lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5E59C7DE-9640-4D97-A633-BFFDC4BF1352@amazon.de>
Date:   Mon, 10 Apr 2017 12:28:38 +0000
From:   "Raslan, KarimAllah" <karahmed@...zon.de>
To:     David Vrabel <david.vrabel@...rix.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "xen-devel@...ts.xenproject.org" <xen-devel@...ts.xenproject.org>
CC:     Juergen Gross <jgross@...e.com>,
        Ross Lagerwall <ross.lagerwall@...rix.com>,
        "linux-pci@...r.kernel.org" <linux-pci@...r.kernel.org>,
        "x86@...nel.org" <x86@...nel.org>,
        "Paul Gortmaker" <paul.gortmaker@...driver.com>,
        Julien Grall <julien.grall@...rix.com>,
        Vitaly Kuznetsov <vkuznets@...hat.com>,
        "Ingo Molnar" <mingo@...hat.com>,
        "Liguori, Anthony" <aliguori@...zon.com>,
        "H. Peter Anvin" <hpa@...or.com>,
        Bjorn Helgaas <bhelgaas@...gle.com>,
        "Boris Ostrovsky" <boris.ostrovsky@...cle.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Stefano Stabellini <stefano.stabellini@...citrix.com>
Subject: Re: [Xen-devel] [PATCH] xen: Remove event channel notification
 through Xen PCI platform device

Unfortunately, this commit is potentially a candidate for reverting. After a
lengthy qualification I realized that there is a function called:
"xen_strict_xenbus_quirk()" that is being called in the offending path that
short-circuits the offending code!

So at the moment any domU kernel with this commit will not boot on any Xen
version < 4.0!  So nobody with Xen < 4.0 was complaining not because nobody is
using it but rather because there is a short-circuit in the code that avoids
hitting the offending code in the first place! So the original assumption that
the code is dead might no be 100% correct!

So even though the code for INTx is broken for any Xen > 4.0, the right thing
to do now is to actually fix the INTx properly and completely revert this
commit (actually now also commit da72ff5bfcb0 needs to be reverted to cleanly
revert this commit) to avoid any potential regression.

David,
Does this make sense to you?

I will send a patch to fix INTx shortly as well.

On 9/30/16, 4:46 PM, "David Vrabel" <david.vrabel@...rix.com> wrote:

    On 26/08/16 22:55, KarimAllah Ahmed wrote:
    > Ever since commit 254d1a3f02eb ("xen/pv-on-hvm kexec: shutdown watches
    > from old kernel") using the INTx interrupt from Xen PCI platform device for
    > event channel notification would just lockup the guest during bootup.
    > postcore_initcall now calls xs_reset_watches which will eventually try to read
    > a value from XenStore and will get stuck on read_reply at XenBus forever since
    > the platform driver is not probed yet and its INTx interrupt handler is not
    > registered yet. That means that the guest can not be notified at this moment of
    > any pending event channels and none of the per-event handlers will ever be
    > invoked (including the XenStore one) and the reply will never be picked up by
    > the kernel.
    
    Applied to for-linus-4.9, thanks.
    
    David
    
    
    

Amazon Development Center Germany GmbH
Berlin - Dresden - Aachen
main office: Krausenstr. 38, 10117 Berlin
Geschaeftsfuehrer: Dr. Ralf Herbrich, Christian Schlaeger
Ust-ID: DE289237879
Eingetragen am Amtsgericht Charlottenburg HRB 149173 B

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ