->watch_pipe[1]);
}
-close(h->fd);
xentoolcore__deregister_active_handle(>tc_ah);
+close(h->fd);
Since the rest of this file uses tabs, you may as well use tabs for this
line as well.
Reviewed-by: Ross Lagerwall <ross.lagerw...@citrix.com>
___
On 11/14/2017 11:51 AM, Ian Jackson wrote:
Ross Lagerwall writes ("Re: [PATCH for-4.10] libs/evtchn: Remove active handler on
clean-up or failure"):
On 11/10/2017 05:10 PM, Julien Grall wrote:
Commit 89d55473ed16543044a31d1e0d4660cf5a3f49df "xentoolcore_restrict
er, I think it should call xentoolcore__deregister_active_handle()
_before_ calling osdep_evtchn_close() to avoid trying to restrict a
closed fd or some other fd that happens to have the same number.
I think all the other libs need to be fixed as well, unless there was a
reason it was done thi
.
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
e size rather than below
(since IIRC we only need pad up to the next 4 byte boundary).
Nope, the build fails unless I pad it to an 8 byte boundary. This is
also why I added padding to struct xen_dm_op_pin_memory_cacheattr...
--
Ross Lagerwall
___
Xen
on a
range.
Ross Lagerwall (5):
xen/mm: Make xenmem_add_to_physmap global
xen: Provide XEN_DMOP_add_to_physmap
xen: Provide XEN_DMOP_pin_memory_cacheattr
tools: libxendevicemodel: Provide xendevicemodel_add_to_physmap
tools: libxendevicemodel: Provide xendevicemodel_pin_memory_cacheattr
Make it global in preparation to be called by a new dmop.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Reviewed-by: Paul Durrant <paul.durr...@citrix.com>
---
xen/common/memory.c | 5 ++---
xen/include/xen/mm.h | 3 +++
2 files changed, 5 insertions(+), 3 deleti
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Paul Durrant <paul.durr...@citrix.com>
---
tools/libs/devicemodel/core.c | 19 +++
tools/libs/devicemodel/include/xen
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Changed in v2:
* Make it operate on a range.
tools/libs/devicemodel/Makefile | 2 +-
tools/libs/devicemodel/core.c | 21 +
tools/libs/devicemodel/include/xendevicemodel.
Provide XEN_DMOP_pin_memory_cacheattr to allow a deprivileged QEMU to
pin the caching type of RAM after moving the VRAM. It is equivalent to
XEN_DOMCTL_pin_memory_cacheattr.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Changed in v2:
* Check pad is 0.
xen/arch/x86/hv
Provide XEN_DMOP_add_to_physmap, a limited version of
XENMEM_add_to_physmap to allow a deprivileged QEMU to move VRAM when a
guest programs its BAR. It is equivalent to XENMEM_add_to_physmap with
space == XENMAPSPACE_gmfn_range.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.
other comments, would it make sense to instead use
XENMAPSPACE_gmfn_range and have the caller set the size?
As it is currently, QEMU does only populate VRAM one page at a time
(using xen_xc_domain_add_to_physmap) so it is already slow but it could
be improved.
--
The recently added support for restricting QEMU prevents use of the VGA
console. This series addresses that by adding a couple of new dmops.
A corresponding patch for QEMU is needed to make use of the new dmops.
Ross Lagerwall (5):
xen/mm: Make xenmem_add_to_physmap public
xen: Provide
Make it global in preparation to be called by a new dmop.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/common/memory.c | 5 ++---
xen/include/xen/mm.h | 3 +++
2 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/xen/common/memory.c b/xen/common/memory.c
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/libs/devicemodel/Makefile | 2 +-
tools/libs/devicemodel/core.c | 17 +
tools/libs/devicemodel/include/xendevicemodel.h | 13 +
tools/libs/devic
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/libs/devicemodel/core.c | 19 +++
tools/libs/devicemodel/include/xendevicemodel.h | 14 ++
tools/libs/devicemodel/libxendevicemodel.map| 1 +
3 files changed, 34 inse
Provide XEN_DMOP_add_to_physmap, a limited version of
XENMEM_add_to_physmap to allow a deprivileged QEMU to move VRAM when a
guest programs its BAR. It is equivalent to XENMEM_add_to_physmap with
space == XENMAPSPACE_gmfn.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xe
Provide XEN_DMOP_pin_memory_cacheattr to allow a deprivileged QEMU to
pin the caching type of RAM after moving the VRAM. It is equivalent to
XEN_DOMCTL_pin_memory_cacheattr.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/arch/x86/hvm/dm.c | 12 +++
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Changed in v2:
* Keep warning about DoS and resource exhaustion being a possibility.
(Note that v1 of this patch was incorrectly titled v2.)
tools/Rules.mk| 2 +-
tools/libs/evtchn/Ma
Implement support for restricting evtchn handles to a particular domain
on Linux by calling the IOCTL_EVTCHN_RESTRICT_DOMID ioctl (support added
in Linux v4.8).
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
Release-acke
map alone and added a new version
which simply adds the new symbol.
Fix this.
Reported-by: Ross Lagerwall <ross.lagerw...@citrix.com>
CC: Stefano Stabellini <sstabell...@kernel.org>
Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
Reviewed-by: Ross Lagerwal
local: *; /* Do not expose anything by default */
Why did all the symbols get moved to VERS_1.1 rather than adding only
the new one to VERS_1.1 and keeping the rest at VERS_1.0 (like has been
done with libxenforeignmemory)?
--
Ross Lagerwall
_
On 10/16/2017 11:55 AM, Ian Jackson wrote:
Ross Lagerwall writes ("[PATCH v2 2/2] xentoolcore_restrict_all: Implement for
libxenevtchn"):
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
...
int osdep_evtchn_open(xenevtchn_handle *xce);
diff --git a/tools/libs/
On 10/16/2017 12:29 PM, Ian Jackson wrote:
Ross Lagerwall writes ("Re: [PATCH v1 1/2] tools/libs/evtchn: Add support for
restricting a handle"):
No. As far as I can see, it can only be used to bind new interdomain
events, not other events.
OK, good, thanks.
This entire file
On 10/16/2017 11:53 AM, Ian Jackson wrote:
Ross Lagerwall writes ("[PATCH v1 1/2] tools/libs/evtchn: Add support for
restricting a handle"):
+/*
+ * Restrict this file descriptor so that it can only be used to bind
+ * new interdomain events from one domain.
Can it be used to
Implement support for restricting evtchn handles to a particular domain
on Linux by calling the IOCTL_EVTCHN_RESTRICT_DOMID ioctl (support added
in Linux v4.8).
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/include/xen-sys/Linux/evtchn.h | 15 +++
tool
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/Rules.mk| 2 +-
tools/libs/evtchn/Makefile| 4 ++--
tools/libs/evtchn/core.c | 13 +
tools/libs/evtchn/private.h | 3 +++
tool
has a /dev/null).
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Return 0 to indicate success rather than whatever rc was previously set
to (-EINVAL).
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/arch/x86/hvm/dm.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c
index 82addea..3
On 10/06/2017 02:19 PM, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Ross Lagerwall
Sent: 06 October 2017 13:58
To: Ian Jackson <ian.jack...@citrix.com>; qemu-de...@nongnu.org
Cc: Anthony Perard <anthony.per...@c
be split into two patches?
Is the latter check not needed for ARM64?
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
hardcoded rules fixes the problem
(although presumably there's a better way):
handlereg.o: $(AUTOINCS)
handlereg.opic: $(AUTOINCS)
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
dmop to fix this properly.
For now, document the problem.
Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reported-by: Ross Lagerwall <ross.lagerw...@citrix.com>
CC: Ross Lagerwall <ross.lagerw...@citrix.com>
CC: Wei Liu <wei.l...@citrix.com>
CC: Paul Durrant
to contain a valid /dev/null. This is a bit annoying and prevents
the chroot being on a "nodev" mount.
Regards,
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
er_pwd->pw_uid : user_gid) < 0) {
fprintf(stderr, "Failed to setuid(%d)\n", user_pwd->pw_uid);
exit(1);
}
This last one should be user_uid, not user_gid.
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
mbol from
test-cases."
which fixes this.
Signed-off-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
---
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Wei Liu <wei.l..
On 10/05/2017 02:51 PM, Konrad Rzeszutek Wilk wrote:
On Thu, Oct 05, 2017 at 02:47:30PM +0100, Ross Lagerwall wrote:
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote:
If the livepatch has only .rodata sections then it is OK to also
apply/revert/apply the livepatch without having to worry
iples" in the warning.
Also fix one case where we would fail if the size of the .ex_table
was being zero - but that is OK.
Signed-off-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
---
Cc: Ross Lagerwall <ross.lagerw...@citrix.com>
Reviewed-by: Ross Lagerwall <
lying after an revert" for details.
Signed-off-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
---
Cc: Ross Lagerwall <ross.lagerw...@citrix.com>
The patch looks OK, but what is the use case for a live patch with only
.rodata?
Rega
the RTC.
This patch by itself doesn't affect any of the toolstacks that I
checked; the libxl toolstack doesn't currently handle this event nor
does the XAPI toolstack. If nothing handles the event, it is simply
ignored. We plan on modifying XAPI to handle it.
Signed-off-by: Ross Lagerwall
On 08/21/2017 11:30 PM, Stefano Stabellini wrote:
On Mon, 21 Aug 2017, Ross Lagerwall wrote:
When the guest writes to the RTC, Xen emulates it and broadcasts a
TIMEOFFSET ioreq. Emit an RTC_CHANGE QMP message when this happens
rather than ignoring it so that something useful can be done
When the guest writes to the RTC, Xen emulates it and broadcasts a
TIMEOFFSET ioreq. Emit an RTC_CHANGE QMP message when this happens
rather than ignoring it so that something useful can be done with the
information.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
hw/i386/x
On 07/31/2017 03:29 PM, Boris Ostrovsky wrote:
On 07/31/2017 10:12 AM, Andrew Cooper wrote:
On 31/07/17 14:55, Boris Ostrovsky wrote:
On 07/31/2017 09:20 AM, Ross Lagerwall wrote:
Hi Boris,
I've modified your PVH VCPU hotplug support v6 patch series [1] to
support HVM guests running _with_
While I'm looking at this code...
This doesn't work if access->width > sizeof(val) (4 bytes). The same
value (access->address) is always passed into acpi_cpumap_access_common
for 'port' and this is used as an offset into the avail_cpus array. So
the
is.ostrov...@oracle.com>
Reviewed-by: Juergen Gross <jgr...@suse.com>
Thanks,
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
See docs/features/livepatch.pandoc for the details.
Turn live patching on by default on supported platforms (x86).
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
---
Changed in v3:
Default to on for supported pl
On 06/30/2017 02:42 PM, George Dunlap wrote:
On 06/28/2017 05:18 PM, Ross Lagerwall wrote:
On 06/27/2017 10:17 AM, George Dunlap wrote:
On 26/06/17 18:30, Andrew Cooper wrote:
On 26/06/17 18:00, George Dunlap wrote:
On 26/06/17 16:36, Ross Lagerwall wrote:
...
We absolutely cannot
-by: Julien Grall <julien.gr...@arm.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel..org>
Acked-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
---
Cc: Ross Lagerwall <ross.lagerw...@citrix.com>
Acked-by: Ross Lagerwall &l
On 06/27/2017 10:17 AM, George Dunlap wrote:
On 26/06/17 18:30, Andrew Cooper wrote:
On 26/06/17 18:00, George Dunlap wrote:
On 26/06/17 16:36, Ross Lagerwall wrote:
...
We absolutely cannot be in the position of issuing XSAs for situations
like this, because there are too many ways where
See docs/features/livepatch.pandoc for the details.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Moved it into a feature document.
Clarified a few bits and pieces based on feedback.
docs/features/livepatch.pandoc | 103 +
xen/
On 06/26/2017 05:39 PM, Andrew Cooper wrote:
On 26/06/17 16:36, Ross Lagerwall wrote:
snip
* Unprivileged access to live patching operations:
Live patching operations should only be accessible to privileged
guests and it shall be treated as a security issue
t live patch can introduce
an arbitrary denial of service.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/common/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index dc8e876..876086c 100644
--- a/xen/common
.
Additionally, fix an off-by-one error while range checking symndx, and perform
a safety check on elf->sym[symndx].sym before derefencing it, to avoid
tripping over a NULL pointer when calculating val.
Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Ross Lagerwall <
On 06/22/2017 07:15 PM, Andrew Cooper wrote:
Each of these arrays is sparse. Use zeroed allocations to cause uninitialised
array elements to contain deterministic values, most importantly for the
embedded pointers.
Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by
.
Additionally, perform a safety check on elf->sym[symndx].sym before
derefencing it, to avoid tripping over a NULL pointer when calculating val.
Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Ross Lagerwall <ross.lagerw..
are probably rarely used these days, but they are used by
GRUB 2 to write to its environment file which happens by default on
Ubuntu.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/firmware/rombios/rombios.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a
On 06/09/2017 06:08 PM, Konrad Rzeszutek Wilk wrote:
On Fri, Jun 09, 2017 at 06:00:35PM +0100, Andrew Cooper wrote:
On 09/06/17 17:38, Konrad Rzeszutek Wilk wrote:
On Fri, Jun 09, 2017 at 05:03:36PM +0100, Ross Lagerwall wrote:
Remove the requirement that section twins have the same alignment
had
previously fixed this but hadn't yet sent out that patch. I've now sent
this fix along with another to xen-devel.
Regards,
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Remove the requirement that section twins have the same alignment. The
section alignment of the patched section is respected by the loader in
Xen so it shouldn't matter if the original section alignment was
different.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
creat
Ignore differences in discard sections. They are not included in the final xen
binary so there is no need to include them in the live patch.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
create-diff-object.c | 8
1 file changed, 8 insertions(+)
diff --git a/creat
softirqs();
if ( spin_trylock(_lock) )
return
The effect is that we have just effectively
taken the lock and returned without unlocking!
CC: Ross Lagerwall <ross.lagerw...@citrix.com>
CC: Boris Ostrovsky <boris.ostrov...@oracle.com>
CC: Jan Beulich <jbeul...@suse
. This is assumed to be erratum BDF14. Workaround the issue
by sign-extending into bits 48:63 for MSR_IA32_LASTINT{FROM,TO}IP.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Changes in v2:
- Use a single check if fixup is needed.
- Rename to include the erratum name/number.
- Sign
Occasionally, the top three bits of MSR_IA32_LASTINTTOIP
(MSR_LER_TO_LIP) may be incorrect, as though the MSR is using the
LBR_FORMAT_EIP_FLAGS_TSX format. The MSR should contain an offset into
the current code segment according to the Intel documentation. It is not
clear why this happens. It may
On 05/15/2017 02:52 PM, Julien Grall wrote:
Hi Andrew,
On 08/05/17 17:29, Andrew Cooper wrote:
On 08/05/17 17:17, Ross Lagerwall wrote:
Some EFI firmware implementations may place the EFI properties table in
RAM marked as BootServicesData, which Xen does not consider as reserved.
When dom0
EFI properties table as reserved in the E820, much like is
done with the dmi regions.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/arch/x86/efi/efi-boot.h | 8
xen/common/efi/boot.c | 20
xen/common/efi/efi.h| 4
3 file
Use the return value from early_microcode_update_cpu rather than
ignoring it.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/arch/x86/microcode.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/microcode.c b/xen/arch/x86/microcode.c
t.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/arch/x86/cpu/common.c | 2 +
xen/arch/x86/microcode.c| 131 +---
xen/arch/x86/microcode_amd.c| 3 +-
xen/arch/x86/microcode_intel.c | 3 +-
xen/arch/x86/setup.c
eul...@suse.com>
Reviewed-by: Ross Lagerwall <ross.lagerw...@citrix.com>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 03/23/2017 02:57 PM, Jan Beulich wrote:
There are quite a few of these, and as the option is a development one
only, duplicate symbol names should not be an issue there.
Signed-off-by: Jan Beulich <jbeul...@suse.com>
Acked-by: Ross Lagerwall <ross.lagerw...@citrix.com>
patching. Does that seem
reasonable?
--
Ross Lagerwall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
bers. They would be
removed only for "release" builds in which it is likely that the source
code & debuginfo is archived somewhere such that looking up a line
number requires several steps anyway. I could suggest making it a
separate config option but IIRC you prefer to limit the number
f __LINE__ that have been
introduced since the last version of this series.
See the patches for further changes on each patch.
Ross Lagerwall (6):
lib: Add a generic implementation of current_text_addr()
sched: Remove dependency on __LINE__ for release builds
mm: Use statically defined locking ord
When using LivePatch, use of __LINE__ can generate spurious changes in
functions due to embedded line numbers. For release builds with
LivePatch enabled, remove the use of these line numbers and print the
current text address instead.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.
When using LivePatch, use of __LINE__ can generate spurious changes in
functions due to embedded line numbers. For release builds with
LivePatch enabled, remove the use of these line numbers in
domain_crash*() and print the current text address instead.
Signed-off-by: Ross Lagerwall <ross.lag
Remove the unused x86 implementation.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Changes in v2:
* Include Clang in the comment.
xen/common/lib.c| 12
xen/include/asm-x86/processor.h | 10 --
xen/include/xen/lib.h | 2
Instead of using a locking order based on line numbers which interacts
poorly with trying to create a live patch, statically define the locking
order.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
Reviewed-by: Dario Faggioli <dario.faggi...@citrix.com>
---
Changes in v2:
When using LivePatch, use of __LINE__ can generate spurious changes in
functions due to embedded line numbers. For release builds with
LivePatch enabled, remove the use of these line numbers in
IOMMU_WAIT_OP() and print the current text address instead.
Signed-off-by: Ross Lagerwall <ross.lag
When using LivePatch, use of __LINE__ can generate spurious changes in
functions due to embedded line numbers. For release builds with
LivePatch enabled, remove the use of these line numbers and print the
current text address instead.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.
api context.
* If any fatal error occurs, unregister and destroy the netdev to avoid
leaving around a half setup network device.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Changed in V3:
* If xennet_create_queues returns < 0, it will not have created any
queues so the
On 02/07/2017 11:33 PM, Boris Ostrovsky wrote:
On 02/07/2017 09:55 AM, Ross Lagerwall wrote:
This fixes a crash when running out of grant refs when creating many
queues across many netdevs.
* If creating queues fails (i.e. there are no grant refs available),
call xenbus_dev_fatal() to ensure
api context.
* If any fatal error occurs, unregister and destroy the netdev to avoid
leaving around a half setup network device.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
Changed in V2:
* Retested on top of v4.10-rc7 + "xen-netfront: Delete r
On 02/01/2017 06:54 PM, Boris Ostrovsky wrote:
On 02/01/2017 10:50 AM, Ross Lagerwall wrote:
Improve error handling during initialization. This fixes a crash when
running out of grant refs when creating many queues across many netdevs.
* Delay timer creation so that if initializing a queue
off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
drivers/net/xen-netfront.c | 39 ++-
1 file changed, 18 insertions(+), 21 deletions(-)
diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c
index 8315fe7..8ca85af 100644
--- a/driver
On 01/31/2017 03:05 AM, Doug Goldstein wrote:
On 5/6/16 10:48 AM, Ross Lagerwall wrote:
Here is a set of changes to make building xSplice patches easier.
Tested to boot on x86.
Compile-tested on arm.
This is probably too late to make it into 4.7, but hey, if someone wants
to put it in I've
Manufacturer: Dell Inc.
Product Name: OptiPlex 9020
Version: 00
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
xen/arch/x86/shutdown.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/xen/arch/x86/shutdown.c b/xen/arch/x86/shutdown.c
index 55f6840..3d669d1
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
Acked-by: Wei Liu <wei.l...@citrix.com>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
---
tools/misc/xen-livepatch.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/tools/misc/xen-livepatch.c b/tools/mi
the output.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/misc/xen-livepatch.c | 37 ++---
1 file changed, 30 insertions(+), 7 deletions(-)
diff --git a/tools/misc/xen-livepatch.c b/tools/misc/xen-livepatch.c
index 140445d..af9fcd6
Hi all,
This series contains a few fixes to the xen-livepatch tool.
It also contains a few changes to make the output more readable.
Changed in v2:
* Fix minor comments.
* Split the last patch into two.
Ross Lagerwall (8):
tools/livepatch: Show the correct expected state before action
tools
Using both stdout and stderr interleaved without newlines can result in
strange output when using line buffered mode (e.g. a terminal) or when
fully buffered (e.g. redirected to a file). Set stdout to unbuffered mode
to fix this (stderr is always unbuffered by default).
Signed-off-by: Ross
-livepatch apply test2
test2 failed with 22(Invalid argument)
Performing apply: (no newline)
After:
$ xen-livepatch apply test2
Applying test2: failed
Error 22: Invalid argument
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
Acked-by: Wei Liu <wei.l...@c
The hypervisor expects the timeout from the hypercall to be in
nanoseconds, so document this correctly. Also correctly document
what happens when timeout is set to zero.
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
docs/misc/livepatch.markdown | 13 +++--
tools
to actually start the operation.
Furthermore, have xen-livepatch set the hypervisor timeout rather than
relying on the hypervisor default since the tool doesn't know how long
it will be. Use nanosleep rather than usleep since usleep has been
removed from POSIX.1-2008.
Signed-off-by: Ross Lagerwall
xen-livepatch unload test
test: in wrong state (APPLIED), expected (unknown)
After:
$ xen-livepatch unload test
test: in wrong state (APPLIED), expected (CHECKED)
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
Acked-by: Wei Liu <wei.l...@citrix.com>
---
tools/mis
Fix a number of incorrect uses of errno after an operation that could
set it (e.g. fprintf, close).
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/misc/xen-livepatch.c | 28
1 file changed, 16 insertions(+), 12 deletions(-)
diff --git a
On 12/12/2016 05:02 PM, Wei Liu wrote:
On Mon, Dec 12, 2016 at 04:18:05PM +, Ross Lagerwall wrote:
Using both stdout and stderr interleaved without newlines can result in
strange output when using line buffered mode (e.g. a terminal) or when
fully buffered (e.g. redirected to a file). Set
Hi all,
This series contains a few fixes to the xen-livepatch tool.
It also contains a few changes to make the output more readable.
Ross Lagerwall (7):
tools/livepatch: Show the correct expected state before action
tools/livepatch: Set stdout and stderr unbuffered
tools/livepatch: Improve
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/misc/xen-livepatch.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/tools/misc/xen-livepatch.c b/tools/misc/xen-livepatch.c
index d683860..9633c4a 100644
--- a/tools/misc/xen-livepatch.c
+++ b/tools/misc/xen-livep
xen-livepatch unload test
test: in wrong state (APPLIED), expected (unknown)
After:
$ xen-livepatch unload test
test: in wrong state (APPLIED), expected (CHECKED)
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/misc/xen-livepatch.c | 2 +-
1 file changed,
the output.
Fix a number of incorrect uses of errno after an operation that could
set it (e.g. fprintf, close).
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/misc/xen-livepatch.c | 60 +++---
1 file changed, 41 insertions(+), 19 del
-livepatch apply test2
test2 failed with 22(Invalid argument)
Performing apply: (no newline)
After:
$ xen-livepatch apply test2
Applying test2: failed
Error 22: Invalid argument
Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com>
---
tools/misc/xen-livepatch.
1 - 100 of 351 matches
Mail list logo