flight 11558 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/11558/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rhel6hvm-intel 4 xen-install fail REGR. vs. 11275
test-amd64-i386-xl-multivcpu 4 xen-install fail REGR. vs. 11275
test-amd64-i386-pv 4 xen-install fail REGR. vs. 11275
test-amd64-i386-xl-credit2 4 xen-install fail REGR. vs. 11275
test-amd64-i386-rhel6hvm-amd 4 xen-install fail REGR. vs. 11275
test-amd64-i386-pair 6 xen-install/dst_host fail REGR. vs. 11275
test-amd64-i386-pair 5 xen-install/src_host fail REGR. vs. 11275
build-i386-oldkern 4 xen-build fail REGR. vs. 11275
test-amd64-i386-xl 4 xen-install fail REGR. vs. 11275
build-i386 4 xen-build fail REGR. vs. 11275
test-amd64-i386-xend-winxpsp3 4 xen-install fail REGR. vs. 11275
test-amd64-i386-xl-win-vcpus1 4 xen-install fail REGR. vs. 11275
test-amd64-i386-win-vcpus1 4 xen-install fail REGR. vs. 11275
test-amd64-i386-win 4 xen-install fail REGR. vs. 11275
test-amd64-i386-xl-win7-amd64 4 xen-install fail REGR. vs. 11275
test-amd64-i386-xl-winxpsp3-vcpus1 4 xen-install fail REGR. vs. 11275
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-win 7 windows-install fail like 11217
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-i386-i386-pv 1 xen-build-check(1) blocked n/a
test-i386-i386-xl 1 xen-build-check(1) blocked n/a
test-i386-i386-pair 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-win 13 guest-stop fail never pass
test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a
test-i386-i386-win 1 xen-build-check(1) blocked n/a
test-i386-i386-xl-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass
version targeted for testing:
xen 137c16a83e40
baseline version:
xen 80fdf2182bc6
------------------------------------------------------------
People who touched revisions under test:
George Dunlap <george.dunlap@eu.citrix.com>
Ian Campbell <ian.campbell@citrix.com>
Jan Beulich <jbeulich@suse.com>
Keir Fraser <keir@xen.org>
Marcus Granado <marcus.granado@eu.citrix.com>
Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Tim Deegan <Tim.Deegan@citrix.com>
------------------------------------------------------------
jobs:
build-amd64 pass
build-i386 fail
build-amd64-oldkern pass
build-i386-oldkern fail
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl pass
test-amd64-i386-xl fail
test-i386-i386-xl blocked
test-amd64-i386-rhel6hvm-amd fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 fail
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel fail
test-amd64-i386-xl-multivcpu fail
test-amd64-amd64-pair pass
test-amd64-i386-pair fail
test-i386-i386-pair blocked
test-amd64-amd64-xl-sedf-pin pass
test-amd64-amd64-pv pass
test-amd64-i386-pv fail
test-i386-i386-pv blocked
test-amd64-amd64-xl-sedf pass
test-amd64-i386-win-vcpus1 fail
test-amd64-i386-xl-win-vcpus1 fail
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-amd64-win fail
test-amd64-i386-win fail
test-i386-i386-win blocked
test-amd64-amd64-xl-win fail
test-i386-i386-xl-win blocked
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 fail
test-i386-i386-xl-winxpsp3 blocked
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
changeset: 24544:137c16a83e40
tag: tip
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Mon Jan 23 09:42:12 2012 +0000
libelf-loader: introduce elf_load_image
Implement a new function, called elf_load_image, to perform the
actually copy of the elf image and clearing the padding. The function
is implemented as memcpy and memset when the library is built as part
of the tools, but it is implemented as raw_copy_to_guest and
raw_clear_guest when built as part of Xen, so that it can be safely
called with an HVM style dom0.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24543:d6cdbc4fe078
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Mon Jan 23 09:41:27 2012 +0000
Introduce clear_user and clear_guest
Introduce clear_user for x86 and ia64, shamelessly taken from Linux.
The x86 version is the 32 bit clear_user implementation. Introduce
clear_guest for x86 and ia64. The x86 implementation is based on
clear_user and a new clear_user_hvm function. The ia64 implementation
is actually in xencomm and it is based on xencomm_copy_to_guest.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Jan Beulich <JBeulich@suse.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24542:37eefb79503c
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Mon Jan 23 09:40:35 2012 +0000
xen: implement an signed 64 bit division helper function
Implement a C function to perform 64 bit signed division and return
both quotient and remainder.
Useful as an helper function to implement __aeabi_ldivmod.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24541:96e071fbefd7
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Mon Jan 23 09:39:58 2012 +0000
A collection of fixes to Xen common files
- call free_xenoprof_pages only ifdef CONFIG_XENOPROF;
- define PRI_stime as PRId64 in an header file;
- respect boundaries in is_kernel_*;
- implement is_kernel_rodata;
- guest_physmap_add_page should be ((void)0).
- fix guest_physmap_add_page;
- introduce CONFIG_XENOPROF;
- define _srodata and _erodata as const char*.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24540:ab0eab766edb
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Mon Jan 23 09:39:11 2012 +0000
Include some header files that are not automatically included on all archs
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24539:95e07258d189
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Mon Jan 23 09:38:34 2012 +0000
Move cpufreq option parsing to cpufreq.c
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24538:5bb22a6871f6
user: George Dunlap <george.dunlap@eu.citrix.com>
date: Mon Jan 23 09:36:54 2012 +0000
xenoprof: Make the escape code consistent across 32 and 64-bit xen
At the moment, the xenoprof escape code is defined as "~0UL".
Unfortunately, this expands to 0xffffffff on 32-bit systems
and 0xffffffffffffffff on 64-bit systems; with the result that
while 32-on-32 and 64-in-64 work fine, 32-on-64 (also known as
"compat mode") is broken.
This patch makes the definition consistent across architectures.
In so doing, it will break old-32-bit-on-new-Xen, and vice versa;
but this was seen as an acceptable thing to do.
Signed-off-by: Marcus Granado <marcus.granado@eu.citrix.com>
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24537:3c0a533d3af0
user: George Dunlap <george.dunlap@eu.citrix.com>
date: Mon Jan 23 09:36:29 2012 +0000
xenoprof: Handle 32-bit guest stacks properly in a 64-bit hypervisor
The dump_guest_backtrace() function attempted to walk the stack
based on the assumption that the guest and hypervisor pointer sizes
were the same; thus any 32-bit guest running under 64-bit hypervisor
would have unreliable results.
In 64-bit mode, read the 32-bit stack frame properly.
Signed-off-by: Marcus Granado <marcus.granado@eu.citrix.com>
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24536:212cf37d50e1
user: George Dunlap <george.dunlap@eu.citrix.com>
date: Mon Jan 23 09:36:01 2012 +0000
xenoprof: Adjust indentation
Bring indentation into Xen hypervisor standard coding style.
No functional changes.
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24535:fb81b807c154
user: Jan Beulich <jbeulich@suse.com>
date: Mon Jan 23 09:35:17 2012 +0000
x86/vMSI: miscellaneous fixes
This addresses a number of problems in msixtbl_{read,write}():
- address alignment was not checked, allowing for memory corruption in
the hypervisor (write case) or returning of hypervisor private data
to the guest (read case)
- the interrupt mask bit was permitted to be written by the guest
(while Xen''s interrupt flow control routines need to control it)
- MAX_MSIX_TABLE_{ENTRIES,PAGES} were pointlessly defined to plain
numbers (making it unobvious why they have these values, and making
the latter non-portable)
- MAX_MSIX_TABLE_PAGES was also off by one (failing to account for a
non-zero table offset); this was also affecting host MSI-X code
- struct msixtbl_entry''s table_flags[] was one element larger than
necessary due to improper open-coding of BITS_TO_LONGS()
- msixtbl_read() unconditionally accessed the physical table, even
though the data was only needed in a quarter of all cases
- various calculations were done unnecessarily for both of the rather
distinct code paths in msixtbl_read()
Additionally it is unclear on what basis MAX_MSIX_ACC_ENTRIES was
chosen to be 3.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 24534:eca719b621a1
user: Keir Fraser <keir@xen.org>
date: Sun Jan 22 10:20:03 2012 +0000
x86/hvm: No need to arch_set_info_guest() before restoring per-vcpu HVM
state.
Signed-off-by: Keir Fraser <keir@xen.org>
changeset: 24533:80fdf2182bc6
user: Keir Fraser <keir@xen.org>
date: Sat Jan 21 17:15:40 2012 +0000
tools/libvchan: Beef up the CPU barriers in libvchan.
Although they were sufficient for x86, they weren''t safe more
generally.
Signed-off-by: Keir Fraser <keir@xen.org>
=======================================commit
bb36d632e4cabf47882adff07a45c6702c4a5b30
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Jan 5 17:16:46 2012 +0000
qemu-xen: adjust MSI-X related log messages
Several of these messages we coded using line continuation within a
string literal. This is generally not recommended and also lead to odd
sequences of many blanks in the middle of the messages.
The message indicating a discarded write due to MSI-X already being
enabled doesn''t need to be issued when a write doesn''t
actually modify
the current value. Adjust the surrounding logic accordingly, and
eliminate some redundancy as well as the sometimes unnecessary access
to the physical MSI-X table.
Finally, adjust the wording of a few messages to be more precise and/or
more useful.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>