Displaying 20 results from an estimated 4000 matches similar to: "[PATCH]rtc emulation for xenU"
2005 Dec 08
0
[PATCH]Don''t unshadow current used shadow L2 table.
# HG changeset patch
# User Xiaofeng Ling <xiaofeng.ling@intel.com>
# Node ID cc6e19224d0b755d24358cd15d1a40f894d320b4
# Parent b215584242c43415eccd008b90c812f3d04b398d
Don''t unshadow when the shadow l2 is the current used shadow table.
Otherwise, when destorying the domain, if the current sl2 is unpinned,
the shadow page will be freed without accquire the shadow_lock.
This may
2005 Nov 29
0
[PATCH]small fix for shadow
# HG changeset patch
# User Xiaofeng Ling <xiaofeng.ling@intel.com>
# Node ID 188b619dad2998f0625b247ee298def1919696ca
# Parent 90d9dff476923318f34c993016c9ada8979ee06d
small fix for shadow
Signed-off-by:Xiaofeng Ling <xiaofeng.ling@intel.com>
diff -r 90d9dff47692 -r 188b619dad29 xen/arch/x86/shadow.c
--- a/xen/arch/x86/shadow.c Tue Nov 29 09:44:46 2005 +0800
+++
2005 Sep 05
2
[PATCH][1/6] add a hypercall number for virtual device in unmodified guest
add a hypercall number for virtual device in unmodified guest
There are 6 patches for para-driver support in vmx guest. This is the
first one.
Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com>
Signed-off-by: Arun Sharma <arun.sharma@intel.com>
diff -r 287d36b46fa3 xen/arch/x86/x86_32/entry.S
--- a/xen/arch/x86/x86_32/entry.S Tue Aug 30 20:36:49 2005
+++
2005 Jun 29
0
[PATCH] fix xc_domain_memory_increase_reservation return value
in xc_domain_memory_increase_reservation, when do_dom_mem_op return 0,
it shall also return -1,I met this problem when I try to allocate
domain memory.
Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com>
diff -Nru a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c
--- a/tools/libxc/xc_domain.c 2005-06-29 17:16:11 +08:00
+++ b/tools/libxc/xc_domain.c 2005-06-29 17:16:11 +08:00
@@
2005 Sep 05
0
[PATCH][4/6] Add to virtual device operations
Add two virtual device operations:
1.set the callback irq for event channel
2.setup the hypercall paramerter share page.
Signed-off-by: Ke Yu <ke.yu@intel.com>
Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com>
Signed-off-by: Arun Sharma <arun.sharma@intel.com>
diff -r 287d36b46fa3 xen/arch/x86/vmx.c
--- a/xen/arch/x86/vmx.c Tue Aug 30 20:36:49 2005
+++
2005 Oct 13
0
[PATCH]Send keys in vmx
After you change to the monitor in vmx using ctrl-alt-2, you can send
keys to the emulator. Use - to press several keys simultaneously.
Example:
sendkey ctrl-alt-f1
This patch is useful to send keys that your graphical user interface
intercepts at low level, such as ctrl-alt-f1 in X Window.
Signed-off-by: Dan Xu <dan.d.xu@intel.com>
Signed-off-by: Zhai, Edwin
2005 Oct 20
3
[PATCH]Cannot send special keys, such as Ctrl+Alt+Del
Here is the patch useful to send special keys that your graphical user
interface intercepts at low level, such as ctrl-alt-del in X Window.
This patch adds a command "sendkey" to deal with it in the monitor, you
can send keys to the vm. Use - to press several keys simultaneously.
Example:
sendkey ctrl-alt-f1
Signed-off-by: Dan Xu <dan.d.xu@intel.com>
Signed-off-by:
2005 Jun 30
0
[PATCH][2/10] Extend the VMX intercept mechanism to include mmio as well as portio.
Extend the VMX intercept mechanism to include mmio as well as portio.
Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com>
Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com>
Signed-off-by: Arun Sharma <arun.sharma@intel.com>
diff -r febfcd0a1a0a -r 9a43d5c12b95 xen/include/asm-x86/vmx_platform.h
--- a/xen/include/asm-x86/vmx_platform.h Thu Jun 30 03:20:48 2005
+++
2004 Jul 02
0
[Patch] We resolve the throughput drop problemwhe nr eading filesin OCFS2 volume in the patch "ocfs2-truncate-pages-1.patch"a gainstsvn 1226.
We are also thinking about locking for each read/write, but would its =
overhead be too high?
We have another idea that is extending the function of flock, lockf, =
fcntl to distributed.
So any application that need strict data consistent can do a lock =
operation on the whole or part of the file.
For ordinary application, maybe the current logic is enough.
How about it?
>-----Original
2011 Jul 12
1
Problem in linux domU re: /dev/rtc and hwclock
Hi all,
One of our domU VMs (CentOS 5.6 x86_64) runs a cobol application,
which in turn called ''clock'' to get timestamps. Changing this is
non-trivial.
When I try to call ''clock --debug'' I get:
[root@vm0010 ~]# clock --debug
hwclock from util-linux-2.13-pre7
hwclock: Open of /dev/rtc failed, errno=19: No such device.
No usable clock interface found.
2004 Aug 17
0
[BUG] LTP:mkdir try to inherits S_ISGID failed
This bug has the same reproduce step as below.
the dir2 has no S_ISGID set. see bug 131.
>-----Original Message-----
>From: ocfs2-devel-bounces@oss.oracle.com=20
>[mailto:ocfs2-devel-bounces@oss.oracle.com] On Behalf Of Ling, Xiaofeng
>Sent: 2004=C4=EA8=D4=C218=C8=D5 9:45
>To: ocfs2-devel@oss.oracle.com
>Subject: [Ocfs2-devel] [BUG] LTP:mkdir try to inherits group id failed
>
2004 Apr 08
0
ltp test result for ocfs2 for 2.4
This is the test result on 2.4.20 kernel, it is much like the result on 2.6.3 kernel.
Both hang on rmdir03.
Anther result is when on a SMP kernel of 2.4.20 on UP machine, the test crashs on "create" test.
> -----Original Message-----
> From: ocfs2-devel-bounces@oss.oracle.com
> [mailto:ocfs2-devel-bounces@oss.oracle.com] On Behalf Of
> Ling, Xiaofeng
> Sent:
2004 Oct 09
1
about memory alloc
Hi,
I have a question, If I start 2 or more guest linux, does the physical memory of code segment and readonly data segment be reused?
What''s the relationship between the physical memory and the number of guest os that can create?
xiaofeng
-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT
2005 Nov 08
1
VMX domain status report Nov. 8 7646
We have test latest xen (ChangeSet 7646) on VT platform with Intel 915
chipset :
The VMX can not be created for the known issue
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=388
<http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=382>
But it is ok after adding xiaofeng''s patch.
IA32:
Build&Boot SMP xen0 without problem
Can startup XenU with different
2008 Jan 28
0
Error starting domU (centos5) on xen3.2.0 : rtc: IRQ 8 is not free
Hi.
I compiled the xen binaries and the kernel with the sources.
DomO starts without any problems, but when I run domU, it stops and freeze.
My domU is a clone of my domO.
___________________________________________
unmounting old /dev
unmounting old /proc
unmounting old /sys
INIT: version 2.86 booting
rtc: IRQ 8 is not free.
modprobe: FATAL: Error inserting rtc
2004 Aug 17
1
[Bug] LTP: mkdir fail after setreuid
For chdir03 investigation result:
The fail is caused by the mkdir fail after setreuid.
Key code in the test case:
if ((pid =3D fork()) < 0) {
tst_brkm(TBROK, cleanup, "first fork failed");
}
if (pid =3D=3D 0) { /* first child */
/* set the child's ID to ltpuser1 */
if (setreuid(ltpuser1->pw_uid,
2005 Nov 03
7
VMX status daily report Nov. 3
We have test latest xen (ChangeSet 7608) on VT platform with Intel 915
chipset and Here is the test summary:
IA32:
Build&Boot SMP xen0 without problem
Can startup XenU with different configuration
IA32 issues contain:
VMX can not be created
IA32E:
Build&Boot SMP xen0 without problem
Can startup XenU with different configuration
IA32E issues
2012 Jun 09
0
bad mmio size, MMIO emulation failed, and other issues
I''ve been trying to pass through a GPU to a domU, so far with a lot of
trouble but finally a success. PCI passthrough works, I''ve had the usb
hubs work successfully. Today I tried to pass through my ATI card to
an ubuntu hvm domU with no gfx_passthru and got this:
[...]
(XEN) memory_map:add: dom14 gfn=f3040 mfn=f7c40 nr=4
(XEN) memory_map:remove: dom14 gfn=f3040 mfn=f7c40 nr=4
2024 Jul 14
1
Splitting of sshd binaries in 9.8?
I realize that the splitting of the sshd binaries is a work in progress.
Nonetheless I am trying to make a diagram of the situation as of 9.8.
How close have I gotten?
Is it correct that currently for a basic session, binaries are run four
ways?
1. A privileged binary to listen for incoming connections (66717 below)
2. A privileged session monitor to track the session, for the duration
of the
2013 Nov 22
10
[PATCH v4] x86: properly handle MSI-X unmask operation from guests
patch revision history
----------------------
v1: Initial patch to handle this issue involving changing the hypercall interface
v2:Totally handled inside hypervisor.
v3:Change some logics of handling msi-x pending unmask operations.
v4:Some changes related to coding style according to Andrew Cooper''s comments
From 51c5b7f1f9c8f319da8adf021b39e18fbd3bf314 Mon Sep 17 00:00:00 2001
From: