similar to: [PATCH] Fix xc_tbuf_enable assumption.

Displaying 20 results from an estimated 300 matches similar to: "[PATCH] Fix xc_tbuf_enable assumption."

2006 May 12
0
[PATCH]fix xentrace
Hi, All This is a patch for xentrace.c. This routine checks the trace buffer is initialized or not. If not, the trace buffer is initialized by using this patch. This is avoiding following message. ERROR: Failure to get trace buffer pointer from Xen (22 = Invalid argument) This routine is based on the specification of the trace buffer control function trace.c/tb_control(). The function checks
2006 Jul 31
1
[PATCH 5/6] xen, tools: calculate nr_cpus via num_online_cpus
Once Xen calculates nr_nodes properly, all nr_cpu calculations based on nr_nodes * sockets_per_node * cores_per_socket * threads_per_core are broken. The easy fix is to replace those calculations with a new field, nr_cpus in physinfo which is calculated by num_online_cpus(). This patch does so and attempts to change all users over to nr_cpus field in physinfo. This patch touches
2007 Apr 05
2
Does xentrace write into buffers by default?
Hello, I have a question about the way Xentrace takes a trace. In previous versions of Xen, I took a trace by setting the size of buffers, activating them and writing the information into a file (optional). setsize 20 tbctl 1 xentrace /tmp/xentrace.dat Now I''m using xen-unstable and I see that setsize is already integrated in xentrace command. My question is: does start/stop buffer is
2006 Dec 04
1
[PATCH] buildconfigsfor pvfb
I have a similar patch for this, which is generated in linux-2.6.16.33-xen/.config automatically. See attachment defbuild.patch. Pae_new_config is used to build x86_32 with PAE enabled. Ping >-----Original Message----- >From: xen-ia64-devel-bounces@lists.xensource.com [mailto:xen-ia64-devel-bounces@lists.xensource.com] On Behalf Of Atsushi >SAKAI >Sent: 2006年12月4日 12:22 >To:
2007 Apr 05
0
How to enable Xentrace in xen-unstable?
Hi, I am using xen-unstable and interested to trace the hypervisor. In previous versions, I was able to trace it by: setsize 20 tbctl 1 xentrace /tmp/xentrace.dat And these functions don''t exist in xen-unstable. xentrace --help shows that in more recent versions the buffers'' size could be determined as a parameter for xentrace. But I can not find any replacement for
2007 Nov 02
1
[patch][doc] adds console_timestamps discription
Hi, It adds console_timestamps discription. Signed-off-by: Atsushi SAKAI <sakaia@jp.fujitsu.com> Anyway, Why Users'' manual version keeps Xen v3.0? Is there any reason? Thanks Atsushi SAKAI _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Oct 20
0
XenMon Patch
Attached is the second release of XenMon, which is a unique performance monitoring tool for Xen. Instead of using hypervisor calls to get domain information, we use the xentrace facility to provide fine-grained monitoring of various metrics (see README below). We have written up a small case study that demonstrates the usefulness of the tool and the metrics that it reports. This will be
2006 Sep 29
4
[PATCH 4/6] xen: export NUMA topology in physinfo hcall
This patch modifies the physinfo hcall to export NUMA CPU and Memory topology information. The new physinfo hcall is integrated into libxc and xend (xm info specifically). Included in this patch is a minor tweak to xm-test''s xm info testcase. The new fields in xm info are: nr_nodes : 4 mem_chunks : node0:0x0000000000000000-0x0000000190000000
2006 Jul 11
0
[PATCH][DOC] Scheduler default in Users Manual
This is a patch which intends for default scheduler changed in user''s manual. (from sedf to credit) Signed-off-by: Atsushi SAKAI <sakaia@jp.fujitsu.com> Request: Credit scheduler has no description on glossary of terms (user''s manual appendix C:P67) _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2007 Oct 23
0
Bug#447795: xen-utils-3.0.3-1: [CVE-2007-3919] xenmon.py / xenbaked insecure file accesss
Package: xen-utils-3.0.3-1 Version: 3.0.3-0-3 Severity: grave Tags: security Justification: user security hole Xen versions 3.x, and 3.1 contain a tool for processing Xen trace buffer information. This tool uses the static file /tmp/xenq-shm insecurely allowing a local user to truncate any local file when xenbaked or xenmon.py are invoked by root. Sample session: # setup. skx
2013 Jul 10
0
Bug#716496: [Mayhem] Bug report on xen-utils-4.1: xenbaked crashes with exit status 139
Package: xen-utils-4.1 Version: 4.1.4-4 Severity: normal User: mayhem at forallsecure.com Usertags: mayhem xenbaked crashes with exit status 139. We confirmed the crash by re-running it in a fresh debian unstable installation. The attachment [1] contains a testcase (under ./crash) crashing the program. It ensures that you can easily reproduce the bug. Additionally, under ./crash_info/, we
2006 Aug 14
0
[PATCH] remove another xc_dom0_op() user
# HG changeset patch # User john.levon@sun.com # Date 1155596263 -3600 # Node ID dc12f0942649ee27ff2aec3e3d9c2d99746b9e58 # Parent 09bc238664cb7b6d0f960f5e135ac80a75b342f1 Remove another external-to-libxc user of xc_dom0_op(). Signed-off-by: John Levon <john.levon@sun.com> diff -r 09bc238664cb -r dc12f0942649 tools/xenmon/xenbaked.c --- a/tools/xenmon/xenbaked.c Mon Aug 14 15:40:36 2006
2008 Apr 24
0
[PATCH] xenbaked: Fix access to trace buffer after xentrace changes
Hi, Xenmon does not work correctlly after xentrace changes in cs 17000. Attached patch fixes this problem. This patch modifies access to trace buffer same as tools/xentrace. Signed-off-by: Naoki Nishiguchi <nisiguti@jp.fujitsu.com> Regards, Naoki Nishiguchi _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2013 Jun 26
0
Bug report on xen-utils-4.1: xenbaked crashes with exit status 139
Hi, We found a crash in xenbaked contained in the xen-utils-4.1 package. You are being contacted because your are listed as one of the maintainer of xen-utils-4.1. We are planning to submit the bug to the Debian bug tracking system in two weeks. We wanted to give you a heads-up, so that you some time to assess the seriousness of the bug before it is publicly disclosed. The bug report that will
2014 Nov 24
0
Processed: reassign 745419 to src:xen, reassign 716496 to src:xen
Processing commands for control at bugs.debian.org: > reassign 745419 src:xen 4.1.4-3+deb7u1 Bug #745419 [xen-utils-4.1] xen-utils-4.1: Pygrub fails to boot from LVM LV when something installed in the volume boot record Bug reassigned from package 'xen-utils-4.1' to 'src:xen'. No longer marked as found in versions xen/4.1.4-3+deb7u1. Ignoring request to alter fixed versions of
2006 Apr 15
1
xentrace failure...
Hello, I''ve been trying to get xenmon.py and xentrace to work, but I consistently get the following (on a couple of different machines/kernels): kibab kibab # xentrace /root/xentrace.log ERROR: Failure to get trace buffer pointer from Xen (22 = Invalid argument) Did I miss an option that has to be turned on or something? Is there some other setting that I need so that everything
2006 Apr 21
1
RE: [PATCH]Check the values of MAX_VIRT_CPUS and NR_CPUSfor SMP
>From: Keir Fraser >Sent: 2006年4月21日 14:41 > > >On 21 Apr 2006, at 02:31, Atsushi SAKAI wrote: > >> But the logical limit of the IA64 Max CPU is larger than 64. >> If someone change these values, some possibility make this error >again. >> >> To avoid this problem, I believe this check code should be exists. > >See how we solve this on x86 near
2007 Jan 14
1
Bug#406863: xenmon.py isn't in the execution search path
Package: xen-utils-3.0.3-1 Version: 3.0.3-0-2 For some reason, xenmon.py is not in the search path - maybe an issue of the wrapper used by the xen Debian packages seems to be only a link to the wrapper is missing the program exists in the package xen-utils-3.0.3-0-2 and the follwoing make it work: ln -s ../lib/xen-common/bin/xen-utils-wrapper /usr/sbin/xenmon.py ln -s
2007 Oct 23
0
Processed: reassign 447795 to xen-3.0
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > reassign 447795 xen-3.0 3.0.3-0-3 Bug#447795: xen-utils-3.0.3-1: [CVE-2007-3919] xenmon.py / xenbaked insecure file accesss Bug reassigned from package `xen-utils-3.0.3-1' to `xen-3.0'. > End of message, stopping processing here. Please contact me if you
2007 Oct 23
0
Processed: found 447795 in 3.0.3-0-1
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > found 447795 3.0.3-0-1 Bug#447795: xen-utils-3.0.3-1: [CVE-2007-3919] xenmon.py / xenbaked insecure file accesss Bug marked as found in version 3.0.3-0-1. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking