Re: [Xen-devel] [Planning for Xen-4.6] Migration v2

2014-11-27 Thread Hongyang Yang
在 11/26/2014 03:54 AM, Andrew Cooper 写道: Hello, The purpose of this email is to plan how to progress the migrationv2 series through to being merged. I believe I have CC'd everyone with a specific interest in this area, but apologies if I have missed anyone. Migration v2 is in exclusive use

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Jan Beulich
On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote: My v1 patch only fixes the VMX side of things. SVM doesn't explicitly identify a failed vmentry and lets it fall into the default case of the vmexit handler. As such, with v1, the infinite loop still affects AMD hardware. Right; I

Re: [Xen-devel] [Planning for Xen-4.6] Migration v2

2014-11-27 Thread Ian Campbell
On Wed, 2014-11-26 at 17:39 +, Andrew Cooper wrote: IMHO this is fine. It essentially means that for xl users there is some delayed gratification wrt the promise of migration between non-alike dom0s. The migration from 4.5(legacy)-4.6(v2) won't support such migrations, but the next

Re: [Xen-devel] [PATCH RFCv3 3/8] xen: introduce XEN_DOMCTL_set_recipient

2014-11-27 Thread Jan Beulich
On 25.11.14 at 18:10, vkuzn...@redhat.com wrote: Jan Beulich jbeul...@suse.com writes: On 25.11.14 at 16:41, vkuzn...@redhat.com wrote: Jan Beulich jbeul...@suse.com writes: On 07.10.14 at 15:10, vkuzn...@redhat.com wrote: @@ -1764,11 +1765,28 @@ void free_domheap_pages(struct page_info

Re: [Xen-devel] [PATCH for-4.5] tools/oxenstored: Fix | vs error in fd event handling

2014-11-27 Thread Ian Campbell
On Wed, 2014-11-26 at 19:03 +, Andrew Cooper wrote: On 26/11/14 18:41, Konrad Rzeszutek Wilk wrote: On Wed, Nov 26, 2014 at 06:24:11PM +, Dave Scott wrote: On 26 Nov 2014, at 15:38, Zheng Li d...@zheng.li wrote: On 26/11/2014 15:09, Andrew Cooper wrote: This makes fields 0 and 1

Re: [Xen-devel] [PATCH v15 11/21] x86/VPMU: Interface for setting PMU mode and flags

2014-11-27 Thread Jan Beulich
On 26.11.14 at 15:32, boris.ostrov...@oracle.com wrote: On 11/25/2014 08:49 AM, Jan Beulich wrote: On 17.11.14 at 00:07, boris.ostrov...@oracle.com wrote: @@ -244,19 +256,19 @@ void vpmu_initialise(struct vcpu *v) switch ( vendor ) { case X86_VENDOR_AMD: -if (

Re: [Xen-devel] [PATCH v15 17/21] x86/VPMU: Handle PMU interrupts for PV guests

2014-11-27 Thread Jan Beulich
On 26.11.14 at 15:39, boris.ostrov...@oracle.com wrote: On 11/25/2014 09:28 AM, Jan Beulich wrote: +else +{ +struct segment_register seg; + +hvm_get_segment_register(sampled, x86_seg_cs, seg); +r-cs = seg.sel; +

Re: [Xen-devel] Regression, host crash with 4.5rc1

2014-11-27 Thread Jan Beulich
On 27.11.14 at 06:29, sfl...@ihonk.com wrote: On 11/25/2014 03:00 AM, Jan Beulich wrote: Okay, so it's not really the mwait-idle driver causing the regression, but it is C-state related. Hence we're now down to seeing whether all or just the deeper C states are affected, i.e. I now need to

Re: [Xen-devel] segv in osevent_release_nexus with libxl backend to libvirt

2014-11-27 Thread Ian Campbell
On Wed, 2014-11-26 at 17:38 +, Ian Jackson wrote: Ian Campbell writes (Re: [Xen-devel] segv in osevent_release_nexus with libxl backend to libvirt): I don't know if this helps but on the 3 occasions I've just looked at the ev passed to libxl__ev_fd_deregister contains an fd which

Re: [Xen-devel] Q77 IGD instantly crashes on xen-pciback bind.

2014-11-27 Thread Dr. Greg Wettstein
On Nov 24, 1:28pm, Pasi =?iso-8859-1?Q?K=E4rkk=E4inen?= wrote: Hello, Hi, hope the week is going well for everyone. As I was walking out the door I remembered I had been delinquent with information. The dom0 kernel is 32-bit 3.14.22 straight from kernel.org under a 64-bit hypervisor

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Ian Campbell
On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: ARMv8 model may not disable correctly the timer interrupt when Xen correct disable context switch to an idle vCPU. Therefore Xen may receive a spurious context switches and s/spurious/unexpected/ (since spurious has a specific meaning in

Re: [Xen-devel] [PATCH] xsm/flask: improve unknown permission handling

2014-11-27 Thread Jan Beulich
On 25.11.14 at 19:05, dgde...@tycho.nsa.gov wrote: --- a/xen/xsm/flask/hooks.c +++ b/xen/xsm/flask/hooks.c @@ -135,6 +135,19 @@ static int get_irq_sid(int irq, u32 *sid, struct avc_audit_data *ad) return 0; } +static int avc_unknown_permission(const char* name, int id) const

Re: [Xen-devel] [Qemu-devel] [PATCH] increase maxmem before calling xc_domain_populate_physmap

2014-11-27 Thread Stefano Stabellini
On Wed, 26 Nov 2014, Don Slutz wrote: On 11/26/14 13:17, Stefano Stabellini wrote: On Tue, 25 Nov 2014, Andrew Cooper wrote: On 25/11/14 17:45, Stefano Stabellini wrote: Increase maxmem before calling xc_domain_populate_physmap_exact to avoid the risk of running out of guest memory.

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Stefano Stabellini
On Thu, 27 Nov 2014, Ian Campbell wrote: On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: ARMv8 model may not disable correctly the timer interrupt when Xen correct disable context switch to an idle vCPU. Therefore Xen may receive a spurious context switches and

[Xen-devel] Xenstore.h clarifications

2014-11-27 Thread Razvan Cojocaru
Hello, I know that xc_interface_open() can be safely called several times from the same process, and that several processes can each have a bunch of xc_interface handles open, and that I shouldn't use an xc_interface inherited from the parent in a child process, because xenctrl.h says so. Is it

[Xen-devel] [PATCH for-4.5] docs/commandline: Refresh document for 4.5

2014-11-27 Thread Andrew Cooper
* Add options whose code has been committed (without a patch to this file). * Remove options which have been deleted (without a patch to this file). * Tweak some formatting for consistency. * Nuke some trailing whitespace. I believe this document now identifies the exact set of command line

Re: [Xen-devel] kdump with xen-unstable on efi machine

2014-11-27 Thread Andrew Cooper
On 27/11/14 09:49, Ian Campbell wrote: On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote: libxc (or some new alternative) should suck it up and gain some notion of a stable API or ABI (like the rest of the world appears to be able to manage), such that it is possible to compile with an

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Jan Beulich
On 27.11.14 at 11:26, t...@xen.org wrote: At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote: My v1 patch only fixes the VMX side of things. SVM doesn't explicitly identify a failed vmentry and lets it fall into the default case

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Andrew Cooper
On 27/11/14 11:16, Jan Beulich wrote: On 27.11.14 at 11:26, t...@xen.org wrote: At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote: My v1 patch only fixes the VMX side of things. SVM doesn't explicitly identify a failed vmentry and

Re: [Xen-devel] kdump with xen-unstable on efi machine

2014-11-27 Thread Ian Campbell
On Thu, 2014-11-27 at 11:05 +, Andrew Cooper wrote: On 27/11/14 09:49, Ian Campbell wrote: On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote: libxc (or some new alternative) should suck it up and gain some notion of a stable API or ABI (like the rest of the world appears to be able

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Jan Beulich
On 27.11.14 at 12:29, t...@xen.org wrote: At 11:16 + on 27 Nov (1417083414), Jan Beulich wrote: On 27.11.14 at 11:26, t...@xen.org wrote: At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote: My v1 patch only fixes the VMX

[Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread George Dunlap
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I agree to the conditions in the XenProject Coverity contribution guidelines [1]. I'm a developer working for Citrix Systems UK, Ltd. I've been active in the Xen community since 2006; I was release coordinator for the 4.3 and 4.4 releases, and I

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Tim Deegan
At 11:38 + on 27 Nov (1417084691), Jan Beulich wrote: On 27.11.14 at 12:29, t...@xen.org wrote: At 11:16 + on 27 Nov (1417083414), Jan Beulich wrote: On 27.11.14 at 11:26, t...@xen.org wrote: At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: On 26.11.14 at 18:43,

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread Andrew Cooper
On 27/11/14 11:39, George Dunlap wrote: I agree to the conditions in the XenProject Coverity contribution guidelines [1]. I'm a developer working for Citrix Systems UK, Ltd. I've been active in the Xen community since 2006; I was release coordinator for the 4.3 and 4.4 releases, and I am

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread Tim Deegan
At 11:39 + on 27 Nov (1417084797), George Dunlap wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I agree to the conditions in the XenProject Coverity contribution guidelines [1]. I'm a developer working for Citrix Systems UK, Ltd. I've been active in the Xen community since

[Xen-devel] Xen Security Advisory 111 (CVE-2014-8866) - Excessive checking in compatibility mode hypercall argument translation

2014-11-27 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-8866 / XSA-111 version 3 Excessive checking in compatibility mode hypercall argument translation UPDATES IN VERSION 3 Public release. ISSUE

[Xen-devel] Xen Security Advisory 112 (CVE-2014-8867) - Insufficient bounding of REP MOVS to MMIO emulated inside the hypervisor

2014-11-27 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-8867 / XSA-112 version 5 Insufficient bounding of REP MOVS to MMIO emulated inside the hypervisor UPDATES IN VERSION 5 Public release. ISSUE

[Xen-devel] [PATCH for-4.5 1/3] python/xc: Fix multiple issues in pyflask_context_to_sid()

2014-11-27 Thread Andrew Cooper
The error handling from a failed memory allocation should return PyErr_SetFromErrno(xc_error_obj); rather than simply calling it and continuing to the memcpy() below, with the dest pointer being NULL. Furthermore, the context string is simply an input parameter to the hypercall, and is not

[Xen-devel] [PATCH for-4.5 3/3] python/xs: Correct the indirection of the NULL xshandle() check

2014-11-27 Thread Andrew Cooper
The code now now matches its comment, and will actually catch the case of a bad xs handle. Signed-off-by: Andrew Cooper andrew.coop...@citrix.com Coverity-ID: 1055948 CC: Ian Campbell ian.campb...@citrix.com CC: Ian Jackson ian.jack...@eu.citrix.com CC: Wei Liu wei.l...@citrix.com CC: Xen

[Xen-devel] [PATCH for-4.5 2/3] python/xc: Fix multiple issues in pyxc_readconsolering()

2014-11-27 Thread Andrew Cooper
Don't leak a 16k allocation if PyArg_ParseTupleAndKeywords() or the first xc_readconsolering() fail. It is trivial to run throught the processes memory by repeatedly passing junk parameters to this function. In the case that the call to xc_readconsolering() in the while loop fails, reinstate str

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Julien Grall
Hi Stefano, On 27/11/14 10:51, Stefano Stabellini wrote: On Thu, 27 Nov 2014, Ian Campbell wrote: On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: ARMv8 model may not disable correctly the timer interrupt when Xen correct disable context switch to an idle vCPU. Therefore Xen may

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Julien Grall
Hi Ian, On 27/11/14 10:40, Ian Campbell wrote: On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: ARMv8 model may not disable correctly the timer interrupt when Xen correct disable context switch to an idle vCPU. Therefore Xen may receive a spurious context switches and

Re: [Xen-devel] [PATCH] x86/HVM: prevent infinite VM entry retries

2014-11-27 Thread Jan Beulich
On 27.11.14 at 13:46, andrew.coop...@citrix.com wrote: On 27/11/14 12:39, Jan Beulich wrote: if ( unlikely(exit_reason == VMEXIT_INVALID) ) { I think it would be good to retain the printk here from previous versions of the patch, specifically identifies the below vmcb dump as

[Xen-devel] [libvirt test] 31874: trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31874 libvirt real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31874/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 3 host-install(3) broken REGR. vs. 31860

[Xen-devel] [rumpuserxen test] 31875: trouble: blocked/broken/pass

2014-11-27 Thread xen . org
flight 31875 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31875/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 3 host-install(3) broken REGR. vs. 31851

[Xen-devel] [seabios test] 31867: regressions - trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31867 seabios real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31867/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3863 host-install(3) broken REGR. vs. 31849 test-amd64-i386-pair

Re: [Xen-devel] [PATCH for-4.5] docs/commandline: Refresh document for 4.5

2014-11-27 Thread Konrad Rzeszutek Wilk
On Nov 27, 2014 8:06 AM, Jan Beulich jbeul...@suse.com wrote: On 27.11.14 at 12:06, andrew.coop...@citrix.com wrote: Konrad: A release ack please.  It would be nice if the command line documentation was correct for 4.5. Honestly, unless really controversial, I don't think release acks

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Tim Deegan
At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: On 21/11/14 10:43, Jan Beulich wrote: On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote: Should the guest change the p2m structure during live migration, the toolstack ends up with a stale p2m with a non-p2m frame in the

Re: [Xen-devel] [PATCH for-4.6] libxl, hotplug/Linux: default to phy backend for raw format file

2014-11-27 Thread Roger Pau Monné
El 26/11/14 a les 18.44, Wei Liu ha escrit: On Wed, Nov 26, 2014 at 06:32:21PM +0100, Roger Pau Monné wrote: El 26/11/14 a les 17.55, Wei Liu ha escrit: Modify libxl and hotplug script to allow raw format file to use phy backend. The block script now tests the path and determine the actual

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread Konrad Rzeszutek Wilk
On Nov 27, 2014 6:59 AM, Tim Deegan t...@xen.org wrote: At 11:39 + on 27 Nov (1417084797), George Dunlap wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I agree to the conditions in the XenProject Coverity contribution guidelines [1]. I'm a developer working for

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Tim Deegan
At 10:32 + on 21 Nov (1416562351), Andrew Cooper wrote: On 21/11/14 05:41, Juergen Gross wrote: On 11/20/2014 07:28 PM, Andrew Cooper wrote: Hello, Tim, David and I were discussing this over lunch. This email is a (hopefully accurate) account of our findings, and potential

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Andrew Cooper
On 27/11/14 15:00, Tim Deegan wrote: At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: On 21/11/14 10:43, Jan Beulich wrote: On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote: Should the guest change the p2m structure during live migration, the toolstack ends up with a stale p2m

Re: [Xen-devel] [PATCH v3] INSTALL: correct EXTRA_CFLAGS handling

2014-11-27 Thread Konrad Rzeszutek Wilk
On November 27, 2014 4:26:26 AM EST, Olaf Hering o...@aepfle.de wrote: The already documented configure patch was not applied. Adjust documentation to describe existing behaviour. Signed-off-by: Olaf Hering o...@aepfle.de Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Tim Deegan
At 15:16 + on 27 Nov (1417097812), Andrew Cooper wrote: On 27/11/14 15:00, Tim Deegan wrote: At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: On 21/11/14 10:43, Jan Beulich wrote: On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote: Should the guest change the p2m

Re: [Xen-devel] [PATCH] xsm/flask: improve unknown permission handling

2014-11-27 Thread Andrew Cooper
On 27/11/14 15:23, George Dunlap wrote: On Tue, Nov 25, 2014 at 6:05 PM, Daniel De Graaf dgde...@tycho.nsa.gov wrote: When an unknown domctl, sysctl, or other operation is encountered in the FLASK security server, use the allow_unknown bit in the security policy (set by running checkpolicy

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Andrew Cooper
On 27/11/14 15:28, Tim Deegan wrote: At 15:16 + on 27 Nov (1417097812), Andrew Cooper wrote: On 27/11/14 15:00, Tim Deegan wrote: At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: On 21/11/14 10:43, Jan Beulich wrote: On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote:

Re: [Xen-devel] Xen Security Advisory 112 (CVE-2014-8867) - Insufficient bounding of REP MOVS to MMIO emulated inside the hypervisor

2014-11-27 Thread Fabio Fantoni
Il 27/11/2014 13:08, Xen.org security team ha scritto: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-8867 / XSA-112 version 5 Insufficient bounding of REP MOVS to MMIO emulated inside the hypervisor UPDATES IN

[Xen-devel] [linux-3.10 test] 31864: regressions - trouble: broken/fail/pass

2014-11-27 Thread xen . org
flight 31864 linux-3.10 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31864/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail in 31856 REGR. vs. 26303 Tests which are

[Xen-devel] [linux-linus test] 31871: trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31871 linux-linus real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31871/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 3 host-install(3) broken REGR. vs. 31241

[Xen-devel] [PATCH 4/6] libxl: events: Tear down SIGCHLD machinery on ctx destruction

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. Also, we should put back the default SIGCHLD handler. So: * In libxl_ctx_free, use libxl_childproc_setmode to set the mode to the default, which is libxl_sigchld_owner_libxl (ie `libxl owns SIGCHLD only when it has active

[Xen-devel] [PATCH 6/6] libxl: events: Document and enforce actual callbacks restriction

2014-11-27 Thread Ian Jackson
libxl_event_register_callbacks cannot reasonably be called while libxl is busy (has outstanding operations and/or enabled events). This is because the previous spec implied (although not entirely clearly) that event hooks would not be called for existing fd and timeout interests. There is thus

[Xen-devel] [PATCH 5/6] libxl: events: Deregister evtchn fd when not needed

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. In this patch, deal with the evtchn fd: * Defer setup of the evtchn handle to the first use. * Defer registration of the evtchn fd; register as needed on use. * When cancelling an evtchn wait, or when wait setup fails, check whether

[Xen-devel] [PATCH 2/6] libxl: events: Deregister xenstore watch fd when not needed

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. In this patch, deal with the xenstore watch fd: * Track the total number of active watches. * When deregistering a watch, or when watch registration fails, check whether there are now no watches and if so deregister the fd. * On libxl

[Xen-devel] [PATCH 3/6] libxl: events: Deregister, don't just modify, sigchld pipe fd

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. This implies that we must be able to deregister our interest in the sigchld self-pipe fd, not just modify to request no events. Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com --- tools/libxl/libxl_fork.c |9 + 1 file

[Xen-devel] [PATCH 1/6] libxl: events: Assert that libxl_ctx_free is not called from a hook

2014-11-27 Thread Ian Jackson
No-one in their right mind would do this, and if they did everything would definitely collapse. Arrange that if this happens, we crash ASAP. Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com --- tools/libxl/libxl.c |2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/libxl/libxl.c

Re: [Xen-devel] [PATCH for-4.5 0/6] libxl: events: Tear down fd interests when idle

2014-11-27 Thread Ian Jackson
Konrad: here is a set of fixes for libxl which ought IMO to be in 4.5. See below, or the rest of the thread, for details. It's broken up into 6 tiny patches for ease of review. Ian Jackson writes ([PATCH for-4.5 0/6] libxl: events: Tear down fd interests when idle): If

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Luis R. Rodriguez
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com Some folks had reported that some xen hypercalls take a long time to complete when issued from the userspace private ioctl mechanism, this

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Luis R. Rodriguez
On Thu, Nov 27, 2014 at 1:36 PM, Luis R. Rodriguez mcg...@suse.com wrote: I'm afraid we don't have much leg room. Let me be clear, I still think putting some hypercalls in process context *might help* but because of notes 1) and 2) I highlighted I think this is the best we can do, with more

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Andrew Cooper
On 27/11/14 18:36, Luis R. Rodriguez wrote: On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com Some folks had reported that some xen hypercalls take a long time to complete when issued from

Re: [Xen-devel] [PATCH] fix migration failure with xl migrate --debug

2014-11-27 Thread M A Young
On Wed, 26 Nov 2014, Andrew Cooper wrote: On 26/11/2014 20:51, M A Young wrote: --- xen-4.5.0-rc1/tools/libxl/xl_cmdimpl.c.orig 2014-10-24 15:22:40.0 +0100 +++ xen-4.5.0-rc1/tools/libxl/xl_cmdimpl.c 2014-11-25 20:29:06.723856433 +000 0 @@ -383,7 +383,7 @@ Sadly, changing

[Xen-devel] [xen-unstable test] 31873: trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31873 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31873/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 3 host-install(3) broken REGR. vs. 31853

[Xen-devel] [PATCH v2] fix migration failure with xl migrate --debug

2014-11-27 Thread M A Young
Migrations with xl migrate --debug will fail because debugging information from the receiving process is written to the stdout channel. This channel is also used for status messages so the migration will fail as the sending process receives an unexpected message. This patch moves the debugging

[Xen-devel] [v3] libxc: Expose the 1GB pages cpuid flag to guest

2014-11-27 Thread Liang Li
If hardware support the 1GB pages, expose the feature to guest by default. Users don't have to use a 'cpuid= ' option in config fil e to turn it on. Signed-off-by: Liang Li liang.z...@intel.com Signed-off-by: Yang Zhang yang.z.zh...@intel.com --- tools/libxc/xc_cpuid_x86.c | 3 +++

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Juergen Gross
On 11/27/2014 07:50 PM, Andrew Cooper wrote: On 27/11/14 18:36, Luis R. Rodriguez wrote: On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com Some folks had reported that some xen hypercalls

[Xen-devel] [xen-4.3-testing test] 31883: regressions - trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31883 xen-4.3-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31883/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs. 31811

[Xen-devel] [OSSTEST PATCH 3/4] Add nested test case of installing L2 guest VM

2014-11-27 Thread longtao.pang
From: longtao.pang longtaox.p...@intel.com This patch is used for installing L2 guest VM inside L1 guest VM. --- sg-run-job|2 + ts-debian-install | 166 + 2 files changed, 132 insertions(+), 36 deletions(-) diff --git

[Xen-devel] [OSSTEST PATCH 2/4] Building XEN and HVM Dom0 kernel for L1 guest VM

2014-11-27 Thread longtao.pang
From: longtao.pang longtaox.p...@intel.com This patch is used for building XEN and HVM Dom0 kernel for L1 guest VM, and then reboot L1 guest into xen kernel. --- sg-run-job|1 + ts-nested-L1-debian-install-part2 | 364 + 2 files

[Xen-devel] [OSSTEST PATCH 0/4] Introduction of the patches.

2014-11-27 Thread longtao.pang
We updated these patchs about adding Nested test job into OSSTest. Nested virtualization is the function of running a hypervisor inside a virtual machine. The hypervisor that runs on the real hardware is called a level 0 or L0; The hypervisor that runs as a guest inside L0 is called level 1 or