flight 6758 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/6758/ Regressions :-( Tests which did not succeed and are blocking: test-amd64-amd64-win 7 windows-install fail REGR. vs. 6756 test-amd64-i386-win 7 windows-install fail REGR. vs. 6756 test-amd64-i386-xl-win-vcpus1 7 windows-install fail REGR. vs. 6756 test-amd64-xcpkern-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 6756 test-amd64-xcpkern-i386-win 7 windows-install fail REGR. vs. 6756 test-amd64-xcpkern-i386-xl-win 7 windows-install fail REGR. vs. 6756 test-i386-i386-win 7 windows-install fail REGR. vs. 6756 test-i386-i386-xl-win 7 windows-install fail REGR. vs. 6756 Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-win 7 windows-install fail pass in 6757 test-amd64-xcpkern-i386-xl-credit2 9 guest-start fail pass in 6757 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-i386-rhel6hvm-amd 8 guest-saverestore fail never pass test-amd64-i386-rhel6hvm-intel 7 redhat-install fail like 6756 test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-xcpkern-i386-rhel6hvm-amd 8 guest-saverestore fail never pass test-i386-xcpkern-i386-win 16 leak-check/check fail never pass version targeted for testing: xen dc8b05d22a59 baseline version: xen 97763efc41f9 ------------------------------------------------------------ People who touched revisions under test: Allen Kay <allen.m.kay@intel.com> Christoph Egger <Christoph.Egger@amd.com> Eddie Dong <eddie.dong@intel.com> George Dunlap <george.dunlap@eu.citrix.com> Ian Campbell <ian.campbell@citrix.com> Ian Jackson <ian.jackson@eu.citrix.com> Keir Fraser <keir@xen.org> Tim Deegan <Tim.Deegan@citrix.com> Wei Huang <wei.huang2@amd.com> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl pass test-i386-i386-xl pass test-amd64-xcpkern-i386-xl pass test-i386-xcpkern-i386-xl pass test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 pass test-amd64-xcpkern-i386-xl-credit2 fail test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu pass test-amd64-xcpkern-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-i386-i386-pair pass test-amd64-xcpkern-i386-pair pass test-i386-xcpkern-i386-pair pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-xcpkern-i386-pv pass test-i386-xcpkern-i386-pv pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win fail test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win fail test-amd64-amd64-xl-win fail test-i386-i386-xl-win fail test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 23172:dc8b05d22a59 tag: tip user: George Dunlap <george.dunlap@eu.citrix.com> date: Wed Apr 06 11:40:54 2011 +0100 x86/hvm: load CPU structures from xen versions <=3.4 Xen 4.0 added "msr_tsc_aux" in the middle of the hvm_hw_cpu structure, making it incompatible with pre-3.4 savefiles. This patch uses the recently introduced backwards-compatibility infrastructure to convert the old to the new. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23171:6a5830de7b54 user: George Dunlap <george.dunlap@eu.citrix.com> date: Wed Apr 06 11:40:51 2011 +0100 hvm: infrastructure for backwards-compatible loading The hvm_save code is used to save and restore hypervisor-related hvm state, either for classic save/restore, or for migration (including remus). This is meant to be backwards-compatible across some hypervisor versions; but if it does change, there is no way to handle the old format as well as the new. This patch introduces the infrastructure to allow a single older version ("compat") of any given "save type" to be defined, along with a function to turn the "old" version into the "new" version. If the size check fails for the "normal" version, it will check the "compat" version, and if it matches, will read the old entry and call the conversion function. This patch involves some preprocessor hackery, but I''m only extending the hackery that''s already there. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23170:86f87da1445a user: Tim Deegan <Tim.Deegan@citrix.com> date: Wed Apr 06 11:22:39 2011 +0100 Nested SVM: fix race in remote shootdown. nestedhvm_flushtlb_ipi() can run between nsvm_vcpu_switch() and CLGI, which would leave the VMCB pointing at the wrong p2m table. Check for this after CLGI. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23169:2a39222f0071 user: Tim Deegan <Tim.Deegan@citrix.com> date: Wed Apr 06 11:22:39 2011 +0100 xen: fix non-debug and 32-bit builds after nested HVM series Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23168:7714b42e72fa user: cegger date: Tue Apr 05 15:44:09 2011 +0200 Implement Nested-on-Nested. This allows the guest to run nested guest with hap enabled. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23167:9c3fbfa7d0d5 user: cegger date: Wed Mar 09 12:36:23 2011 +0100 Implement generic piece to finally enable nested virtualization Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23166:4530152eec39 user: cegger date: Wed Mar 09 12:36:17 2011 +0100 Implement SVM specific interrupt handling Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23165:a5e69b6fdd16 user: cegger date: Wed Mar 09 12:36:05 2011 +0100 Implement SVM specific part for Nested Virtualization Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23164:a21d019bb8fe user: cegger date: Mon Feb 28 12:21:57 2011 +0100 Handle interrupts (generic part) Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23163:340862a9e1cc user: cegger date: Mon Feb 28 12:21:54 2011 +0100 Allow guest to enable SVM in EFER Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23162:c856533343bf user: cegger date: Mon Feb 28 12:21:52 2011 +0100 When injecting an exception into L2 guest, inject a #VMEXIT if L1 guest intercepts the exception Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23161:f9ba1b2ba93d user: cegger date: Mon Feb 28 12:21:49 2011 +0100 Allow paged real mode during vmrun emulation. Emulate cr0 and cr4 when guest does not intercept them. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23160:981397a3a586 user: cegger date: Mon Feb 28 12:21:46 2011 +0100 Nested Virtualization core implementation Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23159:5a137177a6df user: cegger date: Mon Feb 28 12:21:44 2011 +0100 add nestedhvm function hooks for svm/vmx specific code Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23158:029f0a5301f0 user: cegger date: Mon Feb 28 12:21:41 2011 +0100 Data structures for Nested Virtualization Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23157:69e932728d75 user: cegger date: Mon Feb 28 12:21:38 2011 +0100 tools: Add nestedhvm guest config option Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Acked-by: Eddie Dong <eddie.dong@intel.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> changeset: 23156:1984297894a7 user: Keir Fraser <keir@xen.org> date: Wed Apr 06 09:20:40 2011 +0100 Remove __init specifier from function declarations in header files. The specifier only needs to be added to the function''s definition. At the same time, fix init_cpu_to_node() to be __init rather than __devinit (it is only called at boot time). Signed-off-by: Keir Fraser <keir@xen.org> changeset: 23155:c7916d6f4dfb user: Allen Kay <allen.m.kay@intel.com> date: Wed Apr 06 09:11:02 2011 +0100 [VTD] Fixes to ACPI DMAR flag checks. * platform_supports_{intremap,x2apic} should not be marked __init as they are used during S3 resume. * DMAR flags should be taken from the table passed to acpi_parse_dmar() -- this is the trusted copy of the DMAR, when running in TXT mode. Signed-off-by: Allen Kay <allen.m.kay@intel.com> changeset: 23154:42fa70e0761b user: Wei Huang <wei.huang2@amd.com> date: Wed Apr 06 09:02:13 2011 +0100 x86, amd, MTRR: remove k8_enable_fixed_iorrs() AMD64 defines two special bits (bit 3 and 4) RdMem and WrMem in fixed MTRR type. Their values are supposed to be 0 after BIOS hands the control to OS according to AMD BKDG. Unless OS specificially turn them on, they are kept 0 all the time. As a result, k8_enable_fixed_iorrs() is unnecessary and removed from upstream kernel (see https://patchwork.kernel.org/patch/11425/). This patch does the same thing. Signed-off-by: Wei Huang <wei.huang2@amd.com> changeset: 23153:8fb61c9ebe49 user: Wei Huang <wei.huang2@amd.com> date: Wed Apr 06 09:01:31 2011 +0100 x86, amd, MTRR: correct DramModEn bit of SYS_CFG MSR Some buggy BIOS might set SYS_CFG DramModEn bit to 1, which can cause unexpected behavior on AMD platforms. This patch clears DramModEn bit if it is 1. Signed-off-by: Wei Huang <wei.huang2@amd.com> changeset: 23152:97763efc41f9 user: Ian Campbell <ian.campbell@citrix.com> date: Tue Apr 05 18:23:54 2011 +0100 libxl: Drop unnecessary \n from log message Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel