flight 14506 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/14506/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-pv 5 xen-boot fail REGR. vs. 14482 test-amd64-amd64-xl-qemuu-win7-amd64 5 xen-boot fail REGR. vs. 14482 build-i386 4 xen-build fail REGR. vs. 14482 build-i386-oldkern 4 xen-build fail REGR. vs. 14482 test-amd64-amd64-pair 8 xen-boot/dst_host fail REGR. vs. 14482 test-amd64-amd64-pair 7 xen-boot/src_host fail REGR. vs. 14482 test-amd64-amd64-xl-win 5 xen-boot fail REGR. vs. 14482 test-amd64-amd64-xl-win7-amd64 5 xen-boot fail REGR. vs. 14482 test-amd64-amd64-qemut-win 5 xen-boot fail REGR. vs. 14482 test-amd64-amd64-xl-qemut-win 5 xen-boot fail REGR. vs. 14482 test-amd64-amd64-xl-qemut-winxpsp3 5 xen-boot fail REGR. vs. 14482 test-amd64-i386-qemut-rhel6hvm-amd 5 xen-boot fail in 14494 REGR. vs. 14482 test-amd64-i386-xl-multivcpu 5 xen-boot fail in 14494 REGR. vs. 14482 test-amd64-i386-xl 5 xen-boot fail in 14494 REGR. vs. 14482 test-amd64-i386-qemuu-rhel6hvm-amd 5 xen-boot fail in 14494 REGR. vs. 14482 test-amd64-i386-pair 8 xen-boot/dst_host fail in 14494 REGR. vs. 14482 test-amd64-i386-pair 7 xen-boot/src_host fail in 14494 REGR. vs. 14482 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 5 xen-boot fail in 14494 REGR. vs. 14482 test-amd64-i386-xl-winxpsp3-vcpus1 5 xen-boot fail in 14494 REGR. vs. 14482 test-amd64-i386-xend-qemut-winxpsp3 5 xen-boot fail in 14494 REGR. vs. 14482 test-amd64-i386-qemut-win 5 xen-boot fail in 14494 REGR. vs. 14482 Tests which are failing intermittently (not blocking): test-amd64-amd64-xl 5 xen-boot fail pass in 14494 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-sedf-pin 5 xen-boot fail REGR. vs. 14482 test-amd64-amd64-xl-sedf 5 xen-boot fail like 14482 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-i386-qemut-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-qemut-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-xend-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-i386-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-i386-qemut-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-i386-xl-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-qemut-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xend-qemut-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-i386-qemut-win 1 xen-build-check(1) blocked n/a test-amd64-i386-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xend-winxpsp3 16 leak-check/check fail in 14494 never pass test-amd64-i386-win 16 leak-check/check fail in 14494 never pass test-amd64-i386-qemut-win-vcpus1 16 leak-check/check fail in 14494 never pass test-amd64-i386-xl-win-vcpus1 13 guest-stop fail in 14494 never pass test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail in 14494 never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail in 14494 never pass test-amd64-i386-xl-qemut-win-vcpus1 13 guest-stop fail in 14494 never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail in 14494 never pass version targeted for testing: xen 9d88ac6046d8 baseline version: xen 1c69c938f641 ------------------------------------------------------------ People who touched revisions under test: George Dunlap <george.dunlap@eu.citrix.com> Ian Campbell <ian.campbell@citrix.com> Jan Beulich <jbeulich@suse.com> Keir Fraser <keir@xen.org> Kouya Shimura <kouya@jp.fujitsu.com> Roger Pau Monn? <roger.pau@citrix.com> Stefano Stabellini <stefano.stabellini@eu.citrix.com> Tim Deegan <tim@xen.org> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 fail build-amd64-oldkern pass build-i386-oldkern fail build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl fail test-amd64-i386-xl blocked test-amd64-i386-rhel6hvm-amd blocked test-amd64-i386-qemut-rhel6hvm-amd blocked test-amd64-i386-qemuu-rhel6hvm-amd blocked test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 blocked test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 blocked test-amd64-i386-xl-credit2 blocked test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel blocked test-amd64-i386-qemut-rhel6hvm-intel blocked test-amd64-i386-qemuu-rhel6hvm-intel blocked test-amd64-i386-xl-multivcpu blocked test-amd64-amd64-pair fail test-amd64-i386-pair blocked test-amd64-amd64-xl-sedf-pin fail test-amd64-amd64-pv fail test-amd64-i386-pv blocked test-amd64-amd64-xl-sedf fail test-amd64-i386-win-vcpus1 blocked test-amd64-i386-qemut-win-vcpus1 blocked test-amd64-i386-xl-qemut-win-vcpus1 blocked test-amd64-i386-xl-win-vcpus1 blocked test-amd64-i386-xl-qemut-winxpsp3-vcpus1 blocked test-amd64-i386-xl-winxpsp3-vcpus1 blocked test-amd64-amd64-win fail test-amd64-i386-win blocked test-amd64-amd64-qemut-win fail test-amd64-i386-qemut-win blocked test-amd64-amd64-xl-qemut-win fail test-amd64-amd64-xl-win fail test-amd64-i386-xend-qemut-winxpsp3 blocked test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 blocked test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 26205:9d88ac6046d8 tag: tip user: Roger Pau Monne <roger.pau@citrix.com> date: Thu Nov 29 11:28:18 2012 +0000 docs: fix persistent grants doc typo Signed-off-by: Roger Pau Monn? <roger.pau@citrix.com> Acked-by: Ian Campbell <ian.campbell@citrix.com> [ ijc -- fix additional typo s/this grants/these grants/g ] Committed-by: Ian Campbell <ian.campbell@citrix.com> changeset: 26204:48e211812551 user: Stefano Stabellini <stefano.stabellini@eu.citrix.com> date: Thu Nov 29 11:28:17 2012 +0000 xen/arm: build as zImage The zImage format is extremely simple: it only consists of a magic number and 2 addresses in a specific position (see http://www.simtec.co.uk/products/SWLINUX/files/booting_article.html#d0e309). Some bootloaders expect a zImage; considering that it doesn''t cost us much to build Xen compatible with the format, make it so. Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Acked-by: Tim Deegan <tim@xen.org> Acked-by: Ian Campbell <ian.campbell@citrix.com> [ ijc -- switch from 7*nop + nop to just 8*nop ] Committed-by: Ian Campbell <ian.campbell@citrix.com> changeset: 26203:b5cb6cccc32c user: Tim Deegan <tim@xen.org> date: Thu Nov 29 11:01:00 2012 +0000 x86/hap: Fix memory leak of domain->arch.hvm_domain.dirty_vram Signed-off-by: Kouya Shimura <kouya@jp.fujitsu.com> Signed-off-by: Tim Deegan <tim@xen.org> Committed-by: Tim Deegan <tim@xen.org> changeset: 26202:9c6c13bf3803 user: Tim Deegan <tim@xen.org> date: Thu Nov 29 10:49:53 2012 +0000 x86/mm: Comment the definitions of _mfn(), _gfn() &c. It''s not very easy to find them if you don''t know to look for the TYPE_SAFE() macro. Signed-off-by: Tim Deegan <tim@xen.org> Committed-by: Tim Deegan <tim@xen.org> changeset: 26201:5d7e3c2742e8 user: Jan Beulich <jbeulich@suse.com> date: Thu Nov 29 09:14:55 2012 +0100 VT-d: make scope parsing code type safe Rather than requiring the scopes to be the first members of their respective structures (so that casts can be used to switch between the different views), properly use types and container_of(). Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> Acked-by Xiantao Zhang <xiantao.zhang@intel.com> changeset: 26200:836697b19746 user: Jan Beulich <jbeulich@suse.com> date: Wed Nov 28 17:00:56 2012 +0100 IOMMU: imply "verbose" from "debug" I think that generally enabling debugging code without also enabling verbose output is rather pointless; if someone really wants this, they can always pass e.g. "iommu=debug,no-verbose". Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 26199:1fce7522daa6 user: Jan Beulich <jbeulich@suse.com> date: Wed Nov 28 10:08:24 2012 +0100 VT-d: adjust IOMMU interrupt affinities when all CPUs are online Since these interrupts get setup before APs get brought online, their affinities naturally could only ever point to CPU 0 alone so far. Adjust this to include potentially multiple CPUs in the target mask (when running in one of the cluster modes), and take into account NUMA information (to handle the interrupts on a CPU on the node where the respective IOMMU is). Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 26198:ba90ecb0231f user: Jan Beulich <jbeulich@suse.com> date: Wed Nov 28 10:07:11 2012 +0100 AMD IOMMU: include IOMMU interrupt information in ''M'' debug key output Note that this also adds a few pieces missing from c/s 25903:5e4a00b4114c (relevant only when the PCI MSI mask bit is supported by an IOMMU, which apparently isn''t the case for existing implementations). Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 26197:0bc3a489018f user: Jan Beulich <jbeulich@suse.com> date: Wed Nov 28 10:05:52 2012 +0100 VT-d: include IOMMU interrupt information in ''M'' debug key output Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 26196:5faf5b8b702e user: Jan Beulich <jbeulich@suse.com> date: Wed Nov 28 10:03:51 2012 +0100 ACPI: fix return value of XEN_PM_PDC platform op Should return -EFAULT when copying to guest memory fails. Once touching this code, also switch to using the more relaxed copy function (copying from the same guest memory already validated the virtual address range). Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 26195:7670eabcbafc user: Jan Beulich <jbeulich@suse.com> date: Wed Nov 28 10:02:26 2012 +0100 x86: fix hypercall continuation cancellation in XENMAPSPACE_gmfn_range compat wrapper When no continuation was established, there must also not be an attempt to cancel it - hypercall_cancel_continuation(), in the non-HVM, non- multicall case, adjusts the guest mode return address in a way assuming that an earlier call hypercall_create_continuation() took place. Once touching this code, also restructure it slightly to improve readability and switch to using the more relaxed copy function (copying from the same guest memory already validated the virtual address range). Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 26194:0aa1c5136a54 user: Jan Beulich <jbeulich@suse.com> date: Wed Nov 28 10:01:33 2012 +0100 README: adjust gcc version requirement Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 26193:1c69c938f641 user: George Dunlap <george.dunlap@eu.citrix.com> date: Tue Nov 27 14:13:41 2012 +0000 libxl: Fix bug in libxl_cdrom_insert, make more robust against bad xenstore data libxl_cdrom_insert was failing to initialize the backend type, resulting in the wrong default backend. The result was not only that the CD was not inserted properly, but also that some improper xenstore entries were created, causing further block commands to fail. This patch fixes the bug by setting the disk backend type based on the type of the existing device. It also makes the system more robust by checking to see that it has got a valid path before proceeding to write a partial xenstore entry. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Ian Campbell <ian.campbell@citrix.com> (qemu changes not included)