            : 27268

sharing_freed_memory   : 0

sharing_used_memory    : 0

outstanding_claims     : 0

free_cpus              : 0

xen_major              : 4

xen_minor              : 4

xen_extra              : .2-4.el6

xen_version            : 4.4.2-4.el6

xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
hvm-3.0-x86_32p hvm-3.0-x86_64

xen_scheduler          : credit

xen_pagesize           : 4096

platform_params        : virt_start=0xffff800000000000

xen_changeset          : Thu Apr 23 15:06:13 2015 +0100 git:7e7c01e-dirty

xen_commandline        : dom0_mem=1024M,max:1536M loglvl=all
guest_loglvl=all

cc_compiler            : gcc (GCC) 4.4.7 20120313 (Red Hat 4.4.7-11)

cc_compile_by          : mockbuild

cc_compile_domain      : centos.org

cc_compile_date        : Thu Jun 11 12:16:40 UTC 2015

xend_config_format     : 4

 

--

[root@xenhost1 ~]# rpm -qa|grep libvirt

libvirt-daemon-config-nwfilter-1.2.10-3.el6.x86_64

libvirt-daemon-driver-interface-1.2.10-3.el6.x86_64

libvirt-daemon-driver-network-1.2.10-3.el6.x86_64

libvirt-1.2.10-3.el6.x86_64

libvirt-client-1.2.10-3.el6.x86_64

libvirt-daemon-driver-nwfilter-1.2.10-3.el6.x86_64

libvirt-daemon-driver-libxl-1.2.10-3.el6.x86_64

libvirt-daemon-driver-storage-1.2.10-3.el6.x86_64

libvirt-daemon-driver-secret-1.2.10-3.el6.x86_64

libvirt-daemon-driver-qemu-1.2.10-3.el6.x86_64

libvirt-daemon-driver-lxc-1.2.10-3.el6.x86_64

libvirt-daemon-1.2.10-3.el6.x86_64

libvirt-daemon-driver-xen-1.2.10-3.el6.x86_64

libvirt-daemon-driver-nodedev-1.2.10-3.el6.x86_64

libvirt-daemon-config-network-1.2.10-3.el6.x86_64

[root@xenhost1 ~]#


------=_NextPart_000_02AB_01D0AE69.E903E4D0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal>Hi,<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I am trying =
to get virsh/libvirt to work with my Xen 4.4.2 converted to running XL =
toolstack.&nbsp;&nbsp; As shown below when I do a simple virsh list I =
get blank results though I have two guest VMs running.&nbsp; Libxl =
driver pkg is installed.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>What do I =
need to do to get virsh/libvirt working with Xen4 XL?<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Any help is =
very appreciated.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>--<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]# xl list<o:p></o:p></p><p =
class=3DMsoNormal>Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ID&nbsp;&nbsp; Mem =
VCPUs&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; State&nbsp;&nbsp; =
Time(s)<o:p></o:p></p><p =
class=3DMsoNormal>Domain-0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;0&nbsp; 1024&nbsp;&nbsp;&nbsp;&nbsp; 4&nbsp;&nbsp;&nbsp;&nbsp; =
r-----&nbsp;&nbsp;&nbsp;&nbsp; 997.8<o:p></o:p></p><p =
class=3DMsoNormal>vm102&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1&nbsp; =
2047&nbsp;&nbsp;&nbsp;&nbsp; 1&nbsp;&nbsp;&nbsp;&nbsp; =
-b----&nbsp;&nbsp;&nbsp;&nbsp; 120.9<o:p></o:p></p><p =
class=3DMsoNormal>vm103&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2&nbsp; =
2047&nbsp;&nbsp;&nbsp;&nbsp; 1&nbsp;&nbsp;&nbsp;&nbsp; =
r-----&nbsp;&nbsp;&nbsp; 1731.0<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]# virsh list<o:p></o:p></p><p =
class=3DMsoNormal> Id&nbsp;&nbsp;&nbsp; =
Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; State<o:p></o:p></p><p =
class=3DMsoNormal>----------------------------------------------------<o:=
p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]#<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>[root@xenhost1 ~]# virsh -c xen:/// =
list<o:p></o:p></p><p class=3DMsoNormal> Id&nbsp;&nbsp;&nbsp; =
Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; State<o:p></o:p></p><p =
class=3DMsoNormal>----------------------------------------------------<o:=
p></o:p></p><p class=3DMsoNormal>[root@xenhost1 ~]#<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>--<o:p></o:p></p><p class=3DMsoNormal>[root@xenhost1 =
~]# xl info<o:p></o:p></p><p =
class=3DMsoNormal>host&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
xenhost1.xxxxxxxxx.us<o:p></o:p></p><p =
class=3DMsoNormal>release&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
3.10.68-11.el6.centos.alt.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>version&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : #1 SMP Fri Feb 6 10:40:16 =
CST 2015<o:p></o:p></p><p =
class=3DMsoNormal>machine&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : x86_64<o:p></o:p></p><p =
class=3DMsoNormal>nr_cpus&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 4<o:p></o:p></p><p =
class=3DMsoNormal>max_cpu_id&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; : 7<o:p></o:p></p><p =
class=3DMsoNormal>nr_nodes&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 1<o:p></o:p></p><p =
class=3DMsoNormal>cores_per_socket&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
2<o:p></o:p></p><p =
class=3DMsoNormal>threads_per_core&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
1<o:p></o:p></p><p =
class=3DMsoNormal>cpu_mhz&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 2999<o:p></o:p></p><p =
class=3DMsoNormal>hw_caps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
bfebfbff:20100800:00000000:00000100:0000e4bd:00000000:00000001:00000000<o=
:p></o:p></p><p =
class=3DMsoNormal>virt_caps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : hvm<o:p></o:p></p><p =
class=3DMsoNormal>total_memory&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; : 32765<o:p></o:p></p><p =
class=3DMsoNormal>free_memory&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp; : 27268<o:p></o:p></p><p =
class=3DMsoNormal>sharing_freed_memory&nbsp;&nbsp; : 0<o:p></o:p></p><p =
class=3DMsoNormal>sharing_used_memory&nbsp;&nbsp;&nbsp; : =
0<o:p></o:p></p><p =
class=3DMsoNormal>outstanding_claims&nbsp;&nbsp;&nbsp;&nbsp; : =
0<o:p></o:p></p><p =
class=3DMsoNormal>free_cpus&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 0<o:p></o:p></p><p =
class=3DMsoNormal>xen_major&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 4<o:p></o:p></p><p =
class=3DMsoNormal>xen_minor&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 4<o:p></o:p></p><p =
class=3DMsoNormal>xen_extra&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : .2-4.el6<o:p></o:p></p><p =
class=3DMsoNormal>xen_version&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; &nbsp;&nbsp;: 4.4.2-4.el6<o:p></o:p></p><p =
class=3DMsoNormal>xen_caps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : xen-3.0-x86_64 xen-3.0-x86_32p =
hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64<o:p></o:p></p><p =
class=3DMsoNormal>xen_scheduler&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; : credit<o:p></o:p></p><p =
class=3DMsoNormal>xen_pagesize&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; : 4096<o:p></o:p></p><p =
class=3DMsoNormal>platform_params&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; : virt_start=3D0xffff800000000000<o:p></o:p></p><p =
class=3DMsoNormal>xen_changeset&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
 &nbsp;&nbsp;: Thu Apr 23 15:06:13 2015 +0100 =
git:7e7c01e-dirty<o:p></o:p></p><p =
class=3DMsoNormal>xen_commandline&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; : dom0_mem=3D1024M,max:1536M loglvl=3Dall =
guest_loglvl=3Dall<o:p></o:p></p><p =
class=3DMsoNormal>cc_compiler&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp; : gcc (GCC) 4.4.7 20120313 (Red Hat =
4.4.7-11)<o:p></o:p></p><p =
class=3DMsoNormal>cc_compile_by&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; : mockbuild<o:p></o:p></p><p =
class=3DMsoNormal>cc_compile_domain&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
centos.org<o:p></o:p></p><p =
class=3DMsoNormal>cc_compile_date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; : Thu Jun 11 12:16:40 UTC 2015<o:p></o:p></p><p =
class=3DMsoNormal>xend_config_format&nbsp;&nbsp;&nbsp;&nbsp; : =
4<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>--<o:p></o:p></p><p class=3DMsoNormal>[root@xenhost1 =
~]# rpm -qa|grep libvirt<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-config-nwfilter-1.2.10-3.el6.x86_64<o:p>=
</o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-interface-1.2.10-3.el6.x86_64<o:p=
></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-network-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p =
class=3DMsoNormal>libvirt-1.2.10-3.el6.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-client-1.2.10-3.el6.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-nwfilter-1.2.10-3.el6.x86_64<o:p>=
</o:p></p><p class=3DMsoNormal><span =
style=3D'color:red'>libvirt-daemon-driver-libxl-1.2.10-3.el6.x86_64<o:p><=
/o:p></span></p><p =
class=3DMsoNormal>libvirt-daemon-driver-storage-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-secret-1.2.10-3.el6.x86_64<o:p></=
o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-qemu-1.2.10-3.el6.x86_64<o:p></o:=
p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-lxc-1.2.10-3.el6.x86_64<o:p></o:p=
></p><p =
class=3DMsoNormal>libvirt-daemon-1.2.10-3.el6.x86_64<o:p></o:p></p><p =
class=3DMsoNormal>libvirt-daemon-driver-xen-1.2.10-3.el6.x86_64<o:p></o:p=
></p><p =
class=3DMsoNormal>libvirt-daemon-driver-nodedev-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p =
class=3DMsoNormal>libvirt-daemon-config-network-1.2.10-3.el6.x86_64<o:p><=
/o:p></p><p class=3DMsoNormal>[root@xenhost1 =
~]#<o:p></o:p></p></div></body></html>
------=_NextPart_000_02AB_01D0AE69.E903E4D0--



--===============8355777894223652941==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8355777894223652941==--



From xen-users-bounces@lists.xen.org Thu Jun 25 08:46:14 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jun 2015 08:46:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z82mV-0000vO-JJ; Thu, 25 Jun 2015 08:45:11 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=611ba0aa7=Ian.Campbell@citrix.com>)
	id 1Z82mU-0000vJ-CN
	for Xen-users@lists.xen.org; Thu, 25 Jun 2015 08:45:10 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	27/6F-32733-59FBB855; Thu, 25 Jun 2015 08:45:09 +0000
X-Env-Sender: prvs=611ba0aa7=Ian.Campbell@citrix.com
X-Msg-Ref: server-16.tower-27.messagelabs.com!1435221907!18937371!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20599 invoked from network); 25 Jun 2015 08:45:08 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-16.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	25 Jun 2015 08:45:08 -0000
X-IronPort-AV: E=Sophos;i="5.13,675,1427760000"; d="scan'208";a="278418764"
Message-ID: <1435221904.28264.308.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: brandon <brandon@thinkhuge.net>
Date: Thu, 25 Jun 2015 09:45:04 +0100
In-Reply-To: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
References: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] virsh/libvirt to Xen 4 XL problem
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-24 at 10:38 -0700, brandon wrote:
> Hi,
> 
>  
> 
> I am trying to get virsh/libvirt to work with my Xen 4.4.2 converted
> to running XL toolstack.   As shown below when I do a simple virsh
> list I get blank results though I have two guest VMs running.  Libxl
> driver pkg is installed.
> 
>  
> 
> What do I need to do to get virsh/libvirt working with Xen4 XL?

There was a period of time where although xl and libvirt could (mostly
peacefully) coexist they weren't mutually aware of the domains which the
other had created. It's possible that the versions of things you've got
fall into that bracket.

If you use virsh to start a domain does it appear in virsh list?

The other thing to check is that there is no vestiges of xend (pre-xl
toolstack) on the system -- in particular that the xend daemon isn't
running.

BTW, virsh list excludes dom0 whereas xl list includes it, not sure if
that was something which was a concern.

Ian.




_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Thu Jun 25 08:46:14 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jun 2015 08:46:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z82mV-0000vO-JJ; Thu, 25 Jun 2015 08:45:11 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=611ba0aa7=Ian.Campbell@citrix.com>)
	id 1Z82mU-0000vJ-CN
	for Xen-users@lists.xen.org; Thu, 25 Jun 2015 08:45:10 +0000
Received: from [193.109.254.147] by server-8.bemta-14.messagelabs.com id
	27/6F-32733-59FBB855; Thu, 25 Jun 2015 08:45:09 +0000
X-Env-Sender: prvs=611ba0aa7=Ian.Campbell@citrix.com
X-Msg-Ref: server-16.tower-27.messagelabs.com!1435221907!18937371!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 20599 invoked from network); 25 Jun 2015 08:45:08 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-16.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	25 Jun 2015 08:45:08 -0000
X-IronPort-AV: E=Sophos;i="5.13,675,1427760000"; d="scan'208";a="278418764"
Message-ID: <1435221904.28264.308.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: brandon <brandon@thinkhuge.net>
Date: Thu, 25 Jun 2015 09:45:04 +0100
In-Reply-To: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
References: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] virsh/libvirt to Xen 4 XL problem
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Wed, 2015-06-24 at 10:38 -0700, brandon wrote:
> Hi,
> 
>  
> 
> I am trying to get virsh/libvirt to work with my Xen 4.4.2 converted
> to running XL toolstack.   As shown below when I do a simple virsh
> list I get blank results though I have two guest VMs running.  Libxl
> driver pkg is installed.
> 
>  
> 
> What do I need to do to get virsh/libvirt working with Xen4 XL?

There was a period of time where although xl and libvirt could (mostly
peacefully) coexist they weren't mutually aware of the domains which the
other had created. It's possible that the versions of things you've got
fall into that bracket.

If you use virsh to start a domain does it appear in virsh list?

The other thing to check is that there is no vestiges of xend (pre-xl
toolstack) on the system -- in particular that the xend daemon isn't
running.

BTW, virsh list excludes dom0 whereas xl list includes it, not sure if
that was something which was a concern.

Ian.




_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 26 10:12:05 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 10:12:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8QbC-0002xK-7z; Fri, 26 Jun 2015 10:11:06 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <van.freenix@gmail.com>)
	id 1Z87qI-0006VM-S6; Thu, 25 Jun 2015 14:09:27 +0000
Received: from [85.158.139.211] by server-9.bemta-5.messagelabs.com id
	38/CF-21325-69B0C855; Thu, 25 Jun 2015 14:09:26 +0000
X-Env-Sender: van.freenix@gmail.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1435241363!13525005!1
X-Originating-IP: [209.85.192.44]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14579 invoked from network); 25 Jun 2015 14:09:24 -0000
Received: from mail-qg0-f44.google.com (HELO mail-qg0-f44.google.com)
	(209.85.192.44)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	25 Jun 2015 14:09:24 -0000
Received: by qgev13 with SMTP id v13so24988913qge.1;
	Thu, 25 Jun 2015 07:09:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=message-id:date:from:user-agent:mime-version:to:cc:subject
	:references:in-reply-to:content-type:content-transfer-encoding;
	bh=xQ6aMEnf2HsECAwNBUai9ZXkB0Yvi+NSGXe27oLDlkw=;
	b=depzTuGVOdnnfQdgo2XMTT5cgrWPIwTWaze9PRp0HEJ480dxwKYwxUr5fUhTqlN108
	/r6ZhFuns81wGW5L0wW5/UOc8XMJWgO9Vw0tqc+IXeZUgi+xgyS8ZJOFvxJX9TFltODp
	oHCDRf3FyqqfUNv9g/ohj3xU7NccmvPiuaIJXSllUyUMIheEZXytrqoF+7hk//AAcw52
	YyPaUz5YdAJNtltpQ0bq5iLE5gnVZEbFjn4dkFit4Mo0QnEsD0/lgxpz7/2ErnEW/TRZ
	PDMNakKJVmk2R09oyFyLtxt/mFeBsPUNyDyLqnDv3EvS74Y76aXL7pJDpjPAwoyePfll
	Dyiw==
X-Received: by 10.140.84.179 with SMTP id l48mr58761554qgd.11.1435241363634;
	Thu, 25 Jun 2015 07:09:23 -0700 (PDT)
Received: from [10.214.82.52] (gate-tx3.freescale.com. [192.88.168.1])
	by mx.google.com with ESMTPSA id q22sm5023085qkq.4.2015.06.25.07.09.17
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Thu, 25 Jun 2015 07:09:22 -0700 (PDT)
Message-ID: <558C0B89.7070809@gmail.com>
Date: Thu, 25 Jun 2015 22:09:13 +0800
From: Peng Fan <van.freenix@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Julien Grall <julien.grall@citrix.com>, 
	Ian Campbell <ian.campbell@citrix.com>
References: <5582D109.2000409@gmail.com>	<1434639280.28264.42.camel@citrix.com>	<55841799.6000406@gmail.com>	<55853E20.6030700@gmail.com>	<558573D0.6010207@gmail.com>	<55857CF7.4000300@gmail.com>	<5587E175.90704@citrix.com>	<5587EEE6.7030706@gmail.com>
	<5588157E.2030701@citrix.com> <55895915.1010601@gmail.com>
	<558960D7.3000806@citrix.com> <55896582.1030701@gmail.com>
In-Reply-To: <55896582.1030701@gmail.com>
X-Mailman-Approved-At: Fri, 26 Jun 2015 10:11:05 +0000
Cc: "xen-devel"@lists.xen.org,
	Stefano Stabellini <stefano.stabellini@eu.citrix.com>,
	xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-devel] Dom0 kernel panic when porting xen to
	new arm soc
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Julien,

On 6/23/2015 9:56 PM, Peng Fan wrote:
> Hi,
> 
> On 6/23/2015 9:36 PM, Julien Grall wrote:
>> Hi,
>>
>> On 23/06/15 14:03, Peng Fan wrote:
>>> I did not enable LPAE for DOM0 kernel, use shor page table.
>>> Following is the full log from uboot to kernel with DOM0 512M:
>>
>> Which CONFIG_VMSPLIT_* do you use? Can you try to use another one? I
>> remembered it had some effect on the offset between physical and virtual
>> address.
>  CONFIG_VMSPLIT_2G=y
> 
> CONFIG_PAGE_OFFSET=0x80000000
> 
> ok. Will try 3G:1G split.
Later I'll reply with log info about this(Do not have log at hand).
Still panic, maybe something wrong with gnutab configration in my side,
I use default gnutab address/size.

Current I met a DomU boot issue, if do not use blk backend, DomU can
boot with ramfs as rootfs. If use an image file as rootfs, DomU can not
boot.

I am not sure why this happends:"
libxl: error: libxl_create.c:1195:domcreate_launch_dm: unable to add
disk devices
libxl: error: libxl_device.c:799:libxl__initiate_device_remove: unable
to get my domid
"
By using gdb, I found domcreate_launch_dm fails to get domid, then it
reports unable to add disk devices. I am not familiar with xenstore and
etc. Did I miss some configuation?

My cfg file:"
kernel = "/home/root/xen/domu.image"
memory = "128"
name = "domU"
vcpus = 1
serial="pty"
disk = [ 'phy:/dev/loop0,xvda,w' ]
extra = "earlyprintk=xenboot console=hvc0 root=/dev/xvda debug=/bin/sh"
"
My init script when Dom0 boots up:
"
mount -t xenfs xenfs /proc/xen

export LD_LIBRARY_PATH=/usr/local/lib

echo "Starting Xenstored"
xenstored -T /root/xenstored.log
echo "Xenstored started"

echo "Starting xenconsoled"
xenconsoled -i &
echo "Xenconsoled started"

echo "Setting up loop0"
losetup /dev/loop0 DomU.image
losetup -a

echo "Writing dom0 name to xenstore"
/usr/local/bin/xenstore-write "/local/domain/0/name" "Domain-0"
echo "Done"

mkdir -p /var/log/xen
"

Detail log when creat DomU:
xen# xl -vvv create -d  DomU-test
Parsing config from DomU-test
{
    "domid": null,
    "config": {
        "c_info": {
            "type": "pv",
            "name": "domU",
            "uuid": "67000363-4ae4-41a5-9c1f-293c1b69aa69",
            "run_hotplug_scripts": "True"
        },
        "b_info": {
            "max_vcpus": 1,
            "avail_vcpus": [
                0
            ],
            "max_memkb": 131072,
            "target_memkb": 131072,
            "shadow_memkb": 2048,
            "sched_params": {

            },
            "claim_mode": "True",
            "kernel": "/home/root/xen/domu.image",
            "cmdline": "earlyprintk=xenboot console=hvc0 root=/dev/xvda
debug=/bin/sh",
            "type.pv": {

            }
        },
        "disks": [
            {
                "pdev_path": "/dev/loop0",
                "vdev": "xvda",
                "format": "raw",
                "readwrite": 1
            }
        ],
        "on_reboot": "restart"
    }
}
libxl: debug: libxl_create.c:1544:do_domain_create: ao 0x42eb80: create:
how=(nil) callback=(nil) poller=0x42eb08
libxl: debug: libxl_arm.c:58:libxl__arch_domain_prepare_config:
Configure the domain
libxl: debug: libxl_arm.c:61:libxl__arch_domain_prepare_config:  -
Allocate 0 SPIs
libxl: debug: libxl_device.c:269:libxl__device_disk_set_backend: Disk
vdev=xvda spec.backend=unknown
libxl: debug: libxl_device.c:298:libxl__device_disk_set_backend: Disk
vdev=xvda, using backend phy
libxl: debug: libxl_create.c:949:initiate_domain_create: running bootloader
libxl: debug: libxl_bootloader.c:329:libxl__bootloader_run: no
bootloader configured, using user supplied kernel
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42a7cc: deregister unregistered
domainbuilder: detail: xc_dom_allocate: cmdline="earlyprintk=xenboot
console=hvc0 root=/dev/xvda debug=/bin/sh", features="(null)"
libxl: debug: libxl_dom.c:630:libxl__build_pv: pv kernel mapped 0 path
/home/root/xen/domu.image
domainbuilder: detail: xc_dom_kernel_file:
filename="/home/root/xen/domu.image"
domainbuilder: detail: xc_dom_malloc_filemap    : 6116 kB
domainbuilder: detail: xc_dom_boot_xen_init: ver 4.6, caps xen-3.0-armv7l
domainbuilder: detail: xc_dom_rambase_init: RAM starts at 40000
domainbuilder: detail: xc_dom_parse_image: called
domainbuilder: detail: xc_dom_find_loader: trying multiboot-binary
loader ...
domainbuilder: detail: loader probe failed
domainbuilder: detail: xc_dom_find_loader: trying Linux zImage (ARM64)
loader ...
domainbuilder: detail: xc_dom_probe_zimage64_kernel: kernel is not an
arm64 Image
domainbuilder: detail: loader probe failed
domainbuilder: detail: xc_dom_find_loader: trying Linux zImage (ARM32)
loader ...
domainbuilder: detail: loader probe OK
domainbuilder: detail: xc_dom_parse_zimage32_kernel: called
domainbuilder: detail: xc_dom_parse_zimage32_kernel: xen-3.0-armv7l:
0x40008000 -> 0x406012f8
libxl: debug: libxl_arm.c:571:libxl__arch_domain_init_hw_description:
constructing DTB for Xen version 4.6 guest
libxl: debug: libxl_arm.c:572:libxl__arch_domain_init_hw_description:  -
vGIC version: V2
libxl: debug: libxl_arm.c:333:make_memory_nodes: Creating placeholder
node /memory@40000000
libxl: debug: libxl_arm.c:333:make_memory_nodes: Creating placeholder
node /memory@200000000
libxl: debug: libxl_arm.c:647:libxl__arch_domain_init_hw_description:
fdt total size 1290
domainbuilder: detail: xc_dom_devicetree_mem: called
domainbuilder: detail: xc_dom_mem_init: mem 128 MB, pages 0x8000 pages,
4k each
domainbuilder: detail: xc_dom_mem_init: 0x8000 pages
domainbuilder: detail: xc_dom_boot_mem_init: called
domainbuilder: detail: set_mode: guest xen-3.0-armv7l, address size 32
domainbuilder: detail: xc_dom_malloc            : 256 kB
domainbuilder: detail: populate_guest_memory: populating RAM @
0000000040000000-0000000048000000 (128MB)
domainbuilder: detail: populate_one_size: populated 0x40/0x40 entries
with shift 9
domainbuilder: detail: arch_setup_meminit: placing boot modules at
0x47fff000
domainbuilder: detail: arch_setup_meminit: devicetree: 0x47fff000 ->
0x48000000
libxl: debug: libxl_arm.c:678:finalise_one_memory_node: Populating
placeholder node /memory@40000000
libxl: debug: libxl_arm.c:672:finalise_one_memory_node: Nopping out
placeholder node /memory@200000000
domainbuilder: detail: xc_dom_build_image: called
domainbuilder: detail: xc_dom_alloc_segment:   kernel       : 0x40008000
-> 0x40602000  (pfn 0x40008 + 0x5fa pages)
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x40008+0x5fa at 0x75e8e000
domainbuilder: detail: xc_dom_load_zimage_kernel: called
domainbuilder: detail: xc_dom_load_zimage_kernel: kernel seg
0x40008000-0x40602000
domainbuilder: detail: xc_dom_load_zimage_kernel: copy 6263544 bytes
from blob 0x764c9000 to dst 0x75e8e000
domainbuilder: detail: xc_dom_alloc_segment:   devicetree   : 0x47fff000
-> 0x48000000  (pfn 0x47fff + 0x1 pages)
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x47fff+0x1 at 0x76f13000
domainbuilder: detail: alloc_magic_pages: called
domainbuilder: detail: count_pgtables_arm: called
domainbuilder: detail: xc_dom_build_image  : virt_alloc_end : 0x48000000
domainbuilder: detail: xc_dom_build_image  : virt_pgtab_end : 0x0
domainbuilder: detail: xc_dom_boot_image: called
domainbuilder: detail: arch_setup_bootearly: doing nothing
domainbuilder: detail: xc_dom_compat_check: supported guest type:
xen-3.0-armv7l <= matches
domainbuilder: detail: setup_pgtables_arm: called
domainbuilder: detail: clear_page: pfn 0x39000, mfn 0x39000
domainbuilder: detail: clear_page: pfn 0x39001, mfn 0x39001
domainbuilder: detail: start_info_arm: called
domainbuilder: detail: domain builder memory footprint
domainbuilder: detail:    allocated
domainbuilder: detail:       malloc             : 293 kB
domainbuilder: detail:       anon mmap          : 0 bytes
domainbuilder: detail:    mapped
domainbuilder: detail:       file mmap          : 6116 kB
domainbuilder: detail:       domU mmap          : 6124 kB
domainbuilder: detail: vcpu_arm32: called
domainbuilder: detail: Initial state CPSR 0x1d3 PC 0x40008000
domainbuilder: detail: launch_vm: called, ctxt=0x76f15004
domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=0x38000
domainbuilder: detail: xc_dom_release: called
libxl: debug: libxl_device.c:269:libxl__device_disk_set_backend: Disk
vdev=xvda spec.backend=phy
libxl: debug: libxl_event.c:600:libxl__ev_xswatch_register: watch
w=0x42f330 wpath=/local/domain/0/backend/vbd/5/51712/state token=3/0:
register slotnum=3
libxl: debug: libxl_create.c:1560:do_domain_create: ao 0x42eb80:
inprogress: poller=0x42eb08, flags=i
libxl: debug: libxl_event.c:537:watchfd_callback: watch w=0x42f330
wpath=/local/domain/0/backend/vbd/5/51712/state token=3/0: event
epath=/local/domain/0/backend/vbd/5/51712/state
libxl: debug: libxl_event.c:841:devstate_watch_callback: backend
/local/domain/0/backend/vbd/5/51712/state wanted state 2 ok
libxl: debug: libxl_event.c:638:libxl__ev_xswatch_deregister: watch
w=0x42f330 wpath=/local/domain/0/backend/vbd/5/51712/state token=3/0:
deregister slotnum=3
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42f330: deregister unregistered
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42f378: deregister unregistered
libxl: error: libxl_create.c:1195:domcreate_launch_dm: unable to add
disk devices
libxl: error: libxl_device.c:799:libxl__initiate_device_remove: unable
to get my domid
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42e548: deregister unregistered
libxl: error: libxl.c:1657:devices_destroy_cb: libxl__devices_destroy
failed for 5
libxl: debug: libxl.c:1701:devices_destroy_cb: forked pid 763 for
destroy of domain 5
libxl: debug: libxl_event.c:1768:libxl__ao_complete: ao 0x42eb80:
complete, rc=-3
libxl: debug: libxl_event.c:1740:libxl__ao__destroy: ao 0x42eb80: destroy
xc: debug: hypercall buffer: total allocations:99 total releases:99
xc: debug: hypercall buffer: current allocations:0 maximum allocations:3
xc: debug: hypercall buffer: cache current size:3
xc: debug: hypercall buffer: cache hits:89 misses:3 toobig:7


>>
>> Regards,
>>
> Thanks,
> Peng.
> 
Thanks,
Peng.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 26 10:12:05 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 10:12:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8QbC-0002xK-7z; Fri, 26 Jun 2015 10:11:06 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <van.freenix@gmail.com>)
	id 1Z87qI-0006VM-S6; Thu, 25 Jun 2015 14:09:27 +0000
Received: from [85.158.139.211] by server-9.bemta-5.messagelabs.com id
	38/CF-21325-69B0C855; Thu, 25 Jun 2015 14:09:26 +0000
X-Env-Sender: van.freenix@gmail.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1435241363!13525005!1
X-Originating-IP: [209.85.192.44]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 14579 invoked from network); 25 Jun 2015 14:09:24 -0000
Received: from mail-qg0-f44.google.com (HELO mail-qg0-f44.google.com)
	(209.85.192.44)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	25 Jun 2015 14:09:24 -0000
Received: by qgev13 with SMTP id v13so24988913qge.1;
	Thu, 25 Jun 2015 07:09:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=message-id:date:from:user-agent:mime-version:to:cc:subject
	:references:in-reply-to:content-type:content-transfer-encoding;
	bh=xQ6aMEnf2HsECAwNBUai9ZXkB0Yvi+NSGXe27oLDlkw=;
	b=depzTuGVOdnnfQdgo2XMTT5cgrWPIwTWaze9PRp0HEJ480dxwKYwxUr5fUhTqlN108
	/r6ZhFuns81wGW5L0wW5/UOc8XMJWgO9Vw0tqc+IXeZUgi+xgyS8ZJOFvxJX9TFltODp
	oHCDRf3FyqqfUNv9g/ohj3xU7NccmvPiuaIJXSllUyUMIheEZXytrqoF+7hk//AAcw52
	YyPaUz5YdAJNtltpQ0bq5iLE5gnVZEbFjn4dkFit4Mo0QnEsD0/lgxpz7/2ErnEW/TRZ
	PDMNakKJVmk2R09oyFyLtxt/mFeBsPUNyDyLqnDv3EvS74Y76aXL7pJDpjPAwoyePfll
	Dyiw==
X-Received: by 10.140.84.179 with SMTP id l48mr58761554qgd.11.1435241363634;
	Thu, 25 Jun 2015 07:09:23 -0700 (PDT)
Received: from [10.214.82.52] (gate-tx3.freescale.com. [192.88.168.1])
	by mx.google.com with ESMTPSA id q22sm5023085qkq.4.2015.06.25.07.09.17
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Thu, 25 Jun 2015 07:09:22 -0700 (PDT)
Message-ID: <558C0B89.7070809@gmail.com>
Date: Thu, 25 Jun 2015 22:09:13 +0800
From: Peng Fan <van.freenix@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Julien Grall <julien.grall@citrix.com>, 
	Ian Campbell <ian.campbell@citrix.com>
References: <5582D109.2000409@gmail.com>	<1434639280.28264.42.camel@citrix.com>	<55841799.6000406@gmail.com>	<55853E20.6030700@gmail.com>	<558573D0.6010207@gmail.com>	<55857CF7.4000300@gmail.com>	<5587E175.90704@citrix.com>	<5587EEE6.7030706@gmail.com>
	<5588157E.2030701@citrix.com> <55895915.1010601@gmail.com>
	<558960D7.3000806@citrix.com> <55896582.1030701@gmail.com>
In-Reply-To: <55896582.1030701@gmail.com>
X-Mailman-Approved-At: Fri, 26 Jun 2015 10:11:05 +0000
Cc: "xen-devel"@lists.xen.org,
	Stefano Stabellini <stefano.stabellini@eu.citrix.com>,
	xen-users@lists.xen.org
Subject: Re: [Xen-users] [Xen-devel] Dom0 kernel panic when porting xen to
	new arm soc
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi Julien,

On 6/23/2015 9:56 PM, Peng Fan wrote:
> Hi,
> 
> On 6/23/2015 9:36 PM, Julien Grall wrote:
>> Hi,
>>
>> On 23/06/15 14:03, Peng Fan wrote:
>>> I did not enable LPAE for DOM0 kernel, use shor page table.
>>> Following is the full log from uboot to kernel with DOM0 512M:
>>
>> Which CONFIG_VMSPLIT_* do you use? Can you try to use another one? I
>> remembered it had some effect on the offset between physical and virtual
>> address.
>  CONFIG_VMSPLIT_2G=y
> 
> CONFIG_PAGE_OFFSET=0x80000000
> 
> ok. Will try 3G:1G split.
Later I'll reply with log info about this(Do not have log at hand).
Still panic, maybe something wrong with gnutab configration in my side,
I use default gnutab address/size.

Current I met a DomU boot issue, if do not use blk backend, DomU can
boot with ramfs as rootfs. If use an image file as rootfs, DomU can not
boot.

I am not sure why this happends:"
libxl: error: libxl_create.c:1195:domcreate_launch_dm: unable to add
disk devices
libxl: error: libxl_device.c:799:libxl__initiate_device_remove: unable
to get my domid
"
By using gdb, I found domcreate_launch_dm fails to get domid, then it
reports unable to add disk devices. I am not familiar with xenstore and
etc. Did I miss some configuation?

My cfg file:"
kernel = "/home/root/xen/domu.image"
memory = "128"
name = "domU"
vcpus = 1
serial="pty"
disk = [ 'phy:/dev/loop0,xvda,w' ]
extra = "earlyprintk=xenboot console=hvc0 root=/dev/xvda debug=/bin/sh"
"
My init script when Dom0 boots up:
"
mount -t xenfs xenfs /proc/xen

export LD_LIBRARY_PATH=/usr/local/lib

echo "Starting Xenstored"
xenstored -T /root/xenstored.log
echo "Xenstored started"

echo "Starting xenconsoled"
xenconsoled -i &
echo "Xenconsoled started"

echo "Setting up loop0"
losetup /dev/loop0 DomU.image
losetup -a

echo "Writing dom0 name to xenstore"
/usr/local/bin/xenstore-write "/local/domain/0/name" "Domain-0"
echo "Done"

mkdir -p /var/log/xen
"

Detail log when creat DomU:
xen# xl -vvv create -d  DomU-test
Parsing config from DomU-test
{
    "domid": null,
    "config": {
        "c_info": {
            "type": "pv",
            "name": "domU",
            "uuid": "67000363-4ae4-41a5-9c1f-293c1b69aa69",
            "run_hotplug_scripts": "True"
        },
        "b_info": {
            "max_vcpus": 1,
            "avail_vcpus": [
                0
            ],
            "max_memkb": 131072,
            "target_memkb": 131072,
            "shadow_memkb": 2048,
            "sched_params": {

            },
            "claim_mode": "True",
            "kernel": "/home/root/xen/domu.image",
            "cmdline": "earlyprintk=xenboot console=hvc0 root=/dev/xvda
debug=/bin/sh",
            "type.pv": {

            }
        },
        "disks": [
            {
                "pdev_path": "/dev/loop0",
                "vdev": "xvda",
                "format": "raw",
                "readwrite": 1
            }
        ],
        "on_reboot": "restart"
    }
}
libxl: debug: libxl_create.c:1544:do_domain_create: ao 0x42eb80: create:
how=(nil) callback=(nil) poller=0x42eb08
libxl: debug: libxl_arm.c:58:libxl__arch_domain_prepare_config:
Configure the domain
libxl: debug: libxl_arm.c:61:libxl__arch_domain_prepare_config:  -
Allocate 0 SPIs
libxl: debug: libxl_device.c:269:libxl__device_disk_set_backend: Disk
vdev=xvda spec.backend=unknown
libxl: debug: libxl_device.c:298:libxl__device_disk_set_backend: Disk
vdev=xvda, using backend phy
libxl: debug: libxl_create.c:949:initiate_domain_create: running bootloader
libxl: debug: libxl_bootloader.c:329:libxl__bootloader_run: no
bootloader configured, using user supplied kernel
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42a7cc: deregister unregistered
domainbuilder: detail: xc_dom_allocate: cmdline="earlyprintk=xenboot
console=hvc0 root=/dev/xvda debug=/bin/sh", features="(null)"
libxl: debug: libxl_dom.c:630:libxl__build_pv: pv kernel mapped 0 path
/home/root/xen/domu.image
domainbuilder: detail: xc_dom_kernel_file:
filename="/home/root/xen/domu.image"
domainbuilder: detail: xc_dom_malloc_filemap    : 6116 kB
domainbuilder: detail: xc_dom_boot_xen_init: ver 4.6, caps xen-3.0-armv7l
domainbuilder: detail: xc_dom_rambase_init: RAM starts at 40000
domainbuilder: detail: xc_dom_parse_image: called
domainbuilder: detail: xc_dom_find_loader: trying multiboot-binary
loader ...
domainbuilder: detail: loader probe failed
domainbuilder: detail: xc_dom_find_loader: trying Linux zImage (ARM64)
loader ...
domainbuilder: detail: xc_dom_probe_zimage64_kernel: kernel is not an
arm64 Image
domainbuilder: detail: loader probe failed
domainbuilder: detail: xc_dom_find_loader: trying Linux zImage (ARM32)
loader ...
domainbuilder: detail: loader probe OK
domainbuilder: detail: xc_dom_parse_zimage32_kernel: called
domainbuilder: detail: xc_dom_parse_zimage32_kernel: xen-3.0-armv7l:
0x40008000 -> 0x406012f8
libxl: debug: libxl_arm.c:571:libxl__arch_domain_init_hw_description:
constructing DTB for Xen version 4.6 guest
libxl: debug: libxl_arm.c:572:libxl__arch_domain_init_hw_description:  -
vGIC version: V2
libxl: debug: libxl_arm.c:333:make_memory_nodes: Creating placeholder
node /memory@40000000
libxl: debug: libxl_arm.c:333:make_memory_nodes: Creating placeholder
node /memory@200000000
libxl: debug: libxl_arm.c:647:libxl__arch_domain_init_hw_description:
fdt total size 1290
domainbuilder: detail: xc_dom_devicetree_mem: called
domainbuilder: detail: xc_dom_mem_init: mem 128 MB, pages 0x8000 pages,
4k each
domainbuilder: detail: xc_dom_mem_init: 0x8000 pages
domainbuilder: detail: xc_dom_boot_mem_init: called
domainbuilder: detail: set_mode: guest xen-3.0-armv7l, address size 32
domainbuilder: detail: xc_dom_malloc            : 256 kB
domainbuilder: detail: populate_guest_memory: populating RAM @
0000000040000000-0000000048000000 (128MB)
domainbuilder: detail: populate_one_size: populated 0x40/0x40 entries
with shift 9
domainbuilder: detail: arch_setup_meminit: placing boot modules at
0x47fff000
domainbuilder: detail: arch_setup_meminit: devicetree: 0x47fff000 ->
0x48000000
libxl: debug: libxl_arm.c:678:finalise_one_memory_node: Populating
placeholder node /memory@40000000
libxl: debug: libxl_arm.c:672:finalise_one_memory_node: Nopping out
placeholder node /memory@200000000
domainbuilder: detail: xc_dom_build_image: called
domainbuilder: detail: xc_dom_alloc_segment:   kernel       : 0x40008000
-> 0x40602000  (pfn 0x40008 + 0x5fa pages)
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x40008+0x5fa at 0x75e8e000
domainbuilder: detail: xc_dom_load_zimage_kernel: called
domainbuilder: detail: xc_dom_load_zimage_kernel: kernel seg
0x40008000-0x40602000
domainbuilder: detail: xc_dom_load_zimage_kernel: copy 6263544 bytes
from blob 0x764c9000 to dst 0x75e8e000
domainbuilder: detail: xc_dom_alloc_segment:   devicetree   : 0x47fff000
-> 0x48000000  (pfn 0x47fff + 0x1 pages)
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x47fff+0x1 at 0x76f13000
domainbuilder: detail: alloc_magic_pages: called
domainbuilder: detail: count_pgtables_arm: called
domainbuilder: detail: xc_dom_build_image  : virt_alloc_end : 0x48000000
domainbuilder: detail: xc_dom_build_image  : virt_pgtab_end : 0x0
domainbuilder: detail: xc_dom_boot_image: called
domainbuilder: detail: arch_setup_bootearly: doing nothing
domainbuilder: detail: xc_dom_compat_check: supported guest type:
xen-3.0-armv7l <= matches
domainbuilder: detail: setup_pgtables_arm: called
domainbuilder: detail: clear_page: pfn 0x39000, mfn 0x39000
domainbuilder: detail: clear_page: pfn 0x39001, mfn 0x39001
domainbuilder: detail: start_info_arm: called
domainbuilder: detail: domain builder memory footprint
domainbuilder: detail:    allocated
domainbuilder: detail:       malloc             : 293 kB
domainbuilder: detail:       anon mmap          : 0 bytes
domainbuilder: detail:    mapped
domainbuilder: detail:       file mmap          : 6116 kB
domainbuilder: detail:       domU mmap          : 6124 kB
domainbuilder: detail: vcpu_arm32: called
domainbuilder: detail: Initial state CPSR 0x1d3 PC 0x40008000
domainbuilder: detail: launch_vm: called, ctxt=0x76f15004
domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=0x38000
domainbuilder: detail: xc_dom_release: called
libxl: debug: libxl_device.c:269:libxl__device_disk_set_backend: Disk
vdev=xvda spec.backend=phy
libxl: debug: libxl_event.c:600:libxl__ev_xswatch_register: watch
w=0x42f330 wpath=/local/domain/0/backend/vbd/5/51712/state token=3/0:
register slotnum=3
libxl: debug: libxl_create.c:1560:do_domain_create: ao 0x42eb80:
inprogress: poller=0x42eb08, flags=i
libxl: debug: libxl_event.c:537:watchfd_callback: watch w=0x42f330
wpath=/local/domain/0/backend/vbd/5/51712/state token=3/0: event
epath=/local/domain/0/backend/vbd/5/51712/state
libxl: debug: libxl_event.c:841:devstate_watch_callback: backend
/local/domain/0/backend/vbd/5/51712/state wanted state 2 ok
libxl: debug: libxl_event.c:638:libxl__ev_xswatch_deregister: watch
w=0x42f330 wpath=/local/domain/0/backend/vbd/5/51712/state token=3/0:
deregister slotnum=3
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42f330: deregister unregistered
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42f378: deregister unregistered
libxl: error: libxl_create.c:1195:domcreate_launch_dm: unable to add
disk devices
libxl: error: libxl_device.c:799:libxl__initiate_device_remove: unable
to get my domid
libxl: debug: libxl_event.c:652:libxl__ev_xswatch_deregister: watch
w=0x42e548: deregister unregistered
libxl: error: libxl.c:1657:devices_destroy_cb: libxl__devices_destroy
failed for 5
libxl: debug: libxl.c:1701:devices_destroy_cb: forked pid 763 for
destroy of domain 5
libxl: debug: libxl_event.c:1768:libxl__ao_complete: ao 0x42eb80:
complete, rc=-3
libxl: debug: libxl_event.c:1740:libxl__ao__destroy: ao 0x42eb80: destroy
xc: debug: hypercall buffer: total allocations:99 total releases:99
xc: debug: hypercall buffer: current allocations:0 maximum allocations:3
xc: debug: hypercall buffer: cache current size:3
xc: debug: hypercall buffer: cache hits:89 misses:3 toobig:7


>>
>> Regards,
>>
> Thanks,
> Peng.
> 
Thanks,
Peng.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 26 16:14:50 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 16:14:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8WGF-0006EF-7D; Fri, 26 Jun 2015 16:13:51 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <brandon@thinkhuge.net>) id 1Z8WGD-0006E4-P5
	for Xen-users@lists.xen.org; Fri, 26 Jun 2015 16:13:49 +0000
Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id
	C2/DD-25925-D3A7D855; Fri, 26 Jun 2015 16:13:49 +0000
X-Env-Sender: brandon@thinkhuge.net
X-Msg-Ref: server-5.tower-206.messagelabs.com!1435335226!17167431!1
X-Originating-IP: [209.85.220.47]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11384 invoked from network); 26 Jun 2015 16:13:48 -0000
Received: from mail-pa0-f47.google.com (HELO mail-pa0-f47.google.com)
	(209.85.220.47)
	by server-5.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	26 Jun 2015 16:13:48 -0000
Received: by pactm7 with SMTP id tm7so70795217pac.2
	for <Xen-users@lists.xen.org>; Fri, 26 Jun 2015 09:13:46 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date
	:message-id:mime-version:content-type:content-transfer-encoding
	:thread-index:content-language;
	bh=ao7BFgtJljeYPLnHhR/uu2YvSCvAJ53j/cjeKkWafaU=;
	b=PoZpTMxSal+hx+vH3ypeV2A6wC5EuRkhjdcuczVsmOVNWmc9ivZZspcj9m4QvEYuUj
	K7OCz8Mkixt3k2FIZIuYJJfipDLXWEqb/HDNhkkY8lFd22mvpZOec+bqx5zu8e7OIH5g
	wDebomzwwfT64a/m23rqTqwO77SUAC0WniYo8OP4EfmPwpqg2A2Emsp5uuitis2Cgrej
	ZhAyWgSzH9pxosFHWAX8K/DftBQRrgNSDBdH0IGHeBSB96knH34YTGORLNdf3afsIYjZ
	8qbgS1PMNmeFCqNHbQyagT1t6rEtspNsmKYloecnBhC0LgFvTiJJS7va7ApQgJngcbFa
	9uCQ==
X-Gm-Message-State: ALoCoQnqRuTsQOicsnN+vDLD6B9fiMWd2FTNEewI6xlA9nA2JNfSJMBm14P2mr5ipQ5CNt+vEUqm
X-Received: by 10.68.224.72 with SMTP id ra8mr4851554pbc.29.1435335226078;
	Fri, 26 Jun 2015 09:13:46 -0700 (PDT)
Received: from mercury (ip70-189-227-212.lv.lv.cox.net. [70.189.227.212])
	by mx.google.com with ESMTPSA id
	wp5sm27323463pab.22.2015.06.26.09.13.43
	(version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
	Fri, 26 Jun 2015 09:13:44 -0700 (PDT)
From: "brandon" <brandon@thinkhuge.net>
To: "'Ian Campbell'" <ian.campbell@citrix.com>
References: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
	<1435221904.28264.308.camel@citrix.com>
In-Reply-To: <1435221904.28264.308.camel@citrix.com>
Date: Fri, 26 Jun 2015 09:13:41 -0700
Message-ID: <015901d0b02b$125c5e30$37151a90$@thinkhuge.net>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQFiZwYElq5p13t0M8LlzJuG1FNaEQILbo34nosrhTA=
Content-Language: en-us
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] virsh/libvirt to Xen 4 XL problem
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi,

Thanks for the reply.   I got it working after by switching back to XM toolstack.  My reason for working on this is I was investigating using virt-v2v tool to migrate some Xen guests to KVM but, I found that my situation is greatly complicated for migration due to the fact that we use SolusVM manager and don't use default storage configurations the virt-v2v tool looks for. 

Appreciate you time.  Have a nice weekend.  

-----Original Message-----
From: Ian Campbell [mailto:ian.campbell@citrix.com] 
Sent: Thursday, June 25, 2015 1:45 AM
To: brandon
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] virsh/libvirt to Xen 4 XL problem

On Wed, 2015-06-24 at 10:38 -0700, brandon wrote:
> Hi,
> 
>  
> 
> I am trying to get virsh/libvirt to work with my Xen 4.4.2 converted
> to running XL toolstack.   As shown below when I do a simple virsh
> list I get blank results though I have two guest VMs running.  Libxl 
> driver pkg is installed.
> 
>  
> 
> What do I need to do to get virsh/libvirt working with Xen4 XL?

There was a period of time where although xl and libvirt could (mostly
peacefully) coexist they weren't mutually aware of the domains which the other had created. It's possible that the versions of things you've got fall into that bracket.

If you use virsh to start a domain does it appear in virsh list?

The other thing to check is that there is no vestiges of xend (pre-xl
toolstack) on the system -- in particular that the xend daemon isn't running.

BTW, virsh list excludes dom0 whereas xl list includes it, not sure if that was something which was a concern.

Ian.





_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 26 16:14:50 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 16:14:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8WGF-0006EF-7D; Fri, 26 Jun 2015 16:13:51 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <brandon@thinkhuge.net>) id 1Z8WGD-0006E4-P5
	for Xen-users@lists.xen.org; Fri, 26 Jun 2015 16:13:49 +0000
Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id
	C2/DD-25925-D3A7D855; Fri, 26 Jun 2015 16:13:49 +0000
X-Env-Sender: brandon@thinkhuge.net
X-Msg-Ref: server-5.tower-206.messagelabs.com!1435335226!17167431!1
X-Originating-IP: [209.85.220.47]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11384 invoked from network); 26 Jun 2015 16:13:48 -0000
Received: from mail-pa0-f47.google.com (HELO mail-pa0-f47.google.com)
	(209.85.220.47)
	by server-5.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	26 Jun 2015 16:13:48 -0000
Received: by pactm7 with SMTP id tm7so70795217pac.2
	for <Xen-users@lists.xen.org>; Fri, 26 Jun 2015 09:13:46 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date
	:message-id:mime-version:content-type:content-transfer-encoding
	:thread-index:content-language;
	bh=ao7BFgtJljeYPLnHhR/uu2YvSCvAJ53j/cjeKkWafaU=;
	b=PoZpTMxSal+hx+vH3ypeV2A6wC5EuRkhjdcuczVsmOVNWmc9ivZZspcj9m4QvEYuUj
	K7OCz8Mkixt3k2FIZIuYJJfipDLXWEqb/HDNhkkY8lFd22mvpZOec+bqx5zu8e7OIH5g
	wDebomzwwfT64a/m23rqTqwO77SUAC0WniYo8OP4EfmPwpqg2A2Emsp5uuitis2Cgrej
	ZhAyWgSzH9pxosFHWAX8K/DftBQRrgNSDBdH0IGHeBSB96knH34YTGORLNdf3afsIYjZ
	8qbgS1PMNmeFCqNHbQyagT1t6rEtspNsmKYloecnBhC0LgFvTiJJS7va7ApQgJngcbFa
	9uCQ==
X-Gm-Message-State: ALoCoQnqRuTsQOicsnN+vDLD6B9fiMWd2FTNEewI6xlA9nA2JNfSJMBm14P2mr5ipQ5CNt+vEUqm
X-Received: by 10.68.224.72 with SMTP id ra8mr4851554pbc.29.1435335226078;
	Fri, 26 Jun 2015 09:13:46 -0700 (PDT)
Received: from mercury (ip70-189-227-212.lv.lv.cox.net. [70.189.227.212])
	by mx.google.com with ESMTPSA id
	wp5sm27323463pab.22.2015.06.26.09.13.43
	(version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
	Fri, 26 Jun 2015 09:13:44 -0700 (PDT)
From: "brandon" <brandon@thinkhuge.net>
To: "'Ian Campbell'" <ian.campbell@citrix.com>
References: <02aa01d0aea4$955fd6a0$c01f83e0$@thinkhuge.net>
	<1435221904.28264.308.camel@citrix.com>
In-Reply-To: <1435221904.28264.308.camel@citrix.com>
Date: Fri, 26 Jun 2015 09:13:41 -0700
Message-ID: <015901d0b02b$125c5e30$37151a90$@thinkhuge.net>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQFiZwYElq5p13t0M8LlzJuG1FNaEQILbo34nosrhTA=
Content-Language: en-us
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] virsh/libvirt to Xen 4 XL problem
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi,

Thanks for the reply.   I got it working after by switching back to XM toolstack.  My reason for working on this is I was investigating using virt-v2v tool to migrate some Xen guests to KVM but, I found that my situation is greatly complicated for migration due to the fact that we use SolusVM manager and don't use default storage configurations the virt-v2v tool looks for. 

Appreciate you time.  Have a nice weekend.  

-----Original Message-----
From: Ian Campbell [mailto:ian.campbell@citrix.com] 
Sent: Thursday, June 25, 2015 1:45 AM
To: brandon
Cc: Xen-users@lists.xen.org
Subject: Re: [Xen-users] virsh/libvirt to Xen 4 XL problem

On Wed, 2015-06-24 at 10:38 -0700, brandon wrote:
> Hi,
> 
>  
> 
> I am trying to get virsh/libvirt to work with my Xen 4.4.2 converted
> to running XL toolstack.   As shown below when I do a simple virsh
> list I get blank results though I have two guest VMs running.  Libxl 
> driver pkg is installed.
> 
>  
> 
> What do I need to do to get virsh/libvirt working with Xen4 XL?

There was a period of time where although xl and libvirt could (mostly
peacefully) coexist they weren't mutually aware of the domains which the other had created. It's possible that the versions of things you've got fall into that bracket.

If you use virsh to start a domain does it appear in virsh list?

The other thing to check is that there is no vestiges of xend (pre-xl
toolstack) on the system -- in particular that the xend daemon isn't running.

BTW, virsh list excludes dom0 whereas xl list includes it, not sure if that was something which was a concern.

Ian.





_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 26 16:28:17 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 16:28:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8WU1-0001Km-PI; Fri, 26 Jun 2015 16:28:05 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=612b615e2=julien.grall@citrix.com>)
	id 1Z8WTz-0001JY-GD; Fri, 26 Jun 2015 16:28:03 +0000
Received: from [193.109.254.147] by server-16.bemta-14.messagelabs.com id
	59/17-31650-29D7D855; Fri, 26 Jun 2015 16:28:02 +0000
X-Env-Sender: prvs=612b615e2=julien.grall@citrix.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1435336080!27025014!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 3798 invoked from network); 26 Jun 2015 16:28:01 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-2.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	26 Jun 2015 16:28:01 -0000
X-IronPort-AV: E=Sophos;i="5.13,686,1427760000"; d="scan'208";a="276011259"
Message-ID: <558D7D86.3000202@citrix.com>
Date: Fri, 26 Jun 2015 18:27:50 +0200
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Peng Fan <van.freenix@gmail.com>, Ian Campbell <ian.campbell@citrix.com>
References: <5582D109.2000409@gmail.com>
	<1434639280.28264.42.camel@citrix.com>	<55841799.6000406@gmail.com>
	<55853E20.6030700@gmail.com>	<558573D0.6010207@gmail.com>
	<55857CF7.4000300@gmail.com>	<5587E175.90704@citrix.com>
	<5587EEE6.7030706@gmail.com>	<5588157E.2030701@citrix.com>
	<55895915.1010601@gmail.com>	<558960D7.3000806@citrix.com>
	<55896582.1030701@gmail.com> <558C0B89.7070809@gmail.com>
In-Reply-To: <558C0B89.7070809@gmail.com>
X-DLP: MIA1
Cc: xen-users <xen-users@lists.xen.org>,
	Stefano Stabellini <stefano.stabellini@eu.citrix.com>,
	"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>
Subject: Re: [Xen-users] [Xen-devel] Dom0 kernel panic when porting xen to
	new arm soc
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org



On 25/06/2015 16:09, Peng Fan wrote:
> Hi Julien,

Hi,

> On 6/23/2015 9:56 PM, Peng Fan wrote:
>> Hi,
>>
>> On 6/23/2015 9:36 PM, Julien Grall wrote:
>>> Hi,
>>>
>>> On 23/06/15 14:03, Peng Fan wrote:
>>>> I did not enable LPAE for DOM0 kernel, use shor page table.
>>>> Following is the full log from uboot to kernel with DOM0 512M:
>>>
>>> Which CONFIG_VMSPLIT_* do you use? Can you try to use another one? I
>>> remembered it had some effect on the offset between physical and virtual
>>> address.
>>   CONFIG_VMSPLIT_2G=y
>>
>> CONFIG_PAGE_OFFSET=0x80000000
>>
>> ok. Will try 3G:1G split.
> Later I'll reply with log info about this(Do not have log at hand).
> Still panic, maybe something wrong with gnutab configration in my side,
> I use default gnutab address/size.

Did you check that the gnttab doesn't overlap a device/RAM region of 
your hardware?

I've posted a patch a week ago to find automatically a region for the 
grant table [1] in DOM0 memory. It will avoid you to go through the 
datasheet.

> Current I met a DomU boot issue, if do not use blk backend, DomU can
> boot with ramfs as rootfs. If use an image file as rootfs, DomU can not
> boot.
>
> I am not sure why this happends:"
> libxl: error: libxl_create.c:1195:domcreate_launch_dm: unable to add
> disk devices
> libxl: error: libxl_device.c:799:libxl__initiate_device_remove: unable
> to get my domid
> "
> By using gdb, I found domcreate_launch_dm fails to get domid, then it
> reports unable to add disk devices. I am not familiar with xenstore and
> etc. Did I miss some configuation?

The "unable to get my domid" looks like an issue with xenstore. Is 
xenstored running?

Also, did you built you DOM0 kernel with CONFIG_XEN_BLKDEV_BACKEND?

Regards,

[1] http://lists.xen.org/archives/html/xen-devel/2015-06/msg02831.html

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 26 16:28:17 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 16:28:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8WU1-0001Km-PI; Fri, 26 Jun 2015 16:28:05 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=612b615e2=julien.grall@citrix.com>)
	id 1Z8WTz-0001JY-GD; Fri, 26 Jun 2015 16:28:03 +0000
Received: from [193.109.254.147] by server-16.bemta-14.messagelabs.com id
	59/17-31650-29D7D855; Fri, 26 Jun 2015 16:28:02 +0000
X-Env-Sender: prvs=612b615e2=julien.grall@citrix.com
X-Msg-Ref: server-2.tower-27.messagelabs.com!1435336080!27025014!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 3798 invoked from network); 26 Jun 2015 16:28:01 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-2.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	26 Jun 2015 16:28:01 -0000
X-IronPort-AV: E=Sophos;i="5.13,686,1427760000"; d="scan'208";a="276011259"
Message-ID: <558D7D86.3000202@citrix.com>
Date: Fri, 26 Jun 2015 18:27:50 +0200
From: Julien Grall <julien.grall@citrix.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Peng Fan <van.freenix@gmail.com>, Ian Campbell <ian.campbell@citrix.com>
References: <5582D109.2000409@gmail.com>
	<1434639280.28264.42.camel@citrix.com>	<55841799.6000406@gmail.com>
	<55853E20.6030700@gmail.com>	<558573D0.6010207@gmail.com>
	<55857CF7.4000300@gmail.com>	<5587E175.90704@citrix.com>
	<5587EEE6.7030706@gmail.com>	<5588157E.2030701@citrix.com>
	<55895915.1010601@gmail.com>	<558960D7.3000806@citrix.com>
	<55896582.1030701@gmail.com> <558C0B89.7070809@gmail.com>
In-Reply-To: <558C0B89.7070809@gmail.com>
X-DLP: MIA1
Cc: xen-users <xen-users@lists.xen.org>,
	Stefano Stabellini <stefano.stabellini@eu.citrix.com>,
	"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>
Subject: Re: [Xen-users] [Xen-devel] Dom0 kernel panic when porting xen to
	new arm soc
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org



On 25/06/2015 16:09, Peng Fan wrote:
> Hi Julien,

Hi,

> On 6/23/2015 9:56 PM, Peng Fan wrote:
>> Hi,
>>
>> On 6/23/2015 9:36 PM, Julien Grall wrote:
>>> Hi,
>>>
>>> On 23/06/15 14:03, Peng Fan wrote:
>>>> I did not enable LPAE for DOM0 kernel, use shor page table.
>>>> Following is the full log from uboot to kernel with DOM0 512M:
>>>
>>> Which CONFIG_VMSPLIT_* do you use? Can you try to use another one? I
>>> remembered it had some effect on the offset between physical and virtual
>>> address.
>>   CONFIG_VMSPLIT_2G=y
>>
>> CONFIG_PAGE_OFFSET=0x80000000
>>
>> ok. Will try 3G:1G split.
> Later I'll reply with log info about this(Do not have log at hand).
> Still panic, maybe something wrong with gnutab configration in my side,
> I use default gnutab address/size.

Did you check that the gnttab doesn't overlap a device/RAM region of 
your hardware?

I've posted a patch a week ago to find automatically a region for the 
grant table [1] in DOM0 memory. It will avoid you to go through the 
datasheet.

> Current I met a DomU boot issue, if do not use blk backend, DomU can
> boot with ramfs as rootfs. If use an image file as rootfs, DomU can not
> boot.
>
> I am not sure why this happends:"
> libxl: error: libxl_create.c:1195:domcreate_launch_dm: unable to add
> disk devices
> libxl: error: libxl_device.c:799:libxl__initiate_device_remove: unable
> to get my domid
> "
> By using gdb, I found domcreate_launch_dm fails to get domid, then it
> reports unable to add disk devices. I am not familiar with xenstore and
> etc. Did I miss some configuation?

The "unable to get my domid" looks like an issue with xenstore. Is 
xenstored running?

Also, did you built you DOM0 kernel with CONFIG_XEN_BLKDEV_BACKEND?

Regards,

[1] http://lists.xen.org/archives/html/xen-devel/2015-06/msg02831.html

-- 
Julien Grall

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Fri Jun 26 22:23:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 22:23:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8c0z-0005jZ-0Z; Fri, 26 Jun 2015 22:22:29 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <josh.drenan@gmail.com>) id 1Z8c0x-0005jS-Aq
	for xen-users@lists.xen.org; Fri, 26 Jun 2015 22:22:27 +0000
Received: from [85.158.139.211] by server-15.bemta-5.messagelabs.com id
	A4/1E-25881-2A0DD855; Fri, 26 Jun 2015 22:22:26 +0000
X-Env-Sender: josh.drenan@gmail.com
X-Msg-Ref: server-10.tower-206.messagelabs.com!1435357344!11935247!1
X-Originating-IP: [209.85.223.170]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_10_20,HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21117 invoked from network); 26 Jun 2015 22:22:25 -0000
Received: from mail-ie0-f170.google.com (HELO mail-ie0-f170.google.com)
	(209.85.223.170)
	by server-10.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	26 Jun 2015 22:22:25 -0000
Received: by ieqy10 with SMTP id y10so84582770ieq.0
	for <xen-users@lists.xen.org>; Fri, 26 Jun 2015 15:22:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:from:date:message-id:subject:to:content-type;
	bh=jYBUhMWSQtqTTDQ2cpQTKN3B6hAz0SglsMK6XFdL6c8=;
	b=kamDD7NqIBhrixfJEYw1tWU9PPHuuPAETg/TzlSzOKd720mJmOS8zJdcAPVqwtd3Px
	PT6UIzFfaqyWPoZDSGgK/4I9PIiZ+ANS3CwfXURmztxyze5IDeaTOYLZD8nMjNeTYjgd
	W93hsIxQ0ecNqV9dXAcYiVa3TmMRmd/zT8x5MhD7w+pOIGKeQ3x9KjgcHh0zyTs66zpr
	gFd1LxaMmhxIGl7HoSFiqZtHc1xkL9S4COghL9E9O8U1oZ4Dz/uSIg63SnZvapx8EghJ
	CycrtMeY4Gk1HpWVgbSWPspcmNYYcwdUjZYjWtM1BfgxyTcOa2nWFUbFmAmXDvuyxjRE
	YfrA==
X-Received: by 10.50.147.10 with SMTP id tg10mr501940igb.36.1435357344594;
	Fri, 26 Jun 2015 15:22:24 -0700 (PDT)
MIME-Version: 1.0
From: Josh Drenan <josh.drenan@gmail.com>
Date: Fri, 26 Jun 2015 22:22:15 +0000
Message-ID: <CAFn_KHOoV_NGd0XmxtjMNkG+uzP2pZ5Q+uHU0J-PagqkwKyXoQ@mail.gmail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] Nested Xen Boot problem over 8 cpu
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1899025071877625645=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============1899025071877625645==
Content-Type: multipart/alternative; boundary=089e0122a2d0a684440519732cde

--089e0122a2d0a684440519732cde
Content-Type: text/plain; charset=UTF-8

Greetings All

I have the following problem:
I am running ESXI 5.1, inside of that I have created a centos 6 machine
then put the 4.4.0 xen kernel in it. On boot if the VM has more than 8
cpu's on it the VM gets hung during the boot process after printing the
following:
cpu X spinlock event irq Y
Disabled fast string operations
Installing Xen timer for CPU X
Brought up all 16 CPUs

Is anyone aware of a fix or a configuration option that needs to be set
that would cause dom0/xen to fail on boot in this situation? If I set the
vm's cpu count to 8 or less it works fine with the exact same grub. This
seems unrelated to the way the cores are distributed, I have tried I socket
with 16 cores, 4 sockets with 4 cores each, as well as 16 sockets with 1
core each.

Due to the nature of the project I can't change the version but I could
patch the kernel if that is what is required. Any help would be greatly
appreciated.

Including my grub call in case it has something to do with the way I am
booting.

        kernel /xen-4.4.0.gz loglvl=all guest_loglvl=all dom0_mem=8704M
bootscrub=false dom0_max_vcpus=4 dom0_vcpus_pin=true com1=115200
console=com1,vga
        root (hd0,0)
        module /vmlinuz-3.10.45-xen ro root=/dev/mapper/vg_ga-lv_ra
rd_NO_LUKS rd_LVM_LV=vg_ga/lv_ra LANG=en_US.UTF-8 rd_LVM_LV=vg_ga/lv_swap
rd_NO_MD SYSFONT=latarcyrheb-sun16 KEYBOARDTYPE=pc KEYTABLE=us rd_NO_DM
BOOT_OPTION=disk-A OS_TYPE=Xen earlyprintk=xen nomodeset console=tty1
console=hvc0
        module  /initramfs-3.10.45-xen.img

--089e0122a2d0a684440519732cde
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Greetings All<div><br></div><div>I have the following prob=
lem:</div><div>I am running ESXI 5.1, inside of that I have created a cento=
s 6 machine then put the 4.4.0 xen kernel in it. On boot if the VM has more=
 than 8 cpu&#39;s on it the VM gets hung during the boot process after prin=
ting the following:</div><div>cpu X spinlock event irq Y</div><div>Disabled=
 fast string operations</div><div>Installing Xen timer for CPU X</div><div>=
Brought up all 16 CPUs</div><div><br></div><div>Is anyone aware of a fix or=
 a configuration option that needs to be set that would cause dom0/xen to f=
ail on boot in this situation? If I set the vm&#39;s cpu count to 8 or less=
 it works fine with the exact same grub. This seems unrelated to the way th=
e cores are distributed, I have tried I socket with 16 cores, 4 sockets wit=
h 4 cores each, as well as 16 sockets with 1 core each.</div><div><br></div=
><div>Due to the nature of the project I can&#39;t change the version but I=
 could patch the kernel if that is what is required. Any help would be grea=
tly appreciated.</div><div><br></div><div>Including my grub call in case it=
 has something to do with the way I am booting.</div><div><br></div><div><d=
iv>=C2=A0 =C2=A0 =C2=A0 =C2=A0 kernel /xen-4.4.0.gz loglvl=3Dall guest_logl=
vl=3Dall dom0_mem=3D8704M bootscrub=3Dfalse dom0_max_vcpus=3D4 dom0_vcpus_p=
in=3Dtrue com1=3D115200 console=3Dcom1,vga</div><div>=C2=A0 =C2=A0 =C2=A0 =
=C2=A0 root (hd0,0)</div><div>=C2=A0 =C2=A0 =C2=A0 =C2=A0 module /vmlinuz-3=
.10.45-xen ro root=3D/dev/mapper/vg_ga-lv_ra rd_NO_LUKS rd_LVM_LV=3Dvg_ga/l=
v_ra LANG=3Den_US.UTF-8 rd_LVM_LV=3Dvg_ga/lv_swap rd_NO_MD SYSFONT=3Dlatarc=
yrheb-sun16 KEYBOARDTYPE=3Dpc KEYTABLE=3Dus rd_NO_DM BOOT_OPTION=3Ddisk-A O=
S_TYPE=3DXen earlyprintk=3Dxen nomodeset console=3Dtty1 console=3Dhvc0</div=
><div>=C2=A0 =C2=A0 =C2=A0 =C2=A0 module =C2=A0/initramfs-3.10.45-xen.img</=
div></div></div>

--089e0122a2d0a684440519732cde--


--===============1899025071877625645==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============1899025071877625645==--


From xen-users-bounces@lists.xen.org Fri Jun 26 22:23:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2015 22:23:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8c0z-0005jZ-0Z; Fri, 26 Jun 2015 22:22:29 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <josh.drenan@gmail.com>) id 1Z8c0x-0005jS-Aq
	for xen-users@lists.xen.org; Fri, 26 Jun 2015 22:22:27 +0000
Received: from [85.158.139.211] by server-15.bemta-5.messagelabs.com id
	A4/1E-25881-2A0DD855; Fri, 26 Jun 2015 22:22:26 +0000
X-Env-Sender: josh.drenan@gmail.com
X-Msg-Ref: server-10.tower-206.messagelabs.com!1435357344!11935247!1
X-Originating-IP: [209.85.223.170]
X-SpamReason: No, hits=0.9 required=7.0 tests=HTML_10_20,HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 21117 invoked from network); 26 Jun 2015 22:22:25 -0000
Received: from mail-ie0-f170.google.com (HELO mail-ie0-f170.google.com)
	(209.85.223.170)
	by server-10.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	26 Jun 2015 22:22:25 -0000
Received: by ieqy10 with SMTP id y10so84582770ieq.0
	for <xen-users@lists.xen.org>; Fri, 26 Jun 2015 15:22:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:from:date:message-id:subject:to:content-type;
	bh=jYBUhMWSQtqTTDQ2cpQTKN3B6hAz0SglsMK6XFdL6c8=;
	b=kamDD7NqIBhrixfJEYw1tWU9PPHuuPAETg/TzlSzOKd720mJmOS8zJdcAPVqwtd3Px
	PT6UIzFfaqyWPoZDSGgK/4I9PIiZ+ANS3CwfXURmztxyze5IDeaTOYLZD8nMjNeTYjgd
	W93hsIxQ0ecNqV9dXAcYiVa3TmMRmd/zT8x5MhD7w+pOIGKeQ3x9KjgcHh0zyTs66zpr
	gFd1LxaMmhxIGl7HoSFiqZtHc1xkL9S4COghL9E9O8U1oZ4Dz/uSIg63SnZvapx8EghJ
	CycrtMeY4Gk1HpWVgbSWPspcmNYYcwdUjZYjWtM1BfgxyTcOa2nWFUbFmAmXDvuyxjRE
	YfrA==
X-Received: by 10.50.147.10 with SMTP id tg10mr501940igb.36.1435357344594;
	Fri, 26 Jun 2015 15:22:24 -0700 (PDT)
MIME-Version: 1.0
From: Josh Drenan <josh.drenan@gmail.com>
Date: Fri, 26 Jun 2015 22:22:15 +0000
Message-ID: <CAFn_KHOoV_NGd0XmxtjMNkG+uzP2pZ5Q+uHU0J-PagqkwKyXoQ@mail.gmail.com>
To: xen-users@lists.xen.org
Subject: [Xen-users] Nested Xen Boot problem over 8 cpu
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1899025071877625645=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============1899025071877625645==
Content-Type: multipart/alternative; boundary=089e0122a2d0a684440519732cde

--089e0122a2d0a684440519732cde
Content-Type: text/plain; charset=UTF-8

Greetings All

I have the following problem:
I am running ESXI 5.1, inside of that I have created a centos 6 machine
then put the 4.4.0 xen kernel in it. On boot if the VM has more than 8
cpu's on it the VM gets hung during the boot process after printing the
following:
cpu X spinlock event irq Y
Disabled fast string operations
Installing Xen timer for CPU X
Brought up all 16 CPUs

Is anyone aware of a fix or a configuration option that needs to be set
that would cause dom0/xen to fail on boot in this situation? If I set the
vm's cpu count to 8 or less it works fine with the exact same grub. This
seems unrelated to the way the cores are distributed, I have tried I socket
with 16 cores, 4 sockets with 4 cores each, as well as 16 sockets with 1
core each.

Due to the nature of the project I can't change the version but I could
patch the kernel if that is what is required. Any help would be greatly
appreciated.

Including my grub call in case it has something to do with the way I am
booting.

        kernel /xen-4.4.0.gz loglvl=all guest_loglvl=all dom0_mem=8704M
bootscrub=false dom0_max_vcpus=4 dom0_vcpus_pin=true com1=115200
console=com1,vga
        root (hd0,0)
        module /vmlinuz-3.10.45-xen ro root=/dev/mapper/vg_ga-lv_ra
rd_NO_LUKS rd_LVM_LV=vg_ga/lv_ra LANG=en_US.UTF-8 rd_LVM_LV=vg_ga/lv_swap
rd_NO_MD SYSFONT=latarcyrheb-sun16 KEYBOARDTYPE=pc KEYTABLE=us rd_NO_DM
BOOT_OPTION=disk-A OS_TYPE=Xen earlyprintk=xen nomodeset console=tty1
console=hvc0
        module  /initramfs-3.10.45-xen.img

--089e0122a2d0a684440519732cde
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Greetings All<div><br></div><div>I have the following prob=
lem:</div><div>I am running ESXI 5.1, inside of that I have created a cento=
s 6 machine then put the 4.4.0 xen kernel in it. On boot if the VM has more=
 than 8 cpu&#39;s on it the VM gets hung during the boot process after prin=
ting the following:</div><div>cpu X spinlock event irq Y</div><div>Disabled=
 fast string operations</div><div>Installing Xen timer for CPU X</div><div>=
Brought up all 16 CPUs</div><div><br></div><div>Is anyone aware of a fix or=
 a configuration option that needs to be set that would cause dom0/xen to f=
ail on boot in this situation? If I set the vm&#39;s cpu count to 8 or less=
 it works fine with the exact same grub. This seems unrelated to the way th=
e cores are distributed, I have tried I socket with 16 cores, 4 sockets wit=
h 4 cores each, as well as 16 sockets with 1 core each.</div><div><br></div=
><div>Due to the nature of the project I can&#39;t change the version but I=
 could patch the kernel if that is what is required. Any help would be grea=
tly appreciated.</div><div><br></div><div>Including my grub call in case it=
 has something to do with the way I am booting.</div><div><br></div><div><d=
iv>=C2=A0 =C2=A0 =C2=A0 =C2=A0 kernel /xen-4.4.0.gz loglvl=3Dall guest_logl=
vl=3Dall dom0_mem=3D8704M bootscrub=3Dfalse dom0_max_vcpus=3D4 dom0_vcpus_p=
in=3Dtrue com1=3D115200 console=3Dcom1,vga</div><div>=C2=A0 =C2=A0 =C2=A0 =
=C2=A0 root (hd0,0)</div><div>=C2=A0 =C2=A0 =C2=A0 =C2=A0 module /vmlinuz-3=
.10.45-xen ro root=3D/dev/mapper/vg_ga-lv_ra rd_NO_LUKS rd_LVM_LV=3Dvg_ga/l=
v_ra LANG=3Den_US.UTF-8 rd_LVM_LV=3Dvg_ga/lv_swap rd_NO_MD SYSFONT=3Dlatarc=
yrheb-sun16 KEYBOARDTYPE=3Dpc KEYTABLE=3Dus rd_NO_DM BOOT_OPTION=3Ddisk-A O=
S_TYPE=3DXen earlyprintk=3Dxen nomodeset console=3Dtty1 console=3Dhvc0</div=
><div>=C2=A0 =C2=A0 =C2=A0 =C2=A0 module =C2=A0/initramfs-3.10.45-xen.img</=
div></div></div>

--089e0122a2d0a684440519732cde--


--===============1899025071877625645==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============1899025071877625645==--


From xen-users-bounces@lists.xen.org Sat Jun 27 16:02:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 27 Jun 2015 16:02:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8sXc-0005Yt-LR; Sat, 27 Jun 2015 16:01:16 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <845183108@qq.com>) id 1Z8exn-0001s4-1g
	for xen-users@lists.xenproject.org; Sat, 27 Jun 2015 01:31:23 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	4A/D1-01068-AECFD855; Sat, 27 Jun 2015 01:31:22 +0000
X-Env-Sender: 845183108@qq.com
X-Msg-Ref: server-2.tower-31.messagelabs.com!1435368676!20280668!1
X-Originating-IP: [54.206.16.166]
X-SpamReason: No, hits=0.5 required=7.0 tests=FROM_ALL_NUMS,
	FROM_EXCESS_BASE64, FROM_STARTS_WITH_NUMS, HTML_MESSAGE,
	MIME_BASE64_TEXT, 
	MIME_BOUND_NEXTPART, ML_RADAR_FP_R_14, spamassassin: ,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22248 invoked from network); 27 Jun 2015 01:31:20 -0000
Received: from smtpbgau1.qq.com (HELO smtpbgau1.qq.com) (54.206.16.166)
	by server-2.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 27 Jun 2015 01:31:20 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qq.com; s=s201307;
	t=1435368672; bh=1VyHCDUN9o5g8jyDdUGpPMp+giJAQ0ScM3lEJnL9Ktg=;
	h=From:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:Date:Message-ID;
	b=UYCXE4Qdy0FbfaFFM+A1w6vIuKnVmaBB+ozwP6MCe1BACBLpVv4TEAqBwUgMGxWXU
	IqPtywh9r90habSplTTL+nxG1fWBTeDzF3XS0HPE1+i8kmA6ldhGXvydEuUP3KWjqg
	lC0zMXH8bmcmaTG+2mHEOMkhljOWBVkXT0PVHpaw=
X-QQ-FEAT: NWcLJtqnMELucJnnBQt6nnhVu5tAZv61iddDLjzTuuJq0sPK7pigADt6FWLT5
	w7Kcup/8NEzhy4SRTXfmL6qCW07WcoNtZwR1s8rBaYglswr8LcXmBzmPx7uLR+y/nP8cItU
	gUSlT1JyT45zylgUqH3YxGabqMO/RiiCU5ji54YNmBr+3rcitRyEWJ4SyOmaENET6QBmbmu
	M9fWN7dYZhHGef+LgBRCGnoH5O1mlBBM=
X-QQ-SSF: 00000000000000F000000000000000Y
X-HAS-ATTACH: no
X-QQ-BUSINESS-ORIGIN: 2
X-Originating-IP: 119.78.20.87
X-QQ-STYLE: 
X-QQ-mid: webmail733t1435368670t5637209
From: "=?gb18030?B?ZmVuZ3hpbnl1ZQ==?=" <845183108@qq.com>
To: "=?gb18030?B?eGVuLWRldmVs?=" <xen-devel@lists.xenproject.org>,
	"=?gb18030?B?eGVuLXVzZXJz?=" <xen-users@lists.xenproject.org>,
	"=?gb18030?B?WGVuLWFwaQ==?=" <Xen-api@lists.xen.org>
Mime-Version: 1.0
Date: Sat, 27 Jun 2015 09:31:10 +0800
X-Priority: 3
Message-ID: <tencent_3BC5A5C202BADE04265DD1A1@qq.com>
X-QQ-MIME: TCMime 1.0 by Tencent
X-Mailer: QQMail 2.x
X-QQ-Mailer: QQMail 2.x
X-QQ-SENDSIZE: 520
X-QQ-Bgrelay: 1
X-Mailman-Approved-At: Sat, 27 Jun 2015 16:01:15 +0000
Subject: [Xen-users] =?gb18030?q?xen_physical_address=A3=A8paddr=A3=A9and_?=
 =?gb18030?q?machine_address_=28maddr=29?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8966950510444386110=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multi-part message in MIME format.

--===============8966950510444386110==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_558DFCDE_09C339D0_34764044"
Content-Transfer-Encoding: 8Bit

This is a multi-part message in MIME format.

------=_NextPart_558DFCDE_09C339D0_34764044
Content-Type: text/plain;
	charset="gb18030"
Content-Transfer-Encoding: base64
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------=_NextPart_558DFCDE_09C339D0_34764044
Content-Type: text/html;
	charset="gb18030"
Content-Transfer-Encoding: base64
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------=_NextPart_558DFCDE_09C339D0_34764044--





--===============8966950510444386110==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8966950510444386110==--





From xen-users-bounces@lists.xen.org Sat Jun 27 16:02:37 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 27 Jun 2015 16:02:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8sXc-0005Yt-LR; Sat, 27 Jun 2015 16:01:16 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <845183108@qq.com>) id 1Z8exn-0001s4-1g
	for xen-users@lists.xenproject.org; Sat, 27 Jun 2015 01:31:23 +0000
Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id
	4A/D1-01068-AECFD855; Sat, 27 Jun 2015 01:31:22 +0000
X-Env-Sender: 845183108@qq.com
X-Msg-Ref: server-2.tower-31.messagelabs.com!1435368676!20280668!1
X-Originating-IP: [54.206.16.166]
X-SpamReason: No, hits=0.5 required=7.0 tests=FROM_ALL_NUMS,
	FROM_EXCESS_BASE64, FROM_STARTS_WITH_NUMS, HTML_MESSAGE,
	MIME_BASE64_TEXT, 
	MIME_BOUND_NEXTPART, ML_RADAR_FP_R_14, spamassassin: ,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 22248 invoked from network); 27 Jun 2015 01:31:20 -0000
Received: from smtpbgau1.qq.com (HELO smtpbgau1.qq.com) (54.206.16.166)
	by server-2.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 27 Jun 2015 01:31:20 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qq.com; s=s201307;
	t=1435368672; bh=1VyHCDUN9o5g8jyDdUGpPMp+giJAQ0ScM3lEJnL9Ktg=;
	h=From:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:Date:Message-ID;
	b=UYCXE4Qdy0FbfaFFM+A1w6vIuKnVmaBB+ozwP6MCe1BACBLpVv4TEAqBwUgMGxWXU
	IqPtywh9r90habSplTTL+nxG1fWBTeDzF3XS0HPE1+i8kmA6ldhGXvydEuUP3KWjqg
	lC0zMXH8bmcmaTG+2mHEOMkhljOWBVkXT0PVHpaw=
X-QQ-FEAT: NWcLJtqnMELucJnnBQt6nnhVu5tAZv61iddDLjzTuuJq0sPK7pigADt6FWLT5
	w7Kcup/8NEzhy4SRTXfmL6qCW07WcoNtZwR1s8rBaYglswr8LcXmBzmPx7uLR+y/nP8cItU
	gUSlT1JyT45zylgUqH3YxGabqMO/RiiCU5ji54YNmBr+3rcitRyEWJ4SyOmaENET6QBmbmu
	M9fWN7dYZhHGef+LgBRCGnoH5O1mlBBM=
X-QQ-SSF: 00000000000000F000000000000000Y
X-HAS-ATTACH: no
X-QQ-BUSINESS-ORIGIN: 2
X-Originating-IP: 119.78.20.87
X-QQ-STYLE: 
X-QQ-mid: webmail733t1435368670t5637209
From: "=?gb18030?B?ZmVuZ3hpbnl1ZQ==?=" <845183108@qq.com>
To: "=?gb18030?B?eGVuLWRldmVs?=" <xen-devel@lists.xenproject.org>,
	"=?gb18030?B?eGVuLXVzZXJz?=" <xen-users@lists.xenproject.org>,
	"=?gb18030?B?WGVuLWFwaQ==?=" <Xen-api@lists.xen.org>
Mime-Version: 1.0
Date: Sat, 27 Jun 2015 09:31:10 +0800
X-Priority: 3
Message-ID: <tencent_3BC5A5C202BADE04265DD1A1@qq.com>
X-QQ-MIME: TCMime 1.0 by Tencent
X-Mailer: QQMail 2.x
X-QQ-Mailer: QQMail 2.x
X-QQ-SENDSIZE: 520
X-QQ-Bgrelay: 1
X-Mailman-Approved-At: Sat, 27 Jun 2015 16:01:15 +0000
Subject: [Xen-users] =?gb18030?q?xen_physical_address=A3=A8paddr=A3=A9and_?=
 =?gb18030?q?machine_address_=28maddr=29?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8966950510444386110=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multi-part message in MIME format.

--===============8966950510444386110==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_558DFCDE_09C339D0_34764044"
Content-Transfer-Encoding: 8Bit

This is a multi-part message in MIME format.

------=_NextPart_558DFCDE_09C339D0_34764044
Content-Type: text/plain;
	charset="gb18030"
Content-Transfer-Encoding: base64
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------=_NextPart_558DFCDE_09C339D0_34764044
Content-Type: text/html;
	charset="gb18030"
Content-Transfer-Encoding: base64
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------=_NextPart_558DFCDE_09C339D0_34764044--





--===============8966950510444386110==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============8966950510444386110==--





From xen-users-bounces@lists.xen.org Sat Jun 27 20:33:00 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 27 Jun 2015 20:33:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8wlV-0002Ox-4l; Sat, 27 Jun 2015 20:31:53 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <hakon@alstadheim.priv.no>) id 1Z8wlT-0002Oq-Al
	for xen-users@lists.xen.org; Sat, 27 Jun 2015 20:31:51 +0000
Received: from [85.158.137.68] by server-15.bemta-3.messagelabs.com id
	16/C7-28408-6380F855; Sat, 27 Jun 2015 20:31:50 +0000
X-Env-Sender: hakon@alstadheim.priv.no
X-Msg-Ref: server-15.tower-31.messagelabs.com!1435437109!20293177!1
X-Originating-IP: [109.247.116.9]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 24410 invoked from network); 27 Jun 2015 20:31:49 -0000
Received: from asav22.altibox.net (HELO asav22.altibox.net) (109.247.116.9)
	by server-15.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 27 Jun 2015 20:31:49 -0000
Received: from localhost (localhost [127.0.0.1])
	by asav22.altibox.net (Postfix) with ESMTP id 3BC34201F7
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:49 +0200 (CEST)
Received: from asav22.altibox.net ([127.0.0.1])
	by localhost (asav22.lysetele.net [127.0.0.1]) (amavisd-new, port 10024)
	with LMTP id FflSTrTGpFOP for <xen-users@lists.xen.org>;
	Sat, 27 Jun 2015 22:31:48 +0200 (CEST)
Received: from postfix-relay.alstadheim.priv.no
	(178-164-66.9.3p.ntebredband.no [178.164.66.9])
	(using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	(Authenticated sender: hakon.alstadheim@ntebb.no)
	by asav22.altibox.net (Postfix) with ESMTPSA id C8BDC201FB
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:48 +0200 (CEST)
X-Finnesikke-B-A-I-T: finnesikke@alstadheim.priv.no
Received: from smtps.alstadheim.priv.no (localhost [127.0.0.1])
	by postfix-relay.alstadheim.priv.no (Postfix) with ESMTP id D1BC96801F5
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:16 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=alstadheim.priv.no; h=
	message-id:date:from:mime-version:to:subject:content-type
	:content-transfer-encoding; s=smtp; bh=dPdR0L1K5T5R2gWTHq5glu4gm
	6k=; b=UM/8RJjHVdhsXPXy/VMuAkd0QE/Q4REewEXkJW64PlflaOFyWbal42xTz
	y5/lG5qcirQ5bCtrxdzplaqQy317qfx+lfWJvdKyA0KCWO+F3e1oP3zpA6wESuUx
	6A8dGaJaoTRWhfpp1uFi3cGkpslgFYY0VWwkYXZaG0jXwIYAOU=
Received: from [192.168.2.4] (unknown [192.168.2.4])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested) (Authenticated sender: hakon)
	by smtps.alstadheim.priv.no (Postfix) with ESMTPSA id C59AE6C00D8
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:16 +0200 (CEST)
Message-ID: <558F0814.2050603@alstadheim.priv.no>
Date: Sat, 27 Jun 2015 22:31:16 +0200
From: =?UTF-8?B?SMOla29uIEFsc3RhZGhlaW0=?= <hakon@alstadheim.priv.no>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: [Xen-users] graphical monitoring tools for cpu frequency & power
	states?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi all, I'm wondering if anyone has a pointer on how to get a graphical
display of cpu frequency and power for xen ? Something like gkrellm or
cacti to make it easier to home in on bottlenecs and potential tuning.
I'm fairly new at xen and I only have vague ideas about power management
on my Xeon E5 2620 (also new). I have an overview of load and cpu%, but
that is no good when I don't know what frequency the cpu is running at.

I've got a dual socket motherboard with only one socket populated, and
am thinking about expanding. The most concrete issue I'm facing right
now is how to get a single-threaded java server to run as well as
possible, with the java process running on a core that can be in turbo
mode as much as possible. Do I simply need more cores (so i can power
down one or two), or do I have to trade up to a higher frequency rated
cpu?  Need data to decide.

At the moment I can't even see when turbo mode kicks in. Seeing that
would be a first step, before I started fiddling with pinning cpus and
twiddling P-states and what not.

So, anybody have a cacti template or a gkrellm plugin to suck up xenpm data?



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sat Jun 27 20:33:00 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 27 Jun 2015 20:33:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z8wlV-0002Ox-4l; Sat, 27 Jun 2015 20:31:53 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <hakon@alstadheim.priv.no>) id 1Z8wlT-0002Oq-Al
	for xen-users@lists.xen.org; Sat, 27 Jun 2015 20:31:51 +0000
Received: from [85.158.137.68] by server-15.bemta-3.messagelabs.com id
	16/C7-28408-6380F855; Sat, 27 Jun 2015 20:31:50 +0000
X-Env-Sender: hakon@alstadheim.priv.no
X-Msg-Ref: server-15.tower-31.messagelabs.com!1435437109!20293177!1
X-Originating-IP: [109.247.116.9]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 24410 invoked from network); 27 Jun 2015 20:31:49 -0000
Received: from asav22.altibox.net (HELO asav22.altibox.net) (109.247.116.9)
	by server-15.tower-31.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 27 Jun 2015 20:31:49 -0000
Received: from localhost (localhost [127.0.0.1])
	by asav22.altibox.net (Postfix) with ESMTP id 3BC34201F7
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:49 +0200 (CEST)
Received: from asav22.altibox.net ([127.0.0.1])
	by localhost (asav22.lysetele.net [127.0.0.1]) (amavisd-new, port 10024)
	with LMTP id FflSTrTGpFOP for <xen-users@lists.xen.org>;
	Sat, 27 Jun 2015 22:31:48 +0200 (CEST)
Received: from postfix-relay.alstadheim.priv.no
	(178-164-66.9.3p.ntebredband.no [178.164.66.9])
	(using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	(Authenticated sender: hakon.alstadheim@ntebb.no)
	by asav22.altibox.net (Postfix) with ESMTPSA id C8BDC201FB
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:48 +0200 (CEST)
X-Finnesikke-B-A-I-T: finnesikke@alstadheim.priv.no
Received: from smtps.alstadheim.priv.no (localhost [127.0.0.1])
	by postfix-relay.alstadheim.priv.no (Postfix) with ESMTP id D1BC96801F5
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:16 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=alstadheim.priv.no; h=
	message-id:date:from:mime-version:to:subject:content-type
	:content-transfer-encoding; s=smtp; bh=dPdR0L1K5T5R2gWTHq5glu4gm
	6k=; b=UM/8RJjHVdhsXPXy/VMuAkd0QE/Q4REewEXkJW64PlflaOFyWbal42xTz
	y5/lG5qcirQ5bCtrxdzplaqQy317qfx+lfWJvdKyA0KCWO+F3e1oP3zpA6wESuUx
	6A8dGaJaoTRWhfpp1uFi3cGkpslgFYY0VWwkYXZaG0jXwIYAOU=
Received: from [192.168.2.4] (unknown [192.168.2.4])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested) (Authenticated sender: hakon)
	by smtps.alstadheim.priv.no (Postfix) with ESMTPSA id C59AE6C00D8
	for <xen-users@lists.xen.org>; Sat, 27 Jun 2015 22:31:16 +0200 (CEST)
Message-ID: <558F0814.2050603@alstadheim.priv.no>
Date: Sat, 27 Jun 2015 22:31:16 +0200
From: =?UTF-8?B?SMOla29uIEFsc3RhZGhlaW0=?= <hakon@alstadheim.priv.no>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
	rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
Subject: [Xen-users] graphical monitoring tools for cpu frequency & power
	states?
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Hi all, I'm wondering if anyone has a pointer on how to get a graphical
display of cpu frequency and power for xen ? Something like gkrellm or
cacti to make it easier to home in on bottlenecs and potential tuning.
I'm fairly new at xen and I only have vague ideas about power management
on my Xeon E5 2620 (also new). I have an overview of load and cpu%, but
that is no good when I don't know what frequency the cpu is running at.

I've got a dual socket motherboard with only one socket populated, and
am thinking about expanding. The most concrete issue I'm facing right
now is how to get a single-threaded java server to run as well as
possible, with the java process running on a core that can be in turbo
mode as much as possible. Do I simply need more cores (so i can power
down one or two), or do I have to trade up to a higher frequency rated
cpu?  Need data to decide.

At the moment I can't even see when turbo mode kicks in. Seeing that
would be a first step, before I started fiddling with pinning cpus and
twiddling P-states and what not.

So, anybody have a cacti template or a gkrellm plugin to suck up xenpm data?



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Sun Jun 28 01:25:43 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 28 Jun 2015 01:25:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z91Ke-0007bh-4d; Sun, 28 Jun 2015 01:24:28 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xinyue@nfs.iscas.ac.cn>)
	id 1Z91Kc-0007bZ-HO; Sun, 28 Jun 2015 01:24:26 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	7A/36-13517-9CC4F855; Sun, 28 Jun 2015 01:24:25 +0000
X-Env-Sender: xinyue@nfs.iscas.ac.cn
X-Msg-Ref: server-8.tower-31.messagelabs.com!1435454632!20413830!1
X-Originating-IP: [124.16.139.187]
X-SpamReason: No, hits=0.1 required=7.0 tests=HTML_30_40,HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30724 invoked from network); 28 Jun 2015 01:23:54 -0000
Received: from itechs.iscas.ac.cn (HELO itechs.iscas.ac.cn) (124.16.139.187)
	by server-8.tower-31.messagelabs.com with SMTP;
	28 Jun 2015 01:23:54 -0000
Received: from localhost (unknown [127.0.0.1])
	by nfs.iscas.ac.cn (Postfix) with ESMTP id CEFBC2500FE8;
	Sat, 27 Jun 2015 21:38:53 +0800 (CST)
X-Virus-Scanned: amavisd-new at nfs.iscas.ac.cn
Received: from itechs.iscas.ac.cn ([127.0.0.1])
	by localhost (nfs.iscas.ac.cn [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id BKO3OePxd3Xm; Sat, 27 Jun 2015 21:38:35 +0800 (CST)
Received: from localhost (unknown [127.0.0.1])
	(Authenticated sender: xinyue@nfs.iscas.ac.cn)
	by nfs.iscas.ac.cn (Postfix) with ESMTPA id CC2032500D26;
	Sat, 27 Jun 2015 21:38:34 +0800 (CST)
Date: Sat, 27 Jun 2015 21:38:34 +0800 (CST)
From: xinyue <xinyue@nfs.iscas.ac.cn>
To: xen-devel <xen-devel@lists.xenproject.org>, 
	xen-users <xen-users@lists.xenproject.org>, 
	Xen-api <Xen-api@lists.xen.org>
Message-ID: <268467480.107369.1435412314425.JavaMail.tomcat@nfs.iscas.ac.cn>
MIME-Version: 1.0
X-Mail-src: 721
Disposition-Examine-Flag: 2
X-Priority: 
Subject: [Xen-users] =?utf-8?q?xen_physical_address=EF=BC=88paddr=EF=BC=89?=
 =?utf-8?q?and_machine_address_=28maddr=29?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
Reply-To: xinyue@nfs.iscas.ac.cn
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2357266430050898188=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============2357266430050898188==
Content-Type: multipart/alternative; 
	boundary="----=_Part_107368_1794973448.1435412314265"

------=_Part_107368_1794973448.1435412314265
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit


	
		Hi all,
		
		&nbsp; &nbsp; &nbsp; &nbsp;I wan&#39;t to hash the kernel code segment of HVM DomU in Xen hypervisor, so I have to transilate the virtral address in VM to the virtral address in xen. Is there some easy ways ?
		
		&nbsp; &nbsp; &nbsp; &nbsp;I read the source code about memory in Xen and confuse the relationship between the paddr and maddr. How does HVM with EPT translate between them. Is paddr the same with virtral address in xen heap?
		
		
		Thanks for any advices and with best regards!
		
		
		xinyue
		&nbsp; &nbsp; &nbsp;&nbsp;



------=_Part_107368_1794973448.1435412314265
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

<div><div>
	<div>
		Hi all,<br />
		<br />
		&nbsp; &nbsp; &nbsp; &nbsp;I wan&#39;t to hash the kernel code segment of HVM DomU in Xen hypervisor, so I have to transilate the virtral address in VM to the virtral address in xen. Is there some easy ways ?<br />
		<br />
		&nbsp; &nbsp; &nbsp; &nbsp;I read the source code about memory in Xen and confuse the relationship between the paddr and maddr. How does HVM with EPT translate between them. Is paddr the same with virtral address in xen heap?<br />
		<br />
		<br />
		Thanks for any advices and with best regards!<br />
		<br />
		<br />
		xinyue<br />
		&nbsp; &nbsp; &nbsp;&nbsp;</div>
</div>

</div>
------=_Part_107368_1794973448.1435412314265--


--===============2357266430050898188==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============2357266430050898188==--


From xen-users-bounces@lists.xen.org Sun Jun 28 01:25:43 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 28 Jun 2015 01:25:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z91Ke-0007bh-4d; Sun, 28 Jun 2015 01:24:28 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xinyue@nfs.iscas.ac.cn>)
	id 1Z91Kc-0007bZ-HO; Sun, 28 Jun 2015 01:24:26 +0000
Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id
	7A/36-13517-9CC4F855; Sun, 28 Jun 2015 01:24:25 +0000
X-Env-Sender: xinyue@nfs.iscas.ac.cn
X-Msg-Ref: server-8.tower-31.messagelabs.com!1435454632!20413830!1
X-Originating-IP: [124.16.139.187]
X-SpamReason: No, hits=0.1 required=7.0 tests=HTML_30_40,HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 30724 invoked from network); 28 Jun 2015 01:23:54 -0000
Received: from itechs.iscas.ac.cn (HELO itechs.iscas.ac.cn) (124.16.139.187)
	by server-8.tower-31.messagelabs.com with SMTP;
	28 Jun 2015 01:23:54 -0000
Received: from localhost (unknown [127.0.0.1])
	by nfs.iscas.ac.cn (Postfix) with ESMTP id CEFBC2500FE8;
	Sat, 27 Jun 2015 21:38:53 +0800 (CST)
X-Virus-Scanned: amavisd-new at nfs.iscas.ac.cn
Received: from itechs.iscas.ac.cn ([127.0.0.1])
	by localhost (nfs.iscas.ac.cn [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id BKO3OePxd3Xm; Sat, 27 Jun 2015 21:38:35 +0800 (CST)
Received: from localhost (unknown [127.0.0.1])
	(Authenticated sender: xinyue@nfs.iscas.ac.cn)
	by nfs.iscas.ac.cn (Postfix) with ESMTPA id CC2032500D26;
	Sat, 27 Jun 2015 21:38:34 +0800 (CST)
Date: Sat, 27 Jun 2015 21:38:34 +0800 (CST)
From: xinyue <xinyue@nfs.iscas.ac.cn>
To: xen-devel <xen-devel@lists.xenproject.org>, 
	xen-users <xen-users@lists.xenproject.org>, 
	Xen-api <Xen-api@lists.xen.org>
Message-ID: <268467480.107369.1435412314425.JavaMail.tomcat@nfs.iscas.ac.cn>
MIME-Version: 1.0
X-Mail-src: 721
Disposition-Examine-Flag: 2
X-Priority: 
Subject: [Xen-users] =?utf-8?q?xen_physical_address=EF=BC=88paddr=EF=BC=89?=
 =?utf-8?q?and_machine_address_=28maddr=29?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
Reply-To: xinyue@nfs.iscas.ac.cn
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2357266430050898188=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============2357266430050898188==
Content-Type: multipart/alternative; 
	boundary="----=_Part_107368_1794973448.1435412314265"

------=_Part_107368_1794973448.1435412314265
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit


	
		Hi all,
		
		&nbsp; &nbsp; &nbsp; &nbsp;I wan&#39;t to hash the kernel code segment of HVM DomU in Xen hypervisor, so I have to transilate the virtral address in VM to the virtral address in xen. Is there some easy ways ?
		
		&nbsp; &nbsp; &nbsp; &nbsp;I read the source code about memory in Xen and confuse the relationship between the paddr and maddr. How does HVM with EPT translate between them. Is paddr the same with virtral address in xen heap?
		
		
		Thanks for any advices and with best regards!
		
		
		xinyue
		&nbsp; &nbsp; &nbsp;&nbsp;



------=_Part_107368_1794973448.1435412314265
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

<div><div>
	<div>
		Hi all,<br />
		<br />
		&nbsp; &nbsp; &nbsp; &nbsp;I wan&#39;t to hash the kernel code segment of HVM DomU in Xen hypervisor, so I have to transilate the virtral address in VM to the virtral address in xen. Is there some easy ways ?<br />
		<br />
		&nbsp; &nbsp; &nbsp; &nbsp;I read the source code about memory in Xen and confuse the relationship between the paddr and maddr. How does HVM with EPT translate between them. Is paddr the same with virtral address in xen heap?<br />
		<br />
		<br />
		Thanks for any advices and with best regards!<br />
		<br />
		<br />
		xinyue<br />
		&nbsp; &nbsp; &nbsp;&nbsp;</div>
</div>

</div>
------=_Part_107368_1794973448.1435412314265--


--===============2357266430050898188==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============2357266430050898188==--


From xen-users-bounces@lists.xen.org Sun Jun 28 08:48:35 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 28 Jun 2015 08:48:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z98FX-0002KF-A5; Sun, 28 Jun 2015 08:47:39 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xinyue@nfs.iscas.ac.cn>)
	id 1Z98FV-0002Jv-L8; Sun, 28 Jun 2015 08:47:37 +0000
Received: from [85.158.137.68] by server-7.bemta-3.messagelabs.com id
	21/6D-06457-8A4BF855; Sun, 28 Jun 2015 08:47:36 +0000
X-Env-Sender: xinyue@nfs.iscas.ac.cn
X-Msg-Ref: server-12.tower-31.messagelabs.com!1435481092!20429556!1
X-Originating-IP: [124.16.139.187]
X-SpamReason: No, hits=0.0 required=7.0 tests=HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16446 invoked from network); 28 Jun 2015 08:44:52 -0000
Received: from itechs.iscas.ac.cn (HELO itechs.iscas.ac.cn) (124.16.139.187)
	by server-12.tower-31.messagelabs.com with SMTP;
	28 Jun 2015 08:44:52 -0000
Received: from localhost (unknown [127.0.0.1])
	by nfs.iscas.ac.cn (Postfix) with ESMTP id 61B042500E7D;
	Sun, 28 Jun 2015 12:47:28 +0800 (CST)
X-Virus-Scanned: amavisd-new at nfs.iscas.ac.cn
Received: from itechs.iscas.ac.cn ([127.0.0.1])
	by localhost (nfs.iscas.ac.cn [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id a0V9nOnuPdnO; Sun, 28 Jun 2015 12:47:12 +0800 (CST)
Received: from nfsPC (unknown [119.78.243.4])
	(Authenticated sender: xinyue@nfs.iscas.ac.cn)
	by nfs.iscas.ac.cn (Postfix) with ESMTPA id 558B925007FC;
	Sun, 28 Jun 2015 12:47:11 +0800 (CST)
From: "xinyue" <xinyue@nfs.iscas.ac.cn>
To: <xen-users@lists.xen.org>, <xen-api@lists.xen.org>,
	<xen-devel@lists.xen.org>
Date: Sun, 28 Jun 2015 13:13:37 +0800
Message-ID: <000001d0b161$31342770$939c7650$@nfs.iscas.ac.cn>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AdCwBLpvA/TwxVCCTcu5h+X9tZ5nZw==
Content-Language: zh-cn
Subject: [Xen-users] =?gb2312?b?eGVuIHBoeXNpY2FsIGFkZHJlc3OjqHBhZGRyo6lh?=
	=?gb2312?b?bmQgbWFjaGluZSBhZGRyZXNzIChtYWRkcik=?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0087173376772459416=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multipart message in MIME format.

--===============0087173376772459416==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0001_01D0B1A4.3F5A74B0"
Content-Language: zh-cn

This is a multipart message in MIME format.

------=_NextPart_000_0001_01D0B1A4.3F5A74B0
Content-Type: text/plain;
	charset="gb2312"
Content-Transfer-Encoding: 7bit

Hi all,

       I wan't to hash the kernel code segment of HVM DomU in Xen
hypervisor, so I have to transilate the virtral address in VM to the virtral
address in xen. Is there some easy ways ?

       I read the source code about memory in Xen and confuse the
relationship between the paddr and maddr. How does HVM with EPT translate
between them. Is paddr the same with virtral address in xen heap?


Thanks for any advices and with best regards!


xinyue


------=_NextPart_000_0001_01D0B1A4.3F5A74B0
Content-Type: text/html;
	charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dgb2312"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:=CB=CE=CC=E5;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=CB=CE=CC=E5";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	text-align:justify;
	text-justify:inter-ideograph;
	font-size:10.5pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
/* Page Definitions */
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DZH-CN =
link=3D"#0563C1" vlink=3D"#954F72" =
style=3D'text-justify-trim:punctuation'><div class=3DWordSection1><p =
class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-size:10.0pt;font-family:"Arial",sans-serif;color:black'>Hi =
all,<br><br>&nbsp; &nbsp; &nbsp; &nbsp;I wan't to hash the kernel code =
segment of HVM DomU in Xen hypervisor, so I have to transilate the =
virtral address in VM to the virtral address in xen. Is there some easy =
ways ?<br><br>&nbsp; &nbsp; &nbsp; &nbsp;I read the source code about =
memory in Xen and confuse the relationship between the paddr and maddr. =
How does HVM with EPT translate between them. Is paddr the same with =
virtral address in xen heap?<br><br><br>Thanks for any advices and with =
best regards!<br><br><br>xinyue</span><span =
lang=3DEN-US><o:p></o:p></span></p></div></body></html>
------=_NextPart_000_0001_01D0B1A4.3F5A74B0--



--===============0087173376772459416==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============0087173376772459416==--



From xen-users-bounces@lists.xen.org Sun Jun 28 08:48:35 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 28 Jun 2015 08:48:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z98FX-0002KF-A5; Sun, 28 Jun 2015 08:47:39 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xinyue@nfs.iscas.ac.cn>)
	id 1Z98FV-0002Jv-L8; Sun, 28 Jun 2015 08:47:37 +0000
Received: from [85.158.137.68] by server-7.bemta-3.messagelabs.com id
	21/6D-06457-8A4BF855; Sun, 28 Jun 2015 08:47:36 +0000
X-Env-Sender: xinyue@nfs.iscas.ac.cn
X-Msg-Ref: server-12.tower-31.messagelabs.com!1435481092!20429556!1
X-Originating-IP: [124.16.139.187]
X-SpamReason: No, hits=0.0 required=7.0 tests=HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16446 invoked from network); 28 Jun 2015 08:44:52 -0000
Received: from itechs.iscas.ac.cn (HELO itechs.iscas.ac.cn) (124.16.139.187)
	by server-12.tower-31.messagelabs.com with SMTP;
	28 Jun 2015 08:44:52 -0000
Received: from localhost (unknown [127.0.0.1])
	by nfs.iscas.ac.cn (Postfix) with ESMTP id 61B042500E7D;
	Sun, 28 Jun 2015 12:47:28 +0800 (CST)
X-Virus-Scanned: amavisd-new at nfs.iscas.ac.cn
Received: from itechs.iscas.ac.cn ([127.0.0.1])
	by localhost (nfs.iscas.ac.cn [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id a0V9nOnuPdnO; Sun, 28 Jun 2015 12:47:12 +0800 (CST)
Received: from nfsPC (unknown [119.78.243.4])
	(Authenticated sender: xinyue@nfs.iscas.ac.cn)
	by nfs.iscas.ac.cn (Postfix) with ESMTPA id 558B925007FC;
	Sun, 28 Jun 2015 12:47:11 +0800 (CST)
From: "xinyue" <xinyue@nfs.iscas.ac.cn>
To: <xen-users@lists.xen.org>, <xen-api@lists.xen.org>,
	<xen-devel@lists.xen.org>
Date: Sun, 28 Jun 2015 13:13:37 +0800
Message-ID: <000001d0b161$31342770$939c7650$@nfs.iscas.ac.cn>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AdCwBLpvA/TwxVCCTcu5h+X9tZ5nZw==
Content-Language: zh-cn
Subject: [Xen-users] =?gb2312?b?eGVuIHBoeXNpY2FsIGFkZHJlc3OjqHBhZGRyo6lh?=
	=?gb2312?b?bmQgbWFjaGluZSBhZGRyZXNzIChtYWRkcik=?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0087173376772459416=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

This is a multipart message in MIME format.

--===============0087173376772459416==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0001_01D0B1A4.3F5A74B0"
Content-Language: zh-cn

This is a multipart message in MIME format.

------=_NextPart_000_0001_01D0B1A4.3F5A74B0
Content-Type: text/plain;
	charset="gb2312"
Content-Transfer-Encoding: 7bit

Hi all,

       I wan't to hash the kernel code segment of HVM DomU in Xen
hypervisor, so I have to transilate the virtral address in VM to the virtral
address in xen. Is there some easy ways ?

       I read the source code about memory in Xen and confuse the
relationship between the paddr and maddr. How does HVM with EPT translate
between them. Is paddr the same with virtral address in xen heap?


Thanks for any advices and with best regards!


xinyue


------=_NextPart_000_0001_01D0B1A4.3F5A74B0
Content-Type: text/html;
	charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dgb2312"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:=CB=CE=CC=E5;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=CB=CE=CC=E5";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	text-align:justify;
	text-justify:inter-ideograph;
	font-size:10.5pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
/* Page Definitions */
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DZH-CN =
link=3D"#0563C1" vlink=3D"#954F72" =
style=3D'text-justify-trim:punctuation'><div class=3DWordSection1><p =
class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-size:10.0pt;font-family:"Arial",sans-serif;color:black'>Hi =
all,<br><br>&nbsp; &nbsp; &nbsp; &nbsp;I wan't to hash the kernel code =
segment of HVM DomU in Xen hypervisor, so I have to transilate the =
virtral address in VM to the virtral address in xen. Is there some easy =
ways ?<br><br>&nbsp; &nbsp; &nbsp; &nbsp;I read the source code about =
memory in Xen and confuse the relationship between the paddr and maddr. =
How does HVM with EPT translate between them. Is paddr the same with =
virtral address in xen heap?<br><br><br>Thanks for any advices and with =
best regards!<br><br><br>xinyue</span><span =
lang=3DEN-US><o:p></o:p></span></p></div></body></html>
------=_NextPart_000_0001_01D0B1A4.3F5A74B0--



--===============0087173376772459416==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============0087173376772459416==--



From xen-users-bounces@lists.xen.org Sun Jun 28 23:18:12 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 28 Jun 2015 23:18:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9Loq-0007IU-82; Sun, 28 Jun 2015 23:17:00 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pierre.peyronnel@gmail.com>) id 1Z9Loo-0007IP-7o
	for xen-users@lists.xen.org; Sun, 28 Jun 2015 23:16:58 +0000
Received: from [85.158.139.211] by server-2.bemta-5.messagelabs.com id
	17/FF-31304-96080955; Sun, 28 Jun 2015 23:16:57 +0000
X-Env-Sender: pierre.peyronnel@gmail.com
X-Msg-Ref: server-6.tower-206.messagelabs.com!1435533416!17430878!1
X-Originating-IP: [209.85.212.171]
X-SpamReason: No, hits=1.1 required=7.0 tests=BODY_RANDOM_LONG,
	HTML_60_70,HTML_MESSAGE,RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13829 invoked from network); 28 Jun 2015 23:16:56 -0000
Received: from mail-wi0-f171.google.com (HELO mail-wi0-f171.google.com)
	(209.85.212.171)
	by server-6.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	28 Jun 2015 23:16:56 -0000
Received: by wicgi11 with SMTP id gi11so57515466wic.0
	for <xen-users@lists.xen.org>; Sun, 28 Jun 2015 16:16:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=+q2kMROlzpwDeaM6JYkjydyq4epzdbVqm4qvCtNpX/E=;
	b=nqgqbsPA32TwRoqbqVeivtBAlXpTeCGfHPhEhKj78Uqx6mc786EFTZjxY35kgDiVxa
	SJzgYBrPxQa+BNThWjU1d7Xd0z6ePGlZUzrOYrbgv9gXOE1saUcooyh+e+GscGeFAXFH
	6Iv2ccggEkRA61VI0SIwjbHRmCwO3nDRowEOOCyQLArjJ1IdIOd7LbIkeRfpLiMl0L4K
	SqOVd8mxlpI6fo5wMxjTKp3H3LzDSWKQhgYXXtIz4UAll43xUhJ9/EWPkqrgWaA4B5kQ
	AZYOo1QdKLQlO/02qMJUwRSenNTPS2nWq7zVkTuz7N1TqDlhaswkajUEWSLUOpGIPvj0
	5kAQ==
MIME-Version: 1.0
X-Received: by 10.194.187.170 with SMTP id ft10mr23018911wjc.26.1435533416028; 
	Sun, 28 Jun 2015 16:16:56 -0700 (PDT)
Received: by 10.194.39.10 with HTTP; Sun, 28 Jun 2015 16:16:55 -0700 (PDT)
Date: Mon, 29 Jun 2015 01:16:55 +0200
Message-ID: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
From: Pierre Peyronnel <pierre.peyronnel@gmail.com>
To: xen-users <xen-users@lists.xen.org>
Subject: [Xen-users] xen 4.4.2 -> 4.5.0 : after dom 0 upgrade,
	unable to start domUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6286413950706675817=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============6286413950706675817==
Content-Type: multipart/alternative; boundary=047d7bb03a9253615005199c2bf4

--047d7bb03a9253615005199c2bf4
Content-Type: text/plain; charset=UTF-8

Hello,

trying to keep my systems up to date...
so now I moved xen version again and it does not work again.
Note : i did not change anything in my xen config except the version. The
xl config files of the domUs are those of 4.4

Here's what I have, any help welcome :

alpine-xen:~# xl -vvv create /etc/xen/auto/1_debianZFS_withUSB

Parsing config from /etc/xen/auto/1_debianZFS_withUSB

libxl: debug: libxl_create.c:1345:do_domain_create: ao 0x77ce00c84f40:
create: how=0 callback=0 poller=0x77ce01120bc0

xc: detail: domctl operation failed -- need to rebuild the user-space tool
set?

libxl: error: libxl_create.c:478:libxl__domain_make: domain creation fail

libxl: error: libxl_create.c:743:initiate_domain_create: cannot make
domain: -3

xc: detail: sysctl operation failed -- need to rebuild the user-space tool
set?

libxl: error: libxl.c:576:libxl_domain_info: geting domain info list:
*Permission
denied*

libxl: error: libxl.c:1348:domain_destroy_callback: unable to destroy guest
with domid 4294967295

libxl: error: libxl_create.c:1323:domcreate_destruction_cb: unable to
destroy domain 4294967295 following failed creation

libxl: debug: libxl_event.c:1591:libxl__ao_complete: ao 0x77ce00c84f40:
complete, rc=-3

libxl: debug: libxl_create.c:1359:do_domain_create: ao 0x77ce00c84f40:
inprogress: poller=0x77ce01120bc0, flags=ic

libxl: debug: libxl_event.c:1563:libxl__ao__destroy: ao 0x77ce00c84f40:
destroy

xc: debug: hypercall buffer: total allocations:9 total releases:9

xc: debug: hypercall buffer: current allocations:0 maximum allocations:2

xc: debug: hypercall buffer: cache current size:2

xc: debug: hypercall buffer: cache hits:7 misses:2 toobig:0

alpine-xen:~#

Thanks in advance
Pierre

--047d7bb03a9253615005199c2bf4
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello,<div><br></div><div>trying to keep my systems up to =
date...</div><div>so now I moved xen version again and it does not work aga=
in.</div><div>Note : i did not change anything in my xen config except the =
version. The xl config files of the domUs are those of 4.4</div><div><br></=
div><div>Here&#39;s what I have, any help welcome :</div><div><br></div><di=
v><p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;">=
<font color=3D"#000000" style=3D"background-color:rgb(255,255,255)">alpine-=
xen:~# xl -vvv create /etc/xen/auto/1_debianZFS_withUSB</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">Parsing c=
onfig from /etc/xen/auto/1_debianZFS_withUSB</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_create.c:1345:do_domain_create: ao 0x77ce00c84f40: create: how=
=3D0 callback=3D0 poller=3D0x77ce01120bc0</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: detai=
l: domctl operation failed -- need to rebuild the user-space tool set?</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl_create.c:478:libxl__domain_make: domain creation fail</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl_create.c:743:initiate_domain_create: cannot make domain: -3</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: detai=
l: sysctl operation failed -- need to rebuild the user-space tool set?</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl.c:576:libxl_domain_info: geting domain info list: <b>Permission =
denied</b></font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl.c:1348:domain_destroy_callback: unable to destroy guest with dom=
id 4294967295</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl_create.c:1323:domcreate_destruction_cb: unable to destroy domain=
 4294967295 following failed creation</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_event.c:1591:libxl__ao_complete: ao 0x77ce00c84f40: complete, rc=
=3D-3</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_create.c:1359:do_domain_create: ao 0x77ce00c84f40: inprogress: p=
oller=3D0x77ce01120bc0, flags=3Dic</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_event.c:1563:libxl__ao__destroy: ao 0x77ce00c84f40: destroy</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: total allocations:9 total releases:9</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: current allocations:0 maximum allocations:2</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: cache current size:2</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: cache hits:7 misses:2 toobig:0</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">alpine-xe=
n:~#=C2=A0</font></p></div><div><br></div><div>Thanks in advance</div><div>=
Pierre</div></div>

--047d7bb03a9253615005199c2bf4--


--===============6286413950706675817==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6286413950706675817==--


From xen-users-bounces@lists.xen.org Sun Jun 28 23:18:12 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 28 Jun 2015 23:18:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9Loq-0007IU-82; Sun, 28 Jun 2015 23:17:00 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pierre.peyronnel@gmail.com>) id 1Z9Loo-0007IP-7o
	for xen-users@lists.xen.org; Sun, 28 Jun 2015 23:16:58 +0000
Received: from [85.158.139.211] by server-2.bemta-5.messagelabs.com id
	17/FF-31304-96080955; Sun, 28 Jun 2015 23:16:57 +0000
X-Env-Sender: pierre.peyronnel@gmail.com
X-Msg-Ref: server-6.tower-206.messagelabs.com!1435533416!17430878!1
X-Originating-IP: [209.85.212.171]
X-SpamReason: No, hits=1.1 required=7.0 tests=BODY_RANDOM_LONG,
	HTML_60_70,HTML_MESSAGE,RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13829 invoked from network); 28 Jun 2015 23:16:56 -0000
Received: from mail-wi0-f171.google.com (HELO mail-wi0-f171.google.com)
	(209.85.212.171)
	by server-6.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	28 Jun 2015 23:16:56 -0000
Received: by wicgi11 with SMTP id gi11so57515466wic.0
	for <xen-users@lists.xen.org>; Sun, 28 Jun 2015 16:16:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:date:message-id:subject:from:to:content-type;
	bh=+q2kMROlzpwDeaM6JYkjydyq4epzdbVqm4qvCtNpX/E=;
	b=nqgqbsPA32TwRoqbqVeivtBAlXpTeCGfHPhEhKj78Uqx6mc786EFTZjxY35kgDiVxa
	SJzgYBrPxQa+BNThWjU1d7Xd0z6ePGlZUzrOYrbgv9gXOE1saUcooyh+e+GscGeFAXFH
	6Iv2ccggEkRA61VI0SIwjbHRmCwO3nDRowEOOCyQLArjJ1IdIOd7LbIkeRfpLiMl0L4K
	SqOVd8mxlpI6fo5wMxjTKp3H3LzDSWKQhgYXXtIz4UAll43xUhJ9/EWPkqrgWaA4B5kQ
	AZYOo1QdKLQlO/02qMJUwRSenNTPS2nWq7zVkTuz7N1TqDlhaswkajUEWSLUOpGIPvj0
	5kAQ==
MIME-Version: 1.0
X-Received: by 10.194.187.170 with SMTP id ft10mr23018911wjc.26.1435533416028; 
	Sun, 28 Jun 2015 16:16:56 -0700 (PDT)
Received: by 10.194.39.10 with HTTP; Sun, 28 Jun 2015 16:16:55 -0700 (PDT)
Date: Mon, 29 Jun 2015 01:16:55 +0200
Message-ID: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
From: Pierre Peyronnel <pierre.peyronnel@gmail.com>
To: xen-users <xen-users@lists.xen.org>
Subject: [Xen-users] xen 4.4.2 -> 4.5.0 : after dom 0 upgrade,
	unable to start domUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6286413950706675817=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============6286413950706675817==
Content-Type: multipart/alternative; boundary=047d7bb03a9253615005199c2bf4

--047d7bb03a9253615005199c2bf4
Content-Type: text/plain; charset=UTF-8

Hello,

trying to keep my systems up to date...
so now I moved xen version again and it does not work again.
Note : i did not change anything in my xen config except the version. The
xl config files of the domUs are those of 4.4

Here's what I have, any help welcome :

alpine-xen:~# xl -vvv create /etc/xen/auto/1_debianZFS_withUSB

Parsing config from /etc/xen/auto/1_debianZFS_withUSB

libxl: debug: libxl_create.c:1345:do_domain_create: ao 0x77ce00c84f40:
create: how=0 callback=0 poller=0x77ce01120bc0

xc: detail: domctl operation failed -- need to rebuild the user-space tool
set?

libxl: error: libxl_create.c:478:libxl__domain_make: domain creation fail

libxl: error: libxl_create.c:743:initiate_domain_create: cannot make
domain: -3

xc: detail: sysctl operation failed -- need to rebuild the user-space tool
set?

libxl: error: libxl.c:576:libxl_domain_info: geting domain info list:
*Permission
denied*

libxl: error: libxl.c:1348:domain_destroy_callback: unable to destroy guest
with domid 4294967295

libxl: error: libxl_create.c:1323:domcreate_destruction_cb: unable to
destroy domain 4294967295 following failed creation

libxl: debug: libxl_event.c:1591:libxl__ao_complete: ao 0x77ce00c84f40:
complete, rc=-3

libxl: debug: libxl_create.c:1359:do_domain_create: ao 0x77ce00c84f40:
inprogress: poller=0x77ce01120bc0, flags=ic

libxl: debug: libxl_event.c:1563:libxl__ao__destroy: ao 0x77ce00c84f40:
destroy

xc: debug: hypercall buffer: total allocations:9 total releases:9

xc: debug: hypercall buffer: current allocations:0 maximum allocations:2

xc: debug: hypercall buffer: cache current size:2

xc: debug: hypercall buffer: cache hits:7 misses:2 toobig:0

alpine-xen:~#

Thanks in advance
Pierre

--047d7bb03a9253615005199c2bf4
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello,<div><br></div><div>trying to keep my systems up to =
date...</div><div>so now I moved xen version again and it does not work aga=
in.</div><div>Note : i did not change anything in my xen config except the =
version. The xl config files of the domUs are those of 4.4</div><div><br></=
div><div>Here&#39;s what I have, any help welcome :</div><div><br></div><di=
v><p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;">=
<font color=3D"#000000" style=3D"background-color:rgb(255,255,255)">alpine-=
xen:~# xl -vvv create /etc/xen/auto/1_debianZFS_withUSB</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">Parsing c=
onfig from /etc/xen/auto/1_debianZFS_withUSB</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_create.c:1345:do_domain_create: ao 0x77ce00c84f40: create: how=
=3D0 callback=3D0 poller=3D0x77ce01120bc0</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: detai=
l: domctl operation failed -- need to rebuild the user-space tool set?</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl_create.c:478:libxl__domain_make: domain creation fail</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl_create.c:743:initiate_domain_create: cannot make domain: -3</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: detai=
l: sysctl operation failed -- need to rebuild the user-space tool set?</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl.c:576:libxl_domain_info: geting domain info list: <b>Permission =
denied</b></font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl.c:1348:domain_destroy_callback: unable to destroy guest with dom=
id 4294967295</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: er=
ror: libxl_create.c:1323:domcreate_destruction_cb: unable to destroy domain=
 4294967295 following failed creation</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_event.c:1591:libxl__ao_complete: ao 0x77ce00c84f40: complete, rc=
=3D-3</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_create.c:1359:do_domain_create: ao 0x77ce00c84f40: inprogress: p=
oller=3D0x77ce01120bc0, flags=3Dic</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">libxl: de=
bug: libxl_event.c:1563:libxl__ao__destroy: ao 0x77ce00c84f40: destroy</fon=
t></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: total allocations:9 total releases:9</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: current allocations:0 maximum allocations:2</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: cache current size:2</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">xc: debug=
: hypercall buffer: cache hits:7 misses:2 toobig:0</font></p>
<p style=3D"margin:0px;font-size:12px;font-family:&#39;Andale Mono&#39;"><f=
ont color=3D"#000000" style=3D"background-color:rgb(255,255,255)">alpine-xe=
n:~#=C2=A0</font></p></div><div><br></div><div>Thanks in advance</div><div>=
Pierre</div></div>

--047d7bb03a9253615005199c2bf4--


--===============6286413950706675817==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============6286413950706675817==--


From xen-users-bounces@lists.xen.org Mon Jun 29 08:39:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2015 08:39:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9UZp-000315-Ns; Mon, 29 Jun 2015 08:38:05 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=615b14896=Ian.Campbell@citrix.com>)
	id 1Z9UZo-00030z-GS
	for xen-users@lists.xen.org; Mon, 29 Jun 2015 08:38:04 +0000
Received: from [85.158.139.211] by server-16.bemta-5.messagelabs.com id
	9B/CE-15949-BE301955; Mon, 29 Jun 2015 08:38:03 +0000
X-Env-Sender: prvs=615b14896=Ian.Campbell@citrix.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1435567077!13393670!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16038 invoked from network); 29 Jun 2015 08:37:58 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-11.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	29 Jun 2015 08:37:58 -0000
X-IronPort-AV: E=Sophos;i="5.13,697,1427760000"; d="scan'208";a="276427161"
Message-ID: <1435567074.32500.215.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Pierre Peyronnel <pierre.peyronnel@gmail.com>
Date: Mon, 29 Jun 2015 09:37:54 +0100
In-Reply-To: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
References: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] xen 4.4.2 -> 4.5.0 : after dom 0 upgrade,
 unable to start domUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Mon, 2015-06-29 at 01:16 +0200, Pierre Peyronnel wrote:

> libxl: error: libxl.c:576:libxl_domain_info: geting domain info list: Permission denied

This is 99 times out of 100 due to a mistmatch between your hypervisor
and your tools.

The typo in that error message was fixed in 4.5.0-rc4, which suggests to
me that you are still picking up the 4.4.2 tools from somewhere.

Since 4.5 switched from installing in /usr to /usr/local by default[0] I
think it is likely you've still got the 4.4.2 tools in /usr and the 4.5
tools in /usr/local are being shadowed by them.

Ian.

[0]
http://wiki.xenproject.org/wiki/Xen_Project_4.5_Release_Notes#Build_Requirements This was done to match the way most sensible projects do things, which separates distro compiled/packaged software in /usr from locally compiled software in /usr/local by default.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 29 08:39:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2015 08:39:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9UZp-000315-Ns; Mon, 29 Jun 2015 08:38:05 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=615b14896=Ian.Campbell@citrix.com>)
	id 1Z9UZo-00030z-GS
	for xen-users@lists.xen.org; Mon, 29 Jun 2015 08:38:04 +0000
Received: from [85.158.139.211] by server-16.bemta-5.messagelabs.com id
	9B/CE-15949-BE301955; Mon, 29 Jun 2015 08:38:03 +0000
X-Env-Sender: prvs=615b14896=Ian.Campbell@citrix.com
X-Msg-Ref: server-11.tower-206.messagelabs.com!1435567077!13393670!1
X-Originating-IP: [66.165.176.89]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 16038 invoked from network); 29 Jun 2015 08:37:58 -0000
Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89)
	by server-11.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	29 Jun 2015 08:37:58 -0000
X-IronPort-AV: E=Sophos;i="5.13,697,1427760000"; d="scan'208";a="276427161"
Message-ID: <1435567074.32500.215.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Pierre Peyronnel <pierre.peyronnel@gmail.com>
Date: Mon, 29 Jun 2015 09:37:54 +0100
In-Reply-To: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
References: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] xen 4.4.2 -> 4.5.0 : after dom 0 upgrade,
 unable to start domUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Mon, 2015-06-29 at 01:16 +0200, Pierre Peyronnel wrote:

> libxl: error: libxl.c:576:libxl_domain_info: geting domain info list: Permission denied

This is 99 times out of 100 due to a mistmatch between your hypervisor
and your tools.

The typo in that error message was fixed in 4.5.0-rc4, which suggests to
me that you are still picking up the 4.4.2 tools from somewhere.

Since 4.5 switched from installing in /usr to /usr/local by default[0] I
think it is likely you've still got the 4.4.2 tools in /usr and the 4.5
tools in /usr/local are being shadowed by them.

Ian.

[0]
http://wiki.xenproject.org/wiki/Xen_Project_4.5_Release_Notes#Build_Requirements This was done to match the way most sensible projects do things, which separates distro compiled/packaged software in /usr from locally compiled software in /usr/local by default.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 29 11:34:26 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2015 11:34:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9XJR-0001In-NL; Mon, 29 Jun 2015 11:33:21 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=615b14896=Ian.Campbell@citrix.com>)
	id 1Z9UjU-0003Sx-1p; Mon, 29 Jun 2015 08:48:04 +0000
Received: from [193.109.254.147] by server-4.bemta-14.messagelabs.com id
	F5/BE-27764-34601955; Mon, 29 Jun 2015 08:48:03 +0000
X-Env-Sender: prvs=615b14896=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1435567680!27513223!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11545 invoked from network); 29 Jun 2015 08:48:02 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-9.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	29 Jun 2015 08:48:02 -0000
X-IronPort-AV: E=Sophos;i="5.13,698,1427760000"; d="scan'208";a="279410706"
Message-ID: <1435567675.32500.222.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: xinyue <xinyue@nfs.iscas.ac.cn>
Date: Mon, 29 Jun 2015 09:47:55 +0100
In-Reply-To: <000001d0b161$31342770$939c7650$@nfs.iscas.ac.cn>
References: <000001d0b161$31342770$939c7650$@nfs.iscas.ac.cn>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
X-Mailman-Approved-At: Mon, 29 Jun 2015 11:33:21 +0000
Cc: xen-devel@lists.xen.org
Subject: Re: [Xen-users]
 =?utf-8?q?xen_physical_address=EF=BC=88paddr=EF=BC=89?=
 =?utf-8?q?and_machine_address_=28maddr=29?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Sun, 2015-06-28 at 13:13 +0800, xinyue wrote:

Per
http://wiki.xen.org/wiki/Asking_Xen_Devel_Questions#Observe_list_etiquette. please do not cross post.

You question seems to be xen-development related, so I have put the
other two to bcc.

>        I wan't to hash the kernel code segment of HVM DomU in Xen
> hypervisor, so I have to transilate the virtral address in VM to the
> virtral address in xen. Is there some easy ways ?

You need to first translate the guest virtual address to a guest
physical address and then to a machine address which you can then map in
to Xen.

I think you need paging_gva_to_gfn for the first step, then one of the
get_gfn* functions, then map_domain_page. I don't know if there is a
helper which will simplify all this.

>        I read the source code about memory in Xen and confuse the
> relationship between the paddr and maddr. How does HVM with EPT
> translate between them. Is paddr the same with virtral address in xen
> heap?

No. A paddr is a physical address, not a virtual one.

The latest xen.git contains a comment in xen/include/xen/mm.h which
describes the different types of memory.

To get a Xen virtual address for a domheap page you need to use
(un)map_domain_page on the underlying machine address (or struct
page_info *) to create a temporary mapping. For xenheap pages you can
use other mechanisms, but for an arbitrary guest page it is unlikely to
be from the xenheap.

> 
> 
> Thanks for any advices and with best regards!
> 
> 
> xinyue
> 
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 29 11:34:26 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2015 11:34:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9XJR-0001In-NL; Mon, 29 Jun 2015 11:33:21 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=615b14896=Ian.Campbell@citrix.com>)
	id 1Z9UjU-0003Sx-1p; Mon, 29 Jun 2015 08:48:04 +0000
Received: from [193.109.254.147] by server-4.bemta-14.messagelabs.com id
	F5/BE-27764-34601955; Mon, 29 Jun 2015 08:48:03 +0000
X-Env-Sender: prvs=615b14896=Ian.Campbell@citrix.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1435567680!27513223!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 11545 invoked from network); 29 Jun 2015 08:48:02 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-9.tower-27.messagelabs.com with RC4-SHA encrypted SMTP;
	29 Jun 2015 08:48:02 -0000
X-IronPort-AV: E=Sophos;i="5.13,698,1427760000"; d="scan'208";a="279410706"
Message-ID: <1435567675.32500.222.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: xinyue <xinyue@nfs.iscas.ac.cn>
Date: Mon, 29 Jun 2015 09:47:55 +0100
In-Reply-To: <000001d0b161$31342770$939c7650$@nfs.iscas.ac.cn>
References: <000001d0b161$31342770$939c7650$@nfs.iscas.ac.cn>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA1
X-Mailman-Approved-At: Mon, 29 Jun 2015 11:33:21 +0000
Cc: xen-devel@lists.xen.org
Subject: Re: [Xen-users]
 =?utf-8?q?xen_physical_address=EF=BC=88paddr=EF=BC=89?=
 =?utf-8?q?and_machine_address_=28maddr=29?=
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Sun, 2015-06-28 at 13:13 +0800, xinyue wrote:

Per
http://wiki.xen.org/wiki/Asking_Xen_Devel_Questions#Observe_list_etiquette. please do not cross post.

You question seems to be xen-development related, so I have put the
other two to bcc.

>        I wan't to hash the kernel code segment of HVM DomU in Xen
> hypervisor, so I have to transilate the virtral address in VM to the
> virtral address in xen. Is there some easy ways ?

You need to first translate the guest virtual address to a guest
physical address and then to a machine address which you can then map in
to Xen.

I think you need paging_gva_to_gfn for the first step, then one of the
get_gfn* functions, then map_domain_page. I don't know if there is a
helper which will simplify all this.

>        I read the source code about memory in Xen and confuse the
> relationship between the paddr and maddr. How does HVM with EPT
> translate between them. Is paddr the same with virtral address in xen
> heap?

No. A paddr is a physical address, not a virtual one.

The latest xen.git contains a comment in xen/include/xen/mm.h which
describes the different types of memory.

To get a Xen virtual address for a domheap page you need to use
(un)map_domain_page on the underlying machine address (or struct
page_info *) to create a temporary mapping. For xenheap pages you can
use other mechanisms, but for an arbitrary guest page it is unlikely to
be from the xenheap.

> 
> 
> Thanks for any advices and with best regards!
> 
> 
> xinyue
> 
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xen.org
> http://lists.xen.org/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Mon Jun 29 21:54:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2015 21:54:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9gyp-0001cS-K6; Mon, 29 Jun 2015 21:52:43 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pierre.peyronnel@gmail.com>) id 1Z9gyo-0001cN-B4
	for xen-users@lists.xen.org; Mon, 29 Jun 2015 21:52:42 +0000
Received: from [85.158.139.211] by server-16.bemta-5.messagelabs.com id
	6B/71-15949-92EB1955; Mon, 29 Jun 2015 21:52:41 +0000
X-Env-Sender: pierre.peyronnel@gmail.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1435614759!14362070!1
X-Originating-IP: [74.125.82.49]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_20_30,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 438 invoked from network); 29 Jun 2015 21:52:40 -0000
Received: from mail-wg0-f49.google.com (HELO mail-wg0-f49.google.com)
	(74.125.82.49)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	29 Jun 2015 21:52:40 -0000
Received: by wguu7 with SMTP id u7so152194491wgu.3
	for <xen-users@lists.xen.org>; Mon, 29 Jun 2015 14:52:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=PAgVRo8u11b/yxH2jmGc56S+0uEjNjnKlsbngfpNkTo=;
	b=k/dktOcO+Ysliby8I/gnJLPXWb96WC0bDLyDTSPH9BpXZ0xLIgjKL1ncPSfoNKHsqf
	QEmow5iHvI6Zrt610CiO1z13jKvOVuo8soCfOxSu79kFhhHxD181ZcXnOyD5OEOZ3rTg
	QKQvrRPEHH7TkMeq1nSM8skY4iPyKMi+/EF3FNXHPpXrRALDyKHAcbAJQdqDjRSbO5/5
	WtLw3+qknPGho09yfCPM+F0zvEokOWB4bPJ0CUzIhEHA8XWEJFFhho0fLOBr3g7GYden
	cyH675REoJP2Z0vSVJjX5udXMEkMiR52eRDOTKgRe+mg6g1HCHITLMSGvYD/TYbUszRU
	lYhA==
MIME-Version: 1.0
X-Received: by 10.194.174.194 with SMTP id bu2mr35210391wjc.76.1435614759814; 
	Mon, 29 Jun 2015 14:52:39 -0700 (PDT)
Received: by 10.194.39.10 with HTTP; Mon, 29 Jun 2015 14:52:39 -0700 (PDT)
In-Reply-To: <1435567074.32500.215.camel@citrix.com>
References: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
	<1435567074.32500.215.camel@citrix.com>
Date: Mon, 29 Jun 2015 23:52:39 +0200
Message-ID: <CA+mArZWACh2-oaq-MO+iHhg7JKx6959CkiqEEGo7oLvJcZ1U3Q@mail.gmail.com>
From: Pierre Peyronnel <pierre.peyronnel@gmail.com>
To: Ian Campbell <ian.campbell@citrix.com>
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] xen 4.4.2 -> 4.5.0 : after dom 0 upgrade,
 unable to start domUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3389236524871401435=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============3389236524871401435==
Content-Type: multipart/alternative; boundary=089e0141a006cb0bf40519af1bf5

--089e0141a006cb0bf40519af1bf5
Content-Type: text/plain; charset=UTF-8

Thank you Ian, indeed you were right.

It turns out my system upgrade did not apparently upgrade xen correctly...
So I removed everything Xen, reinstalled 4.5.0 and now it works !

Pierre

--089e0141a006cb0bf40519af1bf5
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thank you Ian, indeed you were right.<div><br></div><div>I=
t turns out my system upgrade did not apparently upgrade xen correctly...</=
div><div>So I removed everything Xen, reinstalled 4.5.0 and now it works !<=
/div><div><br></div><div>Pierre</div></div>

--089e0141a006cb0bf40519af1bf5--


--===============3389236524871401435==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3389236524871401435==--


From xen-users-bounces@lists.xen.org Mon Jun 29 21:54:08 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2015 21:54:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9gyp-0001cS-K6; Mon, 29 Jun 2015 21:52:43 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <pierre.peyronnel@gmail.com>) id 1Z9gyo-0001cN-B4
	for xen-users@lists.xen.org; Mon, 29 Jun 2015 21:52:42 +0000
Received: from [85.158.139.211] by server-16.bemta-5.messagelabs.com id
	6B/71-15949-92EB1955; Mon, 29 Jun 2015 21:52:41 +0000
X-Env-Sender: pierre.peyronnel@gmail.com
X-Msg-Ref: server-15.tower-206.messagelabs.com!1435614759!14362070!1
X-Originating-IP: [74.125.82.49]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_20_30,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 438 invoked from network); 29 Jun 2015 21:52:40 -0000
Received: from mail-wg0-f49.google.com (HELO mail-wg0-f49.google.com)
	(74.125.82.49)
	by server-15.tower-206.messagelabs.com with RC4-SHA encrypted SMTP;
	29 Jun 2015 21:52:40 -0000
Received: by wguu7 with SMTP id u7so152194491wgu.3
	for <xen-users@lists.xen.org>; Mon, 29 Jun 2015 14:52:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
	h=mime-version:in-reply-to:references:date:message-id:subject:from:to
	:cc:content-type;
	bh=PAgVRo8u11b/yxH2jmGc56S+0uEjNjnKlsbngfpNkTo=;
	b=k/dktOcO+Ysliby8I/gnJLPXWb96WC0bDLyDTSPH9BpXZ0xLIgjKL1ncPSfoNKHsqf
	QEmow5iHvI6Zrt610CiO1z13jKvOVuo8soCfOxSu79kFhhHxD181ZcXnOyD5OEOZ3rTg
	QKQvrRPEHH7TkMeq1nSM8skY4iPyKMi+/EF3FNXHPpXrRALDyKHAcbAJQdqDjRSbO5/5
	WtLw3+qknPGho09yfCPM+F0zvEokOWB4bPJ0CUzIhEHA8XWEJFFhho0fLOBr3g7GYden
	cyH675REoJP2Z0vSVJjX5udXMEkMiR52eRDOTKgRe+mg6g1HCHITLMSGvYD/TYbUszRU
	lYhA==
MIME-Version: 1.0
X-Received: by 10.194.174.194 with SMTP id bu2mr35210391wjc.76.1435614759814; 
	Mon, 29 Jun 2015 14:52:39 -0700 (PDT)
Received: by 10.194.39.10 with HTTP; Mon, 29 Jun 2015 14:52:39 -0700 (PDT)
In-Reply-To: <1435567074.32500.215.camel@citrix.com>
References: <CA+mArZUj7jvTGF0qV6TFNyjqDsd8YO7Fmf=7cBWRqpm5Etv97w@mail.gmail.com>
	<1435567074.32500.215.camel@citrix.com>
Date: Mon, 29 Jun 2015 23:52:39 +0200
Message-ID: <CA+mArZWACh2-oaq-MO+iHhg7JKx6959CkiqEEGo7oLvJcZ1U3Q@mail.gmail.com>
From: Pierre Peyronnel <pierre.peyronnel@gmail.com>
To: Ian Campbell <ian.campbell@citrix.com>
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] xen 4.4.2 -> 4.5.0 : after dom 0 upgrade,
 unable to start domUs
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3389236524871401435=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============3389236524871401435==
Content-Type: multipart/alternative; boundary=089e0141a006cb0bf40519af1bf5

--089e0141a006cb0bf40519af1bf5
Content-Type: text/plain; charset=UTF-8

Thank you Ian, indeed you were right.

It turns out my system upgrade did not apparently upgrade xen correctly...
So I removed everything Xen, reinstalled 4.5.0 and now it works !

Pierre

--089e0141a006cb0bf40519af1bf5
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thank you Ian, indeed you were right.<div><br></div><div>I=
t turns out my system upgrade did not apparently upgrade xen correctly...</=
div><div>So I removed everything Xen, reinstalled 4.5.0 and now it works !<=
/div><div><br></div><div>Pierre</div></div>

--089e0141a006cb0bf40519af1bf5--


--===============3389236524871401435==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============3389236524871401435==--


From xen-users-bounces@lists.xen.org Tue Jun 30 00:44:39 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 00:44:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9je1-0004mT-9u; Tue, 30 Jun 2015 00:43:25 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <geek@uniserve.com>) id 1Z9jdz-0004mO-UN
	for xen-users@lists.xen.org; Tue, 30 Jun 2015 00:43:24 +0000
Received: from [193.109.254.147] by server-3.bemta-14.messagelabs.com id
	01/76-18676-B26E1955; Tue, 30 Jun 2015 00:43:23 +0000
X-Env-Sender: geek@uniserve.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1435625001!27764589!1
X-Originating-IP: [216.210.109.135]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4410 invoked from network); 30 Jun 2015 00:43:22 -0000
Received: from smtp-relay2.uniserve.net (HELO smtp-relay2.uniserve.net)
	(216.210.109.135)
	by server-9.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 30 Jun 2015 00:43:22 -0000
Received: from dhcp702-3-30.dsl.ucc-net.ca ([216.113.206.158] helo=wiggly)
	by smtp-relay2.uniserve.net with esmtpsa (SSLv3:AES128-SHA:128)
	(Exim 4.72) (envelope-from <geek@uniserve.com>) id 1Z9ihr-0006t2-It
	for xen-users@lists.xen.org; Mon, 29 Jun 2015 16:43:19 -0700
Date: Mon, 29 Jun 2015 17:43:18 -0700
From: Dave Stevens <geek@uniserve.com>
To: xen-users <xen-users@lists.xen.org>
Message-ID: <20150629174318.7ec3ad05@wiggly>
X-Mailer: Claws Mail 3.9.3 (GTK+ 2.24.23; x86_64-pc-linux-gnu)
MIME-Version: 1.0
X-Sender-Info: geek@uniserve.com
X-Authenticated-Sender: geek@uniserve.com
X-Scanner: OK. Scanned.
X-Uniserve-Spam-Score: 0.0 0 (/)
Subject: [Xen-users] simple seeming but don't know how
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Tue Jun 30 00:44:39 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 00:44:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9je1-0004mT-9u; Tue, 30 Jun 2015 00:43:25 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <geek@uniserve.com>) id 1Z9jdz-0004mO-UN
	for xen-users@lists.xen.org; Tue, 30 Jun 2015 00:43:24 +0000
Received: from [193.109.254.147] by server-3.bemta-14.messagelabs.com id
	01/76-18676-B26E1955; Tue, 30 Jun 2015 00:43:23 +0000
X-Env-Sender: geek@uniserve.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1435625001!27764589!1
X-Originating-IP: [216.210.109.135]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 4410 invoked from network); 30 Jun 2015 00:43:22 -0000
Received: from smtp-relay2.uniserve.net (HELO smtp-relay2.uniserve.net)
	(216.210.109.135)
	by server-9.tower-27.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 30 Jun 2015 00:43:22 -0000
Received: from dhcp702-3-30.dsl.ucc-net.ca ([216.113.206.158] helo=wiggly)
	by smtp-relay2.uniserve.net with esmtpsa (SSLv3:AES128-SHA:128)
	(Exim 4.72) (envelope-from <geek@uniserve.com>) id 1Z9ihr-0006t2-It
	for xen-users@lists.xen.org; Mon, 29 Jun 2015 16:43:19 -0700
Date: Mon, 29 Jun 2015 17:43:18 -0700
From: Dave Stevens <geek@uniserve.com>
To: xen-users <xen-users@lists.xen.org>
Message-ID: <20150629174318.7ec3ad05@wiggly>
X-Mailer: Claws Mail 3.9.3 (GTK+ 2.24.23; x86_64-pc-linux-gnu)
MIME-Version: 1.0
X-Sender-Info: geek@uniserve.com
X-Authenticated-Sender: geek@uniserve.com
X-Scanner: OK. Scanned.
X-Uniserve-Spam-Score: 0.0 0 (/)
Subject: [Xen-users] simple seeming but don't know how
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org
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From xen-users-bounces@lists.xen.org Tue Jun 30 08:48:21 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 08:48:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9rC3-0000Ut-UK; Tue, 30 Jun 2015 08:47:03 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=616afaa02=Ian.Campbell@citrix.com>)
	id 1Z9rC3-0000Ul-6p
	for xen-users@lists.xen.org; Tue, 30 Jun 2015 08:47:03 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	AE/27-23832-68752955; Tue, 30 Jun 2015 08:47:02 +0000
X-Env-Sender: prvs=616afaa02=Ian.Campbell@citrix.com
X-Msg-Ref: server-10.tower-31.messagelabs.com!1435654019!21093149!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12644 invoked from network); 30 Jun 2015 08:47:01 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-10.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	30 Jun 2015 08:47:01 -0000
X-IronPort-AV: E=Sophos;i="5.15,376,1432598400"; d="scan'208";a="279811374"
Message-ID: <1435653493.21469.10.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Dave Stevens <geek@uniserve.com>
Date: Tue, 30 Jun 2015 09:38:13 +0100
In-Reply-To: <20150629174318.7ec3ad05@wiggly>
References: <20150629174318.7ec3ad05@wiggly>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] simple seeming but don't know how
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Mon, 2015-06-29 at 17:43 -0700, Dave Stevens wrote:
> I've got a failed raid array. I have been anble to assemble the two
> remaining partitions into a working but degraded raid array. The data
> is in the form of a lvm Logical Volume00. I can inspect the contents
> and they are the right names and sizes for the former xen domains. I
> want to mount and start one of the domUs to do data recovery. The xm
> command works but my efforts are hampered by ignorance of how to
> proceed. Do I need to use lvm for get access to the appropriate vm? And
> if so how? And then how do I go about starting the vm?

If you have the LVM volumes you may not even need to start the domains,
you may be able to simply mount the volume on your dom0 (or even a
non-Xen system). If the volumes contain partition tables then you may
need to use the kpartx tool to expose the subpartitions of the LVM
volume which actually contain the filesystems such that you can mount
them. Linux supports at least read access for a bunch of foreign
filesystems, including e.g. NTFS.

If for some reason you really do need to boot the domains then do you
have the previous cfg files for the domains handy? They should contain
the necessary configuration information to start the domain.

If you are needing to write the configuration files from scratch then
you will need to minimally provide a kernel, an amount of RAM and a disk
spec. /etc/xen/xmexample* should contain examples of the sorts of thing
which is needed.

Were you originally using xm to manage these domains or some other
toolstack? If some other then do you have the cfg data from that
toolstack somewhere?

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 30 08:48:21 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 08:48:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1Z9rC3-0000Ut-UK; Tue, 30 Jun 2015 08:47:03 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <prvs=616afaa02=Ian.Campbell@citrix.com>)
	id 1Z9rC3-0000Ul-6p
	for xen-users@lists.xen.org; Tue, 30 Jun 2015 08:47:03 +0000
Received: from [85.158.137.68] by server-5.bemta-3.messagelabs.com id
	AE/27-23832-68752955; Tue, 30 Jun 2015 08:47:02 +0000
X-Env-Sender: prvs=616afaa02=Ian.Campbell@citrix.com
X-Msg-Ref: server-10.tower-31.messagelabs.com!1435654019!21093149!1
X-Originating-IP: [66.165.176.63]
X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: 
	VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n,
	received_headers: No Received headers
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 12644 invoked from network); 30 Jun 2015 08:47:01 -0000
Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63)
	by server-10.tower-31.messagelabs.com with RC4-SHA encrypted SMTP;
	30 Jun 2015 08:47:01 -0000
X-IronPort-AV: E=Sophos;i="5.15,376,1432598400"; d="scan'208";a="279811374"
Message-ID: <1435653493.21469.10.camel@citrix.com>
From: Ian Campbell <ian.campbell@citrix.com>
To: Dave Stevens <geek@uniserve.com>
Date: Tue, 30 Jun 2015 09:38:13 +0100
In-Reply-To: <20150629174318.7ec3ad05@wiggly>
References: <20150629174318.7ec3ad05@wiggly>
X-Mailer: Evolution 3.12.9-1+b1 
MIME-Version: 1.0
X-DLP: MIA2
Cc: xen-users <xen-users@lists.xen.org>
Subject: Re: [Xen-users] simple seeming but don't know how
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

On Mon, 2015-06-29 at 17:43 -0700, Dave Stevens wrote:
> I've got a failed raid array. I have been anble to assemble the two
> remaining partitions into a working but degraded raid array. The data
> is in the form of a lvm Logical Volume00. I can inspect the contents
> and they are the right names and sizes for the former xen domains. I
> want to mount and start one of the domUs to do data recovery. The xm
> command works but my efforts are hampered by ignorance of how to
> proceed. Do I need to use lvm for get access to the appropriate vm? And
> if so how? And then how do I go about starting the vm?

If you have the LVM volumes you may not even need to start the domains,
you may be able to simply mount the volume on your dom0 (or even a
non-Xen system). If the volumes contain partition tables then you may
need to use the kpartx tool to expose the subpartitions of the LVM
volume which actually contain the filesystems such that you can mount
them. Linux supports at least read access for a bunch of foreign
filesystems, including e.g. NTFS.

If for some reason you really do need to boot the domains then do you
have the previous cfg files for the domains handy? They should contain
the necessary configuration information to start the domain.

If you are needing to write the configuration files from scratch then
you will need to minimally provide a kernel, an amount of RAM and a disk
spec. /etc/xen/xmexample* should contain examples of the sorts of thing
which is needed.

Were you originally using xm to manage these domains or some other
toolstack? If some other then do you have the cfg data from that
toolstack somewhere?

Ian.


_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 30 19:25:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 19:25:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1ZA18d-0006QU-7R; Tue, 30 Jun 2015 19:24:11 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <jl4312@columbia.edu>) id 1ZA18b-0006QP-Su
	for xen-users@lists.xen.org; Tue, 30 Jun 2015 19:24:09 +0000
Received: from [85.158.139.211] by server-14.bemta-5.messagelabs.com id
	22/05-12923-8DCE2955; Tue, 30 Jun 2015 19:24:08 +0000
X-Env-Sender: jl4312@columbia.edu
X-Msg-Ref: server-5.tower-206.messagelabs.com!1435692246!17980723!1
X-Originating-IP: [128.59.72.250]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_20_30,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15013 invoked from network); 30 Jun 2015 19:24:07 -0000
Received: from millet.cc.columbia.edu (HELO millet.cc.columbia.edu)
	(128.59.72.250)
	by server-5.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 30 Jun 2015 19:24:07 -0000
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250])
	by millet.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id t5UJMQtV012735
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400
Received: from hazelnut (localhost.localdomain [127.0.0.1])
	by hazelnut (Postfix) with ESMTP id 4A0097E
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400 (EDT)
Received: from salak.cc.columbia.edu (salak.cc.columbia.edu [128.59.29.6])
	by hazelnut (Postfix) with ESMTP id 2E14F7E
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400 (EDT)
Received: from mail-ig0-f171.google.com (mail-ig0-f171.google.com
	[209.85.213.171])
	by salak.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id t5UJO5qO027856
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400 (EDT)
Received: by igrv9 with SMTP id v9so19712507igr.1
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 12:24:05 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:date:message-id:subject:from:to
	:content-type;
	bh=QI8ZdMzgKURR+7a+0LyJ6kxTFPZ2sbyjsKgCiR3YHsY=;
	b=HLUxxDmszP0coY+JKRivTvCl5GK9pZfrPyjXa8K+yN10ynIxEK41NJ+mRtMlk8hcGS
	o7EwqlFjWdW6nLe8mvHVKblL/VAXZWahCirGmcrevE9V52v0ZLKP6E5l/XMVi6yU8AKI
	5J+sqdw0mc9DNuf7lccz7eze5Y556LlkrFPHzna7vHqeB1c1t35K91LU+yhrdVU62Dsg
	6YsZChaZhUH9KBfRWFySCIU1fhWAyQcTeqL3/b+8XGRHwze+ct5Zj+8K8kqMSj1vnX9M
	3L0hbWS660Dz3EB6aArb1R2DLnd+gA9Uv10G2NHsivdGAM+2lQKvniXZjtISfVrF1RL/
	FDPA==
X-Gm-Message-State: ALoCoQlQr9B9NQJ4nixshAeqfy90MdEE6Axue3uIXr59BE+FNIPTtQZ20tH9sqH/nFxmTjSsCix/J5WWweC9cKWUPuDXssROgSW0fhVRzknluAFVwEtU+NkkzxSbpyq0XLzvdqnF0Krk
X-Received: by 10.50.114.5 with SMTP id jc5mr26832158igb.43.1435692245195;
	Tue, 30 Jun 2015 12:24:05 -0700 (PDT)
X-Received: by 10.50.114.5 with SMTP id jc5mr26832134igb.43.1435692245010;
	Tue, 30 Jun 2015 12:24:05 -0700 (PDT)
Received: from mail-ig0-f180.google.com (mail-ig0-f180.google.com.
	[209.85.213.180])
	by mx.google.com with ESMTPSA id d4sm30669355iod.17.2015.06.30.12.24.02
	for <xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 30 Jun 2015 12:24:03 -0700 (PDT)
Received: by igcsj18 with SMTP id sj18so115692903igc.1
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 12:24:01 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.107.28.202 with SMTP id c193mr32219146ioc.90.1435692241848; 
	Tue, 30 Jun 2015 12:24:01 -0700 (PDT)
Received: by 10.36.42.5 with HTTP; Tue, 30 Jun 2015 12:24:01 -0700 (PDT)
Date: Tue, 30 Jun 2015 15:24:01 -0400
Message-ID: <CAHyh4xiJwYgc0_BvPvBZ3s=gAbsYfmongaEcm4LJ4Pfo3o-P-g@mail.gmail.com>
From: Jintack Lim <jintack@cs.columbia.edu>
To: xen-users@lists.xen.org
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.6
Subject: [Xen-users] Setting total number of cpus in the system
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4360642116333696815=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============4360642116333696815==
Content-Type: multipart/alternative; boundary=001a113ff13c1521060519c1261c

--001a113ff13c1521060519c1261c
Content-Type: text/plain; charset=UTF-8

Hi,

Is there any way to set the total number of cpus in the system?
I know how to set the number of cpus for Dom0 and DomU,
however I was not able to find one for the whole system.
(e.g. I have 8 cpus but I want Xen to recognize only 4 cpus)

The only way I can think of is to modify the device tree.
Is there more convenient way to do this?

Thanks,
Jintack

--001a113ff13c1521060519c1261c
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>Is there any way to set the total n=
umber of cpus in the system?</div><div>I know how to set the number of cpus=
 for Dom0 and DomU,</div><div>however I was not able to find one for the wh=
ole system.</div><div>(e.g. I have 8 cpus but I want Xen to recognize only =
4 cpus)</div><div><br></div><div>The only way I can think of is to modify t=
he device tree.</div><div>Is there more convenient way to do this?</div><di=
v><br></div><div>Thanks,</div><div>Jintack</div></div>

--001a113ff13c1521060519c1261c--



--===============4360642116333696815==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============4360642116333696815==--



From xen-users-bounces@lists.xen.org Tue Jun 30 19:25:33 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 19:25:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1ZA18d-0006QU-7R; Tue, 30 Jun 2015 19:24:11 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <jl4312@columbia.edu>) id 1ZA18b-0006QP-Su
	for xen-users@lists.xen.org; Tue, 30 Jun 2015 19:24:09 +0000
Received: from [85.158.139.211] by server-14.bemta-5.messagelabs.com id
	22/05-12923-8DCE2955; Tue, 30 Jun 2015 19:24:08 +0000
X-Env-Sender: jl4312@columbia.edu
X-Msg-Ref: server-5.tower-206.messagelabs.com!1435692246!17980723!1
X-Originating-IP: [128.59.72.250]
X-SpamReason: No, hits=1.2 required=7.0 tests=HTML_20_30,HTML_MESSAGE,
	RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15013 invoked from network); 30 Jun 2015 19:24:07 -0000
Received: from millet.cc.columbia.edu (HELO millet.cc.columbia.edu)
	(128.59.72.250)
	by server-5.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted
	SMTP; 30 Jun 2015 19:24:07 -0000
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250])
	by millet.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id t5UJMQtV012735
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400
Received: from hazelnut (localhost.localdomain [127.0.0.1])
	by hazelnut (Postfix) with ESMTP id 4A0097E
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400 (EDT)
Received: from salak.cc.columbia.edu (salak.cc.columbia.edu [128.59.29.6])
	by hazelnut (Postfix) with ESMTP id 2E14F7E
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400 (EDT)
Received: from mail-ig0-f171.google.com (mail-ig0-f171.google.com
	[209.85.213.171])
	by salak.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id t5UJO5qO027856
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 15:24:06 -0400 (EDT)
Received: by igrv9 with SMTP id v9so19712507igr.1
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 12:24:05 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:date:message-id:subject:from:to
	:content-type;
	bh=QI8ZdMzgKURR+7a+0LyJ6kxTFPZ2sbyjsKgCiR3YHsY=;
	b=HLUxxDmszP0coY+JKRivTvCl5GK9pZfrPyjXa8K+yN10ynIxEK41NJ+mRtMlk8hcGS
	o7EwqlFjWdW6nLe8mvHVKblL/VAXZWahCirGmcrevE9V52v0ZLKP6E5l/XMVi6yU8AKI
	5J+sqdw0mc9DNuf7lccz7eze5Y556LlkrFPHzna7vHqeB1c1t35K91LU+yhrdVU62Dsg
	6YsZChaZhUH9KBfRWFySCIU1fhWAyQcTeqL3/b+8XGRHwze+ct5Zj+8K8kqMSj1vnX9M
	3L0hbWS660Dz3EB6aArb1R2DLnd+gA9Uv10G2NHsivdGAM+2lQKvniXZjtISfVrF1RL/
	FDPA==
X-Gm-Message-State: ALoCoQlQr9B9NQJ4nixshAeqfy90MdEE6Axue3uIXr59BE+FNIPTtQZ20tH9sqH/nFxmTjSsCix/J5WWweC9cKWUPuDXssROgSW0fhVRzknluAFVwEtU+NkkzxSbpyq0XLzvdqnF0Krk
X-Received: by 10.50.114.5 with SMTP id jc5mr26832158igb.43.1435692245195;
	Tue, 30 Jun 2015 12:24:05 -0700 (PDT)
X-Received: by 10.50.114.5 with SMTP id jc5mr26832134igb.43.1435692245010;
	Tue, 30 Jun 2015 12:24:05 -0700 (PDT)
Received: from mail-ig0-f180.google.com (mail-ig0-f180.google.com.
	[209.85.213.180])
	by mx.google.com with ESMTPSA id d4sm30669355iod.17.2015.06.30.12.24.02
	for <xen-users@lists.xen.org>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Tue, 30 Jun 2015 12:24:03 -0700 (PDT)
Received: by igcsj18 with SMTP id sj18so115692903igc.1
	for <xen-users@lists.xen.org>; Tue, 30 Jun 2015 12:24:01 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.107.28.202 with SMTP id c193mr32219146ioc.90.1435692241848; 
	Tue, 30 Jun 2015 12:24:01 -0700 (PDT)
Received: by 10.36.42.5 with HTTP; Tue, 30 Jun 2015 12:24:01 -0700 (PDT)
Date: Tue, 30 Jun 2015 15:24:01 -0400
Message-ID: <CAHyh4xiJwYgc0_BvPvBZ3s=gAbsYfmongaEcm4LJ4Pfo3o-P-g@mail.gmail.com>
From: Jintack Lim <jintack@cs.columbia.edu>
To: xen-users@lists.xen.org
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.6
Subject: [Xen-users] Setting total number of cpus in the system
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4360642116333696815=="
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

--===============4360642116333696815==
Content-Type: multipart/alternative; boundary=001a113ff13c1521060519c1261c

--001a113ff13c1521060519c1261c
Content-Type: text/plain; charset=UTF-8

Hi,

Is there any way to set the total number of cpus in the system?
I know how to set the number of cpus for Dom0 and DomU,
however I was not able to find one for the whole system.
(e.g. I have 8 cpus but I want Xen to recognize only 4 cpus)

The only way I can think of is to modify the device tree.
Is there more convenient way to do this?

Thanks,
Jintack

--001a113ff13c1521060519c1261c
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>Is there any way to set the total n=
umber of cpus in the system?</div><div>I know how to set the number of cpus=
 for Dom0 and DomU,</div><div>however I was not able to find one for the wh=
ole system.</div><div>(e.g. I have 8 cpus but I want Xen to recognize only =
4 cpus)</div><div><br></div><div>The only way I can think of is to modify t=
he device tree.</div><div>Is there more convenient way to do this?</div><di=
v><br></div><div>Thanks,</div><div>Jintack</div></div>

--001a113ff13c1521060519c1261c--



--===============4360642116333696815==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
--===============4360642116333696815==--



From xen-users-bounces@lists.xen.org Tue Jun 30 20:34:44 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 20:34:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1ZA2E9-0000ol-IE; Tue, 30 Jun 2015 20:33:57 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <m4f1050@hotmail.com>) id 1ZA2E8-0000oc-Eo
	for xen-users@lists.xensource.com; Tue, 30 Jun 2015 20:33:56 +0000
Received: from [193.109.254.147] by server-14.bemta-14.messagelabs.com id
	38/F6-21300-33DF2955; Tue, 30 Jun 2015 20:33:55 +0000
X-Env-Sender: m4f1050@hotmail.com
X-Msg-Ref: server-15.tower-27.messagelabs.com!1435696434!28114177!1
X-Originating-IP: [162.253.133.15]
X-SpamReason: No, hits=0.6 required=7.0 tests=FORGED_HOTMAIL_RCVD2
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7238 invoked from network); 30 Jun 2015 20:33:54 -0000
Received: from mbob.nabble.com (HELO mbob.nabble.com) (162.253.133.15)
	by server-15.tower-27.messagelabs.com with SMTP;
	30 Jun 2015 20:33:54 -0000
Received: from msam.nabble.com (unknown [162.253.133.85])
	by mbob.nabble.com (Postfix) with ESMTP id 1C8F41023637
	for <xen-users@lists.xensource.com>;
	Tue, 30 Jun 2015 13:34:44 -0700 (PDT)
Date: Tue, 30 Jun 2015 13:33:53 -0700 (MST)
From: m4f1050 <m4f1050@hotmail.com>
To: xen-users@lists.xensource.com
Message-ID: <1435696433480-5727939.post@n5.nabble.com>
In-Reply-To: <52F53704.3070702@bobich.net>
References: <1391212364.5145.141.camel@moraal.auul>
	<1391616520.18112.73.camel@moraal.auul>
	<52F2740E.1040308@bobich.net>
	<1391799430.5317.46.camel@moraal.auul>
	<52F53704.3070702@bobich.net>
MIME-Version: 1.0
Subject: Re: [Xen-users] turning nvidia gts 450 into quadro 2000
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Ok, so I was successful in swapping my GTS 450 into a Quadro 2000 for Xen 4.4
6 months ago with this command:

nvflash --index=X --straps 0x7FFC2FFF 0x10006000 0x7fffffff 0x00000000

Now I have moved to KVM and I can't use my GTS 450 (Quadro 2000 now), how do
I swap it back to a GTS 450 so I can sell it?



--
View this message in context: http://xen.1045712.n5.nabble.com/turning-nvidia-gts-450-into-quadro-2000-tp5721058p5727939.html
Sent from the Xen - User mailing list archive at Nabble.com.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

From xen-users-bounces@lists.xen.org Tue Jun 30 20:34:44 2015
Return-path: <xen-users-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2015 20:34:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-users-bounces@lists.xen.org>)
	id 1ZA2E9-0000ol-IE; Tue, 30 Jun 2015 20:33:57 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <m4f1050@hotmail.com>) id 1ZA2E8-0000oc-Eo
	for xen-users@lists.xensource.com; Tue, 30 Jun 2015 20:33:56 +0000
Received: from [193.109.254.147] by server-14.bemta-14.messagelabs.com id
	38/F6-21300-33DF2955; Tue, 30 Jun 2015 20:33:55 +0000
X-Env-Sender: m4f1050@hotmail.com
X-Msg-Ref: server-15.tower-27.messagelabs.com!1435696434!28114177!1
X-Originating-IP: [162.253.133.15]
X-SpamReason: No, hits=0.6 required=7.0 tests=FORGED_HOTMAIL_RCVD2
X-StarScan-Received: 
X-StarScan-Version: 6.13.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 7238 invoked from network); 30 Jun 2015 20:33:54 -0000
Received: from mbob.nabble.com (HELO mbob.nabble.com) (162.253.133.15)
	by server-15.tower-27.messagelabs.com with SMTP;
	30 Jun 2015 20:33:54 -0000
Received: from msam.nabble.com (unknown [162.253.133.85])
	by mbob.nabble.com (Postfix) with ESMTP id 1C8F41023637
	for <xen-users@lists.xensource.com>;
	Tue, 30 Jun 2015 13:34:44 -0700 (PDT)
Date: Tue, 30 Jun 2015 13:33:53 -0700 (MST)
From: m4f1050 <m4f1050@hotmail.com>
To: xen-users@lists.xensource.com
Message-ID: <1435696433480-5727939.post@n5.nabble.com>
In-Reply-To: <52F53704.3070702@bobich.net>
References: <1391212364.5145.141.camel@moraal.auul>
	<1391616520.18112.73.camel@moraal.auul>
	<52F2740E.1040308@bobich.net>
	<1391799430.5317.46.camel@moraal.auul>
	<52F53704.3070702@bobich.net>
MIME-Version: 1.0
Subject: Re: [Xen-users] turning nvidia gts 450 into quadro 2000
X-BeenThere: xen-users@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xen.org>
List-Help: <mailto:xen-users-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-users>,
	<mailto:xen-users-request@lists.xen.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: xen-users-bounces@lists.xen.org
Errors-To: xen-users-bounces@lists.xen.org

Ok, so I was successful in swapping my GTS 450 into a Quadro 2000 for Xen 4.4
6 months ago with this command:

nvflash --index=X --straps 0x7FFC2FFF 0x10006000 0x7fffffff 0x00000000

Now I have moved to KVM and I can't use my GTS 450 (Quadro 2000 now), how do
I swap it back to a GTS 450 so I can sell it?



--
View this message in context: http://xen.1045712.n5.nabble.com/turning-nvidia-gts-450-into-quadro-2000-tp5721058p5727939.html
Sent from the Xen - User mailing list archive at Nabble.com.

_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users

