Re: [PATCH for-4.14] xen/hypfs: fix loglvl parameter setting

2020-06-11 Thread Julien Grall
On 10/06/2020 22:47, Julien Grall wrote: On Wed, 10 Jun 2020 at 19:49, Jürgen Groß wrote: On 10.06.20 19:55, Julien Grall wrote: Hi Juergen, On 09/06/2020 16:45, Juergen Gross wrote: Writing the runtime parameters loglvl or guest_loglvl omits setting the new length of the resulting param

[linux-linus test] 151016: tolerable FAIL - PUSHED

2020-06-11 Thread osstest service owner
flight 151016 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/151016/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds 12 guest-start fail REGR. vs. 150931 Tests which did not succeed,

Re: [PATCH] libacpi: Widen TPM detection

2020-06-11 Thread Andrew Cooper
On 11/06/2020 04:55, Jason Andryuk wrote: > The hardcoded tpm_signature is too restrictive to detect many TPMs. For > instance, it doesn't accept a QEMU emulated TPM (VID 0x1014 DID 0x0001). > Make the TPM detection match that in rombios which accepts a wider > range. > > With this change, the TPM

[PATCH] x86/boot: use BASEDIR for include path

2020-06-11 Thread Bertrand Marquis
Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the include path to be coherent with the rest of the Makefiles. Signed-off-by: Bertrand Marquis --- xen/arch/x86/boot/build32.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/boot/build32.mk b/xen/ar

[PATCH] xen/arm: Add arm Neoverse N1 processor

2020-06-11 Thread Bertrand Marquis
Add MIDR and CPU part numbers for Arm Neoverse N1 processor Signed-off-by: Bertrand Marquis --- xen/include/asm-arm/processor.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h index aa642e3ab2..3ca67f8157 100644 --- a/xen/in

[PATCH 0/2] xen/arm: Convert runstate address during hypcall

2020-06-11 Thread Bertrand Marquis
This serie is introducing changes to convert runstate address virtual address provided by a guest during the hypercall on Arm. It keeps the current strategy on x86 but moves some of the common code inside the architecture code. The serie is divided in 2 patches to allow an easier review of the spec

[PATCH 1/2] xen/arm: Convert runstate address during hypcall

2020-06-11 Thread Bertrand Marquis
At the moment on Arm, a Linux guest running with KTPI enabled will cause the following error when a context switch happens in user mode: (XEN) p2m.c:1890: d1v0: Failed to walk page-table va 0xff837ebe0cd0 This patch is modifying the register runstate area handling on arm to convert the guest a

[PATCH 2/2] xen/arm: Support runstate crossing pages

2020-06-11 Thread Bertrand Marquis
Add support for runstate area register with the structure crossing pages The code is storing up to 2 pages reference during the hypercall. During a context switch, the code is computing where the state_entry_time is and is breaking the memcpy in 2 parts when it is required. Signed-off-by: Bertrand

RE: [PATCH] libacpi: Widen TPM detection

2020-06-11 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper > Sent: 11 June 2020 12:52 > To: Jason Andryuk ; xen-devel@lists.xenproject.org > Cc: Ian Jackson ; Wei Liu ; Jan > Beulich ; > Paul Durrant > Subject: Re: [PATCH] libacpi: Widen TPM detection > > On 11/06/2020 04:55, Jason Andryuk wrote: > > T

Re: HYPERVISOR_console_io + CONSOLEIO_write needs COPY_flush_dcache

2020-06-11 Thread Oleksandr Andrushchenko
On 6/10/20 3:50 PM, Julien Grall wrote: > On 10/06/2020 09:13, Oleksandr Andrushchenko wrote: >> Hello, > > Hi, > >> While adding support for para-virtualized block device in u-boot >> >> I faced an issue with HYPERVISOR_console_io + CONSOLEIO_write. >> >> I tried to use the hypercall during MMU s

[PATCH] xen: remove redundant initialization of variable irq

2020-06-11 Thread Colin King
From: Colin Ian King The variable irq is being initialized with a value that is never read and it is being updated later with a new value. The initialization is redundant and can be removed. Addresses-Coverity: ("Unused value") Signed-off-by: Colin Ian King --- arch/x86/pci/xen.c | 2 +- 1 fi

Seabios Xen TPM check

2020-06-11 Thread Jason Andryuk
Hi, SeaBIOS commit 67643955c746 (make SeaBios compatible with Xen vTPM.) made tpm_start() exit before calling tpm_startup(). The commit message has no explanation why this change was made. Does anyone remember why it was made? The code today means SeaBIOS will not populate PCRs when running on

Re: HYPERVISOR_console_io + CONSOLEIO_write needs COPY_flush_dcache

2020-06-11 Thread Julien Grall
Hi, On 11/06/2020 13:18, Oleksandr Andrushchenko wrote: On 6/10/20 3:50 PM, Julien Grall wrote: On 10/06/2020 09:13, Oleksandr Andrushchenko wrote: Hello, Hi, While adding support for para-virtualized block device in u-boot I faced an issue with HYPERVISOR_console_io + CONSOLEIO_write.

Re: [PATCH] xen/arm: Add arm Neoverse N1 processor

2020-06-11 Thread Julien Grall
Hi Bertrand, On 11/06/2020 12:54, Bertrand Marquis wrote: Add MIDR and CPU part numbers for Arm Neoverse N1 processor The MIDR and CPU part listed are only there because we need to use them for errata. This is not the list of processors we support :). So I would prefer to introduce the new

Xen Security Advisory 320 v2 (CVE-2020-0543) - Special Register Buffer speculative side channel

2020-06-11 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-0543 / XSA-320 version 2 Special Register Buffer speculative side channel UPDATES IN VERSION 2 Add a link to Intel's cross reference of affect

RE: [PATCH for-4.14] xen/hypfs: fix loglvl parameter setting

2020-06-11 Thread Paul Durrant
> -Original Message- > From: Julien Grall > Sent: 11 June 2020 10:20 > To: Julien Grall ; Jürgen Groß ; > Paul Durrant > > Cc: xen-devel ; Andrew Cooper > ; George > Dunlap ; Ian Jackson ; > Jan Beulich > ; Stefano Stabellini ; Wei Liu > > Subject: Re: [PATCH for-4.14] xen/hypfs: fix

Re: [Xen-devel] [PATCH v6 00/12] livepatch: new features and fixes

2020-06-11 Thread George Dunlap
On Tue, Nov 26, 2019 at 10:14 AM Pawel Wieczorkiewicz wrote: > This series introduces new features to the livepatch functionality as > briefly discussed during Xen Developer Summit 2019: [a] and [b]. > It also provides a few fixes and some small improvements. > > Main changes in v6: > - Added mis

Re: Seabios Xen TPM check

2020-06-11 Thread Stefan Berger
On 6/11/20 8:36 AM, Jason Andryuk wrote: Hi, SeaBIOS commit 67643955c746 (make SeaBios compatible with Xen vTPM.) made tpm_start() exit before calling tpm_startup(). The commit message has no explanation why this change was made. Does anyone remember why it was made? The code today means SeaB

Re: [PATCH] xen/arm: Add arm Neoverse N1 processor

2020-06-11 Thread Bertrand Marquis
> On 11 Jun 2020, at 14:09, Julien Grall wrote: > > Hi Bertrand, > > On 11/06/2020 12:54, Bertrand Marquis wrote: >> Add MIDR and CPU part numbers for Arm Neoverse N1 processor > > The MIDR and CPU part listed are only there because we need to use them for > errata. This is not the list of

Re: Kexec and libxenctlr.so

2020-06-11 Thread Jürgen Groß
On 11.06.20 16:57, Julien Grall wrote: Hi all, kexec-tools has an option to load dynamically libxenctlr.so (not .so.4.x) (see [1]). Given that the library has never been considered stable, it is probably a disaster that is waiting to happen. Looking at the tree kexec is using the follow li

Re: [PATCH] tools/libxengnttab: correct size of allocated memory

2020-06-11 Thread Jürgen Groß
On 20.05.20 17:56, Roger Pau Monné wrote: On Wed, May 20, 2020 at 03:49:59PM +0100, Ian Jackson wrote: Juergen Gross writes ("[PATCH] tools/libxengnttab: correct size of allocated memory"): The size of the memory allocated for the IOCTL_GNTDEV_MAP_GRANT_REF ioctl() parameters is calculated wro

Re: Kexec and libxenctlr.so

2020-06-11 Thread Julien Grall
Hi, On 11/06/2020 16:21, Jürgen Groß wrote: On 11.06.20 16:57, Julien Grall wrote: Hi all, kexec-tools has an option to load dynamically libxenctlr.so (not .so.4.x) (see [1]). Given that the library has never been considered stable, it is probably a disaster that is waiting to happen. Lo

Re: Kexec and libxenctlr.so

2020-06-11 Thread Jürgen Groß
On 11.06.20 17:27, Julien Grall wrote: Hi, On 11/06/2020 16:21, Jürgen Groß wrote: On 11.06.20 16:57, Julien Grall wrote: Hi all, kexec-tools has an option to load dynamically libxenctlr.so (not .so.4.x) (see [1]). Given that the library has never been considered stable, it is probably a

Re: Kexec and libxenctlr.so

2020-06-11 Thread Julien Grall
On 11/06/2020 16:35, Jürgen Groß wrote: On 11.06.20 17:27, Julien Grall wrote: Hi, On 11/06/2020 16:21, Jürgen Groß wrote: On 11.06.20 16:57, Julien Grall wrote: Hi all, kexec-tools has an option to load dynamically libxenctlr.so (not .so.4.x) (see [1]). Given that the library has neve

RE: [PATCH] tools/libxengnttab: correct size of allocated memory

2020-06-11 Thread Paul Durrant
> -Original Message- > From: Xen-devel On Behalf Of Jürgen > Groß > Sent: 11 June 2020 16:26 > To: Roger Pau Monné ; Ian Jackson > > Cc: xen-devel@lists.xenproject.org; Wei Liu > Subject: Re: [PATCH] tools/libxengnttab: correct size of allocated memory > > On 20.05.20 17:56, Roger Pau

Re: [PATCH] x86/boot: use BASEDIR for include path

2020-06-11 Thread Andrew Cooper
On 11/06/2020 12:54, Bertrand Marquis wrote: > Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the > include path to be coherent with the rest of the Makefiles. > > Signed-off-by: Bertrand Marquis Does something subtle break before this change? ~Andrew > --- > xen/arch/x86/boot/b

Re: [PATCH for-4.14 v2 2/2] x86/passthrough: introduce a flag for GSIs not requiring an EOI or unmask

2020-06-11 Thread Andrew Cooper
On 10/06/2020 15:29, Roger Pau Monne wrote: > There's no need to setup a timer for GSIs that are edge triggered, > since those don't require any EIO or unmask, and hence couldn't block > other interrupts. > > Note this is only used by PVH dom0, that can setup the passthrough of > edge triggered int

Re: [PATCH] x86/boot: use BASEDIR for include path

2020-06-11 Thread Bertrand Marquis
Hi Andrew, > On 11 Jun 2020, at 17:24, Andrew Cooper wrote: > > On 11/06/2020 12:54, Bertrand Marquis wrote: >> Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the >> include path to be coherent with the rest of the Makefiles. >> >> Signed-off-by: Bertrand Marquis > > Does somet

RE: [PATCH for-4.14 v2 2/2] x86/passthrough: introduce a flag for GSIs not requiring an EOI or unmask

2020-06-11 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper > Sent: 11 June 2020 17:26 > To: Roger Pau Monne ; xen-devel@lists.xenproject.org > Cc: p...@xen.org; Jan Beulich ; Wei Liu > Subject: Re: [PATCH for-4.14 v2 2/2] x86/passthrough: introduce a flag for > GSIs not requiring an EOI > or unmask > >

Re: [PATCH] x86/boot: use BASEDIR for include path

2020-06-11 Thread Andrew Cooper
On 11/06/2020 17:50, Bertrand Marquis wrote: > Hi Andrew, > >> On 11 Jun 2020, at 17:24, Andrew Cooper wrote: >> >> On 11/06/2020 12:54, Bertrand Marquis wrote: >>> Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the >>> include path to be coherent with the rest of the Makefiles. >>>

Re: [PATCH 1/2] xen/arm: Convert runstate address during hypcall

2020-06-11 Thread Stefano Stabellini
On Thu, 11 Jun 2020, Bertrand Marquis wrote: > At the moment on Arm, a Linux guest running with KTPI enabled will > cause the following error when a context switch happens in user mode: > (XEN) p2m.c:1890: d1v0: Failed to walk page-table va 0xff837ebe0cd0 > > This patch is modifying the regist

Re: [PATCH 1/2] xen/arm: Convert runstate address during hypcall

2020-06-11 Thread Julien Grall
> > +return -EINVAL; > > } > > > > -__copy_to_guest(runstate_guest(v), &runstate, 1); > > +v->arch.runstate_guest.page = page; > > +v->arch.runstate_guest.offset = offset; > > + > > +spin_unlock(&v->arch.runstate_guest.lock); > > + > > +return 0; > > +} > > + > > +

Re: [PATCH 1/2] xen/arm: Convert runstate address during hypcall

2020-06-11 Thread Stefano Stabellini
On Thu, 11 Jun 2020, Julien Grall wrote: > > > +return -EINVAL; > > > } > > > > > > -__copy_to_guest(runstate_guest(v), &runstate, 1); > > > +v->arch.runstate_guest.page = page; > > > +v->arch.runstate_guest.offset = offset; > > > + > > > +spin_unlock(&v->arch.runstate_

[xen-unstable-smoke test] 151049: tolerable all pass - PUSHED

2020-06-11 Thread osstest service owner
flight 151049 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/151049/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH v1] kdd: remove zero-length arrays

2020-06-11 Thread Olaf Hering
Am Wed, 10 Jun 2020 20:16:57 +0100 schrieb Tim Deegan : > How tedious. Indeed. This compiles for me as well: --- orig/kdd.h 2020-06-08 17:40:05.0 + +++ kdd.h 2020-06-11 19:00:44.234364040 + @@ -68,7 +68,6 @@ uint16_t len; /* Payload length, excl. header and traili

Re: [PATCH 1/2] xen/arm: Convert runstate address during hypcall

2020-06-11 Thread Julien Grall
Hi Stefano, On 11/06/2020 19:50, Stefano Stabellini wrote: On Thu, 11 Jun 2020, Julien Grall wrote: +return -EINVAL; } -__copy_to_guest(runstate_guest(v), &runstate, 1); +v->arch.runstate_guest.page = page; +v->arch.runstate_guest.offset = offset; + +spin_unlock(&

[xen-unstable test] 151021: regressions - FAIL

2020-06-11 Thread osstest service owner
flight 151021 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/151021/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-libvirt 6 libvirt-buildfail REGR. vs. 150963 Tests which did no

[xen-unstable-smoke test] 151050: tolerable all pass - PUSHED

2020-06-11 Thread osstest service owner
flight 151050 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/151050/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[ovmf test] 151024: regressions - FAIL

2020-06-11 Thread osstest service owner
flight 151024 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/151024/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 150978 version targeted for testi

[linux-5.4 test] 151022: tolerable FAIL - PUSHED

2020-06-11 Thread osstest service owner
flight 151022 linux-5.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/151022/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 150912 Tests which did not succeed, b

[xen-4.9-testing test] 151036: regressions - FAIL

2020-06-11 Thread osstest service owner
flight 151036 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/151036/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm 6 xen-buildfail REGR. vs. 150120 build-i386

[RFC PATCH v1 3/6] sched, credit2: improve scheduler fairness

2020-06-11 Thread Volodymyr Babchuk
Now we can make corrections for scheduling unit run time, based on data gathered in previous patches. This includes time spent in IRQ handlers and time spent for hypervisor housekeeping tasks. Those time spans needs to be deduced from a total run time. This patch adds sched_get_time_correction() f

[RFC PATCH v1 4/6] xentop: collect IRQ and HYP time statistics.

2020-06-11 Thread Volodymyr Babchuk
As scheduler code now collects time spent in IRQ handlers and in do_softirq(), we can present those values to userspace tools like xentop, so system administrator can see how system behaves. We are updating counters only in sched_get_time_correction() function to minimize number of taken spinlocks

[RFC PATCH v1 1/6] sched: track time spent in IRQ handler

2020-06-11 Thread Volodymyr Babchuk
Add code that saves time spent in IRQ handler, so later we can make adjustments to schedule unit run time. This and following changes are called upon to provide fair scheduling. Problem is that any running vCPU can be interrupted by to handle IRQ which is bound to some other vCPU. Thus, current vC

[RFC PATCH v1 6/6] trace: add fair scheduling trace events

2020-06-11 Thread Volodymyr Babchuk
We are tracing each IRQ or HYP mode change and the calculated time adjustment values. Signed-off-by: Volodymyr Babchuk --- tools/xentrace/xenalyze.c | 37 + xen/common/sched/core.c| 9 + xen/include/public/trace.h | 5 + 3 files changed, 51

[RFC PATCH v1 2/6] sched: track time spent in hypervisor tasks

2020-06-11 Thread Volodymyr Babchuk
In most cases hypervisor code performs guest-related jobs. Tasks like hypercall handling or MMIO access emulation are done for calling vCPU so it is okay to charge time spent in hypervisor to the current vCPU. But, there are also tasks that are not originated from guests. This includes things like

[RFC PATCH v1 5/6] tools: xentop: show time spent in IRQ and HYP states.

2020-06-11 Thread Volodymyr Babchuk
xentop show the values in the header like this: IRQ Time 0.2s0.0% HYP Time 1.3s0.1% The first value is the total time spent in corresponding mode, the second value is the instant load percentage, similar to vCPU load value. "IRQ" corresponds to time spent in IRQ handler. "HYP" is the tim

[RFC PATCH v1 0/6] Fair scheduling

2020-06-11 Thread Volodymyr Babchuk
There was number of discussions about fair scheduling, including latest one at [1]. In a nutshell, schedulers don't know when pCPU is doing guest-related work or when it is busy with something else, like running tasklets. All time spent between two calls to schedule() is being charged to active vC

Re: [PATCH 1/2] xen/arm: Convert runstate address during hypcall

2020-06-11 Thread Stefano Stabellini
On Thu, 11 Jun 2020, Julien Grall wrote: > Hi Stefano, > > On 11/06/2020 19:50, Stefano Stabellini wrote: > > On Thu, 11 Jun 2020, Julien Grall wrote: > > > > > +return -EINVAL; > > > > > } > > > > > > > > > > -__copy_to_guest(runstate_guest(v), &runstate, 1); > > > > > +v->

Re: [PATCH 2/2] xen/arm: Support runstate crossing pages

2020-06-11 Thread Stefano Stabellini
On Thu, 11 Jun 2020, Bertrand Marquis wrote: > Add support for runstate area register with the structure crossing pages > The code is storing up to 2 pages reference during the hypercall. > During a context switch, the code is computing where the > state_entry_time is and is breaking the memcpy in

Re: HYPERVISOR_console_io + CONSOLEIO_write needs COPY_flush_dcache

2020-06-11 Thread Stefano Stabellini
On Thu, 11 Jun 2020, Julien Grall wrote: > > Probably my use-case should be somewhere documented, so another time someone > > steps into similar issues it is explained. > > You would have the exact same issue if you don't use hypercalls but modify a > buffer with MMU off and then expect it to read

Re: Seabios Xen TPM check

2020-06-11 Thread Jason Andryuk
On Thu, Jun 11, 2020 at 10:32 AM Stefan Berger wrote: > > On 6/11/20 8:36 AM, Jason Andryuk wrote: > > Hi, > > > > SeaBIOS commit 67643955c746 (make SeaBios compatible with Xen vTPM.) > > made tpm_start() exit before calling tpm_startup(). The commit > > message has no explanation why this change

[xen-unstable-smoke test] 151053: tolerable all pass - PUSHED

2020-06-11 Thread osstest service owner
flight 151053 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/151053/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: Kexec and libxenctlr.so

2020-06-11 Thread Jürgen Groß
On 11.06.20 18:00, Julien Grall wrote: On 11/06/2020 16:35, Jürgen Groß wrote: On 11.06.20 17:27, Julien Grall wrote: Hi, On 11/06/2020 16:21, Jürgen Groß wrote: On 11.06.20 16:57, Julien Grall wrote: Hi all, kexec-tools has an option to load dynamically libxenctlr.so (not .so.4.x) (see

[xen-4.12-testing test] 151032: regressions - FAIL

2020-06-11 Thread osstest service owner
flight 151032 xen-4.12-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/151032/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-prev 6 xen-buildfail REGR. vs. 150176 build-amd64-pr

Re: [RFC PATCH v1 1/6] sched: track time spent in IRQ handler

2020-06-11 Thread Jürgen Groß
On 12.06.20 02:22, Volodymyr Babchuk wrote: Add code that saves time spent in IRQ handler, so later we can make adjustments to schedule unit run time. This and following changes are called upon to provide fair scheduling. Problem is that any running vCPU can be interrupted by to handle IRQ which

Re: [RFC PATCH v1 2/6] sched: track time spent in hypervisor tasks

2020-06-11 Thread Jürgen Groß
On 12.06.20 02:22, Volodymyr Babchuk wrote: In most cases hypervisor code performs guest-related jobs. Tasks like hypercall handling or MMIO access emulation are done for calling vCPU so it is okay to charge time spent in hypervisor to the current vCPU. But, there are also tasks that are not ori

Re: [RFC PATCH v1 3/6] sched, credit2: improve scheduler fairness

2020-06-11 Thread Jürgen Groß
On 12.06.20 02:22, Volodymyr Babchuk wrote: Now we can make corrections for scheduling unit run time, based on data gathered in previous patches. This includes time spent in IRQ handlers and time spent for hypervisor housekeeping tasks. Those time spans needs to be deduced from a total run time.

Re: [RFC PATCH v1 4/6] xentop: collect IRQ and HYP time statistics.

2020-06-11 Thread Jürgen Groß
On 12.06.20 02:22, Volodymyr Babchuk wrote: As scheduler code now collects time spent in IRQ handlers and in do_softirq(), we can present those values to userspace tools like xentop, so system administrator can see how system behaves. We are updating counters only in sched_get_time_correction()

[GIT PULL] xen: branch for v5.8-rc1

2020-06-11 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-5.8b-rc1-tag xen: branch for v5.8-rc1 It contains the following patches: - several smaller cleanups - a fix for a Xen guest regression with CPU offlining - a small fix in the xen p