[Xen-devel] [OSSTEST PATCH 0/4] Introduction of the patches.

2014-11-27 Thread longtao.pang
We updated these patchs about adding Nested test job into OSSTest. Nested virtualization is the function of running a hypervisor inside a virtual machine. The hypervisor that runs on the real hardware is called a level 0 or L0; The hypervisor that runs as a guest inside L0 is called level 1 or L1

[Xen-devel] [OSSTEST PATCH 4/4] Insert nested test job name and runvars

2014-11-27 Thread longtao.pang
From: "longtao.pang" This patch is used for inserting nested test job name and runvars into standalone.db database after execute command './standalone-reset'. --- make-flight | 19 +++ mfi-common |8 2 files changed, 27 insertions(+) diff --git a/make-flight b/

[Xen-devel] [OSSTEST PATCH 1/4] Add nested testcase of preparing and installing L1 guest

2014-11-27 Thread longtao.pang
From: "longtao.pang" This patch is used for preparing and installing L1 guest VM inside L0 system on testhost machine. --- Osstest/Debian.pm | 25 +++-- Osstest/TestSupport.pm| 31 +- sg-run-job|5 + ts-nested-L1-debian-install-pa

[Xen-devel] [OSSTEST PATCH 2/4] Building XEN and HVM Dom0 kernel for L1 guest VM

2014-11-27 Thread longtao.pang
From: "longtao.pang" This patch is used for building XEN and HVM Dom0 kernel for L1 guest VM, and then reboot L1 guest into xen kernel. --- sg-run-job|1 + ts-nested-L1-debian-install-part2 | 364 + 2 files changed, 365 insertion

[Xen-devel] [OSSTEST PATCH 3/4] Add nested test case of installing L2 guest VM

2014-11-27 Thread longtao.pang
From: "longtao.pang" This patch is used for installing L2 guest VM inside L1 guest VM. --- sg-run-job|2 + ts-debian-install | 166 + 2 files changed, 132 insertions(+), 36 deletions(-) diff --git a/sg-run-job b/sg-run-job index

[Xen-devel] [xen-4.3-testing test] 31883: regressions - trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31883 xen-4.3-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31883/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs. 31811 test-amd64-i3

Re: [Xen-devel] [for 4.5] missing chunk in 11dffa2359e8a2629490c14c029c7c7c777b3e47

2014-11-27 Thread Chun Yan Liu
>>> On 11/28/2014 at 02:14 AM, in message , Stefano Stabellini wrote: > On Mon, 7 Jul 2014, Chunyan Liu wrote: > > diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c > > index addacdb..4f1cbd2 100644 > > --- a/tools/libxl/libxl_dm.c > > +++ b/tools/libxl/libxl_dm.c > > @@ -479,6

[Xen-devel] [PATCH] missing chunk of HVM direct kernel boot patch

2014-11-27 Thread Chunyan Liu
Found by Stefano, this chunk of the patch was never applied to xen-unstable (commit 11dffa2359e8a2629490c14c029c7c7c777b3e47), see http://marc.info/?l=qemu-devel&m=140471493425353&w=2. Signed-off-by: Chunyan Liu --- tools/libxl/libxl_dm.c | 9 + 1 file changed, 9 insertions(+) diff --gi

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Juergen Gross
On 11/27/2014 07:50 PM, Andrew Cooper wrote: On 27/11/14 18:36, Luis R. Rodriguez wrote: On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote: From: "Luis R. Rodriguez" Some folks had reported that some xen hypercalls take a long time

[Xen-devel] [v3] libxc: Expose the 1GB pages cpuid flag to guest

2014-11-27 Thread Liang Li
If hardware support the 1GB pages, expose the feature to guest by default. Users don't have to use a 'cpuid= ' option in config fil e to turn it on. Signed-off-by: Liang Li Signed-off-by: Yang Zhang --- tools/libxc/xc_cpuid_x86.c | 3 +++ xen/arch/x86/hvm/hvm.c | 2 +- 2 files changed, 4 in

[Xen-devel] Question about network performance difference between dom0 and host

2014-11-27 Thread zhangleiqiang
I have done some network performance testing under XEN, and found the result which is somehow strange: When testing between Hosts (Sender and receiver servers are both booting from kernel-default), running only one netperf process will be enough to reach the upper limit of NIC. However, wh

[Xen-devel] [xen-4.2-testing test] 31881: regressions - trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31881 xen-4.2-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31881/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 3 host-install(3) broken REGR. vs. 31778 test-amd64-i386-q

[Xen-devel] [linux-next test] 31877: tolerable FAIL

2014-11-27 Thread xen . org
flight 31877 linux-next real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31877/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl9 guest-start fail baseline untested test-amd64-i386-xl-credit2 11

Re: [Xen-devel] [PATCH] libxc: Expose the pdpe1gb cpuid flag to guest

2014-11-27 Thread Li, Liang Z
>>> patch is ok? >> >> No - Tim having confirmed that shadow mode doesn't support 1Gb pages, > the feature clearly must not be made visible for shadow mode guest. >Indeed. Liang, Can you add the shadow mode check in the next version? Ok , I will do it and resend the patch.

[Xen-devel] [PATCH v2] fix migration failure with xl migrate --debug

2014-11-27 Thread M A Young
Migrations with xl migrate --debug will fail because debugging information from the receiving process is written to the stdout channel. This channel is also used for status messages so the migration will fail as the sending process receives an unexpected message. This patch moves the debugging

[Xen-devel] [xen-unstable test] 31873: trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31873 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31873/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 3 host-install(3) broken REGR. vs. 31853

Re: [Xen-devel] [PATCH] fix migration failure with xl migrate --debug

2014-11-27 Thread M A Young
On Wed, 26 Nov 2014, Andrew Cooper wrote: On 26/11/2014 20:51, M A Young wrote: --- xen-4.5.0-rc1/tools/libxl/xl_cmdimpl.c.orig 2014-10-24 15:22:40.0 +0100 +++ xen-4.5.0-rc1/tools/libxl/xl_cmdimpl.c 2014-11-25 20:29:06.723856433 +000 0 @@ -383,7 +383,7 @@ Sadly, changing printf

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Andrew Cooper
On 27/11/14 18:36, Luis R. Rodriguez wrote: > On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: >> On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote: >>> From: "Luis R. Rodriguez" >>> >>> Some folks had reported that some xen hypercalls take a long time >>> to complete when issued from

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Luis R. Rodriguez
On Thu, Nov 27, 2014 at 1:36 PM, Luis R. Rodriguez wrote: > I'm afraid we don't have much leg room. Let me be clear, I still think putting some hypercalls in process context *might help* but because of notes 1) and 2) I highlighted I think this is the best we can do, with more information we shou

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-11-27 Thread Luis R. Rodriguez
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: > On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote: >> From: "Luis R. Rodriguez" >> >> Some folks had reported that some xen hypercalls take a long time >> to complete when issued from the userspace private ioctl mechanism, >> this can

Re: [Xen-devel] [PATCH for-4.5 0/6] libxl: events: Tear down fd interests when idle

2014-11-27 Thread Ian Jackson
Konrad: here is a set of fixes for libxl which ought IMO to be in 4.5. See below, or the rest of the thread, for details. It's broken up into 6 tiny patches for ease of review. Ian Jackson writes ("[PATCH for-4.5 0/6] libxl: events: Tear down fd interests when idle"): > If libxl_event_register_c

[Xen-devel] [PATCH 1/6] libxl: events: Assert that libxl_ctx_free is not called from a hook

2014-11-27 Thread Ian Jackson
No-one in their right mind would do this, and if they did everything would definitely collapse. Arrange that if this happens, we crash ASAP. Signed-off-by: Ian Jackson --- tools/libxl/libxl.c |2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c inde

[Xen-devel] [PATCH 2/6] libxl: events: Deregister xenstore watch fd when not needed

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. In this patch, deal with the xenstore watch fd: * Track the total number of active watches. * When deregistering a watch, or when watch registration fails, check whether there are now no watches and if so deregister the fd. * On libxl tea

[Xen-devel] [PATCH for-4.5 0/6] libxl: events: Tear down fd interests when idle

2014-11-27 Thread Ian Jackson
If libxl_event_register_callbacks is called with nonzero hooks while any part of libxl has any fd interests registered internally, then: * There is no way for libxl to notify the application that it wants to be told about these fds, because the spec in the doc comment says that the new hook

[Xen-devel] [PATCH 3/6] libxl: events: Deregister, don't just modify, sigchld pipe fd

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. This implies that we must be able to deregister our interest in the sigchld self-pipe fd, not just modify to request no events. Signed-off-by: Ian Jackson --- tools/libxl/libxl_fork.c |9 + 1 file changed, 1 insertion(+), 8 d

[Xen-devel] [PATCH 5/6] libxl: events: Deregister evtchn fd when not needed

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. In this patch, deal with the evtchn fd: * Defer setup of the evtchn handle to the first use. * Defer registration of the evtchn fd; register as needed on use. * When cancelling an evtchn wait, or when wait setup fails, check whether t

[Xen-devel] [PATCH 6/6] libxl: events: Document and enforce actual callbacks restriction

2014-11-27 Thread Ian Jackson
libxl_event_register_callbacks cannot reasonably be called while libxl is busy (has outstanding operations and/or enabled events). This is because the previous spec implied (although not entirely clearly) that event hooks would not be called for existing fd and timeout interests. There is thus no

[Xen-devel] [PATCH 4/6] libxl: events: Tear down SIGCHLD machinery on ctx destruction

2014-11-27 Thread Ian Jackson
We want to have no fd events registered when we are idle. Also, we should put back the default SIGCHLD handler. So: * In libxl_ctx_free, use libxl_childproc_setmode to set the mode to the default, which is libxl_sigchld_owner_libxl (ie `libxl owns SIGCHLD only when it has active children')

[Xen-devel] [linux-linus test] 31871: trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31871 linux-linus real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31871/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 3 host-install(3) broken REGR. vs. 31241

[Xen-devel] [for 4.5] missing chunk in 11dffa2359e8a2629490c14c029c7c7c777b3e47

2014-11-27 Thread Stefano Stabellini
On Mon, 7 Jul 2014, Chunyan Liu wrote: > diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c > index addacdb..4f1cbd2 100644 > --- a/tools/libxl/libxl_dm.c > +++ b/tools/libxl/libxl_dm.c > @@ -479,6 +485,15 @@ static char ** > libxl__build_device_model_args_new(libxl__gc *gc, > if (b

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Julien Grall
Hi, On 25/11/14 17:44, Julien Grall wrote: > ARMv8 model may not disable correctly the timer interrupt when Xen > context switch to an idle vCPU. Therefore Xen may receive a spurious > timer interrupt. As the idle domain doesn't have vGIC, Xen will crash > when trying to inject the interrupt with

[Xen-devel] [linux-3.10 test] 31864: regressions - trouble: broken/fail/pass

2014-11-27 Thread xen . org
flight 31864 linux-3.10 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31864/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail in 31856 REGR. vs. 26303 Tests which are f

Re: [Xen-devel] Xen Security Advisory 112 (CVE-2014-8867) - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor

2014-11-27 Thread Fabio Fantoni
Il 27/11/2014 13:08, Xen.org security team ha scritto: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-8867 / XSA-112 version 5 Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor UPDATES IN VERS

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Andrew Cooper
On 27/11/14 15:28, Tim Deegan wrote: > At 15:16 + on 27 Nov (1417097812), Andrew Cooper wrote: >> On 27/11/14 15:00, Tim Deegan wrote: >>> At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: On 21/11/14 10:43, Jan Beulich wrote: On 20.11.14 at 19:28, wrote: >> Should

Re: [Xen-devel] [PATCH] xsm/flask: improve unknown permission handling

2014-11-27 Thread Andrew Cooper
On 27/11/14 15:23, George Dunlap wrote: > On Tue, Nov 25, 2014 at 6:05 PM, Daniel De Graaf > wrote: >> When an unknown domctl, sysctl, or other operation is encountered in the >> FLASK security server, use the allow_unknown bit in the security policy >> (set by running checkpolicy -U allow) to de

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Tim Deegan
At 15:16 + on 27 Nov (1417097812), Andrew Cooper wrote: > On 27/11/14 15:00, Tim Deegan wrote: > > At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: > >> On 21/11/14 10:43, Jan Beulich wrote: > >> On 20.11.14 at 19:28, wrote: > Should the guest change the p2m structure durin

Re: [Xen-devel] [PATCH] xsm/flask: improve unknown permission handling

2014-11-27 Thread George Dunlap
On Tue, Nov 25, 2014 at 6:05 PM, Daniel De Graaf wrote: > When an unknown domctl, sysctl, or other operation is encountered in the > FLASK security server, use the allow_unknown bit in the security policy > (set by running checkpolicy -U allow) to decide if the permission should > be allowed or de

Re: [Xen-devel] [PATCH v3] INSTALL: correct EXTRA_CFLAGS handling

2014-11-27 Thread Konrad Rzeszutek Wilk
On November 27, 2014 4:26:26 AM EST, Olaf Hering wrote: >The already documented configure patch was not applied. >Adjust documentation to describe existing behaviour. > >Signed-off-by: Olaf Hering >Cc: Ian Campbell >Cc: Ian Jackson >Cc: Konrad Rzeszutek Wilk Reviewed-by: me. Don't need an re

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Andrew Cooper
On 27/11/14 15:00, Tim Deegan wrote: > At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: >> On 21/11/14 10:43, Jan Beulich wrote: >> On 20.11.14 at 19:28, wrote: Should the guest change the p2m structure during live migration, the toolstack ends up with a stale p2m with a n

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Tim Deegan
At 10:32 + on 21 Nov (1416562351), Andrew Cooper wrote: > On 21/11/14 05:41, Juergen Gross wrote: > > On 11/20/2014 07:28 PM, Andrew Cooper wrote: > >> Hello, > >> > >> Tim, David and I were discussing this over lunch. This email is a > >> (hopefully accurate) account of our findings, and pote

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread Konrad Rzeszutek Wilk
On Nov 27, 2014 6:59 AM, Tim Deegan wrote: > > At 11:39 + on 27 Nov (1417084797), George Dunlap wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > I agree to the conditions in the XenProject Coverity contribution > > guidelines [1]. > > > > I'm a developer working f

Re: [Xen-devel] [PATCH for-4.6] libxl, hotplug/Linux: default to phy backend for raw format file

2014-11-27 Thread Roger Pau Monné
El 26/11/14 a les 18.44, Wei Liu ha escrit: > On Wed, Nov 26, 2014 at 06:32:21PM +0100, Roger Pau Monné wrote: >> El 26/11/14 a les 17.55, Wei Liu ha escrit: >>> Modify libxl and hotplug script to allow raw format file to use phy >>> backend. >>> >>> The block script now tests the path and determin

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-11-27 Thread Tim Deegan
At 10:54 + on 21 Nov (1416563695), Andrew Cooper wrote: > On 21/11/14 10:43, Jan Beulich wrote: > On 20.11.14 at 19:28, wrote: > >> Should the guest change the p2m structure during live migration, the > >> toolstack ends up with a stale p2m with a non-p2m frame in the middle, > >> resulti

Re: [Xen-devel] [PATCH for-4.5] docs/commandline: Refresh document for 4.5

2014-11-27 Thread Konrad Rzeszutek Wilk
On Nov 27, 2014 8:06 AM, Jan Beulich wrote: > > >>> On 27.11.14 at 12:06, wrote: > > Konrad: A release ack please.  It would be nice if the command line > > documentation was correct for 4.5. > > Honestly, unless really controversial, I don't think release acks are > really needed for purely

[Xen-devel] [qemu-mainline test] 31863: regressions - trouble: broken/fail/pass

2014-11-27 Thread xen . org
flight 31863 qemu-mainline real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31863/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-multivcpu 7 debian-installfail REGR. vs. 31855 test-amd64-i386-xl-

[Xen-devel] [seabios test] 31867: regressions - trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31867 seabios real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31867/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3863 host-install(3) broken REGR. vs. 31849 test-amd64-i386-pair

[Xen-devel] [rumpuserxen test] 31875: trouble: blocked/broken/pass

2014-11-27 Thread xen . org
flight 31875 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31875/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 3 host-install(3) broken REGR. vs. 31851

Re: [Xen-devel] [PATCH for-4.5] docs/commandline: Refresh document for 4.5

2014-11-27 Thread Jan Beulich
>>> On 27.11.14 at 12:06, wrote: > Konrad: A release ack please. It would be nice if the command line > documentation was correct for 4.5. Honestly, unless really controversial, I don't think release acks are really needed for purely documentation changes. Jan

[Xen-devel] [libvirt test] 31874: trouble: blocked/broken/fail/pass

2014-11-27 Thread xen . org
flight 31874 libvirt real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31874/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 3 host-install(3) broken REGR. vs. 31860 buil

Re: [Xen-devel] [PATCH] x86/HVM: prevent infinite VM entry retries

2014-11-27 Thread Jan Beulich
>>> On 27.11.14 at 13:46, wrote: > On 27/11/14 12:39, Jan Beulich wrote: >> if ( unlikely(exit_reason == VMEXIT_INVALID) ) >> { > > I think it would be good to retain the printk here from previous > versions of the patch, specifically identifies the below vmcb dump as > caused by a fail

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Julien Grall
Hi Ian, On 27/11/14 10:40, Ian Campbell wrote: > On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: >> ARMv8 model may not disable correctly the timer interrupt when Xen > > "correct disable" > >> context switch to an idle vCPU. Therefore Xen may receive a spurious > > "context switches" an

Re: [Xen-devel] [PATCH] x86/HVM: prevent infinite VM entry retries

2014-11-27 Thread Andrew Cooper
On 27/11/14 12:39, Jan Beulich wrote: > This reverts the VMX side of commit 28b4baac ("x86/HVM: don't crash > guest upon problems occurring in user mode") and gets SVM in line with > the resulting VMX behavior. This is because Andrew validly says > > "A failed vmentry is overwhelmingly likely to be

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Julien Grall
Hi Stefano, On 27/11/14 10:51, Stefano Stabellini wrote: > On Thu, 27 Nov 2014, Ian Campbell wrote: >> On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: >>> ARMv8 model may not disable correctly the timer interrupt when Xen >> >> "correct disable" >> >>> context switch to an idle vCPU. Theref

[Xen-devel] [PATCH] x86/HVM: prevent infinite VM entry retries

2014-11-27 Thread Jan Beulich
This reverts the VMX side of commit 28b4baac ("x86/HVM: don't crash guest upon problems occurring in user mode") and gets SVM in line with the resulting VMX behavior. This is because Andrew validly says "A failed vmentry is overwhelmingly likely to be caused by corrupt VMC[SB] state. As a result

[Xen-devel] [PATCH for-4.5 0/3] Coverity fixes for python lowlevel libraries

2014-11-27 Thread Andrew Cooper
These were initially flagged by the XenServer coverity scanning. It turns out that they were being found by the upstream scan, but had been grouped with Xend and listed as ignored, hiding them from the output. I have adjusted the scan filters to not ignore the lowlevel libraries, and identified t

[Xen-devel] [PATCH for-4.5 3/3] python/xs: Correct the indirection of the NULL xshandle() check

2014-11-27 Thread Andrew Cooper
The code now now matches its comment, and will actually catch the case of a bad xs handle. Signed-off-by: Andrew Cooper Coverity-ID: 1055948 CC: Ian Campbell CC: Ian Jackson CC: Wei Liu CC: Xen Coverity Team --- tools/python/xen/lowlevel/xs/xs.c |2 +- 1 file changed, 1 insertion(+), 1 d

[Xen-devel] [PATCH for-4.5 2/3] python/xc: Fix multiple issues in pyxc_readconsolering()

2014-11-27 Thread Andrew Cooper
Don't leak a 16k allocation if PyArg_ParseTupleAndKeywords() or the first xc_readconsolering() fail. It is trivial to run throught the processes memory by repeatedly passing junk parameters to this function. In the case that the call to xc_readconsolering() in the while loop fails, reinstate str

[Xen-devel] [PATCH for-4.5 1/3] python/xc: Fix multiple issues in pyflask_context_to_sid()

2014-11-27 Thread Andrew Cooper
The error handling from a failed memory allocation should return PyErr_SetFromErrno(xc_error_obj); rather than simply calling it and continuing to the memcpy() below, with the dest pointer being NULL. Furthermore, the context string is simply an input parameter to the hypercall, and is not mutated

[Xen-devel] Xen Security Advisory 112 (CVE-2014-8867) - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor

2014-11-27 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-8867 / XSA-112 version 5 Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor UPDATES IN VERSION 5 Public release. ISSUE DESCRIPTI

[Xen-devel] Xen Security Advisory 111 (CVE-2014-8866) - Excessive checking in compatibility mode hypercall argument translation

2014-11-27 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-8866 / XSA-111 version 3 Excessive checking in compatibility mode hypercall argument translation UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread Tim Deegan
At 11:39 + on 27 Nov (1417084797), George Dunlap wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > I agree to the conditions in the XenProject Coverity contribution > guidelines [1]. > > I'm a developer working for Citrix Systems UK, Ltd. I've been active > in the Xen community

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread Andrew Cooper
On 27/11/14 11:39, George Dunlap wrote: > I agree to the conditions in the XenProject Coverity contribution > guidelines [1]. > > I'm a developer working for Citrix Systems UK, Ltd. I've been active > in the Xen community since 2006; I was release coordinator for the 4.3 > and 4.4 releases, and I

Re: [Xen-devel] kdump with xen-unstable on efi machine

2014-11-27 Thread Andrew Cooper
On 27/11/14 11:32, Ian Campbell wrote: > On Thu, 2014-11-27 at 11:05 +, Andrew Cooper wrote: >> On 27/11/14 09:49, Ian Campbell wrote: >>> On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote: libxc (or some new alternative) should suck it up and gain some notion of a stable API or

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread Ian Campbell
On Thu, 2014-11-27 at 11:39 +, George Dunlap wrote: > I agree to the conditions in the XenProject Coverity contribution > guidelines [1]. > > I'm a developer working for Citrix Systems UK, Ltd. I've been active > in the Xen community since 2006; I was release coordinator for the 4.3 > and 4.4

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Tim Deegan
At 11:38 + on 27 Nov (1417084691), Jan Beulich wrote: > >>> On 27.11.14 at 12:29, wrote: > > At 11:16 + on 27 Nov (1417083414), Jan Beulich wrote: > >> >>> On 27.11.14 at 11:26, wrote: > >> > At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: > >> >> >>> On 26.11.14 at 18:43, wrot

[Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-11-27 Thread George Dunlap
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I agree to the conditions in the XenProject Coverity contribution guidelines [1]. I'm a developer working for Citrix Systems UK, Ltd. I've been active in the Xen community since 2006; I was release coordinator for the 4.3 and 4.4 releases, and I am

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Jan Beulich
>>> On 27.11.14 at 12:29, wrote: > At 11:16 + on 27 Nov (1417083414), Jan Beulich wrote: >> >>> On 27.11.14 at 11:26, wrote: >> > At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: >> >> >>> On 26.11.14 at 18:43, wrote: >> >> > My v1 patch only fixes the VMX side of things. SVM doesn

Re: [Xen-devel] kdump with xen-unstable on efi machine

2014-11-27 Thread Ian Campbell
On Thu, 2014-11-27 at 11:05 +, Andrew Cooper wrote: > On 27/11/14 09:49, Ian Campbell wrote: > > On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote: > >> libxc (or some new alternative) should suck it up and gain some notion > >> of a stable API or ABI (like the rest of the world appears to

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Tim Deegan
At 11:16 + on 27 Nov (1417083414), Jan Beulich wrote: > >>> On 27.11.14 at 11:26, wrote: > > At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: > >> >>> On 26.11.14 at 18:43, wrote: > >> > My v1 patch only fixes the VMX side of things. SVM doesn't explicitly > >> > identify a failed v

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Andrew Cooper
On 27/11/14 11:16, Jan Beulich wrote: On 27.11.14 at 11:26, wrote: >> At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: >> On 26.11.14 at 18:43, wrote: My v1 patch only fixes the VMX side of things. SVM doesn't explicitly identify a failed vmentry and lets it fall into

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Jan Beulich
>>> On 27.11.14 at 11:26, wrote: > At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: >> >>> On 26.11.14 at 18:43, wrote: >> > My v1 patch only fixes the VMX side of things. SVM doesn't explicitly >> > identify a failed vmentry and lets it fall into the default case of the >> > vmexit han

Re: [Xen-devel] Q77 IGD instantly crashes on xen-pciback bind.

2014-11-27 Thread Sander Eikelenboom
Thursday, November 27, 2014, 11:23:24 AM, you wrote: > On Nov 24, 1:28pm, Pasi =?iso-8859-1?Q?K=E4rkk=E4inen?= wrote: >> Hello, > Hi, hope the week is going well for everyone. >> > >> As I was walking out the door I remembered I had been delinquent >> > >> with information. The dom0 kernel i

[Xen-devel] [PATCH for-4.5] docs/commandline: Refresh document for 4.5

2014-11-27 Thread Andrew Cooper
* Add options whose code has been committed (without a patch to this file). * Remove options which have been deleted (without a patch to this file). * Tweak some formatting for consistency. * Nuke some trailing whitespace. I believe this document now identifies the exact set of command line option

Re: [Xen-devel] kdump with xen-unstable on efi machine

2014-11-27 Thread Andrew Cooper
On 27/11/14 09:49, Ian Campbell wrote: > On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote: >> libxc (or some new alternative) should suck it up and gain some notion >> of a stable API or ABI (like the rest of the world appears to be able to >> manage), such that it is possible to compile with

[Xen-devel] Xenstore.h clarifications

2014-11-27 Thread Razvan Cojocaru
Hello, I know that xc_interface_open() can be safely called several times from the same process, and that several processes can each have a bunch of xc_interface handles open, and that I shouldn't use an xc_interface inherited from the parent in a child process, because xenctrl.h says so. Is it s

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Stefano Stabellini
On Thu, 27 Nov 2014, Ian Campbell wrote: > On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: > > ARMv8 model may not disable correctly the timer interrupt when Xen > > "correct disable" > > > context switch to an idle vCPU. Therefore Xen may receive a spurious > > "context switches" and s/s

Re: [Xen-devel] [Qemu-devel] [PATCH] increase maxmem before calling xc_domain_populate_physmap

2014-11-27 Thread Stefano Stabellini
On Wed, 26 Nov 2014, Don Slutz wrote: > On 11/26/14 13:17, Stefano Stabellini wrote: > > On Tue, 25 Nov 2014, Andrew Cooper wrote: > > > On 25/11/14 17:45, Stefano Stabellini wrote: > > > > Increase maxmem before calling xc_domain_populate_physmap_exact to avoid > > > > the risk of running out of g

Re: [Xen-devel] [PATCH] xsm/flask: improve unknown permission handling

2014-11-27 Thread Jan Beulich
>>> On 25.11.14 at 19:05, wrote: > --- a/xen/xsm/flask/hooks.c > +++ b/xen/xsm/flask/hooks.c > @@ -135,6 +135,19 @@ static int get_irq_sid(int irq, u32 *sid, struct > avc_audit_data *ad) > return 0; > } > > +static int avc_unknown_permission(const char* name, int id) const char *name >

Re: [Xen-devel] [PATCH for-4.5] xen/arm: Fix virtual timer on ARMv8 Model

2014-11-27 Thread Ian Campbell
On Tue, 2014-11-25 at 17:44 +, Julien Grall wrote: > ARMv8 model may not disable correctly the timer interrupt when Xen "correct disable" > context switch to an idle vCPU. Therefore Xen may receive a spurious "context switches" and s/spurious/unexpected/ (since spurious has a specific meanin

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Tim Deegan
At 08:42 + on 27 Nov (1417074133), Jan Beulich wrote: > >>> On 26.11.14 at 18:43, wrote: > > My v1 patch only fixes the VMX side of things. SVM doesn't explicitly > > identify a failed vmentry and lets it fall into the default case of the > > vmexit handler. As such, with v1, the infinite lo

Re: [Xen-devel] Q77 IGD instantly crashes on xen-pciback bind.

2014-11-27 Thread Dr. Greg Wettstein
On Nov 24, 1:28pm, Pasi =?iso-8859-1?Q?K=E4rkk=E4inen?= wrote: > Hello, Hi, hope the week is going well for everyone. > > >> As I was walking out the door I remembered I had been delinquent > > >> with information. The dom0 kernel is 32-bit 3.14.22 straight from > > >> kernel.org under a 64-bi

Re: [Xen-devel] segv in osevent_release_nexus with libxl backend to libvirt

2014-11-27 Thread Ian Campbell
On Wed, 2014-11-26 at 17:38 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [Xen-devel] segv in osevent_release_nexus with > libxl backend to libvirt"): > > I don't know if this helps but on the 3 occasions I've just looked at > > the ev passed to libxl__ev_fd_deregister contains an fd which

Re: [Xen-devel] kdump with xen-unstable on efi machine

2014-11-27 Thread Ian Campbell
On Wed, 2014-11-26 at 14:26 +, Andrew Cooper wrote: > libxc (or some new alternative) should suck it up and gain some notion > of a stable API or ABI (like the rest of the world appears to be able to > manage), such that it is possible to compile with an older header and > use a newer .so at ru

Re: [Xen-devel] Regression, host crash with 4.5rc1

2014-11-27 Thread Jan Beulich
>>> On 27.11.14 at 06:29, wrote: > On 11/25/2014 03:00 AM, Jan Beulich wrote: >> Okay, so it's not really the mwait-idle driver causing the regression, >> but it is C-state related. Hence we're now down to seeing whether all >> or just the deeper C states are affected, i.e. I now need to ask you >

[Xen-devel] [PATCH v3] INSTALL: correct EXTRA_CFLAGS handling

2014-11-27 Thread Olaf Hering
The already documented configure patch was not applied. Adjust documentation to describe existing behaviour. Signed-off-by: Olaf Hering Cc: Ian Campbell Cc: Ian Jackson Cc: Konrad Rzeszutek Wilk --- v3: reword as suggested by Konrad, trim Cc list v2: resend due to lack of Cc: tags INSTALL |

Re: [Xen-devel] [PATCH v15 17/21] x86/VPMU: Handle PMU interrupts for PV guests

2014-11-27 Thread Jan Beulich
>>> On 26.11.14 at 15:39, wrote: > On 11/25/2014 09:28 AM, Jan Beulich wrote: >> >>> +else >>> +{ >>> +struct segment_register seg; >>> + >>> +hvm_get_segment_register(sampled, x86_seg_cs, &seg); >>> +r->cs = seg.sel; >>> +

Re: [Xen-devel] [PATCH v15 11/21] x86/VPMU: Interface for setting PMU mode and flags

2014-11-27 Thread Jan Beulich
>>> On 26.11.14 at 15:32, wrote: > On 11/25/2014 08:49 AM, Jan Beulich wrote: > On 17.11.14 at 00:07, wrote: >>> @@ -244,19 +256,19 @@ void vpmu_initialise(struct vcpu *v) >>> switch ( vendor ) >>> { >>> case X86_VENDOR_AMD: >>> -if ( svm_vpmu_initialise(v, opt_vpmu

Re: [Xen-devel] [PATCH v15 11/21] x86/VPMU: Interface for setting PMU mode and flags

2014-11-27 Thread Jan Beulich
>>> On 26.11.14 at 15:26, wrote: > On 11/25/2014 08:36 AM, Jan Beulich wrote: >> >>> +static long vpmu_sched_checkin(void *arg) >>> +{ >>> +int cpu = cpumask_next(smp_processor_id(), &cpu_online_map); >> unsigned int. >> >>> +int ret; >>> + >>> +/* Mode change shouldn't take more than

Re: [Xen-devel] [PATCH for-4.5] tools/oxenstored: Fix | vs & error in fd event handling

2014-11-27 Thread Ian Campbell
On Wed, 2014-11-26 at 19:03 +, Andrew Cooper wrote: > On 26/11/14 18:41, Konrad Rzeszutek Wilk wrote: > > On Wed, Nov 26, 2014 at 06:24:11PM +, Dave Scott wrote: > >>> On 26 Nov 2014, at 15:38, Zheng Li wrote: > >>> > >>> On 26/11/2014 15:09, Andrew Cooper wrote: > This makes fields 0

Re: [Xen-devel] [PATCH RFCv3 3/8] xen: introduce XEN_DOMCTL_set_recipient

2014-11-27 Thread Jan Beulich
>>> On 25.11.14 at 18:10, wrote: > "Jan Beulich" writes: > > On 25.11.14 at 16:41, wrote: >>> "Jan Beulich" writes: >>> On 07.10.14 at 15:10, wrote: > @@ -1764,11 +1765,28 @@ void free_domheap_pages(struct page_info *pg, > unsigned int order) > scrub = 1; >

Re: [Xen-devel] [Planning for Xen-4.6] Migration v2

2014-11-27 Thread Ian Campbell
On Wed, 2014-11-26 at 17:39 +, Andrew Cooper wrote: > > IMHO this is fine. It essentially means that for xl users there is some > > delayed gratification wrt the promise of migration between non-alike > > dom0s. The migration from 4.5(legacy)->4.6(v2) won't support such > > migrations, but the

Re: [Xen-devel] [PATCH for-4.5 RFC v2] x86/HVM: Unconditionally crash guests on repeated vmentry failures

2014-11-27 Thread Jan Beulich
>>> On 26.11.14 at 18:43, wrote: > My v1 patch only fixes the VMX side of things. SVM doesn't explicitly > identify a failed vmentry and lets it fall into the default case of the > vmexit handler. As such, with v1, the infinite loop still affects AMD > hardware. Right; I should have said "somet

Re: [Xen-devel] [Planning for Xen-4.6] Migration v2

2014-11-27 Thread Hongyang Yang
在 11/26/2014 03:54 AM, Andrew Cooper 写道: Hello, The purpose of this email is to plan how to progress the migrationv2 series through to being merged. I believe I have CC'd everyone with a specific interest in this area, but apologies if I have missed anyone. Migration v2 is in exclusive use i