osstest service owner
2018-12-10 05:23:13 UTC
flight 131155 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131155/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-3 69 xtf/test-hvm64-xsa-278 fail REGR. vs. 130985
test-xtf-amd64-amd64-5 69 xtf/test-hvm64-xsa-278 fail REGR. vs. 130985
Tests which did not succeed, but are not blocking:
test-xtf-amd64-amd64-1 69 xtf/test-hvm64-xsa-278 fail like 130895
test-xtf-amd64-amd64-2 69 xtf/test-hvm64-xsa-278 fail like 130985
test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop fail like 130985
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 130985
test-armhf-armhf-libvirt 14 saverestore-support-check fail like 130985
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 130985
test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 130985
test-armhf-armhf-libvirt-raw 13 saverestore-support-check fail like 130985
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail like 130985
test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop fail like 130985
test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop fail like 130985
test-amd64-amd64-libvirt-xsm 13 migrate-support-check fail never pass
test-amd64-i386-libvirt 13 migrate-support-check fail never pass
test-amd64-i386-xl-pvshim 12 guest-start fail never pass
test-amd64-i386-libvirt-xsm 13 migrate-support-check fail never pass
test-amd64-amd64-libvirt 13 migrate-support-check fail never pass
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass
test-armhf-armhf-xl-arndale 13 migrate-support-check fail never pass
test-armhf-armhf-xl-arndale 14 saverestore-support-check fail never pass
test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2 fail never pass
test-amd64-amd64-libvirt-vhd 12 migrate-support-check fail never pass
test-armhf-armhf-xl-rtds 13 migrate-support-check fail never pass
test-armhf-armhf-xl-rtds 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-credit1 13 migrate-support-check fail never pass
test-armhf-armhf-xl-credit1 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-cubietruck 13 migrate-support-check fail never pass
test-armhf-armhf-libvirt 13 migrate-support-check fail never pass
test-armhf-armhf-xl-multivcpu 13 migrate-support-check fail never pass
test-armhf-armhf-xl-cubietruck 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-multivcpu 14 saverestore-support-check fail never pass
test-armhf-armhf-xl 13 migrate-support-check fail never pass
test-armhf-armhf-xl 14 saverestore-support-check fail never pass
test-armhf-armhf-libvirt-raw 12 migrate-support-check fail never pass
test-armhf-armhf-xl-credit2 13 migrate-support-check fail never pass
test-armhf-armhf-xl-credit2 14 saverestore-support-check fail never pass
test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop fail never pass
test-armhf-armhf-xl-vhd 12 migrate-support-check fail never pass
test-armhf-armhf-xl-vhd 13 saverestore-support-check fail never pass
test-amd64-i386-xl-qemuu-win10-i386 10 windows-install fail never pass
test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install fail never pass
test-amd64-amd64-xl-qemut-win10-i386 10 windows-install fail never pass
test-amd64-i386-xl-qemut-win10-i386 10 windows-install fail never pass
version targeted for testing:
xen 58eb90a9650a8ea73533bc2b87c13b8ca7bbe35a
baseline version:
xen 82855aba5bf91e50c81526167c11d4aeaf665e66
Last test of basis 130985 2018-12-03 17:11:24 Z 6 days
Failing since 131065 2018-12-05 19:14:18 Z 4 days 3 attempts
Testing same since 131155 2018-12-08 23:23:51 Z 1 days 1 attempts
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <***@citrix.com>
Anthony PERARD <***@citrix.com>
Doug Goldstein <***@cardoe.com>
Jan Beulich <***@suse.com>
Juergen Gross <***@suse.com>
Julien Grall <***@arm.com>
Kevin Tian <***@intel.com>
Oleksandr Tyshchenko <***@epam.com>
Roger Pau Monné <***@citrix.com>
Wei Liu <***@citrix.com>
jobs:
build-amd64-xsm pass
build-i386-xsm pass
build-amd64-xtf pass
build-amd64 pass
build-armhf pass
build-i386 pass
build-amd64-libvirt pass
build-armhf-libvirt pass
build-i386-libvirt pass
build-amd64-prev pass
build-i386-prev pass
build-amd64-pvops pass
build-armhf-pvops pass
build-i386-pvops pass
build-amd64-rumprun pass
build-i386-rumprun pass
test-xtf-amd64-amd64-1 pass
test-xtf-amd64-amd64-2 pass
test-xtf-amd64-amd64-3 pass
test-xtf-amd64-amd64-4 pass
test-xtf-amd64-amd64-5 pass
test-amd64-amd64-xl pass
test-armhf-armhf-xl pass
test-amd64-i386-xl pass
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass
test-amd64-amd64-libvirt-xsm pass
test-amd64-i386-libvirt-xsm pass
test-amd64-amd64-xl-xsm pass
test-amd64-i386-xl-xsm pass
test-amd64-amd64-qemuu-nested-amd fail
test-amd64-amd64-xl-pvhv2-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd pass
test-amd64-amd64-xl-qemut-debianhvm-amd64 pass
test-amd64-i386-xl-qemut-debianhvm-amd64 pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-freebsd10-amd64 pass
test-amd64-amd64-xl-qemuu-ovmf-amd64 pass
test-amd64-i386-xl-qemuu-ovmf-amd64 pass
test-amd64-amd64-rumprun-amd64 pass
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-i386-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-qemut-ws16-amd64 fail
test-amd64-i386-xl-qemut-ws16-amd64 fail
test-amd64-amd64-xl-qemuu-ws16-amd64 fail
test-amd64-i386-xl-qemuu-ws16-amd64 fail
test-armhf-armhf-xl-arndale pass
test-amd64-amd64-xl-credit1 pass
test-armhf-armhf-xl-credit1 pass
test-amd64-amd64-xl-credit2 pass
test-armhf-armhf-xl-credit2 pass
test-armhf-armhf-xl-cubietruck pass
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict pass
test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict pass
test-amd64-amd64-examine pass
test-armhf-armhf-examine pass
test-amd64-i386-examine pass
test-amd64-i386-freebsd10-i386 pass
test-amd64-i386-rumprun-i386 pass
test-amd64-amd64-xl-qemut-win10-i386 fail
test-amd64-i386-xl-qemut-win10-i386 fail
test-amd64-amd64-xl-qemuu-win10-i386 fail
test-amd64-i386-xl-qemuu-win10-i386 fail
test-amd64-amd64-qemuu-nested-intel pass
test-amd64-amd64-xl-pvhv2-intel pass
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-amd64-libvirt pass
test-armhf-armhf-libvirt pass
test-amd64-i386-libvirt pass
test-amd64-amd64-livepatch pass
test-amd64-i386-livepatch pass
test-amd64-amd64-migrupgrade pass
test-amd64-i386-migrupgrade pass
test-amd64-amd64-xl-multivcpu pass
test-armhf-armhf-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-amd64-amd64-libvirt-pair pass
test-amd64-i386-libvirt-pair pass
test-amd64-amd64-amd64-pvgrub pass
test-amd64-amd64-i386-pvgrub pass
test-amd64-amd64-xl-pvshim pass
test-amd64-i386-xl-pvshim fail
test-amd64-amd64-pygrub pass
test-amd64-amd64-xl-qcow2 pass
test-armhf-armhf-libvirt-raw pass
test-amd64-i386-xl-raw pass
test-amd64-amd64-xl-rtds pass
test-armhf-armhf-xl-rtds pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow pass
test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow pass
test-amd64-amd64-xl-shadow pass
test-amd64-i386-xl-shadow pass
test-amd64-amd64-libvirt-vhd pass
test-armhf-armhf-xl-vhd pass
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 58eb90a9650a8ea73533bc2b87c13b8ca7bbe35a
Author: Oleksandr Tyshchenko <***@epam.com>
Date: Fri Dec 7 11:45:31 2018 +0200
xen/arm32: Remove __init prefixes from funcs that are used within CPU up flow
This is a follow-up patch to
commit 01a7e8ccef6e7d5718a251ad587567afbe723330
xen/arm: Remove __initdata and __init to enable CPU hotplug
Signed-off-by: Oleksandr Tyshchenko <***@epam.com>
Acked-by: Julien Grall <***@arm.com>
commit 9cbe093b7b848aa96120406032fb15e5ea3362bd
Author: Oleksandr Tyshchenko <***@epam.com>
Date: Fri Dec 7 15:41:16 2018 +0200
xen/arm: link: Link proc_info_list in .rodata instead of .init.data
To be able to use it for the hot-plugged CPUs as well.
The reason why we link proc_info_list in ".rodata" section is that
it context should never be modified.
This patch also renames ".init.proc.info" section to ".proc.info"
as "init" prefix is not actual anymore.
Signed-off-by: Oleksandr Tyshchenko <***@epam.com>
commit 0124380fdf4f5d0f4d85867a4492dd050162b047
Author: Juergen Gross <***@suse.com>
Date: Tue Dec 4 15:28:57 2018 +0100
tools/libxl: fix boot of HVM domain with Xenstore-stubdom
The Xenstore domid isn't set for HVM domains. This will result in
failure when booting a HVM domain on a system with Xenstore not running
in dom0.
Same applies for console domid, so set both.
This is broken since commit a2d9a6fa1fcd ("tools/libxenctrl: use new
xenforeignmemory API to seed grant table").
Signed-off-by: Juergen Gross <***@suse.com>
Acked-by: Wei Liu <***@citrix.com>
commit 42c09149c64d282b3daf67b10a1e08579320b2ec
Author: Anthony PERARD <***@citrix.com>
Date: Wed Dec 5 16:26:02 2018 +0000
tools/xenstore: Document failure for xs_{read,directory,read_watch}
Those functions can return NULL on failure, document it in the public
header.
Signed-off-by: Anthony PERARD <***@citrix.com>
Reviewed-by: Paul Durrant <***@citrix.com>
Acked-by: Wei Liu <***@citrix.com>
commit ae01a8e315fecb1914edd99980a619d387951d3f
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:21:34 2018 +0100
ns16550: enable use of PCI MSI
Which, on x86, requires fiddling with the INTx bit in PCI config space,
since for internally used MSI we can't delegate this to Dom0.
ns16550_init_postirq() also needs (benign) re-ordering of its
operations.
Signed-off-by: Jan Beulich <***@suse.com>
Acked-by: Wei Liu <***@citrix.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit 69343d5af45076e5b196833f3082acf6f7248299
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:20:55 2018 +0100
console: adjust IRQ initialization
In order for a Xen internal PCI device driver to enable MSI on the
device, we need another hook which the driver can use to create the IRQ
(doing this in the init_preirq hook is too early, since IRQ code hasn't
got initialized at that time yet, and doing it in init_postirq is too
late because at least on x86 smp_intr_init() needs to know the IRQ
number).
On x86 this additionally requires a slight ordering change to IRQ
initialization, to facilitate calling the new hook between basic
initialization and the call path leading to smp_intr_init().
Signed-off-by: Jan Beulich <***@suse.com>
Acked-by: Wei Liu <***@citrix.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit c46dba0d72e519743823c76c676858ad1af48b90
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:19:04 2018 +0100
make domain_adjust_tot_pages() __must_check
Even if unlikely, donate_page() should not ignore the possible need to
obtain a domain reference. To make people look more closely when they
add new uses of domain_adjust_tot_pages(), force its return value to be
checked. This in turn requires a benign change to assign_pages().
Signed-off-by: Jan Beulich <***@suse.com>
Acked-by: Andrew Cooper <***@citrix.com>
commit 88f90693c74d5877f6b343076c31739e8754fb00
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:18:03 2018 +0100
x86: reduce code duplication in guest_remove_page()
Quite a bit of duplicate code has accumulated on the "paging" types
special case path. Re-use what can be re-used from the common path.
Since it needs touching anyway, slightly re-format and extend the
gdprintk() on the common path as well.
Signed-off-by: Jan Beulich <***@suse.com>
Reviewed-by: Andrew Cooper <***@citrix.com>
commit 81cfc1b3c78f5d4abafdb368ede914b1dd825a7b
Author: Wei Liu <***@citrix.com>
Date: Thu Nov 22 15:49:03 2018 +0000
automation: break .gitlab-yaml into smaller files
Break out files for build jobs and test jobs. Keep the top level
.gitlab-ci.yaml small.
Signed-off-by: Wei Liu <***@citrix.com>
Acked-by: Doug Goldstein <***@cardoe.com>
commit 9f4ac0e6c2f7634757e62990cba3d531f15104a2
Author: Wei Liu <***@citrix.com>
Date: Thu Nov 22 15:49:02 2018 +0000
automation: add a qemu smoke test for clang build
Also rename the old test to have -gcc suffix.
Signed-off-by: Wei Liu <***@citrix.com>
Acked-by: Doug Goldstein <***@cardoe.com>
commit 7824baee56248474346da138b906a3a5c5420458
Author: Andrew Cooper <***@citrix.com>
Date: Mon Feb 26 12:45:58 2018 +0000
x86/hvm: Handle x2apic MSRs via the new guest_{rd,wr}msr() infrastructure
Dispatch from the guest_{rd,wr}msr() functions. The read side should be safe
outside of current context, but the write side is definitely not. As the
toolstack has no legitimate reason to access the APIC registers via this
interface (not least because whether they are accessible at all depends on
guest settings), unilaterally reject access attempts outside of current
context.
Rename to guest_{rd,wr}msr_x2apic() for consistency, and alter the functions
to use X86EMUL_EXCEPTION rather than X86EMUL_UNHANDLEABLE. The previous
callers turned UNHANDLEABLE into EXCEPTION, but using UNHANDLEABLE will now
interfere with the fallback to legacy MSR handling.
While altering guest_rdmsr_x2apic() make a couple of minor improvements.
Reformat the initialiser for readable[] so it indents in a more natural way,
and alter high to be a 64bit integer to avoid shifting 0 by 32 in the common
path.
Observant people might notice that we now don't let PV guests read the x2apic
MSRs. They should never have been able to in the first place.
Signed-off-by: Andrew Cooper <***@citrix.com>
Reviewed-by: Konrad Rzeszutek Wilk <***@oracle.com>
Acked-by: Jan Beulich <***@suse.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit 689bc6244449fd988c32759201668738498ec261
Author: Andrew Cooper <***@citrix.com>
Date: Wed Mar 7 16:48:01 2018 +0000
x86: Fix APIC MSR constant names
We currently have MSR_IA32_APICBASE and MSR_IA32_APICBASE_MSR which are
synonymous from a naming point of view, but refer to very different things.
Rename the x2APIC MSRs to MSR_X2APIC_*, which are shorter constants and
visually separate the register function from the generic APIC name. For the
case ranges, introduce MSR_X2APIC_LAST, rather than relying on the knowledge
that there are 0x3ff MSRs architecturally reserved for x2APIC functionality.
For functionality relating to the APIC_BASE MSR, use MSR_APIC_BASE for the MSR
itself, but drop the MSR prefix from the other constants to shorten the names.
In all cases, the fact that we are dealing with the APIC_BASE MSR is obvious
from the context.
No functional change (the combined binary is identical).
Signed-off-by: Andrew Cooper <***@citrix.com>
Reviewed-by: Konrad Rzeszutek Wilk <***@oracle.com>
Reviewed-by: Kevin Tian <***@intel.com>
Acked-by: Jan Beulich <***@suse.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit 17c0293b47b5dc16ae64bbd656acd26fe7d7044b
Author: Andrew Cooper <***@citrix.com>
Date: Thu Nov 29 18:16:01 2018 +0000
x86/cpuid: Drop the synthetic X86_FEATURE_XEN_IBPB
This appears to be a vestigial remnent of an old version of the
XSA-254/Spectre series, and has never been used.
Signed-off-by: Andrew Cooper <***@citrix.com>
Reviewed-by: Jan Beulich <***@suse.com>
commit aaed4babc4b9b68faabd5a3931059ef0c66c7886
Author: Andrew Cooper <***@citrix.com>
Date: Thu Nov 29 18:17:45 2018 +0000
x86/spec-ctrl: Drop the bti= command line option
bti= was introduced with the original Spectre fixes (Jan 2018), but by the
time Speculative Store Bypass came along (May 2018), it was superceeded by the
more generic spec-ctrl=.
Since then, we've had LazyFPU (June 2018) and L1TF (August 2018), which means
noone will be using the option. Remove it entirely - anyone who happens to
accidentially be using it might now spot Xen complaining about an option it
doesn't understand.
Signed-off-by: Andrew Cooper <***@citrix.com>
Acked-by: Jan Beulich <***@suse.com>
commit 70739427f55d595ad1c575c47fef00c81881e9a2
Author: Roger Pau Monné <***@citrix.com>
Date: Tue Dec 4 14:04:54 2018 +0100
pci: apply workaround for Intel errata HSE43 and BDF2/BDX2
These errata affect the values read from the BAR registers, and could
render vPCI (and by extension PVH Dom0 unusable).
HSE43 is a Haswell erratum where a non-BAR register is implemented at
the position where the first BAR of the device should be found in a
Power Control Unit device. Note that there are no BARs on this device,
apart from the bogus CSR register positioned on top of the first BAR.
BDF2/BDX2 is a Broadwell erratum where BARs in the Home Agent device
will return bogus non-zero values.
In both cases the solution is to treat such devices as having no BARs
in the vPCI code.
Reported-by: Jan Beulich <***@suse.com>
Signed-off-by: Roger Pau Monné <***@citrix.com>
Reviewed-by: Jan Beulich <***@suse.com>
commit e59441b09790801eeaf215e1d98f47b7e9daca12
Author: Juergen Gross <***@suse.com>
Date: Tue Dec 4 14:04:20 2018 +0100
vmx: remove stale prototypes
Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related
implementation. Remove them.
Signed-off-by: Juergen Gross <***@suse.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
Acked-by: Andrew Cooper <***@citrix.com>
Acked-by: Kevin Tian <***@intel.com>
commit 5aa62f06681ae52c8e647194c32dba2b4c903991
Author: Jan Beulich <***@suse.com>
Date: Tue Dec 4 14:03:43 2018 +0100
x86emul: raise #GP(0) in VME mode for POPF with TF set in new value
This is a check explicitly listed by the instruction page in the SDM.
Signed-off-by: Jan Beulich <***@suse.com>
Reviewed-by: Andrew Cooper <***@citrix.com>
commit 6b4600b1425ef8006efcd2cdb4c4c986309264f6
Author: Jan Beulich <***@suse.com>
Date: Tue Dec 4 14:02:46 2018 +0100
x86emul: skip VIF processing in VME mode for 16-bit POPF at IOPL 3
At IOPL 3 CR4.VME is irrelevant.
Reported-by: Andrew Cooper <***@citrix.com>
Signed-off-by: Jan Beulich <***@suse.com>
Reviewed-by: Andrew Cooper <***@citrix.com>
(qemu changes not included)
http://logs.test-lab.xenproject.org/osstest/logs/131155/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-3 69 xtf/test-hvm64-xsa-278 fail REGR. vs. 130985
test-xtf-amd64-amd64-5 69 xtf/test-hvm64-xsa-278 fail REGR. vs. 130985
Tests which did not succeed, but are not blocking:
test-xtf-amd64-amd64-1 69 xtf/test-hvm64-xsa-278 fail like 130895
test-xtf-amd64-amd64-2 69 xtf/test-hvm64-xsa-278 fail like 130985
test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop fail like 130985
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 130985
test-armhf-armhf-libvirt 14 saverestore-support-check fail like 130985
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 130985
test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 130985
test-armhf-armhf-libvirt-raw 13 saverestore-support-check fail like 130985
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail like 130985
test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop fail like 130985
test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop fail like 130985
test-amd64-amd64-libvirt-xsm 13 migrate-support-check fail never pass
test-amd64-i386-libvirt 13 migrate-support-check fail never pass
test-amd64-i386-xl-pvshim 12 guest-start fail never pass
test-amd64-i386-libvirt-xsm 13 migrate-support-check fail never pass
test-amd64-amd64-libvirt 13 migrate-support-check fail never pass
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass
test-armhf-armhf-xl-arndale 13 migrate-support-check fail never pass
test-armhf-armhf-xl-arndale 14 saverestore-support-check fail never pass
test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2 fail never pass
test-amd64-amd64-libvirt-vhd 12 migrate-support-check fail never pass
test-armhf-armhf-xl-rtds 13 migrate-support-check fail never pass
test-armhf-armhf-xl-rtds 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-credit1 13 migrate-support-check fail never pass
test-armhf-armhf-xl-credit1 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-cubietruck 13 migrate-support-check fail never pass
test-armhf-armhf-libvirt 13 migrate-support-check fail never pass
test-armhf-armhf-xl-multivcpu 13 migrate-support-check fail never pass
test-armhf-armhf-xl-cubietruck 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-multivcpu 14 saverestore-support-check fail never pass
test-armhf-armhf-xl 13 migrate-support-check fail never pass
test-armhf-armhf-xl 14 saverestore-support-check fail never pass
test-armhf-armhf-libvirt-raw 12 migrate-support-check fail never pass
test-armhf-armhf-xl-credit2 13 migrate-support-check fail never pass
test-armhf-armhf-xl-credit2 14 saverestore-support-check fail never pass
test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop fail never pass
test-armhf-armhf-xl-vhd 12 migrate-support-check fail never pass
test-armhf-armhf-xl-vhd 13 saverestore-support-check fail never pass
test-amd64-i386-xl-qemuu-win10-i386 10 windows-install fail never pass
test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install fail never pass
test-amd64-amd64-xl-qemut-win10-i386 10 windows-install fail never pass
test-amd64-i386-xl-qemut-win10-i386 10 windows-install fail never pass
version targeted for testing:
xen 58eb90a9650a8ea73533bc2b87c13b8ca7bbe35a
baseline version:
xen 82855aba5bf91e50c81526167c11d4aeaf665e66
Last test of basis 130985 2018-12-03 17:11:24 Z 6 days
Failing since 131065 2018-12-05 19:14:18 Z 4 days 3 attempts
Testing same since 131155 2018-12-08 23:23:51 Z 1 days 1 attempts
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <***@citrix.com>
Anthony PERARD <***@citrix.com>
Doug Goldstein <***@cardoe.com>
Jan Beulich <***@suse.com>
Juergen Gross <***@suse.com>
Julien Grall <***@arm.com>
Kevin Tian <***@intel.com>
Oleksandr Tyshchenko <***@epam.com>
Roger Pau Monné <***@citrix.com>
Wei Liu <***@citrix.com>
jobs:
build-amd64-xsm pass
build-i386-xsm pass
build-amd64-xtf pass
build-amd64 pass
build-armhf pass
build-i386 pass
build-amd64-libvirt pass
build-armhf-libvirt pass
build-i386-libvirt pass
build-amd64-prev pass
build-i386-prev pass
build-amd64-pvops pass
build-armhf-pvops pass
build-i386-pvops pass
build-amd64-rumprun pass
build-i386-rumprun pass
test-xtf-amd64-amd64-1 pass
test-xtf-amd64-amd64-2 pass
test-xtf-amd64-amd64-3 pass
test-xtf-amd64-amd64-4 pass
test-xtf-amd64-amd64-5 pass
test-amd64-amd64-xl pass
test-armhf-armhf-xl pass
test-amd64-i386-xl pass
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass
test-amd64-amd64-libvirt-xsm pass
test-amd64-i386-libvirt-xsm pass
test-amd64-amd64-xl-xsm pass
test-amd64-i386-xl-xsm pass
test-amd64-amd64-qemuu-nested-amd fail
test-amd64-amd64-xl-pvhv2-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd pass
test-amd64-amd64-xl-qemut-debianhvm-amd64 pass
test-amd64-i386-xl-qemut-debianhvm-amd64 pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-freebsd10-amd64 pass
test-amd64-amd64-xl-qemuu-ovmf-amd64 pass
test-amd64-i386-xl-qemuu-ovmf-amd64 pass
test-amd64-amd64-rumprun-amd64 pass
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-i386-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-qemut-ws16-amd64 fail
test-amd64-i386-xl-qemut-ws16-amd64 fail
test-amd64-amd64-xl-qemuu-ws16-amd64 fail
test-amd64-i386-xl-qemuu-ws16-amd64 fail
test-armhf-armhf-xl-arndale pass
test-amd64-amd64-xl-credit1 pass
test-armhf-armhf-xl-credit1 pass
test-amd64-amd64-xl-credit2 pass
test-armhf-armhf-xl-credit2 pass
test-armhf-armhf-xl-cubietruck pass
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict pass
test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict pass
test-amd64-amd64-examine pass
test-armhf-armhf-examine pass
test-amd64-i386-examine pass
test-amd64-i386-freebsd10-i386 pass
test-amd64-i386-rumprun-i386 pass
test-amd64-amd64-xl-qemut-win10-i386 fail
test-amd64-i386-xl-qemut-win10-i386 fail
test-amd64-amd64-xl-qemuu-win10-i386 fail
test-amd64-i386-xl-qemuu-win10-i386 fail
test-amd64-amd64-qemuu-nested-intel pass
test-amd64-amd64-xl-pvhv2-intel pass
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-amd64-libvirt pass
test-armhf-armhf-libvirt pass
test-amd64-i386-libvirt pass
test-amd64-amd64-livepatch pass
test-amd64-i386-livepatch pass
test-amd64-amd64-migrupgrade pass
test-amd64-i386-migrupgrade pass
test-amd64-amd64-xl-multivcpu pass
test-armhf-armhf-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-amd64-amd64-libvirt-pair pass
test-amd64-i386-libvirt-pair pass
test-amd64-amd64-amd64-pvgrub pass
test-amd64-amd64-i386-pvgrub pass
test-amd64-amd64-xl-pvshim pass
test-amd64-i386-xl-pvshim fail
test-amd64-amd64-pygrub pass
test-amd64-amd64-xl-qcow2 pass
test-armhf-armhf-libvirt-raw pass
test-amd64-i386-xl-raw pass
test-amd64-amd64-xl-rtds pass
test-armhf-armhf-xl-rtds pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow pass
test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow pass
test-amd64-amd64-xl-shadow pass
test-amd64-i386-xl-shadow pass
test-amd64-amd64-libvirt-vhd pass
test-armhf-armhf-xl-vhd pass
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 58eb90a9650a8ea73533bc2b87c13b8ca7bbe35a
Author: Oleksandr Tyshchenko <***@epam.com>
Date: Fri Dec 7 11:45:31 2018 +0200
xen/arm32: Remove __init prefixes from funcs that are used within CPU up flow
This is a follow-up patch to
commit 01a7e8ccef6e7d5718a251ad587567afbe723330
xen/arm: Remove __initdata and __init to enable CPU hotplug
Signed-off-by: Oleksandr Tyshchenko <***@epam.com>
Acked-by: Julien Grall <***@arm.com>
commit 9cbe093b7b848aa96120406032fb15e5ea3362bd
Author: Oleksandr Tyshchenko <***@epam.com>
Date: Fri Dec 7 15:41:16 2018 +0200
xen/arm: link: Link proc_info_list in .rodata instead of .init.data
To be able to use it for the hot-plugged CPUs as well.
The reason why we link proc_info_list in ".rodata" section is that
it context should never be modified.
This patch also renames ".init.proc.info" section to ".proc.info"
as "init" prefix is not actual anymore.
Signed-off-by: Oleksandr Tyshchenko <***@epam.com>
commit 0124380fdf4f5d0f4d85867a4492dd050162b047
Author: Juergen Gross <***@suse.com>
Date: Tue Dec 4 15:28:57 2018 +0100
tools/libxl: fix boot of HVM domain with Xenstore-stubdom
The Xenstore domid isn't set for HVM domains. This will result in
failure when booting a HVM domain on a system with Xenstore not running
in dom0.
Same applies for console domid, so set both.
This is broken since commit a2d9a6fa1fcd ("tools/libxenctrl: use new
xenforeignmemory API to seed grant table").
Signed-off-by: Juergen Gross <***@suse.com>
Acked-by: Wei Liu <***@citrix.com>
commit 42c09149c64d282b3daf67b10a1e08579320b2ec
Author: Anthony PERARD <***@citrix.com>
Date: Wed Dec 5 16:26:02 2018 +0000
tools/xenstore: Document failure for xs_{read,directory,read_watch}
Those functions can return NULL on failure, document it in the public
header.
Signed-off-by: Anthony PERARD <***@citrix.com>
Reviewed-by: Paul Durrant <***@citrix.com>
Acked-by: Wei Liu <***@citrix.com>
commit ae01a8e315fecb1914edd99980a619d387951d3f
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:21:34 2018 +0100
ns16550: enable use of PCI MSI
Which, on x86, requires fiddling with the INTx bit in PCI config space,
since for internally used MSI we can't delegate this to Dom0.
ns16550_init_postirq() also needs (benign) re-ordering of its
operations.
Signed-off-by: Jan Beulich <***@suse.com>
Acked-by: Wei Liu <***@citrix.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit 69343d5af45076e5b196833f3082acf6f7248299
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:20:55 2018 +0100
console: adjust IRQ initialization
In order for a Xen internal PCI device driver to enable MSI on the
device, we need another hook which the driver can use to create the IRQ
(doing this in the init_preirq hook is too early, since IRQ code hasn't
got initialized at that time yet, and doing it in init_postirq is too
late because at least on x86 smp_intr_init() needs to know the IRQ
number).
On x86 this additionally requires a slight ordering change to IRQ
initialization, to facilitate calling the new hook between basic
initialization and the call path leading to smp_intr_init().
Signed-off-by: Jan Beulich <***@suse.com>
Acked-by: Wei Liu <***@citrix.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit c46dba0d72e519743823c76c676858ad1af48b90
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:19:04 2018 +0100
make domain_adjust_tot_pages() __must_check
Even if unlikely, donate_page() should not ignore the possible need to
obtain a domain reference. To make people look more closely when they
add new uses of domain_adjust_tot_pages(), force its return value to be
checked. This in turn requires a benign change to assign_pages().
Signed-off-by: Jan Beulich <***@suse.com>
Acked-by: Andrew Cooper <***@citrix.com>
commit 88f90693c74d5877f6b343076c31739e8754fb00
Author: Jan Beulich <***@suse.com>
Date: Thu Dec 6 12:18:03 2018 +0100
x86: reduce code duplication in guest_remove_page()
Quite a bit of duplicate code has accumulated on the "paging" types
special case path. Re-use what can be re-used from the common path.
Since it needs touching anyway, slightly re-format and extend the
gdprintk() on the common path as well.
Signed-off-by: Jan Beulich <***@suse.com>
Reviewed-by: Andrew Cooper <***@citrix.com>
commit 81cfc1b3c78f5d4abafdb368ede914b1dd825a7b
Author: Wei Liu <***@citrix.com>
Date: Thu Nov 22 15:49:03 2018 +0000
automation: break .gitlab-yaml into smaller files
Break out files for build jobs and test jobs. Keep the top level
.gitlab-ci.yaml small.
Signed-off-by: Wei Liu <***@citrix.com>
Acked-by: Doug Goldstein <***@cardoe.com>
commit 9f4ac0e6c2f7634757e62990cba3d531f15104a2
Author: Wei Liu <***@citrix.com>
Date: Thu Nov 22 15:49:02 2018 +0000
automation: add a qemu smoke test for clang build
Also rename the old test to have -gcc suffix.
Signed-off-by: Wei Liu <***@citrix.com>
Acked-by: Doug Goldstein <***@cardoe.com>
commit 7824baee56248474346da138b906a3a5c5420458
Author: Andrew Cooper <***@citrix.com>
Date: Mon Feb 26 12:45:58 2018 +0000
x86/hvm: Handle x2apic MSRs via the new guest_{rd,wr}msr() infrastructure
Dispatch from the guest_{rd,wr}msr() functions. The read side should be safe
outside of current context, but the write side is definitely not. As the
toolstack has no legitimate reason to access the APIC registers via this
interface (not least because whether they are accessible at all depends on
guest settings), unilaterally reject access attempts outside of current
context.
Rename to guest_{rd,wr}msr_x2apic() for consistency, and alter the functions
to use X86EMUL_EXCEPTION rather than X86EMUL_UNHANDLEABLE. The previous
callers turned UNHANDLEABLE into EXCEPTION, but using UNHANDLEABLE will now
interfere with the fallback to legacy MSR handling.
While altering guest_rdmsr_x2apic() make a couple of minor improvements.
Reformat the initialiser for readable[] so it indents in a more natural way,
and alter high to be a 64bit integer to avoid shifting 0 by 32 in the common
path.
Observant people might notice that we now don't let PV guests read the x2apic
MSRs. They should never have been able to in the first place.
Signed-off-by: Andrew Cooper <***@citrix.com>
Reviewed-by: Konrad Rzeszutek Wilk <***@oracle.com>
Acked-by: Jan Beulich <***@suse.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit 689bc6244449fd988c32759201668738498ec261
Author: Andrew Cooper <***@citrix.com>
Date: Wed Mar 7 16:48:01 2018 +0000
x86: Fix APIC MSR constant names
We currently have MSR_IA32_APICBASE and MSR_IA32_APICBASE_MSR which are
synonymous from a naming point of view, but refer to very different things.
Rename the x2APIC MSRs to MSR_X2APIC_*, which are shorter constants and
visually separate the register function from the generic APIC name. For the
case ranges, introduce MSR_X2APIC_LAST, rather than relying on the knowledge
that there are 0x3ff MSRs architecturally reserved for x2APIC functionality.
For functionality relating to the APIC_BASE MSR, use MSR_APIC_BASE for the MSR
itself, but drop the MSR prefix from the other constants to shorten the names.
In all cases, the fact that we are dealing with the APIC_BASE MSR is obvious
from the context.
No functional change (the combined binary is identical).
Signed-off-by: Andrew Cooper <***@citrix.com>
Reviewed-by: Konrad Rzeszutek Wilk <***@oracle.com>
Reviewed-by: Kevin Tian <***@intel.com>
Acked-by: Jan Beulich <***@suse.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
commit 17c0293b47b5dc16ae64bbd656acd26fe7d7044b
Author: Andrew Cooper <***@citrix.com>
Date: Thu Nov 29 18:16:01 2018 +0000
x86/cpuid: Drop the synthetic X86_FEATURE_XEN_IBPB
This appears to be a vestigial remnent of an old version of the
XSA-254/Spectre series, and has never been used.
Signed-off-by: Andrew Cooper <***@citrix.com>
Reviewed-by: Jan Beulich <***@suse.com>
commit aaed4babc4b9b68faabd5a3931059ef0c66c7886
Author: Andrew Cooper <***@citrix.com>
Date: Thu Nov 29 18:17:45 2018 +0000
x86/spec-ctrl: Drop the bti= command line option
bti= was introduced with the original Spectre fixes (Jan 2018), but by the
time Speculative Store Bypass came along (May 2018), it was superceeded by the
more generic spec-ctrl=.
Since then, we've had LazyFPU (June 2018) and L1TF (August 2018), which means
noone will be using the option. Remove it entirely - anyone who happens to
accidentially be using it might now spot Xen complaining about an option it
doesn't understand.
Signed-off-by: Andrew Cooper <***@citrix.com>
Acked-by: Jan Beulich <***@suse.com>
commit 70739427f55d595ad1c575c47fef00c81881e9a2
Author: Roger Pau Monné <***@citrix.com>
Date: Tue Dec 4 14:04:54 2018 +0100
pci: apply workaround for Intel errata HSE43 and BDF2/BDX2
These errata affect the values read from the BAR registers, and could
render vPCI (and by extension PVH Dom0 unusable).
HSE43 is a Haswell erratum where a non-BAR register is implemented at
the position where the first BAR of the device should be found in a
Power Control Unit device. Note that there are no BARs on this device,
apart from the bogus CSR register positioned on top of the first BAR.
BDF2/BDX2 is a Broadwell erratum where BARs in the Home Agent device
will return bogus non-zero values.
In both cases the solution is to treat such devices as having no BARs
in the vPCI code.
Reported-by: Jan Beulich <***@suse.com>
Signed-off-by: Roger Pau Monné <***@citrix.com>
Reviewed-by: Jan Beulich <***@suse.com>
commit e59441b09790801eeaf215e1d98f47b7e9daca12
Author: Juergen Gross <***@suse.com>
Date: Tue Dec 4 14:04:20 2018 +0100
vmx: remove stale prototypes
Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related
implementation. Remove them.
Signed-off-by: Juergen Gross <***@suse.com>
Reviewed-by: Roger Pau Monné <***@citrix.com>
Acked-by: Andrew Cooper <***@citrix.com>
Acked-by: Kevin Tian <***@intel.com>
commit 5aa62f06681ae52c8e647194c32dba2b4c903991
Author: Jan Beulich <***@suse.com>
Date: Tue Dec 4 14:03:43 2018 +0100
x86emul: raise #GP(0) in VME mode for POPF with TF set in new value
This is a check explicitly listed by the instruction page in the SDM.
Signed-off-by: Jan Beulich <***@suse.com>
Reviewed-by: Andrew Cooper <***@citrix.com>
commit 6b4600b1425ef8006efcd2cdb4c4c986309264f6
Author: Jan Beulich <***@suse.com>
Date: Tue Dec 4 14:02:46 2018 +0100
x86emul: skip VIF processing in VME mode for 16-bit POPF at IOPL 3
At IOPL 3 CR4.VME is irrelevant.
Reported-by: Andrew Cooper <***@citrix.com>
Signed-off-by: Jan Beulich <***@suse.com>
Reviewed-by: Andrew Cooper <***@citrix.com>
(qemu changes not included)