flight 13801 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/13801/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-win7-amd64 12 guest-localmigrate/x10 fail REGR. vs. 13799 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-sedf-pin 10 guest-saverestore fail like 13799 test-amd64-amd64-xl-qemuu-winxpsp3 9 guest-localmigrate fail like 13799 test-amd64-amd64-xl-qemuu-win7-amd64 9 guest-localmigrate fail like 13799 Tests which did not succeed, but are not blocking: test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win 13 guest-stop fail never pass version targeted for testing: xen d1c3375c3f11 baseline version: xen 3bf63fcfacd1 ------------------------------------------------------------ People who touched revisions under test: Andres Lagar-Cavilla <andres@lagarcavilla.org> Christoph Egger <Christoph.Egger@amd.com> Daniel De Graaf <dgdegra@tycho.nsa.gov> Gang Wei <gang.wei@intel.com> Ian Campbell <ian.campbell@citrix.com> Jan Beulich <jbeulich@suse.com> Jiongxi Li <jiongxi.li@intel.com> Keir Fraser <keir@xen.org> Steven Maresca <steve@zentific.com> Tim Deegan <tim@xen.org> Yang Zhang <yang.z.zhang@intel.com> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin fail test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-xl-sedf pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-amd64-amd64-xl-win fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 25925:d1c3375c3f11 tag: tip user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Mon Sep 17 21:12:21 2012 +0100 xsm/flask: add domain relabel support This adds the ability to change a domain''s XSM label after creation. The new label will be used for all future access checks; however, existing event channels and memory mappings will remain valid even if their creation would be denied by the new label. With appropriate security policy and hooks in the domain builder, this can be used to create domains that the domain builder does not have access to after building. It can also be used to allow a domain to drop privileges - for example, prior to launching a user-supplied kernel loaded by a pv-grub stubdom. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 25924:383f0b427494 user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Mon Sep 17 21:10:39 2012 +0100 xsm/flask: remove unneeded create_sid field This field was only used to populate the ssid of dom0, which can be handled explicitly in the domain creation hook. This also removes the unnecessary permission check on the creation of dom0. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 25923:6804e9092670 user: Daniel De Graaf <dgdegra@tycho.nsa.gov> date: Mon Sep 17 21:10:07 2012 +0100 xsm/flask: remove inherited class attributes The ability to declare common permission blocks shared across multiple classes is not currently used in Xen. Currently, support for this feature is broken in the header generation scripts, and it is not expected that this feature will be used in the future, so remove the dead code. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org> changeset: 25922:c2578dd96b83 user: Jiongxi Li <jiongxi.li@intel.com> date: Mon Sep 17 21:06:02 2012 +0100 xen: add virtual x2apic support for apicv basically to benefit from apicv, we need clear MSR bitmap for corresponding x2apic MSRs: 0x800 - 0x8ff: no read intercept for apicv register virtualization TPR,EOI,SELF-IPI: no write intercept for virtual interrupt delivery Signed-off-by: Jiongxi Li <jiongxi.li@intel.com> Committed-by: Keir Fraser <keir@xen.org> changeset: 25921:713b8849b11a user: Jiongxi Li <jiongxi.li@intel.com> date: Mon Sep 17 21:05:11 2012 +0100 xen: enable Virtual-interrupt delivery Virtual interrupt delivery avoids Xen to inject vAPIC interrupts manually, which is fully taken care of by the hardware. This needs some special awareness into existing interrupr injection path: For pending interrupt from vLAPIC, instead of direct injection, we may need update architecture specific indicators before resuming to guest. Before returning to guest, RVI should be updated if any pending IRRs EOI exit bitmap controls whether an EOI write should cause VM-Exit. If set, a trap-like induced EOI VM-Exit is triggered. The approach here is to manipulate EOI exit bitmap based on value of TMR. Level triggered irq requires a hook in vLAPIC EOI write, so that vIOAPIC EOI is triggered and emulated Signed-off-by: Gang Wei <gang.wei@intel.com> Signed-off-by: Yang Zhang <yang.z.zhang@intel.com> Signed-off-by: Jiongxi Li <jiongxi.li@intel.com> Committed-by: Keir Fraser <keir@xen.org> changeset: 25920:ec60de627945 user: Jiongxi Li <jiongxi.li@intel.com> date: Mon Sep 17 21:04:08 2012 +0100 xen: enable APIC-Register Virtualization Add APIC register virtualization support - APIC read doesn''t cause VM-Exit - APIC write becomes trap-like Signed-off-by: Gang Wei <gang.wei@intel.com> Signed-off-by: Yang Zhang <yang.z.zhang@intel.com> Signed-off-by: Jiongxi Li <jiongxi.li@intel.com> changeset: 25919:62de66cec48a user: Christoph Egger <Christoph.Egger@amd.com> date: Mon Sep 17 17:57:24 2012 +0100 MCE: use new common mce handler on AMD CPUs Factor common machine check handler out of intel specific code and move it into common files. Replace old common mce handler with new one and use it on AMD CPUs. No functional changes on Intel side. While here fix some whitespace nits and comments. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> Committed-by: Keir Fraser <keir@xen.org> changeset: 25918:7ab899e46347 user: Steven Maresca <steve@zentific.com> date: Mon Sep 17 17:55:12 2012 +0100 mem_event: fix regression affecting CR3, CR4 memory events This is a patch repairing a regression in code previously functional in 4.1.x. It appears that, during some refactoring work, calls to hvm_memory_event_cr3 and hvm_memory_event_cr4 were lost. These functions were originally called in mov_to_cr() of vmx.c, but the commit http://xenbits.xen.org/hg/xen-unstable.hg/rev/1276926e3795 abstracted the original code into generic functions up a level in hvm.c, dropping these calls in the process. Signed-off-by: Steven Maresca <steve@zentific.com> Acked-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> Acked-by: Tim Deegan <tim@xen.org> Committed-by: Keir Fraser <keir@xen.org> changeset: 25917:5ba70e030b47 user: Andres Lagar-Cavilla <andres@lagarcavilla.org> date: Mon Sep 17 17:51:57 2012 +0100 Extra check in grant table code for mapping of shared frame Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> Committed-by: Keir Fraser <keir@xen.org> changeset: 25916:3bf63fcfacd1 user: Ian Campbell <ian.campbell@citrix.com> date: Mon Sep 17 11:17:05 2012 +0100 tools: drop ia64 only foreign structs from headers Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Acked-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> Committed-by: Ian Campbell <ian.campbell@citrix.com> (qemu changes not included)