|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [BUGFIX][PATCH v4 0/3] gdbsx: fix 3 bugs
Changes v3 to v4:
Drop patch 1 -- already commited
Drop patch 3 -- Does not need to be in 4.4 as far as I know
Added "Acked-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>" to all 3.
Changes v2 to v3:
From Jan Beulich:
Add else to keep debug log the same.
Changes v1 to v2:
From Konrad Rzeszutek Wilk and Ian Campbell:
??
Split out emacs local variables add to it's own new patch (number 1).
From Andrew Cooper:
What does matter is that the caller of dbg_hvm_va2mfn() should
not have to cleanup a reference taken when it returns an error.
So use his version of the change.
From Ian Campbell:
In all three cases what is missing is the "why" and the
appropriate analysis from
http://wiki.xen.org/wiki/Xen_Roadmap/4.4#Exception_guidelines_for_after_the_code_freeze
i.e. what is the impact of the bug (i..e what are the advantages
of the fix) and what are the risks of this changing causing
further breakage? I'm not really in a position to evaluate the
risk of a change in gdbsx, so someone needs to tell me.
I think given that gdbsx is a somewhat "peripheral" bit of code
and that it is targeted at developers (who might be better able
to tolerate any resulting issues and more able to apply
subsequent fixups than regular users) we can accept a larger
risk than we would with a change to the hypervisor itself etc
(that's assuming that all of these changes cannot potentially
impact non-debugger usecases which I expect is the case from the
function names but I would like to see confirmed).
My take on this below.
From Mukesh Rathor:
Ooopsy... my thought was that an application should not even
look at remain if the hcall/syscall failed, but forgot when
writing the gdbsx itself :). Think of it this way, if the call
didn't even make it to xen, and some reason the ioctl returned
non-zero rc, then remain would still be zero. So I think we
should fix gdbsx instead of here:
Dropped old patch 4, Added new patch 5.
Freeze:
The benefit of this series is that the hypervisor stops calling
panic (debug=y) or hanging (debug=n). Also a person using gdbsx
is not seeing random heap data of gdbsx's heap instead of guest
data.
The risk is that gdbsx does something new wrong.
My understanding is that all the changes here only effect gdbsx
and so very limited in scope.
Release manager requests:
patch 1 and 3 are optional for 4.4.0.
patch 2 should be in 4.4.0
patch 4 and 5 would be good to be in 4.4.0
While tracking down a bug in seabios/grub I found the bug in patch
2.
There are 2 ways that gfn will not be INVALID_GFN and yet mfn will
be INVALID_MFN.
1) p2m_is_readonly(gfntype) and writing memory.
2) the requested vaddr does not exist.
This may only be an issue for a HVM guest that is in real mode
(I.E. no page tables).
Patch 3 is debug logging that was used to find the 2nd way.
Andrew Cooper (1):
dbg_rw_guest_mem: need to call put_gfn in error path.
Don Slutz (2):
xg_read_mem: Report on error.
xg_main: If XEN_DOMCTL_gdbsx_guestmemio fails then force error.
tools/debugger/gdbsx/xg/xg_main.c | 15 +++++++++++----
xen/arch/x86/debug.c | 11 +++++++++--
2 files changed, 20 insertions(+), 6 deletions(-)
--
1.8.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |