flight 5664 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/5664/ Regressions :-( Tests which did not succeed and are blocking: build-amd64-oldkern 4 xen-build fail REGR. vs. 5640 build-amd64 4 xen-build fail REGR. vs. 5640 build-i386-oldkern 4 xen-build fail REGR. vs. 5640 build-i386 4 xen-build fail REGR. vs. 5640 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a test-amd64-amd64-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-win 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-win 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-xl-win 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a test-i386-i386-pair 1 xen-build-check(1) blocked n/a test-i386-i386-pv 1 xen-build-check(1) blocked n/a test-i386-i386-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-win 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a version targeted for testing: xen 7ada6faef565 baseline version: xen 4bdb78db22b6 ------------------------------------------------------------ People who touched revisions under test: Allen Kay <allen.m.kay@intel.com> Andre Przywara <andre.przywara@amd.com> George Dunlap <george.dunlap@eu.citrix.com> Ian Jackson <ian.jackson@eu.citrix.com> Juergen Gross <juergen.gross@ts.fujitsu.com> Keir Fraser <keir@xen.org> Stefano Stabellini <stefano.stabellini@eu.citrix.com> Stephen Smalley <sds@tycho.nsa.gov> Wei Huang <wei.huang2@amd.com> Wei Wang <wei.wang2@amd.com> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 fail build-i386 fail build-amd64-oldkern fail build-i386-oldkern fail build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl blocked test-amd64-i386-xl blocked test-i386-i386-xl blocked test-amd64-xcpkern-i386-xl blocked test-i386-xcpkern-i386-xl blocked test-amd64-i386-rhel6hvm-amd blocked test-amd64-xcpkern-i386-rhel6hvm-amd blocked test-amd64-i386-xl-credit2 blocked test-amd64-xcpkern-i386-xl-credit2 blocked test-amd64-i386-rhel6hvm-intel blocked test-amd64-xcpkern-i386-rhel6hvm-intel blocked test-amd64-i386-xl-multivcpu blocked test-amd64-xcpkern-i386-xl-multivcpu blocked test-amd64-amd64-pair blocked test-amd64-i386-pair blocked test-i386-i386-pair blocked test-amd64-xcpkern-i386-pair blocked test-i386-xcpkern-i386-pair blocked test-amd64-amd64-pv blocked test-amd64-i386-pv blocked test-i386-i386-pv blocked test-amd64-xcpkern-i386-pv blocked test-i386-xcpkern-i386-pv blocked test-amd64-i386-win-vcpus1 blocked test-amd64-i386-xl-win-vcpus1 blocked test-amd64-amd64-win blocked test-amd64-i386-win blocked test-i386-i386-win blocked test-amd64-xcpkern-i386-win blocked test-i386-xcpkern-i386-win blocked test-amd64-amd64-xl-win blocked test-i386-i386-xl-win blocked test-amd64-xcpkern-i386-xl-win blocked ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 22878:7ada6faef565 tag: tip user: Keir Fraser <keir@xen.org> date: Sun Feb 06 17:26:31 2011 +0000 hvm: fix XSAVE leaf 0 EBX size calculation Fixes a size calculation bug when enabled bits in XFEATURE_MASK (xcr0) aren''t contiguous. Current for_loop will stop when xcr0 feature bit is 0. But in reality, the bits can be non-contiguous. One example is that LWP is bit 62 on AMD platform. This patch iterates through all bits to calculate the size for enabled features. Signed-off-by: Wei Huang <wei.huang2@amd.com> changeset: 22877:575d2f40acc4 user: Keir Fraser <keir@xen.org> date: Sun Feb 06 17:22:44 2011 +0000 trace: Change trace_var argument to void*, to match __trace_var Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> changeset: 22876:93212e5c88f6 user: Keir Fraser <keir@xen.org> date: Sun Feb 06 17:21:17 2011 +0000 hvm_op: Clean up new mem_access and inject_trap ops. Firstly, they are only for use from privileged entities, so mark them as usable only by code defining __XEN_TOOLS__. Secondly, the check for must-not-operate-on-myself can be done more cleanly. Signed-off-by: Keir Fraser <keir@xen.org> changeset: 22875:1f588baf1242 user: Keir Fraser <keir@xen.org> date: Sun Feb 06 17:10:31 2011 +0000 xsm/flask: Fix permission tables At some point, it seems that someone manually added Flask permission definitions to one header file without updating the corresponding policy configuration or the other related table. The end result is that we can get uninterpretable AVC messages like this: # xl dmesg | grep avc (XEN) avc: denied { 0x4000000 } for domid=0 scontext=system_u:system_r:dom0_t tcontext=system_u:system_r:domU_t tclass=domain Fix this by updating the flask config and regenerating the headers from it. In the future, this can be further improved by integrating the automatic generation of the headers into the build process as is presently done in SELinux. Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> changeset: 22874:24a4487c9bef user: Keir Fraser <keir@xen.org> date: Sun Feb 06 17:09:32 2011 +0000 xsm: Fix compilation error (unused variable) Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> changeset: 22873:186162762071 user: Keir Fraser <keir@xen.org> date: Sun Feb 06 17:03:09 2011 +0000 hvm amd: Fix 32bit guest VM save/restore issues associated with SYSENTER MSRs This patch turn-on SYSENTER MSRs interception for 32bit guest VMs on AMD CPUs. With it, hvm_svm.guest_sysenter_xx fields always contain the canonical version of SYSENTER MSRs and are used in guest save/restore. The data fields in VMCB save area are updated as necessary. Reported-by: James Harper <james.harper@bendigoit.com.au> Signed-off-by: Wei Huang <wei.huang2@amd.com> changeset: 22872:cba9a84d32fb user: Keir Fraser <keir@xen.org> date: Sun Feb 06 16:54:01 2011 +0000 amd iommu: Fix a xen crash after pci-attach pci-detach triggers IO page table deallocation if the last passthru device has been removed from pdev list, and this will result a BUG on amd systems for next pci-attach. This patch fixes this issue. Signed-off-by: Wei Wang <wei.wang2@amd.com> changeset: 22871:23f60ba52fff user: Keir Fraser <keir@xen.org> date: Sun Feb 06 16:07:27 2011 +0000 cpupool: Check for memory allocation failure on switching schedulers When switching schedulers on a physical cpu due to a cpupool operation check for a potential memory allocation failure and stop the operation gracefully. Signed-off-by: Juergen Gross <juergen.gross@ts.fujitsu.com> changeset: 22870:544b103b4d97 user: Ian Jackson <Ian.Jackson@eu.citrix.com> date: Fri Feb 04 18:47:39 2011 +0000 libxl: vncviewer: make autopass work properly The file we write the vnc password to must be rewound back to the beginning, or the vnc viewer will simply get EOF. When the syscalls for communicating the password to the vnc client fail, bomb out with an error messsage rather than blundering on (and probably producing a spurious password prompt). Following this patch, xl vncviewer --autopass works, provided the qemu patch for writing the password to xenstore has also been applied. Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 22869:c77353cb2ebb user: Ian Jackson <Ian.Jackson@eu.citrix.com> date: Fri Feb 04 18:47:20 2011 +0000 libxl: vncviewer: unconditionally read listen port address and password The /local/domain/DOMID/device/vfb/0/backend path is irrelevant. libxl does not create it, so the branch would never be taken. Instead, simply read the target paths of interest. Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 22868:3cd9f9db5c21 user: Ian Jackson <Ian.Jackson@eu.citrix.com> date: Fri Feb 04 18:46:22 2011 +0000 libxl: vncviewer: fix use-after-free This bug can prevent xl vncviewer from working at all. Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 22867:f4d29a2c45ca user: Ian Jackson <Ian.Jackson@eu.citrix.com> date: Fri Feb 04 18:46:00 2011 +0000 libxl: actually print an error when execve (in libxl__exec) fails The header comment says libxl__exec logs errors. So it should do so. Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 22866:ed9ef3b07d2a user: Ian Jackson <Ian.Jackson@eu.citrix.com> date: Fri Feb 04 18:45:26 2011 +0000 libxl: SECURITY: always honour request for vnc password qemu only sets a password on its vnc display if the value for the -vnc option has the ",password" modifier. The code for constructing qemu-dm options was broken and only added this modifier for one of the cases. Unfortunately there does not appear to be any code for passing the vnc password to upstream qemu (ie, in the case where libxl_build_device_model_args_new is called). To avoid accidentally running the domain without a password, check for this situation and fail an assertion. This will have to be revisited after 4.1. Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 22865:25d7e5e2ceea user: Ian Jackson <Ian.Jackson@eu.citrix.com> date: Fri Feb 04 18:43:53 2011 +0000 QEMU_TAG update changeset: 22864:d5863e86c05b user: Stefano Stabellini <stefano.stabellini@eu.citrix.com> date: Fri Feb 04 18:29:55 2011 +0000 libxl: fix console autoconnect with pygrub, by invoking xenconsole twice When using pygrub we have to connect to the console twice: once at the beginning to connect to pygrub and a second time after creating the pv console to connect to the guest''s console. Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 22863:6399079b44f3 user: Stefano Stabellini <sstabellini@xensource.com> date: Fri Feb 04 17:41:37 2011 +0000 Update list of VT-D maintainers. changeset: 22862:068b3f19ef9a user: Andre Przywara <andre.przywara@amd.com> date: Fri Feb 04 17:32:39 2011 +0000 xl: fix broken xl vcpu-list output (tool hangs on large machines) The algorithm for printing the CPU affinity in a condensed way looks for a set bit in a zero-byte: for (i = 0; !(pcpumap & 1); ++i, pcpumap >>= 1) Looking at the code I found that it is entirely broken if more than 8 CPUs are used. Beside that endless loop issue the output is totally bogus except for the "any CPU" case, which is handled explicitly earlier. I tried to fix it, but the whole approach does not work if the outer loops actually iterates (executing more than once). This fix reimplements the whole algorithm in a clean (though not much optimized way). It survived some unit-testing. Signed-off-by: Andre Przywara <andre.przywara@amd.com> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 22861:4bdb78db22b6 user: Allen Kay <allen.m.kay@intel.com> date: Wed Feb 02 17:06:36 2011 +0000 libxl: pass gfx_passthru parameter to QEMU Pass gfx_passthru parameter to QEMU. Keep it boolean for now as QEMU does not expect any other integer value. Signed-off-by: Allen Kay <allen.m.kay@intel.com> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel