flight 14575 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/14575/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-credit2 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 14565
test-amd64-amd64-pv 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-xl 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-qemut-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-qemuu-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-xl-win-vcpus1 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-qemut-win-vcpus1 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-pair 4 host-install/dst_host(4) broken REGR. vs. 14565
test-amd64-i386-pair 3 host-install/src_host(3) broken REGR. vs. 14565
test-amd64-i386-pv 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-xl-multivcpu 3 host-install(3) broken REGR. vs. 14565
test-amd64-amd64-win 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-xl-qemut-win7-amd64 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-qemuu-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-win-vcpus1 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-xl-win7-amd64 3 host-install(3) broken REGR. vs. 14565
test-amd64-amd64-xl 3 host-install(3) broken REGR. vs. 14565
test-amd64-amd64-xl-winxpsp3 3 host-install(3) broken REGR. vs. 14565
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs.
14565
test-amd64-i386-xl-qemut-win-vcpus1 3 host-install(3) broken REGR. vs. 14565
test-amd64-amd64-pair 3 host-install/src_host(3) broken REGR. vs. 14565
test-amd64-amd64-pair 4 host-install/dst_host(4) broken REGR. vs. 14565
test-amd64-i386-xend-qemut-winxpsp3 3 host-install(3) broken REGR. vs. 14565
test-amd64-amd64-xl-qemut-winxpsp3 3 host-install(3) broken REGR. vs. 14565
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-pcipt-intel 3 host-install(3) broken REGR. vs. 14565
test-amd64-amd64-xl-sedf-pin 10 guest-saverestore fail like 14565
test-amd64-amd64-xl-sedf 3 host-install(3) broken REGR. vs. 14565
Tests which did not succeed, but are not blocking:
test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass
test-amd64-i386-win 16 leak-check/check fail never pass
test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass
test-amd64-i386-qemut-win 16 leak-check/check fail never pass
test-amd64-amd64-xl-win 13 guest-stop fail never pass
test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-qemut-win 16 leak-check/check fail never pass
test-amd64-amd64-xl-qemut-win 13 guest-stop fail never pass
version targeted for testing:
xen dc81777ca115
baseline version:
xen bc624b00d6d6
------------------------------------------------------------
People who touched revisions under test:
David Vrabel <david.vrabel@citrix.com>
George Dunlap <george.dunlap@eu.citrix.com>
Ian Campbell <ian.campbell@citrix.com>
Ian Jackson <ian.jackson.citrix.com>
Jan Beulich <jbeulich@suse.com>
Keir Fraser <keir@xen.org>
Liu Jinsong <jinsong.liu@intel.com>
Samuel Thibault <samuel.thibault@ens-lyon.org>
Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Tim Deegan <tim@xen.org>
Wei Huang <wei.huang2@amd.com>
------------------------------------------------------------
jobs:
build-amd64 pass
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl broken
test-amd64-i386-xl broken
test-amd64-i386-rhel6hvm-amd broken
test-amd64-i386-qemut-rhel6hvm-amd broken
test-amd64-i386-qemuu-rhel6hvm-amd broken
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 broken
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 broken
test-amd64-i386-xl-credit2 broken
test-amd64-amd64-xl-pcipt-intel broken
test-amd64-i386-rhel6hvm-intel broken
test-amd64-i386-qemut-rhel6hvm-intel broken
test-amd64-i386-qemuu-rhel6hvm-intel broken
test-amd64-i386-xl-multivcpu broken
test-amd64-amd64-pair broken
test-amd64-i386-pair broken
test-amd64-amd64-xl-sedf-pin fail
test-amd64-amd64-pv broken
test-amd64-i386-pv broken
test-amd64-amd64-xl-sedf broken
test-amd64-i386-win-vcpus1 broken
test-amd64-i386-qemut-win-vcpus1 broken
test-amd64-i386-xl-qemut-win-vcpus1 broken
test-amd64-i386-xl-win-vcpus1 broken
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 broken
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-amd64-win broken
test-amd64-i386-win fail
test-amd64-amd64-qemut-win fail
test-amd64-i386-qemut-win fail
test-amd64-amd64-xl-qemut-win fail
test-amd64-amd64-xl-win fail
test-amd64-i386-xend-qemut-winxpsp3 broken
test-amd64-amd64-xl-qemut-winxpsp3 broken
test-amd64-amd64-xl-qemuu-winxpsp3 fail
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 broken
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
changeset: 26243:dc81777ca115
tag: tip
user: Liu Jinsong <jinsong.liu@intel.com>
date: Thu Dec 06 10:47:22 2012 +0000
X86/vMCE: handle broken page with regard to migration
At the sender
xc_domain_save has a key point: ''to query the types of all the
pages
with xc_get_pfn_type_batch''
1) if broken page occur before the key point, migration will be fine
since proper pfn_type and pfn number will be transferred to the
target and then take appropriate action;
2) if broken page occur after the key point, whole system will crash
and no need care migration any more;
At the target
Target will populates pages for guest. As for the case of broken page,
we prefer to keep the type of the page for the sake of seamless migration.
Target will set p2m as p2m_ram_broken for broken page. If guest access
the broken page again it will kill itself as expected.
Suggested-by: George Dunlap <george.dunlap@eu.citrix.com>
Signed-off-by: Liu Jinsong <jinsong.liu@intel.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Tim Deegan <tim@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26242:89bd3c43f883
user: George Dunlap <george.dunlap@eu.citrix.com>
date: Thu Dec 06 10:19:08 2012 +0000
libxl: Make an internal function explicitly check existence of expected
paths
libxl__device_disk_from_xs_be() was failing without error for some
missing xenstore nodes in a backend, while assuming (without checking)
that other nodes were valid, causing a crash when another internal
error wrote these nodes in the wrong place.
Make this function consistent by:
* Checking the existence of all nodes before using
* Choosing a default only when the node is not written in device_disk_add()
* Failing with log msg if any node written by device_disk_add() is not
present
* Returning an error on failure
* Disposing of the structure before returning using
libxl_device_disk_displose()
Also make the callers of the function pay attention to the error and
behave appropriately. In the case of libxl__append_disk_list_of_type(),
this means only incrementing *ndisks as the disk structures are
successfully initialized.
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26241:d3c96e02e532
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Thu Dec 06 10:19:08 2012 +0000
xen/arm: disable interrupts on return_to_hypervisor
At the moment it is possible to reach return_to_hypervisor with
interrupts enabled (it happens all the times when we are actually going
back to hypervisor mode, when we don''t take the return_to_guest
path).
If that happens we risk loosing the content of ELR_hyp: if we receive an
interrupt right after restoring ELR_hyp, once we come back we''ll
have a
different value in ELR_hyp and the original is lost.
In order to make the return_to_hypervisor path safe, we disable
interrupts before restoring any registers.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26240:0c96325e2c8f
user: Ian Campbell <ian.campbell@citrix.com>
date: Thu Dec 06 10:19:07 2012 +0000
README: docs/pdf/user.pdf was deleted in 24563:4271634e4c86
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26239:4b6d74b093bc
user: Ian Campbell <ian.campbell@citrix.com>
date: Thu Dec 06 10:19:06 2012 +0000
gitignore: ignore xen-foreign/arm.h
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26238:53805e238cca
user: Ian Campbell <ian.campbell@citrix.com>
date: Thu Dec 06 10:56:53 2012 +0100
MAINTAINERS: Reference stable maintenance policy
I also couldn''t resist fixing a typo and adding a reference to
http://wiki.xen.org/wiki/Submitting_Xen_Patches for the normal case as
well.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Jan Beulich <jbeulich@suse.com>
changeset: 26237:85ea612be837
user: Samuel Thibault <samuel.thibault@ens-lyon.org>
date: Thu Dec 06 09:22:31 2012 +0000
mini-os: drop shutdown variables when CONFIG_XENBUS=n
Shutdown variables are meaningless when CONFIG_XENBUS=n since no
shutdown event will ever happen. Better make sure that no code tries
to use it and never get the hoped shutdown event.
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 26236:51767f7f6ccc
user: David Vrabel <david.vrabel@citrix.com>
date: Thu Dec 06 09:21:49 2012 +0000
MAINTAINERS: Device tree is maintained by the ARM maintainers
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
Committed-by: Keir Fraser <keir@xen.org>
changeset: 26235:670b07e8d738
user: Jan Beulich <jbeulich@suse.com>
date: Wed Dec 05 09:52:14 2012 +0100
IOMMU/ATS: fix maximum queue depth calculation
The capabilities register field is a 5-bit value, and the 5 bits all
being zero actually means 32 entries.
Under the assumption that amd_iommu_flush_iotlb() really just tried
to correct for the miscalculation above when adding 32 to the value,
that adjustment is also being removed.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by Xiantao Zhang <xiantao.zhang@intel.com>
Acked-by: Wei Huang <wei.huang2@amd.com>
changeset: 26234:bc624b00d6d6
user: Jan Beulich <jbeulich@suse.com>
date: Tue Dec 04 18:38:31 2012 +0000
x86: get_page_from_gfn() must return NULL for invalid GFNs
... also in the non-translated case.
This is XSA-32 / CVE-2012-xxxx.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Tim Deegan <tim@xen.org>
Committed-by: Ian Jackson <ian.jackson.citrix.com>
(qemu changes not included)