flight 22309 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/22309/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-win7-amd64 12 guest-localmigrate/x10 fail REGR. vs. 22278
test-amd64-i386-xl-winxpsp3-vcpus1 7 windows-install fail REGR. vs. 22278
test-amd64-i386-xl-win7-amd64 7 windows-install fail REGR. vs. 22278
Tests which did not succeed, but are not blocking:
test-amd64-i386-freebsd10-amd64 8 guest-saverestore fail never pass
test-amd64-i386-freebsd10-i386 8 guest-saverestore fail never pass
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass
test-armhf-armhf-xl 5 xen-boot fail never pass
test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass
test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass
test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass
version targeted for testing:
xen d65da94e03935878d84818a6890403997027cfa4
baseline version:
xen 4b07b3cbf29f66da6090d52e75b5fdae592c6441
------------------------------------------------------------
People who touched revisions under test:
Andre Przywara <andre.przywara@linaro.org>
Anthony PERARD <anthony.perard@citrix.com>
Daniel Kiper <daniel.kiper@oracle.com>
Eddie Dong <eddie.dong@intel.com>
Ian Campbell <ian.campbell@citrix.com>
Jan Beulich <jbeulich@suse.com>
Julien Grall <julien.grall@linaro.org>
Keir Fraser <keir@xen.org>
Lan Yixun (dlan) <dennis.yxun@gmail.com>
Nathan Studer <nate.studer@dornerworks.com>
Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
------------------------------------------------------------
jobs:
build-amd64 pass
build-armhf pass
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-armhf-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl pass
test-armhf-armhf-xl fail
test-amd64-i386-xl pass
test-amd64-i386-rhel6hvm-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd pass
test-amd64-i386-freebsd10-amd64 fail
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 pass
test-amd64-i386-freebsd10-i386 fail
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel pass
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-i386-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-amd64-amd64-xl-sedf-pin pass
test-amd64-amd64-pv pass
test-amd64-i386-pv pass
test-amd64-amd64-xl-sedf pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-i386-xend-qemut-winxpsp3 fail
test-amd64-amd64-xl-qemut-winxpsp3 fail
test-amd64-amd64-xl-qemuu-winxpsp3 fail
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit d65da94e03935878d84818a6890403997027cfa4
Author: Andre Przywara <andre.przywara@linaro.org>
Date: Thu Dec 5 11:08:12 2013 +0100
arm64: enable PSCI secondary CPU bringup
If the device tree contains a PSCI node and the DTB CPU node tells us
to use PSCI for enabling secondary cores, we set the function pointer
to the PSCI wrapper function to enable PSCI SMP bringup.
Signed-off-by: Andre Przywara <andre.przywara@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 875c495af5f2f07d98348d1ff19277f49d18be92
Author: Andre Przywara <andre.przywara@linaro.org>
Date: Thu Dec 5 11:08:11 2013 +0100
arm32: enable PSCI secondary CPU bringup
If the device tree contains a PSCI node, we bring up secondary CPUs
by invoking the appropriate PSCI handler.
This will take priority over platform specific functions (which could
call the PSCI wrapper themselves if needed), so any PSCI enablement
of a platform will automatically be used (as on Linux).
Signed-off-by: Andre Przywara <andre.przywara@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 3702d92fe4540f52032281c88182e48962c08f57
Author: Andre Przywara <andre.przywara@linaro.org>
Date: Thu Dec 5 11:08:10 2013 +0100
arm: add a function to invoke the PSCI handler
The PSCI handler is invoked via a secure monitor call with the
arguments defined in registers. Copy the function from the
Linux code and adjust it to work on both ARM32 and ARM64.
Signed-off-by: Andre Przywara <andre.przywara@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 18a13b96766cfa44c0edb170ed34a1d6bfde9db1
Author: Andre Przywara <andre.przywara@linaro.org>
Date: Thu Dec 5 11:08:09 2013 +0100
arm: parse PSCI node from the host device-tree
The availability of a PSCI handler is advertised in the DTB.
Find and parse the node (described in the Linux device-tree binding)
and save the function number for bringing up a CPU for later usage.
We do some sanity checks, especially we deny using HVC as a calling
method, as it does not make much sense currently under Xen.
Signed-off-by: Andre Przywara <andre.przywara@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 4e014d63e3d611efbb5fc971ffccafda9aa2b2bb
Author: Andre Przywara <andre.przywara@linaro.org>
Date: Thu Dec 5 11:08:08 2013 +0100
arm: move GIC SGI kicking into separate function
Currently we unconditionally send SGIs to all cores on SMP bringup.
Those SGIs (software generated interrupts) are to push a secondary core
through a gate in the Xen bring up code to filter the right CPU. This gate
is
necessary on platforms which do not allow us to wake up a specific secondary
processor and will trap all but the CPU we are trying to wake up.
With PSCI we can explicitly specify the core to startup, so we
don''t need the
kick here because the CPU will fall straight through Xen''s gate.
So we move the GIC kick into a function and call it explicitly from the
platforms that need it. This gets us get rid of the empty cpu_up() platform
functions in ARM32 and the comment in there.
Signed-off-by: Andre Przywara <andre.przywara@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
[ ijc -- explain more about the Xen gate in the commit message ]
commit fd715d2c958833a8a9bdc41287922a441d66406d
Author: Andre Przywara <andre.przywara@linaro.org>
Date: Thu Dec 5 11:08:07 2013 +0100
arm: rename xen/arch/arm/psci.c into vpsci.c
Follow the current convention of prefixing guest related names
with "v" by renaming the guest PSCI functionality into vpsci.c to
make
room for the host PSCI functions.
Signed-off-by: Andre Przywara <andre.przywara@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit fba6c4ba5e8563d7ce53750750ac273781bd9398
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Wed Dec 4 17:48:56 2013 +0000
tools: libxl: testidl: initialise the KeyedUnion keyvar before the union
This is Coverity CID 1135378 and 1135379.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>
commit 71952bfcbe9187765cf4010b1479af86def4fb1f
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Wed Dec 4 14:54:21 2013 +0000
xen: arm: Enable 1:1 workaround by default
I was just about to send out patches adding the 1:1 workaround to vexpress
(the foundation model is a vexpress platfrom with DMA) and sunxi.
That would have meant that all platforms now implement the quirk. Instead
lets
just make it the default and remove the quirk.
In the future this will likely be set based on the presence absence of an
IOMMU, perhaps with additional overrides by the platform.
This results in some dead code in domain_build for dealing with the non-1:1
case. This is deliberate and is left in anticipation of IOMMU support in
4.5.
PLATFORM_QUIRK_GIC_64K_STRIDE is renumbered as a side effect of this change.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Julien Grall <julien.grall@linaro.org>
commit ca5690565784caa53b9889f8539c2dd9b375e419
Merge: c04fbf5... 747fb88...
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Wed Dec 4 14:51:57 2013 +0000
Merge branch ''staging'' of
ssh://xenbits.xen.org/home/xen/git/xen into staging
commit 747fb88881b0c448fa99a94fba3a492066df248a
Author: Ian Jackson <ian.jackson@eu.citrix.com>
Date: Wed Dec 4 14:46:19 2013 +0000
QEMU_TAG update
commit c04fbf58558de544b96c861bb88293524fa30afc
Author: Dennis Lan (dlan) <dennis.yxun@gmail.com>
Date: Wed Dec 4 14:37:25 2013 +0000
xen: arm64: clear boot_first instead of boot_pgtable twice
Signed-off-by: Lan Yixun (dlan) <dennis.yxun@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit fda8904bf3d149296a3dd8d3e7fc835d91b9828e
Author: Anthony PERARD <anthony.perard@citrix.com>
Date: Thu Nov 28 19:44:50 2013 +0000
Update QEMU_UPSTREAM_REVISION
Changing to master, otherwise we don''t get the last updates.
Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 2cebe22e6924439535cbf4a9f82a7d9d30c8f9c7
Author: Daniel Kiper <daniel.kiper@oracle.com>
Date: Mon Dec 2 20:13:03 2013 +0100
libxenctrl: Fix xc_interface_close() crash if it gets NULL as an argument
xc_interface_close() crashes if it gets NULL as an argument. However,
it just calls xc_interface_close_common() which is called by many
others functions. It means that they are also vulnerable. So fix above
mentioned issue by adding NULL check in xc_interface_close_common().
This way we fix similar issue in other functions which calls
xc_interface_close_common() too.
Signed-off-by: Daniel Kiper <daniel.kiper@oracle.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 17d34efd6751f93bec943ccc8f5b8c56c8fbb483
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Tue Dec 3 15:13:36 2013 +0000
xen: arm: TCR_EL1 is 64-bit on arm64
Storing it in a 32-bit variable in struct arch_vcpu caused breakage over
context switch.
There were also several other places which stored this as the 32-bit value.
Update them all.
The "struct vcpu_guest_context" case needs special consideration.
This struct
is in theory is exposed to guests, via the VCPUOP_initialise hypercall.
However as discussed in
http://lists.xen.org/archives/html/xen-devel/2013-10/msg00912.html this
isn''t
really a guest visible interface since ARM uses PSCI for VCPU bringup
(VCPUOP_initialise simply isn''t available) The other users of this
interface
are the domctls, which are not a stable API. Therefore while fixing the
ttbcr
size also surround the struct in ifdefs to restrict the struct to the
hypervisor and the tools only (omitting the extra complexity of renaming as
I
suggested in the referenced thread).
NB TCR_EL1 on arm64 is known as TTBCR on arm32, hence the apparent naming
inconsistencies.
Spotted-by: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Julien Grall <julien.grall@linaro.org>
Acked-by: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
Cc: Anup Patel <anup.patel@linaro.org>
Cc: patches@linaro.org
Cc: patches@apm.com
commit 375c911acc373b4765c0b6e53203e37ae4eb3745
Merge: 81dcaaa... 9f0c658...
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Wed Dec 4 14:29:39 2013 +0000
Merge branch ''staging'' of
ssh://xenbits.xen.org/home/xen/git/xen into staging
commit 81dcaaa97a21cb397cd326fdcb8f9953ea23ceff
Author: Nathan Studer <nate.studer@dornerworks.com>
Date: Tue Dec 3 17:24:27 2013 -0500
arinc: Add poolid parameter to scheduler get/set functions
Signed-off-by: Nathan Studer <nate.studer@dornerworks.com>
Reviewed-by: Dario Faggioli <dario.faggioli@citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 9f0c658baedcd0f3f71c35b54965e440ffef0e45
Author: Nathan Studer <nate.studer@dornerworks.com>
Date: Wed Dec 4 13:29:00 2013 +0100
arinc: add cpu-pool support to scheduler
1. Remove the restriction that dom0 must be in the schedule, since dom-0
may
not belong to the scheduler''s pool.
2. Add a schedule entry for each of dom-0''s vcpus as they are
created.
3. Add code to deal with empty schedules in the do_schedule function.
4. Call the correct idle task for the pcpu on which the scheduling decision
is being made in do_schedule.
5. Add code to prevent migration of a vcpu.
6. Implement a proper cpu_pick function, which prefers the current
processor.
7. Add a scheduler lock to protect access to global variables from multiple
PCPUs.
These changes do not implement arinc653 multicore. Since the schedule only
supports 1 vcpu entry per slot, even if the vcpus of a domain are run on
multiple pcpus, the scheduler will essentially serialize their execution.
Signed-off-by: Nathan Studer <nate.studer@dornerworks.com>
Release-acked-by: George Dunlap <george.dunlap@eu.citrix.com>
commit dc37e0bfffc673f4bdce1d69ad86098bfb0ab531
Author: Daniel Kiper <daniel.kiper@oracle.com>
Date: Wed Dec 4 13:26:37 2013 +0100
x86: fix early boot command line parsing
There is no reliable way to encode NUL character as a character so encode
it as a number. Read:
http://sourceware.org/binutils/docs/as/Characters.html.
Octal and hex encoding do not work on at least one system (GNU assembler
version 2.22 (x86_64-linux-gnu) using BFD version (GNU Binutils for Debian)
2.22).
Without this fix e.g. no-real-mode option at the end of xen.gz command line
is not detected.
Signed-off-by: Daniel Kiper <daniel.kiper@oracle.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
commit e1978480c76e36bc22ec12657121ac91d08aca6b
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 4 13:23:27 2013 +0100
nested VMX: fix I/O port exit emulation
For multi-byte operations all affected ports'' bits in the bitmap
need
to be checked, not just the first port''s one.
Reported-by: Matthew Daley <mattd@bugfuzz.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Eddie Dong <eddie.dong@intel.com>
(qemu changes not included)