search for: cavilla

Displaying 20 results from an estimated 35 matches for "cavilla".

Did you mean: cavill
2012 Jan 27
4
[PATCH] Tools: build tests
...efile | 20 ++++++++++++++++++++ 3 files changed, 22 insertions(+), 0 deletions(-) Build tests as part of the tools build. It is enabled with CONFIG_TESTS in Config.mk Currently disabled build of tests/regressions and tests/xen-access (in 32 bit mode) as they fail. Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> diff -r 2c6ff08e8b5b -r 7d62108a8936 Config.mk --- a/Config.mk +++ b/Config.mk @@ -240,6 +240,7 @@ OCAML_TOOLS ?= y CONFIG_MINITERM ?= n CONFIG_LOMOUNT ?= n CONFIG_SYSTEM_LIBAIO ?= y +CONFIG_TESTS ?= y ifeq ($(OCAML_TOOLS),y) OCAML_TOOLS :...
2012 Mar 01
14
[PATCH 0 of 3] RFC Paging support for AMD NPT V2
...know how it goes for you. If I unleash xenpaging on a domain for a non-ambitious target (64 MiBs paged out for one minute), we sail by just fine. But if I kick things up a notch, still dying on an VMEXIT_SHUTDOWN (a.k.a. triple fault). Not sure at all what to do next. Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> Signed-off-by: Adin Scannell <adin@scannell.ca> xen/drivers/passthrough/iommu.c | 2 + xen/arch/x86/mm/p2m-pt.c | 56 ++++++++++++++++++++++++++++------------ xen/arch/x86/mm/mem_event.c | 7 +++- xen/arch/x86/mm/mem_sharing.c | 7 +++++ 4...
2011 Nov 29
10
[PATCH 0 of 2] Fix correctness race in xc_mem_paging_prep
...ng a prime example. Fix the race by allowing a buffer to be optionally passed in the prep operation, and having the hypervisor memcpy from that buffer into the newly prepped page before promoting the gfn type. Second patch is a tools patch, cc''ed maintainers. Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> xen/arch/x86/mm/mem_event.c | 2 +- xen/arch/x86/mm/mem_paging.c | 2 +- xen/arch/x86/mm/p2m.c | 52 +++++++++++++++++++++++++++++++++++++++++-- xen/include/asm-x86/p2m.h | 2 +- xen/include/public/domctl.h | 8 +++++- tools/libxc/xc_mem_event....
2012 Oct 20
15
xen-unstable, winxp32 very poor performance on AMD FX-8150, I bisected and changeset is 24770:7f79475d3de7
...uot;xl top" show cpu usage around 650% for the domu. The bug might be AMD specific. I''m running an AMD FX-8150. ========== The result: ========== good: 24769:730f6ed72d70 bad: 24770:7f79475d3de7 The change was 8 months ago changeset: 24770:7f79475d3de7 user: Andres Lagar-Cavilla <andres@lagarcavilla.org> date: Fri Feb 10 16:07:07 2012 +0000 summary: x86/mm: Make p2m lookups fully synchronized wrt modifications ========== My hardware: ========== AMD FX-8150 990 FX chipset Here''s a dmidecode: http://pastebin.com/XUZjmiVz ========== My kernel: ==...
2012 Jun 28
4
[xen-unstable test] 13383: regressions - FAIL
...xl-winxpsp3-vcpus1 13 guest-stop fail never pass version targeted for testing: xen 52f1b8a4f9a4 baseline version: xen 4f92bdf3370c ------------------------------------------------------------ People who touched revisions under test: Andres Lagar-Cavilla <andres@lagarcavilla.org> George Dunlap <george.dunlap@eu.citrix.com> Ian Campbell <ian.campbell@citrix.com> Ian Jackson <ian.jackson@eu.citrix.com> Jan Beulich <jbeulich@suse.com> Keir Fraser <keir@xen.org> Roger Pau Monne <roger.pau@citrix.com&gt...
2011 Dec 01
11
[PATCH 0 of 2] Paging support updates for XCP dom0
...he second patch adds retry loops to all backend grant operations (map and netback copy), in the case of a paged out frame. Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Jan Beulich <jbeulich@novell.com> Acked-by: Patrick Colp <pjcolp@cs.ubc.ca> Acked-by: Andres Lagar-Cavilla <andres@lagarcavilla> Ported and submitted by Andres Lagar-Cavilla arch/x86/mm/ioremap-xen.c | 12 ++---- drivers/xen/blkback/blkback.c | 6 ++- drivers/xen/blkback/interface.c | 9 +++- drivers/xen/core/gnttab.c | 4 +- drive...
2012 Mar 29
2
BUG: soft lockup - CPU#0 stuck for 61s!
Ian, I came across the subject line on a 96GB server with over 85 VMs running. Completely frozen and unresponsive, qemu-dm processes hung on event channels. I''m using the XenServer 6.0 dom0 kernel on top of the xen-unstable tip hypervisor. I believe you solved the issue backporting some event channel patches to the 2.6.32 kernel, as described in this thread
2011 Nov 08
48
Need help with fixing the Xen waitqueue feature
The patch ''mem_event: use wait queue when ring is full'' I just sent out makes use of the waitqueue feature. There are two issues I get with the change applied: I think I got the logic right, and in my testing vcpu->pause_count drops to zero in p2m_mem_paging_resume(). But for some reason the vcpu does not make progress after the first wakeup. In my debugging there is one
2011 Dec 07
0
[xen-unstable test] 10413: regressions - trouble: broken/fail/pass
...or testing: xen 38eb74c01d9d baseline version: xen 62ff6a318c5d ------------------------------------------------------------ People who touched revisions under test: Adin Scannell <adin@scanneel.ca> Adin Scannell <adin@scannell.ca> Andres Lagar-Cavilla <andres@lagarcavilla.org> Andres Lagar-Cavilla <andres@lagarcavilla> Andrew Cooper <andrew.cooper3@citrix.com> Anthony PERARD <anthony.perard@citrix.com> Brendan Cully <brendan@cs.ubc.ca> Daniel De Graaf <dgdegra@tycho.nsa.gov> Haitao Shan <haitao....
2012 Sep 06
0
[PATCH] Fix mmap batch ioctl error status copy back.
Copy back of per-slot error codes is only necessary for V2. V1 does not provide an error array, so copyback will unconditionally set the global rc to EFAULT. Only copyback for V2. Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> --- drivers/xen/privcmd.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c index 5386f20..e4dfa3b 100644 --- a/drivers/xen/privcmd.c +++ b/drivers/xen/privcmd.c @@ -389,7 +389,7 @@ static long privc...
2012 Sep 10
10
[PATCH] mem_event: fix regression affecting CR3, CR4 memory events
This is a patch repairing a regression in code previously functional in 4.1.x. It appears that, during some refactoring work, calls to hvm_memory_event_cr3 and hvm_memory_event_cr4 were lost. These functions were originally called in mov_to_cr() of vmx.c, but the commit http://xenbits.xen.org/hg/xen-unstable.hg/rev/1276926e3795 abstracted the original code into generic functions up a level in
2012 Jul 03
2
[xen-unstable test] 13439: regressions - FAIL
...-xl-win7-amd64 13 guest-stop fail never pass version targeted for testing: xen d4e4ef1d390f baseline version: xen 4f92bdf3370c ------------------------------------------------------------ People who touched revisions under test: Andres Lagar-Cavilla <andres@lagarcavilla.org> Andrew Cooper <andrew.cooper3@citrix.com> Dario Faggioli <dario.faggioli@citrix.com> Dario Faggioli <raistlin@linux.it> George Dunlap <george.dunlap@eu.citrix.com> Ian Campbell <ian.campbell@citrix.com> Ian Jackson <ian.ja...
2013 Mar 15
1
Re: [PATCH 6/9] tools: memshr: arm64 support
> I''m not mad keen on propagating these sorts of asm atomic operations throughout > our code base. Other options would be: gcc has atomic builtins to do this kind of work. I don''t know about arm, but they do the job in x86 http://gcc.gnu.org/onlinedocs/gcc-4.1.1/gcc/Atomic-Builtins.html so atomic_inc(val) -> __sync_fetch_and_add(val, 1) and likewise for dec/sub Andres
2012 Mar 28
1
Re: tools/memshr: fix build errors caused by Werror
> # HG changeset patch > # User Olaf Hering <olaf@aepfle.de> > # Date 1332942876 -7200 > # Node ID d0fe664fca8a7e7db8b46b2f6c267acc88fa9c78 > # Parent 4bd752a4cdf323c41c50f8cd6286f566d67adeae > tools/memshr: fix build errors caused by Werror > > -O2 -Wall -Werror triggers these warnings: > > cc1: warnings being treated as errors > interface.c: In function
2012 Sep 08
3
[patch 1/3] xen/privcmd: check for integer overflow in ioctl
If m.num is too large then the "m.num * sizeof(*m.arr)" multiplication could overflow and the access_ok() check wouldn't test the right size. Signed-off-by: Dan Carpenter <dan.carpenter at oracle.com> --- Only needed in linux-next. diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c index 215a3c0..fdff8f9 100644 --- a/drivers/xen/privcmd.c +++ b/drivers/xen/privcmd.c
2012 Sep 08
3
[patch 1/3] xen/privcmd: check for integer overflow in ioctl
If m.num is too large then the "m.num * sizeof(*m.arr)" multiplication could overflow and the access_ok() check wouldn't test the right size. Signed-off-by: Dan Carpenter <dan.carpenter at oracle.com> --- Only needed in linux-next. diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c index 215a3c0..fdff8f9 100644 --- a/drivers/xen/privcmd.c +++ b/drivers/xen/privcmd.c
2012 Mar 14
0
[xen-unstable test] 12230: regressions - FAIL
...-xl-win 13 guest-stop fail never pass version targeted for testing: xen 64f5cd4aa2a2 baseline version: xen 5d20d2f6ffed ------------------------------------------------------------ People who touched revisions under test: Andres Lagar-Cavilla <andres@lagarcavilla.org> Daniel De Graaf <dgdegra@tycho.nsa.gov> Fabio Fantoni <fabio.fantoni@heliman.it> Fantu <fantonifabio@tiscali.it> George Dunlap <george.dunlap@eu.citrix.com> Ian Campbell <ian.campbell@citrix.com> Ian Jackson <ian.jackson@e...
2012 Sep 08
3
[patch 3/3] xen/privcmd: remove const modifier from declaration
When we use this pointer, we cast away the const modifier and modify the data. I think it was an accident to declare it as const. Signed-off-by: Dan Carpenter <dan.carpenter at oracle.com> diff --git a/include/xen/privcmd.h b/include/xen/privcmd.h index a853168..58ed953 100644 --- a/include/xen/privcmd.h +++ b/include/xen/privcmd.h @@ -69,7 +69,7 @@ struct privcmd_mmapbatch_v2 {
2012 Sep 08
3
[patch 3/3] xen/privcmd: remove const modifier from declaration
When we use this pointer, we cast away the const modifier and modify the data. I think it was an accident to declare it as const. Signed-off-by: Dan Carpenter <dan.carpenter at oracle.com> diff --git a/include/xen/privcmd.h b/include/xen/privcmd.h index a853168..58ed953 100644 --- a/include/xen/privcmd.h +++ b/include/xen/privcmd.h @@ -69,7 +69,7 @@ struct privcmd_mmapbatch_v2 {
2012 Feb 17
3
Re: Xen domU Timekeeping (a.k.a TSC/HPET issues)
> Date: Fri, 17 Feb 2012 12:06:05 +0000 > From: Ian Campbell <Ian.Campbell@citrix.com> > To: Qrux <qrux.qed@gmail.com> > Cc: "xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com> > Subject: Re: [Xen-devel] Xen domU Timekeeping (a.k.a TSC/HPET issues) > Message-ID: <1329480365.3131.50.camel@zakaz.uk.xensource.com> > Content-Type: