[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] Re: [Xen-devel] ARP problems with xen 4.0 with pvops kernel 2.6.32.15
On Sun, Jun 06, 2010 at 11:54:11AM -0700, Boris Derzhavets wrote: > Virt-install hangs attempting to retrieve updates.img from Apache Mirror > setup at Dom0 > with kernel 2.6.32.15 > It doesn't happen with 2.6.32.10 (12,14 final). > Environment Xen 4.0 Dom0 on top Ubuntu 10.04 Server. Libvirt is 0.8.0 . > Attempting to virt-install F13 PV DomU in vnc mode. > > I believe that builds are consistent. > Runtime behavior is the same for .10, .14, .15. Seems to be communicating > problem between DomU and Dom0 during HTTP download. > I'm seeing PV domU network issues aswell.. when running Xen 4.0.0 on Fedora 13. I'll have to dig more into it.. -- Pasi > Boris. > > --- On Sun, 6/6/10, Jeremy Fitzhardinge <jeremy@xxxxxxxx> wrote: > > From: Jeremy Fitzhardinge <jeremy@xxxxxxxx> > Subject: Re: [Xen-users] Re: [Xen-devel] ARP problems with xen 4.0 with > pvops kernel 2.6.32.15 > To: "Boris Derzhavets" <bderzhavets@xxxxxxxxx> > Cc: luis.silva@xxxxxxxxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxx, > xen-users@xxxxxxxxxxxxxxxxxxx > Date: Sunday, June 6, 2010, 12:43 PM > > On 06/06/2010 03:19 AM, Boris Derzhavets wrote: > > Network issues when working with DomUs in 2.6.32.14 and finally been > > fixed, > > seem to appear again in 2.6.32.15. Reverting to back to xen/stable - > > 2.6.32.10 > > works as a fix again. > > > > There are no substantial differences between 2.6.32.14 and .15. If > there are any differences in behaviour between them, then I'd suspect > some inconsistency from boot to boot, or in your kernel build process. > > J > > > > > Boris > > > > --- On *Thu, 6/3/10, Luís Silva /<[1]luis.silva@xxxxxxxxxxxxx>/* > wrote: > > > > > > From: Luís Silva <[2]luis.silva@xxxxxxxxxxxxx> > > Subject: Re: [Xen-users] Re: [Xen-devel] ARP problems with xen 4.0 > > with pvops kernel > > To: "Boris Derzhavets" <[3]bderzhavets@xxxxxxxxx> > > Cc: "Jeremy Fitzhardinge" <[4]jeremy@xxxxxxxx>, > > [5]xen-devel@xxxxxxxxxxxxxxxxxxx, [6]xen-users@xxxxxxxxxxxxxxxxxxx > > Date: Thursday, June 3, 2010, 6:20 AM > > > > Hello, > > > > Thanks for the suggestion, xen/stable works ok for me. Only > > problem is that I have to disable offload do get dhcp to work on > > domU, but the problem I described before doesn't exist in this > > kernel. Later today I'm going to try a previous build I have based > > on stable-2.6.32.x (2.6.32.13) to check if it already had this > > problem or not and I'll post the results. > > > > Luís > > > > On Wed, 2010-06-02 at 12:26 -0700, Boris Derzhavets wrote: > >> Could you,please, build and try 2.6.32.10 ( xen/stable) ? > >> > >> Boris. > >> > >> --- On *Wed, 6/2/10, Luís Silva > **/<[7]luis.silva@xxxxxxxxxxxxx>/* > >> wrote: > >> > >> > >> From: Luís Silva <[8]luis.silva@xxxxxxxxxxxxx> > >> Subject: [Xen-users] Re: [Xen-devel] ARP problems with xen > >> 4.0 with pvops kernel > >> To: "Jeremy Fitzhardinge" <[9]jeremy@xxxxxxxx> > >> Cc: [10]xen-devel@xxxxxxxxxxxxxxxxxxx, > [11]xen-users@xxxxxxxxxxxxxxxxxxx > >> Date: Wednesday, June 2, 2010, 2:53 PM > >> > >> Hello, > >> > >> On Wed, 2010-06-02 at 09:06 -0700, Jeremy Fitzhardinge wrote: > >>> On 06/02/2010 01:47 AM, Luís Silva wrote: > >>> > Hello, > >>> > > >>> > I'm using the latest stable-2.6.32.x. I already tried > "ethtool -K > >>> > <bridge> tx off", but that didn't make any difference. > Also, this only > >>> > happen with pv, in hvm mode all works ok and the domU sees > the arp > >>> > messages... > >>> > >>> Yes, ARP is a new twist on network problems. I'm guessing > you're using > >>> hvm without stubdoms, which means that its networking > originates from > >>> qemu within dom0, whereas PV and HVM+stubdom comes via > netback. > >>> > >>> > >> Yes, when I mentioned hvm I was talking about hvm without > >> stubdoms. I haven't tried those yet. > >>> But aside from that, I'm stumped. Are you running any > firewalls on > >>> either side? Can you try disabling all the offloads (tx, > rx, gso, tso) > >>> on all the relevent interfaces (bridge, netback, within the > guest) and > >>> see if that changes anything? > >>> > >>> J > >>> > >>> > >> > >> Ok, this is the bridge interface: > >> > >> brctl show > >> bridge name bridge id STP enabled interfaces > >> virbr0 8000.feffffffffff no vif1.0 > >> > >> ifconfig virbr0 > >> virbr0 Link encap:Ethernet HWaddr c2:ef:67:2b:a4:23 > >> inet addr:192.168.120.254 Bcast:192.168.120.255 > Mask:255.255.255.0 > >> inet6 addr: fe80::c0ef:67ff:fe2b:a423/64 Scope:Link > >> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > >> RX packets:0 errors:0 dropped:0 overruns:0 frame:0 > >> TX packets:25 errors:0 dropped:0 overruns:0 > carrier:0 > >> collisions:0 txqueuelen:0 > >> RX bytes:0 (0.0 > >> B) > >> TX bytes:4662 (4.6 KB) > >> > >> > >> > >> I'm not using firewall other than the rules defined by > >> libvirt. DomU has no firewall and the rules in dom0 are only > >> these (virbr0 is natted to the outside, virbr1 is routed. The > >> result is the same in either one of them): > >> > >> sudo iptables -L -n -v > >> Chain INPUT (policy ACCEPT 241K packets, 53M bytes) > >> pkts bytes target prot opt in out source > destination > >> 0 0 ACCEPT udp -- virbr1 * 0.0.0.0/0 > 0.0.0.0/0 udp dpt:53 > >> 0 0 ACCEPT tcp -- virbr1 * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:53 > >> > >> > >> 0 0 ACCEPT udp -- virbr1 * 0.0.0.0/0 > 0.0.0.0/0 udp dpt:67 > >> 0 0 ACCEPT tcp -- virbr1 * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:67 > >> 8 515 ACCEPT udp -- virbr0 * 0.0.0.0/0 > 0.0.0.0/0 udp dpt:53 > >> 0 0 > >> > >> ACCEPT tcp -- virbr0 * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:53 > >> 0 0 ACCEPT udp -- virbr0 * 0.0.0.0/0 > 0.0.0.0/0 udp dpt:67 > >> 0 0 ACCEPT tcp -- virbr0 * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:67 > >> > >> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) > >> pkts bytes target > >> prot > >> opt in out source destination > >> 0 0 ACCEPT all -- * virbr1 0.0.0.0/0 > 192.168.121.0/24 > >> 0 0 ACCEPT all -- virbr1 * > 192.168.121.0/24 0.0.0.0/0 > >> 0 0 ACCEPT all -- virbr1 virbr1 0.0.0.0/0 > > >> > >> 0.0.0.0/0 > >> 0 0 REJECT all -- * virbr1 0.0.0.0/0 > 0.0.0.0/0 reject-with icmp-port-unreachable > >> 0 0 REJECT all -- virbr1 * 0.0.0.0/0 > 0.0.0.0/0 reject-with icmp-port-unreachable > >> 13 3448 ACCEPT all -- * virbr0 0.0.0.0/0 > 192.168.120.0/24 > >> state > >> RELATED,ESTABLISHED > >> 16 1374 ACCEPT all -- virbr0 * > 192.168.120.0/24 0.0.0.0/0 > >> 0 0 ACCEPT all -- virbr0 virbr0 0.0.0.0/0 > 0.0.0.0/0 > >> 0 0 REJECT all -- * virbr0 0.0.0.0/0 > 0.0.0.0/0 reject-with icmp-port-unreachable > >> 0 0 REJECT all -- > >> virbr0 > >> * 0.0.0.0/0 0.0.0.0/0 reject-with > icmp-port-unreachable > >> > >> Chain OUTPUT (policy ACCEPT 233K packets, 27M bytes) > >> pkts bytes target prot opt in out source > destination > >> > >> > >> > >> > >> And these are the various offload parameters as set at boot: > >> > >> Offload parameters for virbr0: > >> rx-checksumming: on > >> tx-checksumming: on > >> scatter-gather: on > >> tcp-segmentation-offload: on > >> udp-fragmentation-offload: on > >> generic-segmentation-offload: on > >> generic-receive-offload: off > >> large-receive-offload: off > >> > >> Offload parameters for vif1.0: > >> rx-checksumming: on > >> tx-checksumming: on > >> scatter-gather: on > >> tcp-segmentation-offload: on > >> udp-fragmentation-offload: off > >> generic-segmentation-offload: on > >> generic-receive-offload: off > >> large-receive-offload: off > >> > >> Offload parameters for eth0: > >> rx-checksumming: on > >> tx-checksumming: on > >> scatter-gather: on > >> tcp-segmentation-offload: on > >> udp-fragmentation-offload: off > >> generic-segmentation-offload: off > >> generic-receive-offload: off > >> large-receive-offload: off > >> > >> > >> > >> To disable all checksuming I run the following commands: > >> dom0: > >> > >> sudo ethtool -K virbr0 tx off sg off tso off gso off gro off > >> sudo ethtool -K vif1.0 tx off sg off tso off gso off gro off > >> > >> > >> domU > >> > >> sudo ethtool -K eth0 tx off sg off tso off gso off gro off > >> > >> > >> > >> This managed to get all parameter to off in the mentioned > >> interfaces, but unfortunately the result is the same. The arp > >> requests get to vif1.0, but not to eth0 on the domU. > >> > >> sudo tcpdump -i vif1.0 -n -vv arp > >> tcpdump: WARNING: vif1.0: no IPv4 address assigned > >> tcpdump: listening on vif1.0, link-type EN10MB (Ethernet), > capture size 96 bytes > >> 19:43:51.233378 ARP, Ethernet (len 6), IPv4 (len 4), Request > who-has 192.168.120.1 tell 192.168.120.254, length 28 > >> 19:43:52.233164 ARP, Ethernet (len 6), IPv4 (len 4), Request > who-has 192.168.120.1 tell 192.168.120.254, length 28 > >> 19:43:53.233166 ARP, Ethernet (len 6), IPv4 (len 4), Request > who-has 192.168.120.1 tell 192.168.120.254, length 28 > >> 19:43:54.684214 ARP, Ethernet (len 6), IPv4 (len 4), Request > who-has 192.168.120.1 tell 192.168.120.254, length 28 > >> 19:43:55.684218 ARP, Ethernet (len 6), IPv4 (len 4), Request > who-has 192.168.120.1 tell 192.168.120.254, length 28 > >> 19:43:56.684232 ARP, Ethernet (len 6), IPv4 (len 4), Request > who-has 192.168.120.1 tell 192.168.120.254, length 28 > >> > >> > >> > >> I hope this information is enough. If I can provide anything > >> else to help debug or test, please just ask! ;) > >> > >> Thanks in advance, > >> Luís > >> > >>> > > >>> > Thanks, > >>> > Luís > >>> > > >>> > On Tue, 2010-06-01 at 18:20 -0700, Jeremy Fitzhardinge > wrote: > >>> >> On 06/01/2010 05:38 PM, Luís Silva wrote: > >>> >> > Hello, > >>> >> > > >>> >> > Finally I managed to get a xen 4.0 working on ubuntu > 10.04 with pvops > >>> >> > kernel and libvirt. However I am having some problems > with > >>> >> > networking... after initial installation with > netinstall image in hvm > >>> >> > mode, when I transform the vm in xen pv (via pygrub > with the current > >>> >> > ubuntu kernel), networking startEd to act weird... > >>> >> > > >>> >> > Basically I'm not using a network script from xen. I > define a bridge > >>> >> > (manually or via libvirt, the result is the same) and I > use vif-bridge > >>> >> > to connect the vif to it. But now the weird part comes: > I can > >>> >> > communicate from domU to dom0, but not the other way > >>> around, > >>> unless I > >>> >> > keep a ping running from domU to dom0... That's right, > weird... while > >>> >> > trying the ping from dom0 to domU, I used tcpdump both > on the bridge, > >>> >> > on the vif and on the eth0 in the domU. The arp packets > never get to > >>> >> > domU, but they appear both in the bridge and the vif > sniff's... > >>> >> > >>> >> What version of kernel are you using in dom0 and domU? > There was a > >>> >> netback bug which caused problems with dom0<->domU > communication, but it > >>> >> has been fixed for a while in 2.6.32 (but only recently > in .31). The > >>> >> workaround is to disable tx checksum offload on your > bridge (ethtool -K > >>> >> <bridge> tx off). > >>> >> > >>> >> J > >>> >> > >>> >> > > >>> >> > Here is the bridge: > >>> >> > ifconfig virbr0 > >>> >> > virbr0 Link encap:Ethernet HWaddr > fe:ff:ff:ff:ff:ff > >>> >> > > >>> > >>> inet addr:192.168.120.254 Bcast:192.168.120.255 > Mask:255.255.255.0 > >>> >> > inet6 addr: fe80::7cee:4bff:fe82:e63f/64 > Scope:Link > >>> >> > UP BROADCAST RUNNING MULTICAST MTU:1500 > Metric:1 > >>> >> > RX packets:16 errors:0 dropped:0 overruns:0 > frame:0 > >>> >> > TX packets:226 errors:0 dropped:0 overruns:0 > carrier:0 > >>> >> > collisions:0 txqueuelen:0 > >>> >> > RX bytes:952 (952.0 B) TX bytes:13953 (13.9 > KB) > >>> >> > > >>> >> > > >>> >> > brctl show > >>> >> > bridge name bridge id STP enabled > interfaces > >>> >> > virbr0 8000.feffffffffff no vif5.0 > >>> >> > > >>> >> > > >>> >> > tcpdump -i virbr0 -vv -n > >>> >> > tcpdump: listening on virbr0, link-type EN10MB > (Ethernet), capture size 96 bytes > >>> >> > 01:31:25.945151 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], > >>> proto ICMP (1), > >>> length 84) > >>> >> > 192.168.120.254 > 192.168.120.1: ICMP echo request, > id 10317, seq 1, length 64 > >>> >> > 01:31:26.945361 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], proto ICMP (1), length 84) > >>> >> > 192.168.120.254 > 192.168.120.1: ICMP echo request, > id 10317, seq 2, length 64 > >>> >> > 01:31:27.945420 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], proto ICMP (1), length 84) > >>> >> > 192.168.120.254 > 192.168.120.1: ICMP echo request, > id 10317, seq 3, length 64 > >>> >> > 01:31:28.945362 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], proto ICMP (1), length 84) > >>> >> > 192.168.120.254 > 192.168.120.1: ICMP echo request, > id 10317, seq 4, length 64 > >>> >> > 01:31:29.945364 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], proto ICMP (1), length 84) > >>> >> > 192.168.120.254 > 192.168.120.1: ICMP echo request, > id 10317, > >>> seq 5, length > >>> 64 > >>> >> > 01:31:30.944300 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:30.945359 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], proto ICMP (1), length 84) > >>> >> > 192.168.120.254 > 192.168.120.1: ICMP echo request, > id 10317, seq 6, length 64 > >>> >> > 01:31:31.944297 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:31.945444 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], proto ICMP (1), length 84) > >>> >> > 192.168.120.254 > 192.168.120.1: ICMP echo request, > id 10317, seq 7, length 64 > >>> >> > 01:31:32.944294 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:32.945401 IP (tos 0x0, ttl 64, id 0, offset 0, > flags [DF], proto ICMP (1), length 84) > >>> >> > > >>> > >>> 192.168.120.254 > 192.168.120.1: ICMP echo request, id > 10317, seq 8, length 64 > >>> >> > 01:31:33.947293 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:34.947373 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:35.947353 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:37.948352 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:38.948399 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:39.948376 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:31:40.949356 ARP, Ethernet (len 6), IPv4 (len 4), > Request > >>> who-has > >>> 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > > >>> >> > > >>> >> > tcpdump -i vif5.0 -vv -n > >>> >> > tcpdump: WARNING: vif5.0: no IPv4 address assigned > >>> >> > tcpdump: listening on vif5.0, link-type EN10MB > (Ethernet), capture size 96 bytes > >>> >> > 01:32:19.956358 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:32:20.956358 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:32:21.956359 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:32:23.957311 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:32:24.957312 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length > >>> 28 > >>> >> > > >>> 01:32:25.957359 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:32:27.958360 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:32:28.958310 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > 01:32:29.958362 ARP, Ethernet (len 6), IPv4 (len 4), > Request who-has 192.168.120.1 tell 192.168.120.254, length 28 > >>> >> > > >>> >> > > >>> >> > > >>> >> > Forwarding and iptables don't seem to be the problem, > because if I > >>> >> > initiate a ping from domU (at the same time as the > failing one from > >>> >> > dom0), the ping in dom0 starts to work. As soon as I > stop the ping in > >>> >> > domU, the one in dom0 starts failing again... > >>> >> > > >>> >> > Is anyone having the same > >>> problem? Is this a bug > >>> in the kernel? In > >>> >> > dom0 or domU? > >>> >> > > >>> >> > Thanks in advance, > >>> >> > Luís > >>> >> > > >>> >> > > >>> >> > _______________________________________________ > >>> >> > Xen-devel mailing list > >>> >> > [12]Xen-devel@xxxxxxxxxxxxxxxxxxx > <mailto:[13]Xen-devel@xxxxxxxxxxxxxxxxxxx> > <mailto:[14]Xen-devel@xxxxxxxxxxxxxxxxxxx> > >>> >> > [15]http://lists.xensource.com/xen-devel > >>> >> > > >>> >> > >>> >> > >>> >> _______________________________________________ > >>> >> Xen-devel mailing list > >>> >> [16]Xen-devel@xxxxxxxxxxxxxxxxxxx > <mailto:[17]Xen-devel@xxxxxxxxxxxxxxxxxxx> > <mailto:[18]Xen-devel@xxxxxxxxxxxxxxxxxxx> > >>> >> [19]http://lists.xensource.com/xen-devel > >>> >> > >>> >> > >>> > > >>> > >>> > >>> > >> > >> > >> > >> -----Inline Attachment Follows----- > >> > >> _______________________________________________ > >> Xen-users mailing list > >> [20]Xen-users@xxxxxxxxxxxxxxxxxxx > >> [21]http://lists.xensource.com/xen-users > >> > >> > > > > > > -----Inline Attachment Follows----- > > > > _______________________________________________ > > Xen-users mailing list > > [22]Xen-users@xxxxxxxxxxxxxxxxxxx > > </mc/compose?to=[23]Xen-users@xxxxxxxxxxxxxxxxxxx> > > [24]http://lists.xensource.com/xen-users > > > > > > References > > Visible links > 1. file:///mc/compose?to=luis.silva@xxxxxxxxxxxxx > 2. file:///mc/compose?to=luis.silva@xxxxxxxxxxxxx > 3. file:///mc/compose?to=bderzhavets@xxxxxxxxx > 4. file:///mc/compose?to=jeremy@xxxxxxxx > 5. file:///mc/compose?to=xen-devel@xxxxxxxxxxxxxxxxxxx > 6. file:///mc/compose?to=xen-users@xxxxxxxxxxxxxxxxxxx > 7. file:///mc/compose?to=luis.silva@xxxxxxxxxxxxx > 8. file:///mc/compose?to=luis.silva@xxxxxxxxxxxxx > 9. file:///mc/compose?to=jeremy@xxxxxxxx > 10. file:///mc/compose?to=xen-devel@xxxxxxxxxxxxxxxxxxx > 11. file:///mc/compose?to=xen-users@xxxxxxxxxxxxxxxxxxx > 12. file:///mc/compose?to=Xen-devel@xxxxxxxxxxxxxxxxxxx > 13. file:///mc/compose?to=Xen-devel@xxxxxxxxxxxxxxxxxxx > 14. file:///mc/compose?to=Xen-devel@xxxxxxxxxxxxxxxxxxx > 15. http://lists.xensource.com/xen-devel > 16. file:///mc/compose?to=Xen-devel@xxxxxxxxxxxxxxxxxxx > 17. file:///mc/compose?to=Xen-devel@xxxxxxxxxxxxxxxxxxx > 18. file:///mc/compose?to=Xen-devel@xxxxxxxxxxxxxxxxxxx > 19. http://lists.xensource.com/xen-devel > 20. file:///mc/compose?to=Xen-users@xxxxxxxxxxxxxxxxxxx > 21. http://lists.xensource.com/xen-users > 22. file:///mc/compose?to=Xen-users@xxxxxxxxxxxxxxxxxxx > 23. file:///mc/compose?to=Xen-users@xxxxxxxxxxxxxxxxxxx > 24. http://lists.xensource.com/xen-users > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |