在 11/26/2014 03:54 AM, Andrew Cooper 写道:
Hello,
The purpose of this email is to plan how to progress the migrationv2
series through to being merged. I believe I have CC'd everyone with a
specific interest in this area, but apologies if I have missed anyone.
Migration v2 is in exclusive use
On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote:
My v1 patch only fixes the VMX side of things. SVM doesn't explicitly
identify a failed vmentry and lets it fall into the default case of the
vmexit handler. As such, with v1, the infinite loop still affects AMD
hardware.
Right; I
On Wed, 2014-11-26 at 17:39 +, Andrew Cooper wrote:
IMHO this is fine. It essentially means that for xl users there is some
delayed gratification wrt the promise of migration between non-alike
dom0s. The migration from 4.5(legacy)-4.6(v2) won't support such
migrations, but the next
On 25.11.14 at 18:10, vkuzn...@redhat.com wrote:
Jan Beulich jbeul...@suse.com writes:
On 25.11.14 at 16:41, vkuzn...@redhat.com wrote:
Jan Beulich jbeul...@suse.com writes:
On 07.10.14 at 15:10, vkuzn...@redhat.com wrote:
@@ -1764,11 +1765,28 @@ void free_domheap_pages(struct page_info
On Wed, 2014-11-26 at 19:03 +, Andrew Cooper wrote:
On 26/11/14 18:41, Konrad Rzeszutek Wilk wrote:
On Wed, Nov 26, 2014 at 06:24:11PM +, Dave Scott wrote:
On 26 Nov 2014, at 15:38, Zheng Li d...@zheng.li wrote:
On 26/11/2014 15:09, Andrew Cooper wrote:
This makes fields 0 and 1
On 26.11.14 at 15:32, boris.ostrov...@oracle.com wrote:
On 11/25/2014 08:49 AM, Jan Beulich wrote:
On 17.11.14 at 00:07, boris.ostrov...@oracle.com wrote:
@@ -244,19 +256,19 @@ void vpmu_initialise(struct vcpu *v)
switch ( vendor )
{
case X86_VENDOR_AMD:
-if (
On 26.11.14 at 15:39, boris.ostrov...@oracle.com wrote:
On 11/25/2014 09:28 AM, Jan Beulich wrote:
+else
+{
+struct segment_register seg;
+
+hvm_get_segment_register(sampled, x86_seg_cs, seg);
+r-cs = seg.sel;
+
On 27.11.14 at 06:29, sfl...@ihonk.com wrote:
On 11/25/2014 03:00 AM, Jan Beulich wrote:
Okay, so it's not really the mwait-idle driver causing the regression,
but it is C-state related. Hence we're now down to seeing whether all
or just the deeper C states are affected, i.e. I now need to
On Wed, 2014-11-26 at 17:38 +, Ian Jackson wrote:
Ian Campbell writes (Re: [Xen-devel] segv in osevent_release_nexus with
libxl backend to libvirt):
I don't know if this helps but on the 3 occasions I've just looked at
the ev passed to libxl__ev_fd_deregister contains an fd which
On Nov 24, 1:28pm, Pasi =?iso-8859-1?Q?K=E4rkk=E4inen?= wrote:
Hello,
Hi, hope the week is going well for everyone.
As I was walking out the door I remembered I had been delinquent
with information. The dom0 kernel is 32-bit 3.14.22 straight from
kernel.org under a 64-bit hypervisor
On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote:
ARMv8 model may not disable correctly the timer interrupt when Xen
correct disable
context switch to an idle vCPU. Therefore Xen may receive a spurious
context switches and s/spurious/unexpected/ (since spurious has a
specific meaning in
On 25.11.14 at 19:05, dgde...@tycho.nsa.gov wrote:
--- a/xen/xsm/flask/hooks.c
+++ b/xen/xsm/flask/hooks.c
@@ -135,6 +135,19 @@ static int get_irq_sid(int irq, u32 *sid, struct
avc_audit_data *ad)
return 0;
}
+static int avc_unknown_permission(const char* name, int id)
const
On Wed, 26 Nov 2014, Don Slutz wrote:
On 11/26/14 13:17, Stefano Stabellini wrote:
On Tue, 25 Nov 2014, Andrew Cooper wrote:
On 25/11/14 17:45, Stefano Stabellini wrote:
Increase maxmem before calling xc_domain_populate_physmap_exact to avoid
the risk of running out of guest memory.
On Thu, 27 Nov 2014, Ian Campbell wrote:
On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote:
ARMv8 model may not disable correctly the timer interrupt when Xen
correct disable
context switch to an idle vCPU. Therefore Xen may receive a spurious
context switches and
Hello,
I know that xc_interface_open() can be safely called several times from
the same process, and that several processes can each have a bunch of
xc_interface handles open, and that I shouldn't use an xc_interface
inherited from the parent in a child process, because xenctrl.h says so.
Is it
* Add options whose code has been committed (without a patch to this file).
* Remove options which have been deleted (without a patch to this file).
* Tweak some formatting for consistency.
* Nuke some trailing whitespace.
I believe this document now identifies the exact set of command line
On 27/11/14 09:49, Ian Campbell wrote:
On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote:
libxc (or some new alternative) should suck it up and gain some notion
of a stable API or ABI (like the rest of the world appears to be able to
manage), such that it is possible to compile with an
On 27.11.14 at 11:26, t...@xen.org wrote:
At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote:
On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote:
My v1 patch only fixes the VMX side of things. SVM doesn't explicitly
identify a failed vmentry and lets it fall into the default case
On 27/11/14 11:16, Jan Beulich wrote:
On 27.11.14 at 11:26, t...@xen.org wrote:
At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote:
On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote:
My v1 patch only fixes the VMX side of things. SVM doesn't explicitly
identify a failed vmentry and
On Thu, 2014-11-27 at 11:05 +, Andrew Cooper wrote:
On 27/11/14 09:49, Ian Campbell wrote:
On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote:
libxc (or some new alternative) should suck it up and gain some notion
of a stable API or ABI (like the rest of the world appears to be able
On 27.11.14 at 12:29, t...@xen.org wrote:
At 11:16 + on 27 Nov (1417083414), Jan Beulich wrote:
On 27.11.14 at 11:26, t...@xen.org wrote:
At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote:
On 26.11.14 at 18:43, andrew.coop...@citrix.com wrote:
My v1 patch only fixes the VMX
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I agree to the conditions in the XenProject Coverity contribution
guidelines [1].
I'm a developer working for Citrix Systems UK, Ltd. I've been active
in the Xen community since 2006; I was release coordinator for the 4.3
and 4.4 releases, and I
At 11:38 + on 27 Nov (1417084691), Jan Beulich wrote:
On 27.11.14 at 12:29, t...@xen.org wrote:
At 11:16 + on 27 Nov (1417083414), Jan Beulich wrote:
On 27.11.14 at 11:26, t...@xen.org wrote:
At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote:
On 26.11.14 at 18:43,
On 27/11/14 11:39, George Dunlap wrote:
I agree to the conditions in the XenProject Coverity contribution
guidelines [1].
I'm a developer working for Citrix Systems UK, Ltd. I've been active
in the Xen community since 2006; I was release coordinator for the 4.3
and 4.4 releases, and I am
At 11:39 + on 27 Nov (1417084797), George Dunlap wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I agree to the conditions in the XenProject Coverity contribution
guidelines [1].
I'm a developer working for Citrix Systems UK, Ltd. I've been active
in the Xen community since
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2014-8866 / XSA-111
version 3
Excessive checking in compatibility mode hypercall argument translation
UPDATES IN VERSION 3
Public release.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2014-8867 / XSA-112
version 5
Insufficient bounding of REP MOVS to MMIO emulated inside the hypervisor
UPDATES IN VERSION 5
Public release.
ISSUE
The error handling from a failed memory allocation should return
PyErr_SetFromErrno(xc_error_obj); rather than simply calling it and continuing
to the memcpy() below, with the dest pointer being NULL.
Furthermore, the context string is simply an input parameter to the hypercall,
and is not
The code now now matches its comment, and will actually catch the case of a
bad xs handle.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
Coverity-ID: 1055948
CC: Ian Campbell ian.campb...@citrix.com
CC: Ian Jackson ian.jack...@eu.citrix.com
CC: Wei Liu wei.l...@citrix.com
CC: Xen
Don't leak a 16k allocation if PyArg_ParseTupleAndKeywords() or the first
xc_readconsolering() fail. It is trivial to run throught the processes memory
by repeatedly passing junk parameters to this function.
In the case that the call to xc_readconsolering() in the while loop fails,
reinstate str
Hi Stefano,
On 27/11/14 10:51, Stefano Stabellini wrote:
On Thu, 27 Nov 2014, Ian Campbell wrote:
On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote:
ARMv8 model may not disable correctly the timer interrupt when Xen
correct disable
context switch to an idle vCPU. Therefore Xen may
Hi Ian,
On 27/11/14 10:40, Ian Campbell wrote:
On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote:
ARMv8 model may not disable correctly the timer interrupt when Xen
correct disable
context switch to an idle vCPU. Therefore Xen may receive a spurious
context switches and
On 27.11.14 at 13:46, andrew.coop...@citrix.com wrote:
On 27/11/14 12:39, Jan Beulich wrote:
if ( unlikely(exit_reason == VMEXIT_INVALID) )
{
I think it would be good to retain the printk here from previous
versions of the patch, specifically identifies the below vmcb dump as
flight 31874 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31874/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 3 host-install(3) broken REGR. vs. 31860
flight 31875 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31875/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 3 host-install(3) broken REGR. vs. 31851
flight 31867 seabios real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31867/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3863 host-install(3) broken REGR. vs. 31849
test-amd64-i386-pair
On Nov 27, 2014 8:06 AM, Jan Beulich jbeul...@suse.com wrote:
On 27.11.14 at 12:06, andrew.coop...@citrix.com wrote:
Konrad: A release ack please. It would be nice if the command line
documentation was correct for 4.5.
Honestly, unless really controversial, I don't think release acks
At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote:
On 21/11/14 10:43, Jan Beulich wrote:
On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote:
Should the guest change the p2m structure during live migration, the
toolstack ends up with a stale p2m with a non-p2m frame in the
El 26/11/14 a les 18.44, Wei Liu ha escrit:
On Wed, Nov 26, 2014 at 06:32:21PM +0100, Roger Pau Monné wrote:
El 26/11/14 a les 17.55, Wei Liu ha escrit:
Modify libxl and hotplug script to allow raw format file to use phy
backend.
The block script now tests the path and determine the actual
On Nov 27, 2014 6:59 AM, Tim Deegan t...@xen.org wrote:
At 11:39 + on 27 Nov (1417084797), George Dunlap wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I agree to the conditions in the XenProject Coverity contribution
guidelines [1].
I'm a developer working for
At 10:32 + on 21 Nov (1416562351), Andrew Cooper wrote:
On 21/11/14 05:41, Juergen Gross wrote:
On 11/20/2014 07:28 PM, Andrew Cooper wrote:
Hello,
Tim, David and I were discussing this over lunch. This email is a
(hopefully accurate) account of our findings, and potential
On 27/11/14 15:00, Tim Deegan wrote:
At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote:
On 21/11/14 10:43, Jan Beulich wrote:
On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote:
Should the guest change the p2m structure during live migration, the
toolstack ends up with a stale p2m
On November 27, 2014 4:26:26 AM EST, Olaf Hering o...@aepfle.de wrote:
The already documented configure patch was not applied.
Adjust documentation to describe existing behaviour.
Signed-off-by: Olaf Hering o...@aepfle.de
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson
At 15:16 + on 27 Nov (1417097812), Andrew Cooper wrote:
On 27/11/14 15:00, Tim Deegan wrote:
At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote:
On 21/11/14 10:43, Jan Beulich wrote:
On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote:
Should the guest change the p2m
On 27/11/14 15:23, George Dunlap wrote:
On Tue, Nov 25, 2014 at 6:05 PM, Daniel De Graaf dgde...@tycho.nsa.gov
wrote:
When an unknown domctl, sysctl, or other operation is encountered in the
FLASK security server, use the allow_unknown bit in the security policy
(set by running checkpolicy
On 27/11/14 15:28, Tim Deegan wrote:
At 15:16 + on 27 Nov (1417097812), Andrew Cooper wrote:
On 27/11/14 15:00, Tim Deegan wrote:
At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote:
On 21/11/14 10:43, Jan Beulich wrote:
On 20.11.14 at 19:28, andrew.coop...@citrix.com wrote:
Il 27/11/2014 13:08, Xen.org security team ha scritto:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2014-8867 / XSA-112
version 5
Insufficient bounding of REP MOVS to MMIO emulated inside the hypervisor
UPDATES IN
flight 31864 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31864/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail in 31856 REGR. vs.
26303
Tests which are
flight 31871 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31871/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 3 host-install(3) broken REGR. vs. 31241
We want to have no fd events registered when we are idle.
Also, we should put back the default SIGCHLD handler. So:
* In libxl_ctx_free, use libxl_childproc_setmode to set the mode to
the default, which is libxl_sigchld_owner_libxl (ie `libxl owns
SIGCHLD only when it has active
libxl_event_register_callbacks cannot reasonably be called while libxl
is busy (has outstanding operations and/or enabled events).
This is because the previous spec implied (although not entirely
clearly) that event hooks would not be called for existing fd and
timeout interests. There is thus
We want to have no fd events registered when we are idle.
In this patch, deal with the evtchn fd:
* Defer setup of the evtchn handle to the first use.
* Defer registration of the evtchn fd; register as needed on use.
* When cancelling an evtchn wait, or when wait setup fails, check
whether
We want to have no fd events registered when we are idle.
In this patch, deal with the xenstore watch fd:
* Track the total number of active watches.
* When deregistering a watch, or when watch registration fails, check
whether there are now no watches and if so deregister the fd.
* On libxl
We want to have no fd events registered when we are idle. This
implies that we must be able to deregister our interest in the sigchld
self-pipe fd, not just modify to request no events.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
tools/libxl/libxl_fork.c |9 +
1 file
No-one in their right mind would do this, and if they did everything
would definitely collapse. Arrange that if this happens, we crash
ASAP.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
tools/libxl/libxl.c |2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/libxl/libxl.c
Konrad: here is a set of fixes for libxl which ought IMO to be in 4.5.
See below, or the rest of the thread, for details. It's broken up
into 6 tiny patches for ease of review.
Ian Jackson writes ([PATCH for-4.5 0/6] libxl: events: Tear down fd interests
when idle):
If
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
Some folks had reported that some xen hypercalls take a long time
to complete when issued from the userspace private ioctl mechanism,
this
On Thu, Nov 27, 2014 at 1:36 PM, Luis R. Rodriguez mcg...@suse.com wrote:
I'm afraid we don't have much leg room.
Let me be clear, I still think putting some hypercalls in process
context *might help* but because of notes 1) and 2) I highlighted I
think this is the best we can do, with more
On 27/11/14 18:36, Luis R. Rodriguez wrote:
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
Some folks had reported that some xen hypercalls take a long time
to complete when issued from
On Wed, 26 Nov 2014, Andrew Cooper wrote:
On 26/11/2014 20:51, M A Young wrote:
--- xen-4.5.0-rc1/tools/libxl/xl_cmdimpl.c.orig 2014-10-24 15:22:40.0
+0100
+++ xen-4.5.0-rc1/tools/libxl/xl_cmdimpl.c 2014-11-25 20:29:06.723856433
+000
0
@@ -383,7 +383,7 @@
Sadly, changing
flight 31873 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31873/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 3 host-install(3) broken REGR. vs. 31853
Migrations with xl migrate --debug will fail because debugging information
from the receiving process is written to the stdout channel. This channel
is also used for status messages so the migration will fail as the sending
process receives an unexpected message. This patch moves the debugging
If hardware support the 1GB pages, expose the feature to guest by
default. Users don't have to use a 'cpuid= ' option in config fil
e to turn it on.
Signed-off-by: Liang Li liang.z...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
---
tools/libxc/xc_cpuid_x86.c | 3 +++
On 11/27/2014 07:50 PM, Andrew Cooper wrote:
On 27/11/14 18:36, Luis R. Rodriguez wrote:
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
Some folks had reported that some xen hypercalls
flight 31883 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31883/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs.
31811
From: longtao.pang longtaox.p...@intel.com
This patch is used for installing L2 guest VM inside L1 guest VM.
---
sg-run-job|2 +
ts-debian-install | 166 +
2 files changed, 132 insertions(+), 36 deletions(-)
diff --git
From: longtao.pang longtaox.p...@intel.com
This patch is used for building XEN and HVM Dom0 kernel for L1 guest VM,
and then reboot L1 guest into xen kernel.
---
sg-run-job|1 +
ts-nested-L1-debian-install-part2 | 364 +
2 files
We updated these patchs about adding Nested test job into OSSTest.
Nested virtualization is the function of running a hypervisor inside a virtual
machine.
The hypervisor that runs on the real hardware is called a level 0 or L0;
The hypervisor that runs as a guest inside L0 is called level 1 or
68 matches
Mail list logo