flight 18433 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/18433/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 4 xen-build fail REGR. vs. 18431
build-i386 4 xen-build fail REGR. vs. 18431
build-i386-pvops 4 kernel-build fail REGR. vs. 18431
build-amd64-pvops 4 kernel-build fail REGR. vs. 18431
build-i386-oldkern 4 xen-build fail REGR. vs. 18431
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pcipt-intel 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-intel 1 xen-build-check(1) blocked n/a
test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a
test-amd64-i386-pv 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-sedf-pin 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-sedf 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-amd 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a
test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a
test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-amd 1 xen-build-check(1) blocked n/a
test-amd64-i386-pair 1 xen-build-check(1) blocked n/a
test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a
test-amd64-i386-xend-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-intel 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a
test-amd64-i386-xend-qemut-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a
version targeted for testing:
xen 4816f9a7d47f985dfa796dc632771201b10858e8
baseline version:
xen 5d0ca62156d734a757656b9bcb6bf17ee76d37b4
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
Bamvor Jian Zhang <bjzhang@suse.com>
George Dunlap <george.dunlap@eu.citrix.com>
Ian Campbell <ian.campbell@citrix.com>
Ian Murray <murrayie@yahoo.co.uk>
Jan Beulich <jbeulich@suse.com>
Julien Grall <julien.grall@linaro.org>
Keir Fraser <keir@xen.org>
Kjetil Torgrim Homme <kjetil.homme@redpill-linpro.com>
Marek Marczykowski <marmarek@invisiblethingslab.com>
Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Tim Deegan <tim@xen.org>
------------------------------------------------------------
jobs:
build-amd64 fail
build-armhf pass
build-i386 fail
build-amd64-oldkern pass
build-i386-oldkern fail
build-amd64-pvops fail
build-i386-pvops fail
test-amd64-amd64-xl blocked
test-amd64-i386-xl blocked
test-amd64-i386-rhel6hvm-amd blocked
test-amd64-i386-qemut-rhel6hvm-amd blocked
test-amd64-i386-qemuu-rhel6hvm-amd blocked
test-amd64-amd64-xl-qemut-win7-amd64 blocked
test-amd64-i386-xl-qemut-win7-amd64 blocked
test-amd64-amd64-xl-qemuu-win7-amd64 blocked
test-amd64-amd64-xl-win7-amd64 blocked
test-amd64-i386-xl-win7-amd64 blocked
test-amd64-i386-xl-credit2 blocked
test-amd64-amd64-xl-pcipt-intel blocked
test-amd64-i386-rhel6hvm-intel blocked
test-amd64-i386-qemut-rhel6hvm-intel blocked
test-amd64-i386-qemuu-rhel6hvm-intel blocked
test-amd64-i386-xl-multivcpu blocked
test-amd64-amd64-pair blocked
test-amd64-i386-pair blocked
test-amd64-amd64-xl-sedf-pin blocked
test-amd64-amd64-pv blocked
test-amd64-i386-pv blocked
test-amd64-amd64-xl-sedf blocked
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 blocked
test-amd64-i386-xl-winxpsp3-vcpus1 blocked
test-amd64-i386-xend-qemut-winxpsp3 blocked
test-amd64-amd64-xl-qemut-winxpsp3 blocked
test-amd64-amd64-xl-qemuu-winxpsp3 blocked
test-amd64-i386-xend-winxpsp3 blocked
test-amd64-amd64-xl-winxpsp3 blocked
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 4816f9a7d47f985dfa796dc632771201b10858e8
Author: Julien Grall <julien.grall@linaro.org>
Date: Mon Jul 15 15:40:55 2013 +0100
xen/arm: Dummy implementation of multi-bank support
U-boot for the arndale board splits the memory in 8 contiguous banks and
rewrites the memory node. So most of the memory is lost.
As the frametable is only able to handle contiguous memory, use the first
contiguous banks and warn if some of the memory banks are not used.
Signed-off-by: Julien Grall <julien.grall@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
[ ijc -- "some banks" -> "some memory banks" ]
commit e5078b3a1b1a2fcb45197346edbd1beff4f290c4
Author: George Dunlap <george.dunlap@eu.citrix.com>
Date: Fri Jul 5 17:30:44 2013 +0100
docs: Fix minor error in xm man page
xm block-attach takes "r" as read-only, not "ro".
This is a backport candidate for 4.3, and probably others.
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 8348707ce1c76e2fecbe9d413d5d8f2085bf57cb
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Mon Jul 15 09:24:05 2013 +0100
xen: arm: correctly configure NSACR.
Previously we were setting it up twice, the second time neglecting to set
the
NS_SMP bit.
NSACR.NS_SMP is a processor specific bit which on Cortex-A7 and -A15
regulates
access to the (also processor specific) ACTLR.SMP bit. Not setting
NSACR.NS_SMP
meant that Xen''s attempts to set ACTLR.SMP was silently ignored.
Setting this
bit is required in order to cause the processor to take part in cache and
TLB
coherency protocols. Failure to set this bit leads to random memory
corruption
in guests (although nothing like as catastrophic as you might expect!).
An alternative fix would have been to set ACTLR.SMP when in Secure World,
however Linux expects to set ACTLR.SMP itself in NS mode, so it''s a
good bet
that bootloaders will set NSACR.NS_SMP instead.
While here switch to a read-modify-write of NSACR to preserve any existing
bits -- seems safer.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Julien Grall <julien.grall@linaro.org>
commit 26b48cf251c6ce39c07462b833d33195c172466b
Author: Marek Marczykowski <marmarek@invisiblethingslab.com>
Date: Mon May 13 20:23:54 2013 +0200
Cleanup scmversion script, fix --save-scmversion option
Remove unused variable, fix erroneously removed --save-scmversion code.
Signed-off-by: Marek Marczykowski <marmarek@invisiblethingslab.com>
commit 4d1759b5153ce5b0903e56fefcfdca8a03b7c246
Author: Ian Murray <murrayie@yahoo.co.uk>
Date: Thu Jul 4 00:58:27 2013 +0100
xl: support for leaving domain paused after save
New feature to allow xl save to leave a domain paused after its
memory has been saved. This is to allow disk snapshots of domU
to be taken that exactly correspond to the memory state at save time.
Once the snapshot(s) have been taken or whatever, the domain can be
unpaused in the usual manner.
Usage:
xl save -p <domid> <filespec>
Signed-off-by: Ian Murray <murrayie@yahoo.co.uk>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit b179c6c490ca3e3baf1ce58ecb7f87f2a8df6049
Author: Kjetil Torgrim Homme <kjetil.homme@redpill-linpro.com>
Date: Thu Jun 20 13:51:41 2013 +0200
pygrub: allow user to specify an explicit offset to fs
This new option overrides partition table parsing
Signed-off-by: Kjetil Torgrim Homme <kjetil.homme@redpill-linpro.com>
Reviewed-by: Matt Wilson <msw@amazon.com>
commit 75beb8e45133acb8795024fc6114ff557ce1c27f
Author: Bamvor Jian Zhang <bjzhang@suse.com>
Date: Mon Jul 15 16:45:33 2013 +0800
xen: arm: introduce Cortex-A7 support
Introduce Cortex-A7 with a scalable proc_info_list which including cpu id
and cpu initialize function.
In head.S, search cpu specific MIDR in procinfo and call such initialize
function. Currently, support Cortex-A7 and Cortex-A15.
Signed-off-by: Bamvor Jian Zhang <bjzhang@suse.com>
Acked-by: Tim Deegan <tim@xen.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 68caac7f6f4687241a24e804a9fca19aa26fe183
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Jul 17 10:21:33 2013 +0200
x86: don''t use destroy_xen_mappings() for vunmap()
Its attempt to tear down intermediate page table levels may race with
map_pages_to_xen() establishing them, and now that
map_domain_page_global() is backed by vmap() this teardown is also
wasteful (as it''s very likely to need the same address space
populated
again within foreseeable time).
As the race between vmap() and vunmap(), according to the latest stage
tester logs, doesn''t appear to be the only one still left, the
patch
also adds logging for vmap() and vunmap() uses (there shouldn''t be
too
many of them, so logs shouldn''t get flooded). These are supposed to
get removed (and are made stand out clearly) as soon as we''re
certain
that there''s no issue left.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
commit e0b6459aa2236324213d8af38c44eceb6efcedc3
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Jul 17 08:49:39 2013 +0200
Viridian: cleanup
- functions used only locally should be static
- constify parameters of dump functions
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Yang Zhang <yang.z.zhang@intel.com>
commit 551b3c1227318a442c1c8fc121e63d7d36d5dd12
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Jul 17 08:49:08 2013 +0200
Viridian: populate CPUID leaf 6
Properly reporting hardware features we use can only help Windows in
making decisions towards its own performance tuning.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Yang Zhang <yang.z.zhang@intel.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 27815a123ad898bc4f6dd82c62b16188d6f8eef1
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Jul 17 08:48:24 2013 +0200
VMX: suppress pointless indirect calls
Get the other virtual interrupt delivery related actors in sync
with the newly added handle_eoi() one: Clear the respective pointers
(thus avoiding the call from generic code) when the feature is
unavailable instead of checking feature availability in the actors.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Yang Zhang <yang.z.zhang@intel.com>
commit 303066fdb1e4fe816e48acd665453f58b8399e81
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Jul 17 08:47:18 2013 +0200
VMX: fix interaction of APIC-V and Viridian emulation
Viridian using a synthetic MSR for issuing EOI notifications bypasses
the normal in-processor handling, which would clear
GUEST_INTR_STATUS.SVI. Hence we need to do this in software in order
for future interrupts to get delivered.
Based on analysis by Yang Z Zhang <yang.z.zhang@intel.com>.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Yang Zhang <yang.z.zhang@intel.com>
commit 85047d9e4f4afeb73bca1e98f705a2f4f1d51c03
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Jul 17 08:45:20 2013 +0200
x86/cpuidle: Change logging for unknown APIC IDs
Dom0 uses this hypercall to pass ACPI information to Xen. It is not very
uncommon for more cpus to be listed in the ACPI tables than are present on
the
system, particularly on systems with a common BIOS for a 2 and 4 socket
server
varients.
As Dom0 does not control the number of entries in the ACPI tables, and is
required to pass everything it finds to Xen, change the logging.
There is now an single unconditional warning for the first unknown ID, and
further warnings if "cpuinfo" is requested by the user on the
command line.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
(qemu changes not included)