Re: [Xen-devel] [PATCH v4] x86/cpuid: AVX-512 Feature Detection

2016-07-04 Thread Kang, Luwei
What about remove the dependency between AVX2 and AVX512F ( AVX2: [AVX512F], ) ? -Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, July 1, 2016 3:56 PM To: andrew.coop...@citrix.com; Kang, Luwei Cc: chao.p.p...@linux.intel.com;

[Xen-devel] [xen-4.5-testing baseline-only test] 66514: regressions - trouble: blocked/broken/fail/pass

2016-07-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66514 xen-4.5-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66514/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 4

Re: [Xen-devel] [PATCH v4 4/8] monitor: ARM SMC events

2016-07-04 Thread Tamas K Lengyel
On Mon, Jul 4, 2016 at 2:02 PM, Julien Grall wrote: > > > On 04/07/2016 20:13, Tamas K Lengyel wrote: >>> >>> On ARMv8, ESR_EL2.ISS has a different encoding depending on the state >>> (i.e >>> AArch64 or AArch32). See D7-1861 in ARM DDI 0487A.i. Furthermore, in >>> AArch32

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 08:30 PM, Julien Grall wrote: > > > On 04/07/16 17:40, Sergej Proskurin wrote: >> On 07/04/2016 05:17 PM, Julien Grall wrote: >>> On 04/07/16 12:45, Sergej Proskurin wrote: > > [...] > +static struct p2m_domain *p2m_init_one(struct domain *d) +{ +struct

[Xen-devel] [PATCH v3 09/17] libxl/arm: Construct ACPI GTDT table

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Construct GTDT table with the interrupt information of timers. Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm_acpi.c | 29 + 1 file changed, 29 insertions(+) diff --git

[Xen-devel] [PATCH v3 16/17] libxc/xc_dom_core: Copy ACPI tables to guest space

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Copy all the ACPI tables to guest space so that UEFI or guest could access them. Signed-off-by: Shannon Zhao --- tools/libxc/xc_dom_core.c | 51 +++ 1 file changed, 51

[Xen-devel] [PATCH v3 06/17] libxl/arm: Estimate the size of ACPI tables

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Estimate the size of ACPI tables and reserve a memory map space for ACPI tables. Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm_acpi.c | 85 +++ xen/include/public/arch-arm.h |

[Xen-devel] [PATCH v3 17/17] libxl/arm: Initialize domain param HVM_PARAM_CALLBACK_IRQ

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao The guest kernel will get the event channel interrupt information via domain param HVM_PARAM_CALLBACK_IRQ. Initialize it here. Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm.c | 11 +++ 1 file changed, 11

[Xen-devel] [PATCH v3 07/17] libxl/arm: Construct ACPI RSDP table

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Construct ACPI RSDP table and add a helper to calculate the ACPI table checksum. Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm_acpi.c | 35 +++ 1 file changed, 35 insertions(+) diff

[Xen-devel] [PATCH v3 15/17] libxl/arm: Add ACPI module

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Add the ARM Multiboot module for ACPI, so UEFI or DomU can get the base address of ACPI tables from it. Signed-off-by: Shannon Zhao --- docs/misc/arm/device-tree/acpi.txt | 24

[Xen-devel] [PATCH v3 13/17] libxl/arm: Construct ACPI DSDT table

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Copy the static DSDT table into ACPI blob. Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm_acpi.c | 10 ++ 1 file changed, 10 insertions(+) diff --git a/tools/libxl/libxl_arm_acpi.c

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 08:18 PM, Julien Grall wrote: > > > On 04/07/16 17:43, Andrew Cooper wrote: >> On 04/07/16 17:40, Sergej Proskurin wrote: >>> >{ > -struct p2m_domain *p2m = >arch.p2m; > +int ret = 0; > + > +spin_lock_init(>lock); > +

Re: [Xen-devel] [PATCH 11/18] arm/altp2m: Make flush_tlb_domain ready for altp2m.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/2016 12:45, Sergej Proskurin wrote: This commit makes sure that the TLB of a domain considers flushing all of the associated altp2m views. Therefore, in case a different domain (not the currently active domain) shall flush its TLBs, the current implementation loops over

Re: [Xen-devel] [PATCH 15/18] arm/altp2m: Add altp2m paging mechanism.

2016-07-04 Thread Julien Grall
(CC Tamas) Hello Sergej, On 04/07/2016 12:45, Sergej Proskurin wrote: This commit adds the function p2m_altp2m_lazy_copy implementing the altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies the hostp2m's mapping into the currently active altp2m view on 2nd stage

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 07:56 PM, Tamas K Lengyel wrote: > On Mon, Jul 4, 2016 at 11:42 AM, Julien Grall wrote: >> >> >> On 04/07/16 12:45, Sergej Proskurin wrote: >>> >>> The Xen altp2m subsystem is currently supported only on x86-64 based >>> architectures. By utilizing ARM's

Re: [Xen-devel] [PATCH v14 3/3] IOMMU: fix vt-d Device-TLB flush timeout issue

2016-07-04 Thread Tian, Kevin
> From: Xu, Quan > Sent: Monday, July 04, 2016 5:12 PM > > From: Quan Xu > > If Device-TLB flush timed out, we hide the target ATS device > immediately. By hiding the device, we make sure it can't be > assigned to any domain any longer (see device_assigned). > >

[Xen-devel] [PATCH v3 01/17] libxl/arm: Factor out codes for generating DTB

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Factor out codes for generating DTB to prepare for adding ACPI tables generation codes. Signed-off-by: Shannon Zhao Acked-by: Wei Liu --- tools/libxl/libxl_arm.c | 18 -- 1 file changed,

[Xen-devel] [PATCH v3 03/17] libxl/arm: Add a configuration option for ARM DomU ACPI

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Add a configuration option for ARM DomU so that user can deicde to use ACPI or not. This option is defaultly false. Signed-off-by: Shannon Zhao --- tools/libxl/libxl.h | 5 + tools/libxl/libxl_types.idl | 1 +

[Xen-devel] [PATCH v3 02/17] libxc: Add placeholders for ACPI tables blob and size

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Add placeholders for ACPI tables blob and size here so that ACPI blob can be accessed from libxl and libxc. Signed-off-by: Shannon Zhao --- tools/libxc/include/xc_dom.h | 2 ++ 1 file changed, 2 insertions(+) diff --git

[Xen-devel] [PATCH v3 04/17] libxl/arm: prepare for constructing ACPI tables

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao It only constructs the ACPI tables for 64-bit ARM DomU when user enables acpi because 32-bit DomU doesn't support ACPI. Signed-off-by: Shannon Zhao --- tools/libxl/Makefile | 4 tools/libxl/libxl_arm.c |

[Xen-devel] [PATCH v3 12/17] libxl/arm: Construct ACPI FADT table

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm_acpi.c | 21 + 1 file changed, 21 insertions(+) diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c index 96ce605..6075391 100644

[Xen-devel] [PATCH v3 08/17] libxl/arm: Construct ACPI XSDT table

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm_acpi.c | 30 ++ 1 file changed, 30 insertions(+) diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/libxl/libxl_arm_acpi.c index

[Xen-devel] [PATCH v3 05/17] libxl/arm: Generate static ACPI DSDT table

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao It uses static DSDT table like the way x86 uses. Currently the DSDT table only contains processor device objects and it generates the maximal objects which so far is 128. Signed-off-by: Shannon Zhao ---

[Xen-devel] [PATCH v3 00/17] Xen ARM DomU ACPI support

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Note: while there are still two points (user configuration name and where to load the ACPI blob) which we don't reach an agreement and need other maintainer's opinions, but I'd like to send the updated series out since we could move forward and once we

[Xen-devel] [xen-4.7-testing test] 96645: trouble: blocked/broken/fail/pass

2016-07-04 Thread osstest service owner
flight 96645 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/96645/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 3 host-install(3) broken REGR. vs.

Re: [Xen-devel] [PATCH v14 3/3] IOMMU: fix vt-d Device-TLB flush timeout issue

2016-07-04 Thread Xu, Quan
On July 05, 2016 8:47 AM, Tian, Kevin wrote: > > From: Xu, Quan > > Sent: Monday, July 04, 2016 5:12 PM > > > > From: Quan Xu > > > > If Device-TLB flush timed out, we hide the target ATS device > > immediately. By hiding the device, we make sure it can't

Re: [Xen-devel] [PATCH 13/18] arm/altp2m: Make get_page_from_gva ready for altp2m.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/2016 12:45, Sergej Proskurin wrote: diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c index ce1c3c3..413125f 100644 --- a/xen/arch/arm/guestcopy.c +++ b/xen/arch/arm/guestcopy.c @@ -17,7 +17,7 @@ static unsigned long raw_copy_to_guest_helper(void *to, const

Re: [Xen-devel] [PATCH 17/18] arm/altp2m: Adjust debug information to altp2m.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/2016 12:45, Sergej Proskurin wrote: Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/p2m.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-)

[Xen-devel] [xen-unstable test] 96634: regressions - trouble: blocked/broken/fail/pass

2016-07-04 Thread osstest service owner
flight 96634 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/96634/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 96611

[Xen-devel] [PATCH v3 10/17] libxl/arm: Factor MPIDR computing codes out as a helper

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Factor MPIDR computing codes out as a helper, so it could be shared between DT and ACPI. Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm.c | 8 +--- tools/libxl/libxl_arm.h | 11 +++ 2 files changed, 12

[Xen-devel] [PATCH v3 14/17] libxl/arm: Factor finalise_one_memory_node as a gerneric function

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao Rename finalise_one_memory_node to finalise_one_node and pass the node name via function parameter. This is useful for adding ACPI module which will be added by a later patch. Signed-off-by: Shannon Zhao ---

[Xen-devel] [PATCH v3 11/17] libxl/arm: Construct ACPI MADT table

2016-07-04 Thread Shannon Zhao
From: Shannon Zhao According to the GIC version, construct the MADT table. Signed-off-by: Shannon Zhao --- tools/libxl/libxl_arm_acpi.c | 83 1 file changed, 83 insertions(+) diff --git

[Xen-devel] [qemu-mainline test] 96618: regressions - FAIL

2016-07-04 Thread osstest service owner
flight 96618 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/96618/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs. 94856

[Xen-devel] [distros-debian-sid test] 66516: trouble: blocked/broken

2016-07-04 Thread Platform Team regression test user
flight 66516 distros-debian-sid real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66516/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 4 capture-logs !broken

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 07:44 PM, Julien Grall wrote: > > > On 04/07/16 17:56, Sergej Proskurin wrote: >> Hi Andrew, >> >> On 07/04/2016 06:43 PM, Andrew Cooper wrote: >>> On 04/07/16 17:40, Sergej Proskurin wrote: >>{ >> -struct p2m_domain *p2m = >arch.p2m; >> +int ret = 0;

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/2016 22:19, Sergej Proskurin wrote: On 07/04/2016 07:44 PM, Julien Grall wrote: On 04/07/16 17:56, Sergej Proskurin wrote: On 07/04/2016 06:43 PM, Andrew Cooper wrote: On 04/07/16 17:40, Sergej Proskurin wrote: { -struct p2m_domain *p2m = >arch.p2m; +int

[Xen-devel] [seabios baseline-only test] 66515: tolerable FAIL

2016-07-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66515 seabios real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66515/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 11:19 PM, Sergej Proskurin wrote: > > On 07/04/2016 07:44 PM, Julien Grall wrote: >> >> >> On 04/07/16 17:56, Sergej Proskurin wrote: >>> Hi Andrew, >>> >>> On 07/04/2016 06:43 PM, Andrew Cooper wrote: On 04/07/16 17:40, Sergej Proskurin wrote: > >>>{ >>> -

[Xen-devel] [ovmf test] 96639: regressions - FAIL

2016-07-04 Thread osstest service owner
flight 96639 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/96639/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94748

Re: [Xen-devel] [PATCH 08/18] arm/altp2m: Add HVMOP_altp2m_destroy_p2m.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 12:45, Sergej Proskurin wrote: Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c| 2 +- xen/arch/arm/p2m.c| 32

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Andrew Cooper
On 04/07/16 17:40, Sergej Proskurin wrote: > >>> { >>> -struct p2m_domain *p2m = >arch.p2m; >>> +int ret = 0; >>> + >>> +spin_lock_init(>lock); >>> +INIT_PAGE_LIST_HEAD(>pages); >>> + >>> +spin_lock(>lock); >>> + >>> +p2m->domain = d; >>> +p2m->access_required =

[Xen-devel] [PULL 01/36] xen: fix ram init regression

2016-07-04 Thread Michael S. Tsirkin
From: Gerd Hoffmann Commit "8156d48 pc: allow raising low memory via max-ram-below-4g option" causes a regression on xen, because it uses a different memory split. This patch initializes max-ram-below-4g to zero and leaves the initialization to the memory initialization

Re: [Xen-devel] [PATCH 0/6] xenconsoled: rotating log file abstration

2016-07-04 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH 0/6] xenconsoled: rotating log file abstration"): > Ian, do you have any opinion on this series? > > Despite the pending discussion of how to proceed on the logging issue, I > think this functionality is useful to have in xenconsoled. I was waiting for a decision on

Re: [Xen-devel] [PATCH 06/18] arm/altp2m: Add a(p2m) table flushing routines.

2016-07-04 Thread Julien Grall
On 04/07/16 12:45, Sergej Proskurin wrote: +void p2m_flush_altp2m(struct domain *d) +{ +unsigned int i; + +altp2m_lock(d); + +for ( i = 0; i < MAX_ALTP2M; i++ ) +{ +p2m_flush_table(d->arch.altp2m_p2m[i]); +flush_tlb(); I forgot to comment on this line. Can you

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 7:16 PM, Jan Beulich wrote: On 04.07.16 at 18:09, wrote: Now that I think about it, that's feasible too. So then, make arch_vm_event be dynamically allocated as it was, but slightly change its definition to: struct arch_vm_event { uint32_t

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
Hello Julien, On 07/04/2016 05:17 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/16 12:45, Sergej Proskurin wrote: >> The p2m intialization now invokes intialization routines responsible for > > s/intialization/initialization/ > >> the allocation and intitialization of altp2m structures.

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
Hello Julien, On 07/04/2016 06:15 PM, Julien Grall wrote: > > > On 04/07/16 12:45, Sergej Proskurin wrote: >> +static void p2m_teardown_hostp2m(struct domain *d) >> +{ >> +struct p2m_domain *p2m = p2m_get_hostp2m(d); >> +struct page_info *pg = NULL; >> +mfn_t mfn; >> +unsigned

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
Hi Andrew, On 07/04/2016 06:43 PM, Andrew Cooper wrote: > On 04/07/16 17:40, Sergej Proskurin wrote: >> { -struct p2m_domain *p2m = >arch.p2m; +int ret = 0; + +spin_lock_init(>lock); +INIT_PAGE_LIST_HEAD(>pages); + +spin_lock(>lock);

Re: [Xen-devel] [PATCH 4/6] libxl: debug output for args and env when invoking hotplug script

2016-07-04 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH 4/6] libxl: debug output for args and env when invoking hotplug script"): > > From 49714976c5fde3d08baa6f34295b3f7db6a81444 Mon Sep 17 00:00:00 2001 > > From: Wei Liu > > Date: Fri, 15 Apr 2016 12:56:03 +0100 > > Subject: [PATCH] libxl: debug

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Julien Grall
On 04/07/16 12:45, Sergej Proskurin wrote: The Xen altp2m subsystem is currently supported only on x86-64 based architectures. By utilizing ARM's virtualization extensions, we intend to implement altp2m support for ARM architectures and thus further extend current Virtual Machine Introspection

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Julien Grall
On 04/07/16 17:56, Sergej Proskurin wrote: Hi Andrew, On 07/04/2016 06:43 PM, Andrew Cooper wrote: On 04/07/16 17:40, Sergej Proskurin wrote: { -struct p2m_domain *p2m = >arch.p2m; +int ret = 0; + +spin_lock_init(>lock); +INIT_PAGE_LIST_HEAD(>pages); + +

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Tamas K Lengyel
On Mon, Jul 4, 2016 at 11:42 AM, Julien Grall wrote: > > > On 04/07/16 12:45, Sergej Proskurin wrote: >> >> The Xen altp2m subsystem is currently supported only on x86-64 based >> architectures. By utilizing ARM's virtualization extensions, we intend >> to implement altp2m

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Julien Grall
On 04/07/16 17:40, Sergej Proskurin wrote: On 07/04/2016 05:17 PM, Julien Grall wrote: On 04/07/16 12:45, Sergej Proskurin wrote: [...] +static struct p2m_domain *p2m_init_one(struct domain *d) +{ +struct p2m_domain *p2m = xzalloc(struct p2m_domain); + +if ( !p2m ) +return

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Julien Grall
On 04/07/16 17:51, Sergej Proskurin wrote: On 07/04/2016 06:15 PM, Julien Grall wrote: On 04/07/16 12:45, Sergej Proskurin wrote: +static void p2m_teardown_hostp2m(struct domain *d) +{ +struct p2m_domain *p2m = p2m_get_hostp2m(d); +struct page_info *pg = NULL; +mfn_t mfn; +

Re: [Xen-devel] [PATCH 10/18] arm/altp2m: Renamed and extended p2m_alloc_table.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 12:45, Sergej Proskurin wrote: +int p2m_table_init(struct domain *d) +{ +int i = 0; +int rc = -ENOMEM; +struct p2m_domain *p2m = p2m_get_hostp2m(d); + +spin_lock(>lock); + +rc = p2m_alloc_table(p2m); +if ( rc != 0 ) +goto out; + +

[Xen-devel] [xen-unstable baseline-only test] 66513: regressions - trouble: blocked/broken/fail/pass

2016-07-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66513 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66513/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf 4 capture-logs

Re: [Xen-devel] [PATCH 6/8] x86/time: support 32-bit wide ACPI PM timer

2016-07-04 Thread Andrew Cooper
On 15/06/16 11:29, Jan Beulich wrote: > I have no idea why we didn't do so from the beginning. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org

Re: [Xen-devel] [PATCH 06/18] arm/altp2m: Add a(p2m) table flushing routines.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 13:12, Sergej Proskurin wrote: +/* Reset this p2m table to be empty */ +static void p2m_flush_table(struct p2m_domain *p2m) +{ +struct page_info *top, *pg; +mfn_t mfn; +unsigned int i; + +/* Check whether the p2m table has already been flushed before.

Re: [Xen-devel] [PATCH 5/8] x86/time: correctly honor late clearing of TSC related feature flags

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 17:39, wrote: > On 20/06/16 16:20, Jan Beulich wrote: > On 20.06.16 at 16:32, wrote: >>> On 15/06/16 11:28, Jan Beulich wrote: --- a/xen/arch/x86/time.c +++ b/xen/arch/x86/time.c @@ -1358,6 +1358,24 @@

Re: [Xen-devel] [PATCH 06/18] arm/altp2m: Add a(p2m) table flushing routines.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 12:45, Sergej Proskurin wrote: The current implementation differentiates between flushing and destroying altp2m views. This commit adds the functions p2m_flush_altp2m, and p2m_flush_table, which allow to flush all or individual altp2m views without destroying the

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 5:58 PM, Jan Beulich wrote: On 04.07.16 at 13:02, wrote: On 7/4/2016 1:22 PM, Jan Beulich wrote: On 30.06.16 at 20:43, wrote: @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr) return test_bit(msr,

[Xen-devel] [xen-4.7-testing test] 96628: regressions - FAIL

2016-07-04 Thread osstest service owner
flight 96628 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/96628/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 15 guest-localmigrate/x10 fail REGR. vs. 96002

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 6:57 PM, Jan Beulich wrote: On 04.07.16 at 17:21, wrote: On 7/4/2016 6:07 PM, Jan Beulich wrote: On 04.07.16 at 16:21, wrote: On 07/04/16 17:17, Jan Beulich wrote: On 04.07.16 at 15:50, wrote: On

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 18:09, wrote: > Now that I think about it, that's feasible too. So then, make > arch_vm_event be dynamically allocated as it was, but slightly change > its definition to: > > struct arch_vm_event { > uint32_t emulate_flags; > struct

Re: [Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Julien Grall
On 04/07/16 12:45, Sergej Proskurin wrote: +static void p2m_teardown_hostp2m(struct domain *d) +{ +struct p2m_domain *p2m = p2m_get_hostp2m(d); +struct page_info *pg = NULL; +mfn_t mfn; +unsigned int i; + +spin_lock(>lock); -if ( p2m->root ) -

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 4:11 PM, Jan Beulich wrote: On 04.07.16 at 15:03, wrote: On 7/4/2016 3:47 PM, Jan Beulich wrote: On 30.06.16 at 20:45, wrote: The arch_vm_event structure is dynamically allocated and freed @ vm_event_cleanup_domain. This cleanup is

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 15:50, wrote: > On 07/04/16 16:11, Jan Beulich wrote: > On 04.07.16 at 15:03, wrote: >>> On 7/4/2016 3:47 PM, Jan Beulich wrote: >>> On 30.06.16 at 20:45, wrote: > The arch_vm_event structure

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Razvan Cojocaru
On 07/04/16 17:05, Jan Beulich wrote: On 04.07.16 at 15:22, wrote: >> On 07/04/16 13:22, Jan Beulich wrote: >> On 30.06.16 at 20:43, wrote: @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr) return

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 5:17 PM, Jan Beulich wrote: On 04.07.16 at 15:50, wrote: On 07/04/16 16:11, Jan Beulich wrote: On 04.07.16 at 15:03, wrote: On 7/4/2016 3:47 PM, Jan Beulich wrote: On 30.06.16 at 20:45, wrote: The

[Xen-devel] [PATCH v2 5/5] xl: new loglvl command

2016-07-04 Thread Wei Liu
Introduce a new command to dynamically change log level thresholds. Provide adequate documentation. Based on a patch by Jan Beulich. Signed-off-by: Jan Beulich Signed-off-by: Wei Liu --- Cc: Jan Beulich Cc: Ian Jackson

[Xen-devel] [PATCH v2 0/5] Allow runtime adjustment to log level thresholds

2016-07-04 Thread Wei Liu
Previously Jan posted [0]. The downside of that approach is that we need to rework log level number space to make it suitable for stable API (safe against addition and removal of numbers). This version changes the interface to use buffers that contain string representation of log level. User

[Xen-devel] [PATCH v2 2/5] xen/console: allow log level threshold adjustments

2016-07-04 Thread Wei Liu
... from serial console and via sysctl so that one doesn't always need to reboot to see more / less messages. Note that upper thresholds driven from the serial console are sticky, i.e. while they get adjusted upwards when the lower threshold would otherwise end up above the upper one, they don't

[Xen-devel] [PATCH v2 4/5] libxl: introduce APIs to get and set log level

2016-07-04 Thread Wei Liu
Signed-off-by: Wei Liu --- Cc: Ian Jackson Cc: Jan Beulich --- tools/libxl/libxl.c | 40 tools/libxl/libxl.h | 11 +++ 2 files changed, 51 insertions(+) diff --git

[Xen-devel] [PATCH v2 1/5] xen/console: consolidate log levels to an array

2016-07-04 Thread Wei Liu
It cleaner than open-coding strings and numbers. The array will also become handy later when we need to refactor things a bit. No functional change. Signed-off-by: Wei Liu --- Cc: Jan Beulich --- xen/drivers/char/console.c | 25 +++--

[Xen-devel] [PATCH v2 3/5] libxc: wrapper for log level sysctl

2016-07-04 Thread Wei Liu
Signed-off-by: Wei Liu --- Cc: Ian Jackson Cc: Jan Beulich --- tools/libxc/include/xenctrl.h | 6 ++ tools/libxc/xc_misc.c | 143 ++ 2 files changed, 149 insertions(+) diff

[Xen-devel] [xen-unstable-smoke test] 96636: trouble: broken/pass

2016-07-04 Thread osstest service owner
flight 96636 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/96636/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 3 host-install(3) broken REGR. vs.

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 6:07 PM, Jan Beulich wrote: On 04.07.16 at 16:21, wrote: On 07/04/16 17:17, Jan Beulich wrote: On 04.07.16 at 15:50, wrote: On 07/04/16 16:11, Jan Beulich wrote: On 04.07.16 at 15:03, wrote: On

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 6:09 PM, Jan Beulich wrote: On 04.07.16 at 16:31, wrote: Hmm, I meant "<= 80" the first time too, I was under the impression that that's what CODING_STYLE asks for too, but, quoting: 'Lines should be less than 80 characters in length.' Why not <= 80?

Re: [Xen-devel] [PATCH v2 1/5] xen/console: consolidate log levels to an array

2016-07-04 Thread Wei Liu
On Mon, Jul 04, 2016 at 04:13:22PM +0100, Wei Liu wrote: > It cleaner than open-coding strings and numbers. The array will also > become handy later when we need to refactor things a bit. > > No functional change. > > Signed-off-by: Wei Liu > --- > Cc: Jan Beulich

Re: [Xen-devel] [PATCH 5/8] x86/time: correctly honor late clearing of TSC related feature flags

2016-07-04 Thread Andrew Cooper
On 20/06/16 16:20, Jan Beulich wrote: On 20.06.16 at 16:32, wrote: >> On 15/06/16 11:28, Jan Beulich wrote: >>> --- a/xen/arch/x86/time.c >>> +++ b/xen/arch/x86/time.c >>> @@ -1358,6 +1358,24 @@ static void time_calibration(void *unuse >>> ,

Re: [Xen-devel] [PATCH 05/18] arm/altp2m: Add HVMOP_altp2m_set_domain_state.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 12:45, Sergej Proskurin wrote: diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c index 8e8e0f7..cb90a55 100644 --- a/xen/arch/arm/hvm.c +++ b/xen/arch/arm/hvm.c @@ -104,8 +104,36 @@ static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg) break;

Re: [Xen-devel] [PATCH 7/8] x86/time: fold recurring code

2016-07-04 Thread Andrew Cooper
On 15/06/16 11:30, Jan Beulich wrote: > Common code between time_calibration_{std,tsc}_rendezvous() can better > live in a single place, eliminating the risk of adjusting one without > the other. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 17:21, wrote: > On 7/4/2016 6:07 PM, Jan Beulich wrote: > On 04.07.16 at 16:21, wrote: >>> On 07/04/16 17:17, Jan Beulich wrote: >>> On 04.07.16 at 15:50, wrote: > On 07/04/16 16:11, Jan

Re: [Xen-devel] [PATCH 8/8] x86/time: group time stamps into a structure

2016-07-04 Thread Andrew Cooper
On 15/06/16 11:30, Jan Beulich wrote: > If that had been done from the beginning, mistakes like the one > corrected in commit b64438c7c1 ("x86/time: use correct (local) time > stamp in constant-TSC calibration fast path") would likely never have > happened. > > Also add a few "const" to make more

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 18:00, wrote: > On 7/4/2016 5:58 PM, Jan Beulich wrote: > On 04.07.16 at 13:02, wrote: >>> On 7/4/2016 1:22 PM, Jan Beulich wrote: >>> On 30.06.16 at 20:43, wrote: > @@ -119,6 +156,55 @@ bool_t

Re: [Xen-devel] [PATCH 02/18] arm/altp2m: Add first altp2m HVMOP stubs.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 12:45, Sergej Proskurin wrote: This commit moves the altp2m-related code from x86 to ARM. Looking at the code in the follow-up patches, I have the impression that the code is very similar (if not exactly) to the x86 code. If so, we should move the HVMOP for altp2m

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 4:50 PM, Razvan Cojocaru wrote: On 07/04/16 16:11, Jan Beulich wrote: On 04.07.16 at 15:03, wrote: On 7/4/2016 3:47 PM, Jan Beulich wrote: On 30.06.16 at 20:45, wrote: The arch_vm_event structure is dynamically allocated and freed @

Re: [Xen-devel] [PATCH 4/8] x86/vm-event/monitor: turn monitor_write_data.do_write into enum

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 15:21, wrote: > On 7/4/2016 4:07 PM, Jan Beulich wrote: > On 04.07.16 at 14:47, wrote: >>> On 7/4/2016 3:37 PM, Jan Beulich wrote: >>> On 30.06.16 at 20:44, wrote: > After trapping a

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 15:22, wrote: > On 07/04/16 13:22, Jan Beulich wrote: > On 30.06.16 at 20:43, wrote: >>> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr) >>> return test_bit(msr, bitmap); >>> } >>> >>>

[Xen-devel] [ovmf test] 96614: regressions - FAIL

2016-07-04 Thread osstest service owner
flight 96614 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/96614/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94748

Re: [Xen-devel] [PATCH 4/8] x86/vm-event/monitor: turn monitor_write_data.do_write into enum

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 16:24, wrote: > On 7/4/2016 5:08 PM, Jan Beulich wrote: > On 04.07.16 at 15:21, wrote: >>> On 7/4/2016 4:07 PM, Jan Beulich wrote: >>> On 04.07.16 at 14:47, wrote: > On 7/4/2016 3:37 PM, Jan

Re: [Xen-devel] [PATCH 18/18] arm/altp2m: Extend xen-access for altp2m on ARM.

2016-07-04 Thread Razvan Cojocaru
On 07/04/16 14:45, Sergej Proskurin wrote: > Signed-off-by: Sergej Proskurin > --- > Cc: Razvan Cojocaru > Cc: Tamas K Lengyel > Cc: Ian Jackson > Cc: Wei Liu > --- >

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
Hello Julien, On 07/04/2016 03:25 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/16 12:45, Sergej Proskurin wrote: >> The Xen altp2m subsystem is currently supported only on x86-64 based >> architectures. By utilizing ARM's virtualization extensions, we intend >> to implement altp2m

Re: [Xen-devel] [PATCH 02/18] arm/altp2m: Add first altp2m HVMOP stubs.

2016-07-04 Thread Sergej Proskurin
Hello Julien, On 07/04/2016 03:36 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/16 12:45, Sergej Proskurin wrote: >> This commit moves the altp2m-related code from x86 to ARM. > > Looking at the code in the follow-up patches, I have the impression that > the code is very similar (if not

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 15:28, wrote: > On 7/4/2016 4:11 PM, Jan Beulich wrote: > On 04.07.16 at 15:03, wrote: >>> On 7/4/2016 3:47 PM, Jan Beulich wrote: >>> On 30.06.16 at 20:45, wrote: > The arch_vm_event structure

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Razvan Cojocaru
On 07/04/16 17:17, Jan Beulich wrote: On 04.07.16 at 15:50, wrote: >> On 07/04/16 16:11, Jan Beulich wrote: >> On 04.07.16 at 15:03, wrote: On 7/4/2016 3:47 PM, Jan Beulich wrote: On 30.06.16 at 20:45,

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 5:16 PM, Razvan Cojocaru wrote: On 07/04/16 17:05, Jan Beulich wrote: On 04.07.16 at 15:22, wrote: On 07/04/16 13:22, Jan Beulich wrote: On 30.06.16 at 20:43, wrote: @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain

Re: [Xen-devel] repeating 'd1v0 Over-allocation for domain 1' messages in xen 4.7 Host logs on PVHVM Guest launch

2016-07-04 Thread PGNet Dev
On 07/04/2016 04:22 AM, George Dunlap wrote: Thanks for your persistence. :-) I appreciate the reply :-) It's likely that this is related to a known problem with the interface between the balloon driver and the toolstack. The warning itself is benign: it simply means that the balloon driver

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 13:02, wrote: > On 7/4/2016 1:22 PM, Jan Beulich wrote: > On 30.06.16 at 20:43, wrote: >>> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr) >>> return test_bit(msr, bitmap); >>> } >>> >>>

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 16:21, wrote: > On 07/04/16 17:17, Jan Beulich wrote: > On 04.07.16 at 15:50, wrote: >>> On 07/04/16 16:11, Jan Beulich wrote: >>> On 04.07.16 at 15:03, wrote: > On 7/4/2016 3:47 PM, Jan

  1   2   3   >