All of lore.kernel.org
 help / color / mirror / Atom feed
* Backports for Xen 4.6
@ 2016-01-18 15:53 Andrew Cooper
  2016-01-19 13:43 ` Ian Jackson
                   ` (2 more replies)
  0 siblings, 3 replies; 8+ messages in thread
From: Andrew Cooper @ 2016-01-18 15:53 UTC (permalink / raw)
  To: Jan Beulich, Ian Jackson; +Cc: Xen Security, Xen-devel List

Hi,

Looking at the XenServer patch queue, I have a few nominations for
backports.

Hypervisor:
22a1fbb575df "x86/hvm: make sure stdvga cache cannot be re-enabled"
0747bc8b4d85 "x86/vmx: Fix injection of #DB traps following XSA-156"

Possibly also:
42940c046902 "x86/shadow: Fix missing newline in dprintk()"
6851e979874e "VT-d: use proper error codes in iommu_enable_x2apic_IR()"
0ce647ad6f70 "x86: suppress bogus log message"
484c14b7254e "x86/vmx: enable PML by default"

Toolstack:
82ff7cbed64e "oxenstored: Quota.merge: don't assume domain already exists"
8a2c11f876e6 "tools/ocaml/xb: Correct calculations of data/space the ring"

In particular, the advisory for XSA-156 needs re-issuing with c/s
0747bc8b4d85 folded in.

~Andrew

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Backports for Xen 4.6
  2016-01-18 15:53 Backports for Xen 4.6 Andrew Cooper
@ 2016-01-19 13:43 ` Ian Jackson
  2016-01-19 14:24   ` Andrew Cooper
  2016-01-20 12:29 ` Jan Beulich
  2016-01-20 18:32 ` Andrew Cooper
  2 siblings, 1 reply; 8+ messages in thread
From: Ian Jackson @ 2016-01-19 13:43 UTC (permalink / raw)
  To: Andrew Cooper; +Cc: Xen Security, Jan Beulich, Xen-devel List

Andrew Cooper writes ("Backports for Xen 4.6"):
> Toolstack:
> 82ff7cbed64e "oxenstored: Quota.merge: don't assume domain already exists"
> 8a2c11f876e6 "tools/ocaml/xb: Correct calculations of data/space the ring"

I have applied these to 4.6 and 4.5.

They didn't apply cleanly to 4.4.  If someone wants to check if
they're relevant and supply backport(s), I would apply them.

Thanks,
Ian.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Backports for Xen 4.6
  2016-01-19 13:43 ` Ian Jackson
@ 2016-01-19 14:24   ` Andrew Cooper
  0 siblings, 0 replies; 8+ messages in thread
From: Andrew Cooper @ 2016-01-19 14:24 UTC (permalink / raw)
  To: Ian Jackson; +Cc: Xen Security, Jan Beulich, Xen-devel List

On 19/01/16 13:43, Ian Jackson wrote:
> Andrew Cooper writes ("Backports for Xen 4.6"):
>> Toolstack:
>> 82ff7cbed64e "oxenstored: Quota.merge: don't assume domain already exists"
>> 8a2c11f876e6 "tools/ocaml/xb: Correct calculations of data/space the ring"
> I have applied these to 4.6 and 4.5.

Thanks.

~Andrew

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Backports for Xen 4.6
  2016-01-18 15:53 Backports for Xen 4.6 Andrew Cooper
  2016-01-19 13:43 ` Ian Jackson
@ 2016-01-20 12:29 ` Jan Beulich
  2016-01-20 13:14   ` Andrew Cooper
  2016-01-20 18:32 ` Andrew Cooper
  2 siblings, 1 reply; 8+ messages in thread
From: Jan Beulich @ 2016-01-20 12:29 UTC (permalink / raw)
  To: Andrew Cooper; +Cc: Ian Jackson, Xen-devel List

>>> On 18.01.16 at 16:53, <andrew.cooper3@citrix.com> wrote:
> Possibly also:
> 42940c046902 "x86/shadow: Fix missing newline in dprintk()"

The affected statement compiles to nothing in a release build, which
can be taken as an argument both ways. I lean towards not putting
it in.

> 6851e979874e "VT-d: use proper error codes in iommu_enable_x2apic_IR()"

Since I had pulled this into our own tree already, and since you're
now also viewing this as useful, I guess I will throw it in.

> 0ce647ad6f70 "x86: suppress bogus log message"

This being a purely cosmetic change, may I ask for the reason
you consider this a backport candidate?

> 484c14b7254e "x86/vmx: enable PML by default"

Not in a point release I would say.

Jan

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Backports for Xen 4.6
  2016-01-20 12:29 ` Jan Beulich
@ 2016-01-20 13:14   ` Andrew Cooper
  2016-01-20 15:09     ` Doug Goldstein
  0 siblings, 1 reply; 8+ messages in thread
From: Andrew Cooper @ 2016-01-20 13:14 UTC (permalink / raw)
  To: Jan Beulich; +Cc: Ian Jackson, Xen-devel List

On 20/01/16 12:29, Jan Beulich wrote:
>>>> On 18.01.16 at 16:53, <andrew.cooper3@citrix.com> wrote:
>> Possibly also:
>> 42940c046902 "x86/shadow: Fix missing newline in dprintk()"
> The affected statement compiles to nothing in a release build, which
> can be taken as an argument both ways. I lean towards not putting
> it in.
>
>> 6851e979874e "VT-d: use proper error codes in iommu_enable_x2apic_IR()"
> Since I had pulled this into our own tree already, and since you're
> now also viewing this as useful, I guess I will throw it in.
>
>> 0ce647ad6f70 "x86: suppress bogus log message"
> This being a purely cosmetic change, may I ask for the reason
> you consider this a backport candidate?

The shear volume reduction in debug builds.

XenServer ships both a release and a debug hypervisor for first-line
triage of customer issues.  As such, "only affecting a debug build"
isn't a relevant consideration for us, and I expect we are not alone here.

~Andrew

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Backports for Xen 4.6
  2016-01-20 13:14   ` Andrew Cooper
@ 2016-01-20 15:09     ` Doug Goldstein
  0 siblings, 0 replies; 8+ messages in thread
From: Doug Goldstein @ 2016-01-20 15:09 UTC (permalink / raw)
  To: Andrew Cooper, Jan Beulich; +Cc: Ian Jackson, Xen-devel List


[-- Attachment #1.1: Type: text/plain, Size: 1228 bytes --]

On 1/20/16 7:14 AM, Andrew Cooper wrote:
> On 20/01/16 12:29, Jan Beulich wrote:
>>>>> On 18.01.16 at 16:53, <andrew.cooper3@citrix.com> wrote:
>>> Possibly also:
>>> 42940c046902 "x86/shadow: Fix missing newline in dprintk()"
>> The affected statement compiles to nothing in a release build, which
>> can be taken as an argument both ways. I lean towards not putting
>> it in.
>>
>>> 6851e979874e "VT-d: use proper error codes in iommu_enable_x2apic_IR()"
>> Since I had pulled this into our own tree already, and since you're
>> now also viewing this as useful, I guess I will throw it in.
>>
>>> 0ce647ad6f70 "x86: suppress bogus log message"
>> This being a purely cosmetic change, may I ask for the reason
>> you consider this a backport candidate?
> 
> The shear volume reduction in debug builds.
> 
> XenServer ships both a release and a debug hypervisor for first-line
> triage of customer issues.  As such, "only affecting a debug build"
> isn't a relevant consideration for us, and I expect we are not alone here.
> 
> ~Andrew
> 

I will likely locally backport this one myself if it doesn't land in
4.6.1 because we too have a debug variant and a release variant.

-- 
Doug Goldstein


[-- Attachment #1.2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 959 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Backports for Xen 4.6
  2016-01-18 15:53 Backports for Xen 4.6 Andrew Cooper
  2016-01-19 13:43 ` Ian Jackson
  2016-01-20 12:29 ` Jan Beulich
@ 2016-01-20 18:32 ` Andrew Cooper
  2016-01-21  7:37   ` Jan Beulich
  2 siblings, 1 reply; 8+ messages in thread
From: Andrew Cooper @ 2016-01-20 18:32 UTC (permalink / raw)
  To: Jan Beulich; +Cc: Xen-devel List, Xen Security

On 18/01/16 15:53, Andrew Cooper wrote:
> Hi,
>
> Looking at the XenServer patch queue, I have a few nominations for
> backports.
>
> Hypervisor:
> 22a1fbb575df "x86/hvm: make sure stdvga cache cannot be re-enabled"

This patch appears to have been missed in the latest round of backports.

It causes guest console corruption when an HVM guest restarts its
graphics drivers.

~Andrew

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Backports for Xen 4.6
  2016-01-20 18:32 ` Andrew Cooper
@ 2016-01-21  7:37   ` Jan Beulich
  0 siblings, 0 replies; 8+ messages in thread
From: Jan Beulich @ 2016-01-21  7:37 UTC (permalink / raw)
  To: Andrew Cooper; +Cc: Xen Security, Xen-devel List

>>> On 20.01.16 at 19:32, <andrew.cooper3@citrix.com> wrote:
> On 18/01/16 15:53, Andrew Cooper wrote:
>> Looking at the XenServer patch queue, I have a few nominations for
>> backports.
>>
>> Hypervisor:
>> 22a1fbb575df "x86/hvm: make sure stdvga cache cannot be re-enabled"
> 
> This patch appears to have been missed in the latest round of backports.
> 
> It causes guest console corruption when an HVM guest restarts its
> graphics drivers.

Oops - I had pulled it into my queue, but with the queue ordered by
time I then overlooked it when committing the pieces. Will do together
with the vPMU ones requested by Boris.

Jan

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2016-01-21  7:37 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-01-18 15:53 Backports for Xen 4.6 Andrew Cooper
2016-01-19 13:43 ` Ian Jackson
2016-01-19 14:24   ` Andrew Cooper
2016-01-20 12:29 ` Jan Beulich
2016-01-20 13:14   ` Andrew Cooper
2016-01-20 15:09     ` Doug Goldstein
2016-01-20 18:32 ` Andrew Cooper
2016-01-21  7:37   ` Jan Beulich

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.