This project is mirrored from git://xenbits.xen.org/xen.git. Updated .
  1. 23 Oct, 2019 5 commits
  2. 22 Oct, 2019 5 commits
  3. 19 Oct, 2019 2 commits
  4. 16 Oct, 2019 2 commits
  5. 14 Oct, 2019 5 commits
  6. 10 Oct, 2019 11 commits
  7. 09 Oct, 2019 1 commit
  8. 08 Oct, 2019 2 commits
  9. 07 Oct, 2019 4 commits
    • Lars Kurth's avatar
      docs: update all URLs in man pages · f8abe4fe
      Lars Kurth authored
      Specifically
      * xen.org to xenproject.org
      * http to https
      * Replaced pages where page has moved
        (including on xen pages as well as external pages)
      * Removed some URLs (e.g. downloads for Linux PV drivers)
      Tested-by: Lars Kurth's avatarLars Kurth <lars.kurth@citrix.com>
      Signed-off-by: Lars Kurth's avatarLars Kurth <lars.kurth@citrix.com>
      Acked-by: Andrew Cooper's avatarAndrew Cooper <andrew.cooper3@citrix.com>
      Acked-by: default avatarWei Liu <wl@xen.org>
      Release-acked-by: Juergen Gross's avatarJuergen Gross <jgross@suse.com>
      f8abe4fe
    • Juergen Gross's avatar
      xen/sched: let credit scheduler control its timer all alone · 969f58bd
      Juergen Gross authored
      The credit scheduler is the only scheduler with tick_suspend and
      tick_resume callbacks. Today those callbacks are invoked without being
      guarded by the scheduler lock which is critical when at the same the
      cpu those callbacks are active is being moved to or from a cpupool.
      
      Crashes like the following are possible due to that race:
      
      (XEN) ----[ Xen-4.13.0-8.0.12-d  x86_64  debug=y   Not tainted ]----
      (XEN) CPU:    79
      (XEN) RIP:    e008:[<ffff82d0802467dc>] set_timer+0x39/0x1f7
      (XEN) RFLAGS: 0000000000010002   CONTEXT: hypervisor
      <snip>
      (XEN) Xen call trace:
      (XEN)    [<ffff82d0802467dc>] set_timer+0x39/0x1f7
      (XEN)    [<ffff82d08022c1f4>]
      sched_credit.c#csched_tick_resume+0x54/0x59
      (XEN)    [<ffff82d080241dfe>] sched_tick_resume+0x67/0x86
      (XEN)    [<ffff82d0802eda52>] mwait-idle.c#mwait_idle+0x32b/0x357
      (XEN)    [<ffff82d08027939e>] domain.c#idle_loop+0xa6/0xc2
      (XEN)
      (XEN) Pagetable walk from 0000000000000048:
      (XEN)  L4[0x000] = 00000082cfb9c063 ffffffffffffffff
      (XEN)  L3[0x000] = 00000082cfb9b063 ffffffffffffffff
      (XEN)  L2[0x000] = 00000082cfb9a063 ffffffffffffffff
      (XEN)  L1[0x000] = 0000000000000000 ffffffffffffffff
      (XEN)
      (XEN) ****************************************
      (XEN) Panic on CPU 79:
      (XEN) FATAL PAGE FAULT
      (XEN) [error_code=0000]
      (XEN) Faulting linear address: 0000000000000048
      (XEN) ****************************************
      
      The callbacks are used when the cpu is going to or coming from idle in
      order to allow higher C-states.
      
      The credit scheduler knows when it is going to schedule an idle
      scheduling unit or another one after idle, so it can easily stop or
      resume the timer itself removing the need to do so via the callback.
      As this timer handling is done in the main scheduling function the
      scheduler lock is still held, so the race with cpupool operations can
      no longer occur. Note that calling the callbacks from schedule_cpu_rm()
      and schedule_cpu_add() is no longer needed, as the transitions to and
      from idle in the cpupool with credit active will automatically occur
      and do the right thing.
      
      With the last user of the callbacks gone those can be removed.
      Suggested-by: default avatarGeorge Dunlap <george.dunlap@citrix.com>
      Signed-off-by: Juergen Gross's avatarJuergen Gross <jgross@suse.com>
      Reviewed-by: Dario Faggioli's avatarDario Faggioli <dfaggioli@suse.com>
      969f58bd
    • Julien Grall's avatar
      xen/xsm: flask: Check xmalloc_array() return in security_sid_to_context() · 4a647ad1
      Julien Grall authored
      xmalloc_array() may return NULL if there are memory. Rather than trying
      to deference it directly, we should check the return value first.
      
      Coverity-ID: 1381852
      Signed-off-by: default avatarJulien Grall <julien.grall@arm.com>
      Acked-by: default avatarDaniel De Graaf <dgdegra@tycho.nsa.gov>
      Release-acked-by: Juergen Gross's avatarJuergen Gross <jgross@suse.com>
      4a647ad1
    • Julien Grall's avatar
      xen/xsm: flask: Prevent NULL deference in flask_assign_{, dt}device() · 38ad94ac
      Julien Grall authored
      flask_assign_{, dt}device() may be used to check whether you can test if
      a device is assigned. In this case, the domain will be NULL.
      
      However, flask_iommu_resource_use_perm() will be called and may end up
      to deference a NULL pointer. This can be prevented by moving the call
      after we check the validity for the domain pointer.
      
      Coverity-ID: 1486741
      Fixes: 71e617a6 ('use is_iommu_enabled() where appropriate...')
      Signed-off-by: default avatarJulien Grall <julien.grall@arm.com>
      Acked-by: default avatarDaniel De Graaf <dgdegra@tycho.nsa.gov>
      Reviewed-by: default avatarPaul Durrant <paul@xen.org>
      Release-acked-by: Juergen Gross's avatarJuergen Gross <jgross@suse.com>
      38ad94ac
  10. 04 Oct, 2019 3 commits