Displaying 20 results from an estimated 2000 matches similar to: "rdtsc in userspace"
2018 Sep 17
11
[patch V2 00/11] x86/vdso: Cleanups, simmplifications and CLOCK_TAI support
Matt attempted to add CLOCK_TAI support to the VDSO clock_gettime()
implementation, which extended the clockid switch case and added yet
another slightly different copy of the same code.
Especially the extended switch case is problematic as the compiler tends to
generate a jump table which then requires to use retpolines. If jump tables
are disabled it adds yet another conditional to the existing
2018 Sep 14
24
[patch 00/11] x86/vdso: Cleanups, simmplifications and CLOCK_TAI support
Matt attempted to add CLOCK_TAI support to the VDSO clock_gettime()
implementation, which extended the clockid switch case and added yet
another slightly different copy of the same code.
Especially the extended switch case is problematic as the compiler tends to
generate a jump table which then requires to use retpolines. If jump tables
are disabled it adds yet another conditional to the existing
2018 Sep 14
24
[patch 00/11] x86/vdso: Cleanups, simmplifications and CLOCK_TAI support
Matt attempted to add CLOCK_TAI support to the VDSO clock_gettime()
implementation, which extended the clockid switch case and added yet
another slightly different copy of the same code.
Especially the extended switch case is problematic as the compiler tends to
generate a jump table which then requires to use retpolines. If jump tables
are disabled it adds yet another conditional to the existing
2015 Nov 25
2
"Failed to start domain..."
Sadly, I'm back with another issue. I can do a "system list --all" just
fine; however, if I attempt to start the machines, I get back:
maas@Bill-MAAS-cc:~$ strace -s 1024 -f -o /tmp/asdfasdf.log virsh -c
vbox+ssh://gbadmin@10.20.0.1/system start PXE-client-07
error: Failed to start domain PXE-client-07
error: An error occurred, but the cause is unknown
Log files on both client
2016 Feb 03
2
[PATCH] Fix compilation on OS/2
On 01/24/16 12:29 PM, Erik de Castro Lopo wrote:> Dave Yeo wrote:
>
>> After this the build dies with,
>> util.c: In function 'benchmark_function':
>> util.c:124:17: error: 'CLOCK_PROCESS_CPUTIME_ID' undeclared (first use
>> in this function)
>> clock_gettime (CLOCK_PROCESS_CPUTIME_ID, &start) ;
>>
>> Would using
2012 Jun 25
6
puppet freezes on FUTEX_WAKE_PRIVATE
Hi, i just want to ask whether somebody else has this problem of mine and
if it can be solved.
Many of my ( 30+ ) puppet installation freeze up after some time. The
process is waiting for some private futex, but it stays like that forever.
This is what strace looks like when the problem occures:
[pid 29173] futex(0x3d35ce7a84,
FUTEX_WAIT_BITSET_PRIVATE|FUTEX_CLOCK_REALTIME, 43406739,
2013 Aug 03
2
Call for testing: OpenSSH-6.3
On 2013-08-03 01:41, Darren Tucker wrote:
> On Sat, Aug 3, 2013 at 5:58 PM, Damien Miller <djm at mindrot.org> wrote:
>>> Looking at failure logs - this is what's killing it:
>>> clock_gettime: Invalid argument
> [...]
>> Maybe these platforms lack CLOCK_MONOTONIC? Darren, perhaps we should
>> wrap clock_gettime and have a fallback for
2020 Apr 24
2
[PATCH] Allow RDTSC and RDTSCP from userspace
On 4/24/20 2:03 PM, Mike Stunes wrote:
> I needed to allow RDTSC(P) from userspace and in early boot in order to
> get userspace started properly. Patch below.
>
> ---
> SEV-ES guests will need to execute rdtsc and rdtscp from userspace and
> during early boot. Move the rdtsc(p) #VC handler into common code and
> extend the #VC handlers.
Do SEV-ES guests _always_ #VC on
2020 Apr 24
2
[PATCH] Allow RDTSC and RDTSCP from userspace
On 4/24/20 2:03 PM, Mike Stunes wrote:
> I needed to allow RDTSC(P) from userspace and in early boot in order to
> get userspace started properly. Patch below.
>
> ---
> SEV-ES guests will need to execute rdtsc and rdtscp from userspace and
> during early boot. Move the rdtsc(p) #VC handler into common code and
> extend the #VC handlers.
Do SEV-ES guests _always_ #VC on
2016 Jan 08
8
Lets do a 1.3.2 release
HI all,
I think its time for a new release. The current code base is stable
and I've been building it for x86_64/linux, powerpc/linux, armhf/linux,
x86_64/darwin in a Jenkins build bot. I'm pretty sure others have been
building regularly on their platforms of interest.
I made a first pass on an update to the changelog.html. I' also putting
toether a release checklist that I will add
2008 Nov 25
7
when timer go back in dom0 save and restore or migrate, PV domain hung
Hi,
I find PV domin hung, When we take those steps
1, save PV domain
2, change system time of PV domain back
3, restore a PV domain
or
1, migrate a PV domain from Machine A to Machine B
2, the system time of Machine B is slower than Machine A.
the problem is wc_sec will be change when system-time chanaged in dom0 or restore in a
2008 Nov 27
1
Re: RE: Re: Re: when timer go back in dom0 save and restore ormigrate, PV domain hung
F.Y.I
>>> "Tian, Kevin" <kevin.tian@intel.com> 08.11.27. 11:50 >>>Sorry for a
typo. I did mean domU instead of dom0. :-) The point here is that
time_resume will sync to new system time and wall clock at restore, and
thus pv guest should be able to continue... Xen system time is not
wallclock time which just counts up from power up. As Keir points out,
only its
2023 Jan 26
0
[klibc:time64] time: Use clock_* system calls for time-of-day and sleep
Commit-ID: 8b44cc180f664532821211e8261534b0c9e6c01c
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=8b44cc180f664532821211e8261534b0c9e6c01c
Author: Ben Hutchings <ben at decadent.org.uk>
AuthorDate: Sat, 14 Jan 2023 02:15:10 +0100
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sun, 15 Jan 2023 21:28:18 +0100
[klibc] time: Use clock_* system
2006 Aug 26
13
qemu-dm cpu utilization
Using an 8-way ES7000 with 32GB of ram, I''m running xen at changset 11217
with dom0_mem=3092M as a kernel parameter on a x86_64 hyperviser.
It appears that qemu is adding too much overhead to
virtual machines to display graphics.
If I boot a sles9sp3 domVT in runlevel 5 with vga=0x314 for a graphicalboot, and immediately use
vncviewer simply to watch the virtual machine as it boots,
2013 Jul 08
1
Samba4, NTP, and Ubuntu 12.04
Hello,
I have a question regarding signed NTP support for Samba4 on Ubuntu 12.04. I have followed most of the steps outlined here:
https://wiki.samba.org/index.php/Configure_NTP
These steps I did differently are:
* I did not install from source because the latest Ubuntu package for ntp available on Ubuntu 12.04 includes ntp-signd support already
* I did not install Samba4 to /usr/local/samba, so
2014 Apr 16
6
[Bug 2228] New: ssh-agent passwords do not timeout properly
https://bugzilla.mindrot.org/show_bug.cgi?id=2228
Bug ID: 2228
Summary: ssh-agent passwords do not timeout properly
Product: Portable OpenSSH
Version: 6.4p1
Hardware: All
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: ssh-agent
Assignee: unassigned-bugs at
2012 Jul 10
1
monotonic clock
Hi,
I've submitted a patch to the Alioth tracker but thought to give a heads up
here as well, I have an issue with nut not working when the clock is moved
backwards. I provided a patch[1] to use clock_gettime with CLOCK_MONOTONIC
to fix this, based on comments from Charles Lepple I made a few changes and
it can be seen in a git branch I created at [2].
Let me know what you think.
Baruch
2020 Apr 24
0
[PATCH] Allow RDTSC and RDTSCP from userspace
On 4/24/20 4:24 PM, Dave Hansen wrote:
> On 4/24/20 2:03 PM, Mike Stunes wrote:
>> I needed to allow RDTSC(P) from userspace and in early boot in order to
>> get userspace started properly. Patch below.
>>
>> ---
>> SEV-ES guests will need to execute rdtsc and rdtscp from userspace and
>> during early boot. Move the rdtsc(p) #VC handler into common code and
2007 Apr 18
2
[RFC, PATCH 17/24] i386 Vmi msr patch
Fairly straightforward code motion of MSR / TSC / PMC accessors
to the sub-arch level. Note that rdmsr/wrmsr_safe functions are
not moved; Linux relies on the fault behavior here in the event
that certain MSRs are not supported on hardware, and combining
this with a VMI wrapper is overly complicated. The instructions
are virtualizable with trap and emulate, not on critical code
paths, and only
2007 Apr 18
2
[RFC, PATCH 17/24] i386 Vmi msr patch
Fairly straightforward code motion of MSR / TSC / PMC accessors
to the sub-arch level. Note that rdmsr/wrmsr_safe functions are
not moved; Linux relies on the fault behavior here in the event
that certain MSRs are not supported on hardware, and combining
this with a VMI wrapper is overly complicated. The instructions
are virtualizable with trap and emulate, not on critical code
paths, and only