[Xen-devel] [qemu-upstream-4.5-testing test] 83042: trouble: broken/fail/pass

2016-02-20 Thread osstest service owner
flight 83042 qemu-upstream-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83042/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl   3 host-install(3) broken REGR. vs. 82621

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemuu-winxpsp3 13 guest-localmigrate   fail REGR. vs. 82621
 test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail blocked in 82621
 test-amd64-amd64-xl-rtds  6 xen-boot fail   like 82621
 test-armhf-armhf-xl-credit2  15 guest-start/debian.repeatfail   like 82621
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 82621
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop  fail like 82621

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pvh-intel 11 guest-start  fail  never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start  fail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-libvirt-qcow2 10 guest-start  fail never pass
 test-armhf-armhf-libvirt-raw 10 guest-start  fail   never pass
 test-armhf-armhf-xl-vhd  10 guest-start  fail   never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-checkfail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-checkfail never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-checkfail  never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-checkfail  never pass
 test-armhf-armhf-xl-rtds 13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-rtds 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt 12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-checkfail   never pass

version targeted for testing:
 qemuu90045485cae7ba34334c5f2a6e7b007f2ab7dc2d
baseline version:
 qemuu6d285f1ceb317286c3198a1a13737baa303a814f

Last test of basis82621  2016-02-15 04:19:07 Z5 days
Testing same since83042  2016-02-18 17:59:34 Z1 days1 attempts


People who touched revisions under test:
  Don Slutz 
  Paolo Bonzini 

jobs:
 build-amd64  pass
 build-armhf  pass
 build-i386   pass
 build-amd64-libvirt  pass
 build-armhf-libvirt  pass
 build-i386-libvirt   pass
 build-amd64-pvopspass
 build-armhf-pvopspass
 build-i386-pvops pass
 test-amd64-amd64-xl  pass
 test-armhf-armhf-xl  broken  
 test-amd64-i386-xl   pass
 test-amd64-amd64-qemuu-nested-amdfail
 test-amd64-amd64-xl-pvh-amd  fail
 test-amd64-i386-qemuu-rhel6hvm-amd   pass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64pass
 test-amd64-i386-xl-qemuu-debianhvm-amd64 pass
 test-amd64-i386-freebsd10-amd64  pass
 test-amd64-amd64-xl-qemuu-ovmf-amd64 pass
 test-amd64-i386-xl-qemuu-ovmf-amd64  pass
 test-amd64-amd64-xl-qemuu-win7-amd64 fail
 test-amd64-i386-xl-qemuu-win7-amd64  fail
 test-armhf-armhf-xl-arndale  pass
 test-amd64-amd64-xl-credit2  pass
 test-armhf-armhf-xl-credit2  fail
 test-armhf-armhf-xl-cubietruck   pass
 test-amd64-i386-freebsd10-i386   pass
 test-amd64-amd64-qemuu-nested-intel 

Re: [Xen-devel] [RFC v2 2/6] x86/init: use linker tables to simplify x86 init and annotate dependencies

2016-02-20 Thread Luis R. Rodriguez
On Fri, Feb 19, 2016 at 08:40:49AM -0800, Andy Lutomirski wrote:
> On Fri, Feb 19, 2016 at 6:15 AM, Luis R. Rodriguez  wrote:
> > Any failure on the x86 init path can be catastrophic.
> > A simple shift of a call from one place to another can
> > easily break things. Likewise adding a new call to
> > one path without considering all x86 requirements
> > can make certain x86 run time environments crash.
> > We currently account for these requirements through
> > peer code review and run time testing. We could do
> > much better if we had a clean and simple way to annotate
> > strong semantics for run time requirements, init sequence
> > dependencies, and detection mechanisms for additions of
> > new x86 init sequences.
> 
> Please document this in a way that will be useful for people trying to
> understand what the code does as opposed to just people who are trying
> to understand why you wrote it.  More below.

Sure. I'm kind of glad people are getting tired of me trying to
explain *why* I wrote it though, I figured that might be the harder
thing to explain. Hopefully it sinks in.

> > +/**
> > + * struct x86_init_fn - x86 generic kernel init call
> > + *
> > + * Linux x86 features vary in complexity, features may require work done at
> > + * different levels of the full x86 init sequence. Today there are also two
> > + * different possible entry points for Linux on x86, one for bare metal, 
> > KVM
> > + * and Xen HVM, and another for Xen PV guests / dom0.  Assuming a 
> > bootloader
> > + * has set up 64-bit mode, roughly the x86 init sequence follows this path:
> > + *
> > + * Bare metal, KVM, Xen HVM  Xen PV / dom0
> > + *   startup_64() startup_xen()
> > + *  \ /
> > + *  x86_64_start_kernel() xen_start_kernel()
> > + *   \   /
> > + *  x86_64_start_reservations()
> > + *   |
> > + *  start_kernel()
> > + *  [   ...]
> > + *  [ setup_arch() ]
> > + *  [   ...]
> > + *  init
> > + *
> 
> 
> I don't think this paragraph below is necessary.  I also think it's
> very confusing.  Keep in mind that the reader has no idea what a
> "level" is at this point and that the reader also doesn't need to
> think about terms like "paravirtualization yielding".
> 
> > + * x86_64_start_kernel() and xen_start_kernel() are the respective first C 
> > code
> > + * entry starting points. The different entry points exist to enable Xen to
> > + * skip a lot of hardware setup already done and managed on behalf of the
> > + * hypervisor, we refer to this as "paravirtualization yielding". The 
> > different
> > + * levels of init calls on the x86 init sequence exist to account for these
> > + * slight differences and requirements. These different entry points also 
> > share
> > + * a common entry x86 specific path, x86_64_start_reservations().

OK sure, I'll nuke.

> > + *
> 
> And here, I don't even know what a "feature" is.

Kasan is an example.

> > + * A generic x86 feature can have different initialization calls, one on 
> > each
> > + * of the different main x86 init sequences, but must also address both 
> > entry
> > + * points in order to work properly across the board on all supported x86
> > + * subarchitectures. Since x86 features can also have dependencies on other
> > + * setup code or features, x86 features can at times be subordinate to 
> > other
> > + * x86 features, or conditions. struct x86_init_fn enables feature 
> > developers
> > + * to annotate dependency relationships to ensure subsequent init calls 
> > only
> > + * run once a subordinate's dependencies have run. When needed custom
> > + * dependency requirements can also be spelled out through a custom 
> > dependency
> > + * checker. In order to account for the dual entry point nature of x86-64 
> > Linux
> > + * for "paravirtualization yielding" and to make annotations for support 
> > for
> > + * these explicit each struct x86_init_fn must specify supported
> > + * subarchitectures. The earliest x86-64 code can read the subarchitecture
> > + * though is after load_idt(), as such the earliest we can currently rely 
> > on
> > + * subarchitecture for semantics and a common init sequences is on the 
> > shared
> > + * common x86_64_start_reservations().  Each struct x86_init_fn must also
> > + * declare a two-digit decimal number to impose an ordering relative to 
> > other
> > + * features when required.
> 
> I'm totally lost in the paragraph above.

As an example Kasan could be defined as a struct x86_init_fn with a respective
callback on x86_64_start_kernel() (kasan_early_init()) and later setup_arch()
(kasan_init()). Since we can't support for struct x86_init_fn calls to start all
the 

[Xen-devel] [qemu-upstream-4.6-testing test] 83043: regressions - FAIL

2016-02-20 Thread osstest service owner
flight 83043 qemu-upstream-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83043/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-xsm5 xen-build fail REGR. vs. 82482

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 82482
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop  fail like 82482

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xl-xsm1 build-check(1)   blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm  1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-pvh-intel 11 guest-start  fail  never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start  fail   never pass
 test-armhf-armhf-libvirt 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-qcow2 11 migrate-support-checkfail never pass
 test-armhf-armhf-libvirt-qcow2 13 guest-saverestorefail never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-libvirt-raw 13 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-xsm 14 guest-saverestorefail   never pass
 test-armhf-armhf-xl  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  13 saverestore-support-checkfail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-checkfail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-checkfail never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-checkfail  never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-checkfail  never pass
 test-armhf-armhf-xl-rtds 13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-rtds 12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-rtds 15 guest-start/debian.repeatfail   never pass
 test-armhf-armhf-xl-vhd  11 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-vhd  12 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-xsm  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-xsm  12 migrate-support-checkfail   never pass

version targeted for testing:
 qemuu9869880372c8e786502ce140d50158118e29a165
baseline version:
 qemuu36d4ccc357252ff5506352c4815533f0a3ebc116

Last test of basis82482  2016-02-14 09:52:11 Z6 days
Testing same since83043  2016-02-18 18:00:16 Z1 days1 attempts


People who touched revisions under test:
  Don Slutz 
  Paolo Bonzini 

jobs:
 build-amd64-xsm  pass
 build-armhf-xsm  pass
 build-i386-xsm   fail
 build-amd64  pass
 build-armhf  pass
 build-i386   pass
 build-amd64-libvirt  pass
 build-armhf-libvirt  pass
 build-i386-libvirt   pass
 build-amd64-pvopspass
 build-armhf-pvopspass
 build-i386-pvops pass
 test-amd64-amd64-xl  pass
 test-armhf-armhf-xl  pass
 test-amd64-i386-xl  

[Xen-devel] [PATCH 2/2] arm: CONFIG_ARM_{32, 64} defined by Kconfig

2016-02-20 Thread Doug Goldstein
CONFIG_ARM_32 and CONFIG_ARM_64 is defined by Kconfig.

Signed-off-by: Doug Goldstein 
---
CC: Ian Campbell 
CC: Stefano Stabellini 
---
 xen/include/asm-arm/config.h | 6 --
 1 file changed, 6 deletions(-)

diff --git a/xen/include/asm-arm/config.h b/xen/include/asm-arm/config.h
index a1b968d..c3a2c30 100644
--- a/xen/include/asm-arm/config.h
+++ b/xen/include/asm-arm/config.h
@@ -7,12 +7,6 @@
 #ifndef __ARM_CONFIG_H__
 #define __ARM_CONFIG_H__
 
-#if defined(__aarch64__)
-# define CONFIG_ARM_64 1
-#elif defined(__arm__)
-# define CONFIG_ARM_32 1
-#endif
-
 #if defined(CONFIG_ARM_64)
 # define LONG_BYTEORDER 3
 #else
-- 
2.4.10


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


[Xen-devel] [PATCH 1/2] x86: CONFIG_X86 defined by Kconfig

2016-02-20 Thread Doug Goldstein
CONFIG_X86 is defined by Kconfig when building for x86.

Signed-off-by: Doug Goldstein 
---
CC: Keir Fraser 
CC: Jan Beulich 
CC: Andrew Cooper 
---
 xen/include/asm-x86/config.h | 1 -
 1 file changed, 1 deletion(-)

diff --git a/xen/include/asm-x86/config.h b/xen/include/asm-x86/config.h
index a45d3ee..07f3c1f 100644
--- a/xen/include/asm-x86/config.h
+++ b/xen/include/asm-x86/config.h
@@ -16,7 +16,6 @@
 
 #define BITS_PER_XEN_ULONG BITS_PER_LONG
 
-#define CONFIG_X86 1
 #define CONFIG_PAGING_ASSISTANCE 1
 #define CONFIG_X86_LOCAL_APIC 1
 #define CONFIG_X86_GOOD_APIC 1
-- 
2.4.10


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] xen-netfront: set real_num_tx_queues to zreo avoid to trigger BUG_ON

2016-02-20 Thread Sergei Shtylyov

On 02/20/2016 04:27 AM, Gonglei wrote:


It's possible for a race condition to exist between xennet_open() and
talk_to_netback(). After invoking netfront_probe() then other
threads or processes invoke xennet_open (such as NetworkManager)
immediately may trigger BUG_ON(). Besides, we also should reset
real_num_tx_queues in xennet_destroy_queues().

 [ 3324.658057] kernel BUG at include/linux/netdevice.h:508!
 [ 3324.658057] invalid opcode:  [#1] SMP
 [ 3324.658057] CPU: 0 PID: 662 Comm: NetworkManager Tainted: G
 [] ? raw_notifier_call_chain+0x16/0x20
 [] __dev_open+0xce/0x150
 [] __dev_change_flags+0xa1/0x170
 [] dev_change_flags+0x29/0x70
 [] do_setlink+0x39f/0xb40
 [] ? nla_parse+0x32/0x120
 [] rtnl_newlink+0x604/0x900
 [] ? netlink_unicast+0x193/0x1c0
 [] ? security_capable+0x18/0x20
 [] ? ns_capable+0x2d/0x60
 [] rtnetlink_rcv_msg+0xf5/0x270
 [] ? rhashtable_lookup_compare+0x5d/0xa0
 [] ? rtnetlink_rcv+0x40/0x40
 [] netlink_rcv_skb+0xb9/0xe0
 [] rtnetlink_rcv+0x2c/0x40
 [] netlink_unicast+0x12d/0x1c0
 [] netlink_sendmsg+0x4d3/0x630
 [] ? sock_has_perm+0x72/0x90
 [] do_sock_sendmsg+0x9f/0xc0
 [ 3324.703482] RIP  [] xennet_open+0x180/0x182 
[xen_netfront]

CC: David S. Miller 
Signed-off-by: Gonglei 


   Full name required for this tag.

[...]

MBR, Sergei


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


[Xen-devel] [libvirt test] 83119: tolerable FAIL - PUSHED

2016-02-20 Thread osstest service owner
flight 83119 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83119/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-qcow2 11 migrate-support-checkfail never pass
 test-armhf-armhf-libvirt-qcow2 13 guest-saverestorefail never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-xsm 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt-raw 13 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail   never pass

version targeted for testing:
 libvirt  647ac97ab6797fa2de58c1a8d36811a3fb915e94
baseline version:
 libvirt  cda1cc170f07b45911b3dad03e42c8ebfc210fa1

Last test of basis82949  2016-02-17 04:25:44 Z3 days
Testing same since83119  2016-02-19 04:58:42 Z1 days1 attempts


People who touched revisions under test:
  Bjoern Walk 
  Cole Robinson 
  Erik Skultety 
  John Ferlan 
  Ján Tomko 
  Martin Kletzander 
  Matthias Bolte 
  Michal Privoznik 
  Peter Krempa 

jobs:
 build-amd64-xsm  pass
 build-armhf-xsm  pass
 build-i386-xsm   pass
 build-amd64  pass
 build-armhf  pass
 build-i386   pass
 build-amd64-libvirt  pass
 build-armhf-libvirt  pass
 build-i386-libvirt   pass
 build-amd64-pvopspass
 build-armhf-pvopspass
 build-i386-pvops pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm   pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsmpass
 test-amd64-amd64-libvirt-xsm pass
 test-armhf-armhf-libvirt-xsm fail
 test-amd64-i386-libvirt-xsm  pass
 test-amd64-amd64-libvirt pass
 test-armhf-armhf-libvirt fail
 test-amd64-i386-libvirt  pass
 test-amd64-amd64-libvirt-pairpass
 test-amd64-i386-libvirt-pair pass
 test-armhf-armhf-libvirt-qcow2   fail
 test-armhf-armhf-libvirt-raw fail
 test-amd64-amd64-libvirt-vhd pass



sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

+ branch=libvirt
+ revision=647ac97ab6797fa2de58c1a8d36811a3fb915e94
+ . ./cri-lock-repos
++ . ./cri-common
+++ . ./cri-getconfig
+++ umask 002
+++ getrepos
 getconfig Repos
 perl -e '
use Osstest;
readglobalconfig();
print $c{"Repos"} or die $!;
'
+++ local repos=/home/osstest/repos
+++ '[' -z /home/osstest/repos ']'
+++ '[' '!' -d /home/osstest/repos ']'
+++ echo /home/osstest/repos
++ repos=/home/osstest/repos
++ repos_lock=/home/osstest/repos/lock
++ '[' x '!=' x/home/osstest/repos/lock ']'
++ OSSTEST_REPOS_LOCK_LOCKED=/home/osstest/repos/lock
++ exec with-lock-ex -w /home/osstest/repos/lock ./ap-push libvirt 
647ac97ab6797fa2de58c1a8d36811a3fb915e94
+ branch=libvirt
+ revisio

Re: [Xen-devel] [PATCH v2 05/30] xen/public: Export cpu featureset information in the public API

2016-02-20 Thread Andrew Cooper
On 19/02/16 22:03, Joao Martins wrote:
> On 02/19/2016 05:55 PM, Andrew Cooper wrote:
>> On 19/02/16 17:29, Joao Martins wrote:
>>> On 02/05/2016 01:41 PM, Andrew Cooper wrote:
 For the featureset to be a useful object, it needs a stable 
 interpretation, a
 property which is missing from the current hw_caps interface.

 Additionly, introduce TSC_ADJUST, SHA, PREFETCHWT1, ITSC, EFRO and CLZERO
 which will be used by later changes.

 To maintain compilation, FSCAPINTS is currently hardcoded at 9.  Future
 changes will change this to being dynamically generated.

 Signed-off-by: Andrew Cooper 
>>> Hey Andrew!
>>>
>>> There are a few word motions in this patch:
>> Indeed there are.  They are in aid of getting a new clean interface.
>>
>>> [current]   [this series]
>>> word 0   ->  word 0
>>> word 4   ->  word 1
>>> word 1,6 ->  word 2,3
>>> word 2   ->  word 4
>>> word 7,8 ->  word 5,6
>>>  ->  word 7   (new leaf not previously described)
>>>  ->  word 8   (new leaf not previously described)
>>> word 3   ->  word 9   (linux defined mapping)
>>>
>>> Since you're proposing the stabilization of physinfo.hw_caps
>> Stabilising of physinfo.hw_caps is a side effect, but it has shifted
>> words in the past (c/s 4f4eec3, 6c421a1, 9c907c6).  It is not a stable
>> interface from Xen, and cannot be relied upon.
>>
>> It has also never had a published ABI.
>>
> Thanks for the clarification! I thought that it was sort of a stable API 
> because
> it was exposed through libxl, but I got the wrong idea entirely.

Supposedly so.  In reality, a number of poor decisions were made when
declaring certain things stable.

>
>>>  and given that this
>>> is exposed on both sysctl and libxl (through libxl_hwcap) shouldn't its size
>>> match the real one (boot_cpu_data.x86_capability) i.e. NCAPINTS ? 
>>> Additionally I
>>> see that libxl_hwcap is also hardcoded to 8 alongside struct 
>>> xen_sysctl_physinfo
>>> when it should be 10 ?
>> Hardcoding of the size in sysctl can be worked around. Fixing libxl is
>> harder.
>>
>> The synthetic leaves are internal and should not be exposed.
>>
>>> libxl users could potentially make use of this hwcap field to see what 
>>> features
>>> the host CPU supports.
>> The purpose of the new featureset interface is to have stable object
>> which can be used by higher level toolstacks.
>>
>> This is done by pretending that hw_caps never existed, and replacing it
>> wholesale with a bitmap, (specified as variable length and safe to
>> zero-extend), with an ABI in the public header files detailing what each
>> bit means.
> Given that you introduce a new API for libxc (xc_get_cpu_featureset()) perhaps
> an equivalent to libxl could also be added? That wat users of libxl could also
> query about the host and guests supported features. I would be happy to 
> produce
> patches towards that.

In principle, this is fine.  Part of this is covered by the xen-cpuid
utility in a later patch.

Despite my plans to further rework guest cpuid handling, the principle
of the {raw,host,pv,hvm}_featuresets is expected to stay, and be usable
in their current form.

However, other details such as the hvm hap and shadow mask are expected
to change moving forwards, so shouldn't be made into a stable API.

Note also that the current "inverted" mask is subject to some redesign,
following the "x86: workaround inability to fully restore FPU state​"
issue David was working on.

~Andrew

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH 1/2] x86: CONFIG_X86 defined by Kconfig

2016-02-20 Thread Andrew Cooper
On 20/02/16 15:34, Doug Goldstein wrote:
> CONFIG_X86 is defined by Kconfig when building for x86.
>
> Signed-off-by: Doug Goldstein 

Reviewed-by: Andrew Cooper 

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


[Xen-devel] [linux-mingo-tip-master test] 83116: regressions - FAIL

2016-02-20 Thread osstest service owner
flight 83116 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83116/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-rumpuserxen6 xen-build fail REGR. vs. 60684
 build-amd64-rumpuserxen   6 xen-build fail REGR. vs. 60684
 test-amd64-amd64-xl-multivcpu 15 guest-localmigrate   fail REGR. vs. 60684
 test-amd64-amd64-xl-xsm  15 guest-localmigratefail REGR. vs. 60684
 test-amd64-amd64-libvirt 15 guest-saverestore.2   fail REGR. vs. 60684
 test-amd64-amd64-xl  15 guest-localmigratefail REGR. vs. 60684
 test-amd64-amd64-libvirt-xsm 15 guest-saverestore.2   fail REGR. vs. 60684
 test-amd64-amd64-xl-credit2  15 guest-localmigratefail REGR. vs. 60684
 test-amd64-amd64-pair  22 guest-migrate/dst_host/src_host fail REGR. vs. 60684

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds 15 guest-localmigratefail REGR. vs. 60684
 test-amd64-i386-libvirt-xsm  15 guest-saverestore.2  fail blocked in 60684
 test-amd64-i386-libvirt  15 guest-saverestore.2  fail blocked in 60684
 test-amd64-i386-xl   15 guest-localmigrate   fail blocked in 60684
 test-amd64-i386-xl-xsm   15 guest-localmigrate   fail blocked in 60684
 test-amd64-i386-libvirt-pair 22 guest-migrate/dst_host/src_host fail blocked 
in 60684
 test-amd64-amd64-libvirt-pair 22 guest-migrate/dst_host/src_host fail blocked 
in 60684
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop   fail blocked in 60684
 test-amd64-i386-pair  22 guest-migrate/dst_host/src_host fail blocked in 60684
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop  fail like 60684
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop  fail like 60684

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)   blocked n/a
 test-amd64-i386-rumpuserxen-i386  1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl-pvh-intel 14 guest-saverestorefail  never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start  fail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-qemuu-nested-amd 13 xen-boot/l1   fail never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1 fail never pass

version targeted for testing:
 linux58e86b4f400d7a5649d3c4d554f3dedd9f79903e
baseline version:
 linux69f75ebe3b1d1e636c4ce0a0ee248edacc69cbe0

Last test of basis60684  2015-08-13 04:21:46 Z  191 days
Failing since 60712  2015-08-15 18:33:48 Z  188 days  134 attempts
Testing same since83116  2016-02-19 04:45:15 Z1 days1 attempts

jobs:
 build-amd64-xsm  pass
 build-i386-xsm   pass
 build-amd64  pass
 build-i386   pass
 build-amd64-libvirt  pass
 build-i386-libvirt   pass
 build-amd64-pvopspass
 build-i386-pvops pass
 build-amd64-rumpuserxen  fail
 build-i386-rumpuserxen   fail
 test-amd64-amd64-xl  fail
 test-amd64-i386-xl   fail
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsmpass
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm   pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsmpass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsmpass
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsmpass
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass
 test-amd64-amd64-libvirt-xsm fail
 test-amd64-i386-libvirt-xsm  fail
 test-amd64-amd64-xl-xsm   

Re: [Xen-devel] [PATCH v2 05/30] xen/public: Export cpu featureset information in the public API

2016-02-20 Thread Joao Martins


On 02/20/2016 04:17 PM, Andrew Cooper wrote:
> On 19/02/16 22:03, Joao Martins wrote:
>> On 02/19/2016 05:55 PM, Andrew Cooper wrote:
>>> On 19/02/16 17:29, Joao Martins wrote:
 On 02/05/2016 01:41 PM, Andrew Cooper wrote:
> For the featureset to be a useful object, it needs a stable 
> interpretation, a
> property which is missing from the current hw_caps interface.
>
> Additionly, introduce TSC_ADJUST, SHA, PREFETCHWT1, ITSC, EFRO and CLZERO
> which will be used by later changes.
>
> To maintain compilation, FSCAPINTS is currently hardcoded at 9.  Future
> changes will change this to being dynamically generated.
>
> Signed-off-by: Andrew Cooper 
 Hey Andrew!

 There are a few word motions in this patch:
>>> Indeed there are.  They are in aid of getting a new clean interface.
>>>
 [current]   [this series]
 word 0   ->  word 0
 word 4   ->  word 1
 word 1,6 ->  word 2,3
 word 2   ->  word 4
 word 7,8 ->  word 5,6
  ->  word 7   (new leaf not previously described)
  ->  word 8   (new leaf not previously described)
 word 3   ->  word 9   (linux defined mapping)

 Since you're proposing the stabilization of physinfo.hw_caps
>>> Stabilising of physinfo.hw_caps is a side effect, but it has shifted
>>> words in the past (c/s 4f4eec3, 6c421a1, 9c907c6).  It is not a stable
>>> interface from Xen, and cannot be relied upon.
>>>
>>> It has also never had a published ABI.
>>>
>> Thanks for the clarification! I thought that it was sort of a stable API 
>> because
>> it was exposed through libxl, but I got the wrong idea entirely.
> 
> Supposedly so.  In reality, a number of poor decisions were made when
> declaring certain things stable.
> 
>>
  and given that this
 is exposed on both sysctl and libxl (through libxl_hwcap) shouldn't its 
 size
 match the real one (boot_cpu_data.x86_capability) i.e. NCAPINTS ? 
 Additionally I
 see that libxl_hwcap is also hardcoded to 8 alongside struct 
 xen_sysctl_physinfo
 when it should be 10 ?
>>> Hardcoding of the size in sysctl can be worked around. Fixing libxl is
>>> harder.
>>>
>>> The synthetic leaves are internal and should not be exposed.
>>>
 libxl users could potentially make use of this hwcap field to see what 
 features
 the host CPU supports.
>>> The purpose of the new featureset interface is to have stable object
>>> which can be used by higher level toolstacks.
>>>
>>> This is done by pretending that hw_caps never existed, and replacing it
>>> wholesale with a bitmap, (specified as variable length and safe to
>>> zero-extend), with an ABI in the public header files detailing what each
>>> bit means.
>> Given that you introduce a new API for libxc (xc_get_cpu_featureset()) 
>> perhaps
>> an equivalent to libxl could also be added? That wat users of libxl could 
>> also
>> query about the host and guests supported features. I would be happy to 
>> produce
>> patches towards that.
> 
> In principle, this is fine.  Part of this is covered by the xen-cpuid
> utility in a later patch.
> 
OK.

> Despite my plans to further rework guest cpuid handling, the principle
> of the {raw,host,pv,hvm}_featuresets is expected to stay, and be usable
> in their current form.
That's great to hear. The reason I brought this up is because libvirt has the
idea of cpu model and features associated with it (similar to qemu -cpu
XXX,+feature,-feature stuff but in an hypervisor agnostic manner that other
architectures can also use). libvirt could do mostly everything on its own, but
it still needs to know what the host supports. Based on that it then calculates
the lowest common denominator of cpu features to be enabled or masked out for
guests when comparing to an older family in a pool of servers. Though PV/HVM
(with{,out} hap/shadow) have different feature sets as you mention. So libvirt
might be thrown into error since a certain feature isn't sure to be set/masked
for a certain type of guest. So knowing those (i.e {pv,hvm,...}_featuresets in
advance lets libxl users make more reliable usage of the libxl cpuid policies to
more correctly normalize the cpuid for each type of guest.

> 
> However, other details such as the hvm hap and shadow mask are expected
> to change moving forwards, so shouldn't be made into a stable API.
> 
> Note also that the current "inverted" mask is subject to some redesign,
> following the "x86: workaround inability to fully restore FPU state​"
> issue David was working on.
Ah, Thanks for the heads up!

Joao

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] pre Sandy bridge IOMMU support (gm45)

2016-02-20 Thread Thierry Laurion
Le lun. 1 févr. 2016 à 07:35, Jan Beulich  a écrit :

> >>> On 01.02.16 at 13:28,  wrote:
> > On Mon, Feb 01, 2016 at 12:59:00AM -0700, Jan Beulich wrote:
> >> >>> On 30.01.16 at 02:47,  wrote:
> >> > On Tue, Jan 26, 2016 at 04:37:05AM -0700, Jan Beulich wrote:
> >> >> (re-adding xen-devel)
> >> >>
> >> >> >>> On 26.01.16 at 12:28,  wrote:
> >> >> > Iommu=0 let the whole Qubes system work, without enforcing hardware
> >> >> > compartimentalisation (iommu is enforced in software mode)
> >> >> >
> >> >> > When iommu=no-igfx is enforced, shell console boot up works
> flawlessly.
> > All
> >> >> > domu machines get booted up. A system hang will happen at the
> moment a
> > domu
> >> >> > machine does graphic rendering,
> >> >>
> >> >> And this is (other than I originally implied) without passing through
> >> >> the IGD to the DomU? If so, I can't see the difference between a
> >> >> guest rendering to its display (and vncviewer or whatever frontend
> >> >> you use converting this to rendering on the host) and rendering
> >> >> which originates in the host.
> >> >
> >> > Not sure if relevant, but window content is mapped from PV domU
> directly
> >> > into X server (in dom0) address space, using xc_map_foreign_pages. It
> is
> >> > done by hacking XShmAttach function. Not sure what graphics driver do
> >> > with it next. Theoretically it could be possible that driver will
> direct IGD
> >> > to do DMA directly from that place, but I guess it does not.
> >>
> >> Interesting. This then really needs to be investigated from the
> >> Qubes end rather than here. Possible resulting patches, if
> >> relevant outside of that unusual setup, would then of course be
> >> appreciated to be sent here.
> >
>
Interesting fact: kde corrupts video buffer and make system hang faster
then it's xfce counterparts.

> > Note that Thierry said "The point is the iommu=no-igfx doesn't fix the
> > issue", so either it is totally unrelated issue, or iommu=no-igfx is
> > broken. Does iommu=no-igfx have any meaning when IDG is _not_ passed
> > through to some domU?
>
> Yes: Iirc that option turns off the IOMMU responsible for IGD.
>
>  I suppose passing iommu=dom0-passthrough to hypervisor and passing
*intel_iommu*=*igfx_off to dom0 *may be what is desired here, but
hypervisor refuses to boot without iommu=no-igfx flag.

> And generally - is IOMMU used in any way for dom0
> > devices?
>
> Of course; by how much depends on what options you use (see
> the command line doc).
>
Qubes does't use any specifics.

>
> > Is Linux kernel able to utilize it for its own purposes (my
> > guess: no)?
>
> Under Xen? If so - indeed, no.
>
Wouldn't it be more natural if i915 iommu would be deactivated in kernel
with *intel_iommu*=*igfx_off option being passed to dom0?*

>
> > Somehow unrelated: I've tried to get p2m iommu mapping using `xl
> > debug-key o`, but it's too long (and xenconsoled isn't fast enough to
> > catch it into hypervisor.log). Is is possible to enlarge console ring
> > buffer at runtime?
>
> No.
>
> > If not, is `conring_size` the right option?
>
> Yes.
>
> > How large
> > it should be (aprox) for `xl debug-key o` output?
>
> Depends on the amount of memory page tables need to be created
> for as well as how fragmented memory was at the time memory
> allocation for domains happens. I'm afraid you can only try it out.
>
> Jan
>
> Would it be possible to lend a x200 laptop to the most
interested/motivated developer in making i915/iommu work correctly for this
laptop? I don't see how I can troubleshoot this deeper by myself alone.

Thierry
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH v2 05/30] xen/public: Export cpu featureset information in the public API

2016-02-20 Thread Andrew Cooper
On 20/02/16 17:39, Joao Martins wrote:
>
>  and given that this
> is exposed on both sysctl and libxl (through libxl_hwcap) shouldn't its 
> size
> match the real one (boot_cpu_data.x86_capability) i.e. NCAPINTS ? 
> Additionally I
> see that libxl_hwcap is also hardcoded to 8 alongside struct 
> xen_sysctl_physinfo
> when it should be 10 ?
 Hardcoding of the size in sysctl can be worked around. Fixing libxl is
 harder.

 The synthetic leaves are internal and should not be exposed.

> libxl users could potentially make use of this hwcap field to see what 
> features
> the host CPU supports.
 The purpose of the new featureset interface is to have stable object
 which can be used by higher level toolstacks.

 This is done by pretending that hw_caps never existed, and replacing it
 wholesale with a bitmap, (specified as variable length and safe to
 zero-extend), with an ABI in the public header files detailing what each
 bit means.
>>> Given that you introduce a new API for libxc (xc_get_cpu_featureset()) 
>>> perhaps
>>> an equivalent to libxl could also be added? That wat users of libxl could 
>>> also
>>> query about the host and guests supported features. I would be happy to 
>>> produce
>>> patches towards that.
>> In principle, this is fine.  Part of this is covered by the xen-cpuid
>> utility in a later patch.
>>
> OK.
>
>> Despite my plans to further rework guest cpuid handling, the principle
>> of the {raw,host,pv,hvm}_featuresets is expected to stay, and be usable
>> in their current form.
> That's great to hear. The reason I brought this up is because libvirt has the
> idea of cpu model and features associated with it (similar to qemu -cpu
> XXX,+feature,-feature stuff but in an hypervisor agnostic manner that other
> architectures can also use). libvirt could do mostly everything on its own, 
> but
> it still needs to know what the host supports. Based on that it then 
> calculates
> the lowest common denominator of cpu features to be enabled or masked out for
> guests when comparing to an older family in a pool of servers. Though PV/HVM
> (with{,out} hap/shadow) have different feature sets as you mention. So libvirt
> might be thrown into error since a certain feature isn't sure to be set/masked
> for a certain type of guest. So knowing those (i.e {pv,hvm,...}_featuresets in
> advance lets libxl users make more reliable usage of the libxl cpuid policies 
> to
> more correctly normalize the cpuid for each type of guest.

Does libvirt currently use hw_caps (and my series will inadvertently
break it), or are you looking to do some new work for future benefit?

Sadly, cpuid levelling is a quagmire and not as simple as just choosing
the common subset of bits.  When I started this project I was expecting
it to be bad, but nothing like as bad as it has turned out to be.

As an example, the "deprecates fcs/fds" bit which is the subject of the
"inverted" mask.  The meaning of the bit is "hardware no longer supports
x87 fcs/fds, and they are hardwired to zero".

Originally, the point of the inverted mask was to make a "featureset"
which could be levelled sensibly without specific knowledge of the
meaning of each bit.  This property is important for forwards
compatibility, and avoiding unnecessary complexity in higher level
toolstack components.

However, with hindsight, attempting to level this bit is pointless.  It
is a statement about a change in pre-existing behaviour of an element of
the cpu pipeline, and the pipeline behaviour will not change depending
on how the bit is advertised to the guest.  Another bit, "fdp exception
only" is in a similar bucket.

Other issues, which I haven't even tried to tackle in this series, are
items such as the MXCSR mask.  The real value cannot be levelled, is
expected to remain constant after boot, and liable to induce #GP faults
on fxrstor if it changes.  Alternatively, there is EFER.LMSLE (long mode
segment limit enable) which doesn't even have a feature bit to indicate
availability (not that I can plausibly see an OS actually turning that
feature on).

A toolstack needs to handles all of:
* The maximum "configuration" available to a guest on the available servers.
* Which bits of that can be controlled, and which will simply leak through.
* What the guest actually saw when it booted.

(I use configuration here to include items such as max leaf, max phys
addr, etc which are important to be levelled, but not included in the
plain feature bits in cpuid).

My longterm plans involve:
* Having Xen construct a full "maximum" cpuid policy, rather than just a
featureset.
* Per-domain cpuid policy, seeded from maximum on domain_create, and
modified where appropriate (e.g. hap vs shadow, PV guest switching
between native and compat mode).
* All validity checking for updates in the set_cpuid hypercall rather
than being deferred to the cpuid intercept point.
* A get_cpuid hypercall so a to

[Xen-devel] [linux-linus test] 83118: regressions - trouble: blocked/broken/fail/pass

2016-02-20 Thread osstest service owner
flight 83118 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83118/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
 build-amd64-rumpuserxen   6 xen-build fail REGR. vs. 59254
 test-amd64-amd64-xl  15 guest-localmigratefail REGR. vs. 59254
 test-amd64-amd64-xl-credit2  15 guest-localmigratefail REGR. vs. 59254
 test-amd64-i386-xl-xsm   15 guest-localmigratefail REGR. vs. 59254
 test-amd64-amd64-xl-xsm  15 guest-localmigratefail REGR. vs. 59254
 test-amd64-amd64-xl-multivcpu 15 guest-localmigrate   fail REGR. vs. 59254
 test-amd64-i386-xl   15 guest-localmigratefail REGR. vs. 59254
 test-amd64-amd64-pair  22 guest-migrate/dst_host/src_host fail REGR. vs. 59254
 test-amd64-i386-pair   22 guest-migrate/dst_host/src_host fail REGR. vs. 59254
 test-armhf-armhf-xl-multivcpu  8 leak-check/basis(8)  fail REGR. vs. 59254
 test-armhf-armhf-xl-cubietruck 15 guest-start/debian.repeat fail REGR. vs. 
59254
 test-armhf-armhf-xl  15 guest-start/debian.repeat fail REGR. vs. 59254

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds 15 guest-localmigratefail REGR. vs. 59254
 test-armhf-armhf-xl-rtds 11 guest-start   fail REGR. vs. 59254
 test-amd64-amd64-libvirt-pair 21 guest-migrate/src_host/dst_host fail baseline 
untested
 test-amd64-i386-libvirt-pair 22 guest-migrate/dst_host/src_host fail baseline 
untested
 test-armhf-armhf-xl-vhd   8 leak-check/basis(8) fail baseline untested
 test-amd64-amd64-libvirt 15 guest-saverestore.2  fail blocked in 59254
 test-amd64-i386-libvirt  15 guest-saverestore.2  fail blocked in 59254
 test-amd64-i386-libvirt-xsm  15 guest-saverestore.2  fail blocked in 59254
 test-amd64-amd64-libvirt-xsm 15 guest-saverestore.2  fail blocked in 59254
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop  fail like 59254
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 59254
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop  fail like 59254
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 59254

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)   blocked n/a
 test-amd64-i386-rumpuserxen-i386  1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl-pvh-intel 14 guest-saverestorefail  never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start  fail   never pass
 test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-xsm 14 guest-saverestorefail   never pass
 test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1 fail never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-checkfail   never pass
 test-amd64-amd64-qemuu-nested-amd 13 xen-boot/l1   fail never pass
 test-armhf-armhf-xl-xsm  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-xsm  12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-checkfail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-checkfail never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  13 saverestore-support-checkfail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-raw 13 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-qcow2 11 migrate-support-checkfail never pass
 test-armhf-armhf-libvirt-qcow2 13 guest-saverestorefail never pass

version targeted for testing:
 linux705d43dbe10d6e213a75187ac92b

[Xen-devel] [xen-4.6-testing test] 83120: regressions - FAIL

2016-02-20 Thread osstest service owner
flight 83120 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83120/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail 
REGR. vs. 81632

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 81632
 test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail blocked in 81632
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 81632
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 81632

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pvh-intel 11 guest-start  fail  never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start  fail   never pass
 test-armhf-armhf-libvirt 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-qcow2 11 migrate-support-checkfail never pass
 test-armhf-armhf-libvirt-qcow2 13 guest-saverestorefail never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-raw 13 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-checkfail   never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-checkfail  never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-checkfail  never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-xsm  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-xsm  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-checkfail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-checkfail never pass
 test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-xsm 14 guest-saverestorefail   never pass
 test-armhf-armhf-xl-vhd  11 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-vhd  12 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-rtds 13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-rtds 12 migrate-support-checkfail   never pass

version targeted for testing:
 xen  046e5d0218a0600f9a21fd3b5a5ccfbaaf4357b6
baseline version:
 xen  d77bac5c064ffb9dbb5b89b55b89853f1b784ebf

Last test of basis81632  2016-02-09 15:11:54 Z   11 days
Testing same since83001  2016-02-18 14:40:57 Z2 days2 attempts


People who touched revisions under test:
  Alan.Robinson 
  Andrew Cooper 
  Anthony PERARD 
  Boris Ostrovsky 
  Dirk Behme 
  George Dunlap 
  Ian Campbell 
  Jan Beulich 
  Juergen Gross 
  Kevin Tian 

jobs:
 build-amd64-xsm  pass
 build-armhf-xsm  pass
 build-i386-xsm   pass
 build-amd64  pass
 build-armhf  pass
 build-i386   pass
 build-amd64-libvirt  pass
 build-armhf-libvirt  pass
 build-i386-libvirt   pass
 build-amd64-prev pass
 build-i386-prev  pass
 build-amd64-pvopspass
 build-armhf-pvopspass
 build-i386-

[Xen-devel] [xen-4.5-testing test] 83135: tolerable FAIL - PUSHED

2016-02-20 Thread osstest service owner
flight 83135 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83135/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-amd64 15 guest-localmigrate/x10 fail in 
83003 pass in 83135
 test-armhf-armhf-xl-cubietruck 15 guest-start/debian.repeat fail pass in 83003

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail REGR. vs. 78640
 test-armhf-armhf-xl-rtds 15 guest-start/debian.repeat fail in 83003 blocked in 
78736
 test-amd64-amd64-xl-qemuu-winxpsp3 15 guest-localmigrate/x10 fail in 83003 
like 78640
 test-amd64-amd64-xl-rtds  6 xen-boot fail   like 78736
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop  fail like 78736
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 78736
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 78736
 test-armhf-armhf-xl-rtds 11 guest-start  fail   like 78736

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-rtds 13 saverestore-support-check fail in 83003 never pass
 test-armhf-armhf-xl-rtds 12 migrate-support-check fail in 83003 never pass
 test-amd64-amd64-xl-pvh-intel 11 guest-start  fail  never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start  fail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-checkfail   never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-checkfail  never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-checkfail  never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl  12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt 12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-vhd  10 guest-start  fail   never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt-qcow2 10 guest-start  fail never pass
 test-armhf-armhf-libvirt-raw 10 guest-start  fail   never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-checkfail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-checkfail never pass

version targeted for testing:
 xen  fe71162ab965d4a3344bb867f88e967806c80af5
baseline version:
 xen  7afddd3b945b11a7f5162d1355283b6b9ae7aba3

Last test of basis78736  2016-01-21 20:56:44 Z   30 days
Testing same since83003  2016-02-18 14:45:02 Z2 days2 attempts


People who touched revisions under test:
  Alan.Robinson 
  Andrew Cooper 
  Anthony PERARD 
  Dirk Behme 
  George Dunlap 
  Ian Campbell 
  Jan Beulich 
  Juergen Gross 
  Kevin Tian 

jobs:
 build-amd64  pass
 build-armhf  pass
 build-i386   pass
 build-amd64-libvirt  pass
 build-armhf-libvirt  pass
 build-i386-libvirt   pass
 build-amd64-prev pass
 build-i386-prev  pass
 build-amd64-pvopspass
 build-armhf-pvopspass
 build-i386-pvops pass
 build-amd64-rumpuserxen  pass
 build-i386-rumpuserxen   pass
 test-amd64-amd64-xl  pass
 test-armhf-armhf-xl  pass
 test-amd64-i386-xl   pass
 test-amd64-amd64-qemuu-nested-amdfail
 test-amd64-amd64-xl-pvh-amd  fail
 test-amd64-i386-qemut-rhel6hvm-amd   pass
 test-amd64-i386-qemuu-rhel6hvm-amd   pass
 test-amd64-amd64-xl-qemut-debianhvm-am

Re: [Xen-devel] pre Sandy bridge IOMMU support (gm45)

2016-02-20 Thread Thierry Laurion
Le mar. 26 janv. 2016 à 05:52, Jan Beulich  a écrit :

> >>> On 25.01.16 at 22:49,  wrote:
> > The case is 1) disabling iommu for IGD, unilaterally since i915 + gm45
> > doesn't play well together. Iommu is still desired to isolate usb and
> > network devices, so we don't want to disable iommu completely. The side
> > effect of this would be to have IGD only for dom0, which would also
> > completely make sense in this use case.
> >
> > The point is the iommu=no-igfx doesn't fix the issue, since remapping
> seems
> > to still happen for IGD. Does that make sense ?
>
> It certainly may make sense, just that in what you have written so
> far I don't think I've been able to spot any evidence thereof. Since,
> as you say, nothing interesting gets logged by Xen, you must be
> drawing this conclusion from something (or else you wouldn't say
> "doesn't fix the issue").
>
> Jan
>
>
Here is some interesting lines showing Xen failing without iommu=no-igfx:

--- /home/john/Downloads/amtterm/x200_xen_debug-normal-no_ts.txt
+++ /home/john/Downloads/amtterm/x200_xen_debug-iommu-no_igfx-no_ts.txt
@@ -339,23 +339,10 @@
(XEN) [VT-D]iommu.c:1465: d0:PCI: map :00:1f.3
(XEN) [VT-D]iommu.c:1453: d0:PCIe: map :03:00.0
(XEN) [VT-D]iommu.c:729: iommu_enable_translation: iommu->reg =
82c000205000
-(XEN) [VT-D]iommu.c:729: iommu_enable_translation: iommu->reg =
82c000203000
+(XEN) [VT-D]iommu.c:719: BIOS did not enable IGD for VT properly.
Disabling IGD VT-d engine.
(XEN) [VT-D]iommu.c:729: iommu_enable_translation: iommu->reg =
82c000201000
(XEN) [VT-D]iommu.c:729: iommu_enable_translation: iommu->reg =
82c000207000
(XEN) Scrubbing Free RAM on 1 nodes using 2 CPUs
-(XEN) [VT-D]iommu.c:873: iommu_fault_status: Fault Overflow
-(XEN) [VT-D]iommu.c:875: iommu_fault_status: Primary Pending Fault
-(XEN) [VT-D]DMAR:[DMA Write] Request device [:00:02.0] fault addr
ff000, iommu reg = 82c000203000
-(XEN) [VT-D]DMAR: reason 05 - PTE Write access is not set
-(XEN) print_vtd_entries: iommu 8301363fa7d0 dev :00:02.0 gmfn
ff
-(XEN) root_entry = 8301363f4000
-(XEN) root_entry[0] = 80fa001
-(XEN) context = 8300080fa000
-(XEN) context[10] = 1_8ae0001
-(XEN) l3 = 830008ae
-(XEN) l3_index = 3f
-(XEN) l3[3f] = 0
-(XEN) l3[3f] not present
(XEN) done.
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Std. Loglevel: All

I restate my comprehension.
iommu=no-igfx needs to be passed to hypervisor for it to boot.
iommu=dom0-passthrough would also be needed for dom0 tobe able to unset
iommu usage for itself?

For Dom0 to have access to device, I also understand that
intel_iommu=igfx_off kernel option would need to be passed to i915 driver
of dom0?

Doing so still fails without error. Any hint?
Doing so by providing dom0-pass
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


[Xen-devel] [linux-next test] 83159: regressions - trouble: blocked/broken/fail/pass

2016-02-20 Thread osstest service owner
flight 83159 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/83159/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-libvirt-qcow2  3 host-install(3)   broken REGR. vs. 82911
 test-amd64-i386-libvirt-xsm  14 guest-saverestore fail REGR. vs. 82911
 test-amd64-i386-libvirt  14 guest-saverestore fail REGR. vs. 82911
 test-amd64-amd64-xl-multivcpu 14 guest-saverestorefail REGR. vs. 82911
 test-amd64-i386-xl-xsm6 xen-boot  fail REGR. vs. 82911
 test-amd64-amd64-libvirt-xsm  6 xen-boot  fail REGR. vs. 82911
 test-amd64-amd64-xl-pvh-amd   6 xen-boot  fail REGR. vs. 82911
 test-amd64-i386-qemut-rhel6hvm-amd  6 xen-bootfail REGR. vs. 82911
 test-armhf-armhf-xl-xsm  11 guest-start   fail REGR. vs. 82911
 test-armhf-armhf-libvirt-xsm 11 guest-start   fail REGR. vs. 82911
 test-amd64-amd64-qemuu-nested-amd  6 xen-boot fail REGR. vs. 82911
 test-amd64-amd64-xl-qemut-win7-amd64 12 guest-saverestore fail REGR. vs. 82911
 test-amd64-i386-xl-qemuu-win7-amd64  6 xen-boot   fail REGR. vs. 82911
 test-amd64-amd64-xl-qemuu-win7-amd64 12 guest-saverestore fail REGR. vs. 82911
 test-amd64-i386-pair 10 xen-boot/dst_host fail REGR. vs. 82911
 test-amd64-i386-pair  9 xen-boot/src_host fail REGR. vs. 82911
 test-amd64-i386-libvirt-pair 10 xen-boot/dst_host fail REGR. vs. 82911
 test-amd64-i386-libvirt-pair  9 xen-boot/src_host fail REGR. vs. 82911
 test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 82911
 test-armhf-armhf-libvirt-raw  9 debian-di-install fail REGR. vs. 82911

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 82911
 test-amd64-amd64-xl-rtds 14 guest-saverestore fail REGR. vs. 82911
 test-amd64-amd64-xl-credit2  17 guest-localmigrate/x10   fail blocked in 82911
 build-i386-rumpuserxen6 xen-buildfail   like 82911
 test-amd64-amd64-xl  15 guest-localmigrate   fail   like 82911
 build-amd64-rumpuserxen   6 xen-buildfail   like 82911
 test-amd64-amd64-xl-xsm  15 guest-localmigrate   fail   like 82911
 test-amd64-amd64-libvirt 15 guest-saverestore.2  fail   like 82911
 test-amd64-i386-xl   15 guest-localmigrate   fail   like 82911
 test-amd64-amd64-pair   22 guest-migrate/dst_host/src_host fail like 82911
 test-amd64-amd64-libvirt-pair 22 guest-migrate/dst_host/src_host fail like 
82911
 test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeatfail  like 82911
 test-armhf-armhf-xl-credit2  15 guest-start/debian.repeatfail   like 82911
 test-armhf-armhf-xl-rtds 11 guest-start  fail   like 82911
 test-armhf-armhf-xl-vhd   9 debian-di-installfail   like 82911

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)   blocked n/a
 test-amd64-i386-rumpuserxen-i386  1 build-check(1)   blocked  n/a
 test-amd64-i386-libvirt-xsm  12 migrate-support-checkfail   never pass
 test-amd64-i386-libvirt  12 migrate-support-checkfail   never pass
 test-amd64-amd64-xl-pvh-intel 14 guest-saverestorefail  never pass
 test-amd64-amd64-libvirt 12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-checkfail   never pass
 test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1 fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-checkfail  never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-checkfail  never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  12 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  13 saverestore-support-checkfail   never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-checkfail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-checkfail never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail   never pass
 test-armhf-armhf-libvirt 14 guest-saverestorefail   never pass
 test-armhf-armhf-libvirt 12 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass

version targeted for testing:
 linuxb6186245890a0052d230a1e422961d0c000ae346
baselin