flight 12115 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/12115/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-pvops 4 kernel-build fail REGR. vs. 12104 build-i386 4 xen-build fail REGR. vs. 12104 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-sedf-pin 10 guest-saverestore fail REGR. vs. 12104 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-i386-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-i386-pv 1 xen-build-check(1) blocked n/a test-i386-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-i386-xend-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-i386-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-win 1 xen-build-check(1) blocked n/a test-i386-i386-pair 1 xen-build-check(1) blocked n/a test-i386-i386-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-winxpsp3 7 windows-install fail never pass test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win 13 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-win7-amd64 7 windows-install fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-i386-i386-xl-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass version targeted for testing: xen 39283113682e baseline version: xen a7bacdc5449a ------------------------------------------------------------ People who touched revisions under test: Attilio Rao <attilio.rao@citrix.com> Daniel De Graaf <dgdegra@tycho.nsa.gov> Dietmar Hahn <dietmar.hahn@ts.fujitsu.com> Ian Campbell <Ian.Campbell@citrix.com> Ian Jackson <ian.jackson@eu.citrix.com> Jan Beulich <jbeulich@suse.com> Jean Guyader <jean.guyader@eu.citrix.com> Keir Fraser <keir@xen.org> Liu, Jinsong <jinsong.liu@intel.com> Olaf Hering <olaf@aepfle.de> Roger Pau Monne <roger.pau@entel.upc.edu> Tim Deegan <tim@xen.org> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 fail build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops fail test-amd64-amd64-xl pass test-amd64-i386-xl blocked test-i386-i386-xl blocked test-amd64-i386-rhel6hvm-amd blocked test-amd64-i386-qemuu-rhel6hvm-amd blocked test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 blocked test-amd64-i386-xl-credit2 blocked test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel blocked test-amd64-i386-qemuu-rhel6hvm-intel blocked test-amd64-i386-xl-multivcpu blocked test-amd64-amd64-pair pass test-amd64-i386-pair blocked test-i386-i386-pair blocked test-amd64-amd64-xl-sedf-pin fail test-amd64-amd64-pv pass test-amd64-i386-pv blocked test-i386-i386-pv blocked test-amd64-amd64-xl-sedf pass test-amd64-i386-win-vcpus1 blocked test-amd64-i386-xl-win-vcpus1 blocked test-amd64-i386-xl-winxpsp3-vcpus1 blocked test-amd64-amd64-win fail test-amd64-i386-win blocked test-i386-i386-win blocked test-amd64-amd64-xl-win fail test-i386-i386-xl-win blocked test-amd64-amd64-xl-qemuu-winxpsp3 fail test-i386-i386-xl-qemuu-winxpsp3 blocked test-amd64-i386-xend-winxpsp3 blocked test-amd64-amd64-xl-winxpsp3 fail test-i386-i386-xl-winxpsp3 blocked ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 24908:39283113682e tag: tip user: Ian Jackson <Ian.Jackson@eu.citrix.com> date: Wed Feb 29 14:38:28 2012 +0000 tools: xencommons: revert accidental hunk in 24905:2b5cf6bde62d 24905:2b5cf6bde62d accidentally contained a change to tools/hotplug/Linux/init.d/xencommons. That change is probably OK but should not be in 24905 so remove it. Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 24907:24117fff2fe1 user: Roger Pau Monne <roger.pau@entel.upc.edu> date: Wed Feb 29 14:36:04 2012 +0000 install: remove old checks from install.sh Signed-off-by: Roger Pau Monne <roger.pau@entel.upc.edu> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 24906:606af3fbd6fc user: Olaf Hering <olaf@aepfle.de> date: Wed Feb 29 14:32:51 2012 +0000 libxl: use libxl wrapper for yajl_gen_alloc To fix compile errors with libyajl2: * use libxl_yajl_gen_alloc() * use libxl_yajl_length * link xl with -lyajl for yajl_gen_string() Signed-off-by: Olaf Hering <olaf@aepfle.de> Acked-by: Ian Campbell <ian.campbell@citrix.com> Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 24905:2b5cf6bde62d user: Olaf Hering <olaf@aepfle.de> date: Wed Feb 29 14:31:59 2012 +0000 libxl: rename libxl__yajl_gen_alloc libxl__yajl_gen_alloc() is called by generic code, rename it to libx_yajl_gen_alloc(). Signed-off-by: Olaf Hering <olaf@aepfle.de> Acked-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> changeset: 24904:93d379d11cbb user: Dietmar Hahn <dietmar.hahn@ts.fujitsu.com> date: Wed Feb 29 13:51:42 2012 +0000 vpmu: No need for two initialisation functions With the changeset 24529:87854d3bed93 we got 2 initialisation functions for the arch specific stuff. This is no more needed. Signed-off-by: Dietmar Hahn <dietmar.hahn@ts.fujitsu.com> Committed-by: Keir Fraser <keir@xen.org> changeset: 24903:bea68a25f368 user: Dietmar Hahn <dietmar.hahn@ts.fujitsu.com> date: Wed Feb 29 13:51:12 2012 +0000 vpmu: cleanup structures - struct msr_load_store_entry is unused - struct pmumsr is only used in the vmx part Signed-off-by: Dietmar Hahn <dietmar.hahn@ts.fujitsu.com> Committed-by: Keir Fraser <keir@xen.org> changeset: 24902:57706facdbdd user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Wed Feb 29 13:48:41 2012 +0000 xsm: expose context of event channel peers This hypercall allows a domain to identify the security context of a domain that it is communicating with using the interdomain event channel that it is using for the communication. This can be used to augment Xen''s security permissions with intra-domain security checks. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 24901:b8adaf598a6a user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Wed Feb 29 13:47:41 2012 +0000 xsm/flask: buffer AVC messages for output When multiple CPUs hit an AVC audit message, the resulting output in the ring buffer and serial console is garbled due to the audit process using many separate printk invocations for each message. Change the AVC audit process to use a temporary buffer and output the contents once the entire audit message is complete. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 24900:2e6c3194c3b2 user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Wed Feb 29 13:47:11 2012 +0000 xsm/flask: clean interdomain event channel hook Don''t attempt to relabel the already-bound half of the event channel pair created by an interdomain event channel. This relabeling also performed an incorrect check that the destination domain is permitted to create the reverse event channel, which may not be true if the unbound channel was created by the domain builder (like the xenstore channel). Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 24899:ea7a07622a43 user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Wed Feb 29 13:46:32 2012 +0000 xsm: label xen-consumer event channels Event channels created during the domain build process for HVM domains did not call the XSM creation hook. Since these channels are used internally by Xen, redirect them to DOMAIN_INVAID instead of failing to create if the XSM hook fails the permissions check. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 24898:be9d56fada86 user: Keir Fraser <keir@xen.org> date: Wed Feb 29 13:43:44 2012 +0000 Update autoconf-generated configure script. Signed-off-by: Keir Fraser <keir@xen.org> changeset: 24897:f25e5785327e user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Wed Feb 29 13:40:25 2012 +0000 build: Export configure variables to hypervisor build Since the introduction of autoconf, builds with XSM enabled in .config have been broken unless FLASK_ENABLE was explicitly set. Since the setting in .config has apparently been deprecated in favor of an autoconf --enable-xsm, add config/Xen.mk to export this to Xen. This also makes --disable-debug and some paths to be pulled from the configure process in the hypervisor build. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 24896:d6c72d5ab780 user: Attilio Rao <attilio.rao@citrix.com> date: Wed Feb 29 13:33:51 2012 +0000 hvmloader: drop the ovmf32 support and rename ovmf64 -> ovmf. - Remove the 15cpus hack from ovmf because it should be unnecessary on nowadays windows/EFI supported. Signed-off-by: Attilio Rao <attilio.rao@citrix.com> Acked-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Keir Fraser <keir@xen.org> changeset: 24895:a43eeaedf61c user: Tim Deegan <tim@xen.org> date: Tue Feb 28 10:17:27 2012 +0000 arm: Handle booting on SMP platforms Make all non-boot CPUs wait forever instead of trying to boot in parallel. Signed-off-by: Tim Deegan <tim@xen.org> Acked-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Ian Campbell <ian.campbell@citrix.com> changeset: 24894:d19a254197d7 user: Tim Deegan <tim@xen.org> date: Tue Feb 28 10:17:27 2012 +0000 arm: strip xen binary The symbols in it are wrong anyway and will only confuse people who ought to be looking at xen-syms. Signed-off-by: Tim Deegan <tim@xen.org> Acked-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Ian Campbell <ian.campbell@citrix.com> changeset: 24893:72551f578776 user: Liu, Jinsong <jinsong.liu@intel.com> date: Tue Feb 28 09:06:27 2012 +0100 X86: expose HLE/RTM features to dom0 Intel recently release 2 new features, HLE and TRM. Refer to http://software.intel.com/file/41417. This patch expose them to dom0. Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com> Committed-by: Jan Beulich <jbeulich@suse.com> changeset: 24892:a7bacdc5449a user: Ian Campbell <ian.campbell@citrix.com> date: Mon Feb 27 17:05:18 2012 +0000 Update SEABIOS_UPSTREAM_TAG Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Ian Campbell <Ian.Campbell@citrix.com> =======================================commit 128de2549c5f24e4a437b86bd2e46f023976d50a Author: Jean Guyader <jean.guyader@eu.citrix.com> Date: Mon Feb 20 16:21:47 2012 +0000 Intel GPU passthrough: Host bridge config space Expose more host bridge config space value to make the driver happy for all the different revisions of the device. Signed-off-by: Jean Guyader <jean.guyader@eu.citrix.com>