[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 5663: regressions - FAIL

flight 5663 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking:
 build-amd64-oldkern           4 xen-build                  fail REGR. vs. 5640
 build-amd64                   4 xen-build                  fail REGR. vs. 5640
 build-i386-oldkern            4 xen-build                  fail REGR. vs. 5640
 build-i386                    4 xen-build                  fail REGR. vs. 5640

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-pair         1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pv           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-win          1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win-vcpus1    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win-vcpus1  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-pair  1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-pv    1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-rhel6hvm-amd  1 xen-build-check(1)         blocked n/a
 test-amd64-xcpkern-i386-rhel6hvm-intel  1 xen-build-check(1)       blocked n/a
 test-amd64-xcpkern-i386-win   1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-xl-credit2  1 xen-build-check(1)           blocked n/a
 test-amd64-xcpkern-i386-xl-multivcpu  1 xen-build-check(1)         blocked n/a
 test-amd64-xcpkern-i386-xl-win  1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-xl    1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pair           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pv             1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win            1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-win         1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl             1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pair   1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pv     1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-win    1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-xl     1 xen-build-check(1)           blocked  n/a

version targeted for testing:
 xen                  7ada6faef565
baseline version:
 xen                  4bdb78db22b6

People who touched revisions under test:
  Allen Kay <allen.m.kay@xxxxxxxxx>
  Andre Przywara <andre.przywara@xxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Juergen Gross <juergen.gross@xxxxxxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Stephen Smalley <sds@xxxxxxxxxxxxx>
  Wei Huang <wei.huang2@xxxxxxx>
  Wei Wang <wei.wang2@xxxxxxx>

 build-i386-xcpkern                                           pass     
 build-amd64                                                  fail     
 build-i386                                                   fail     
 build-amd64-oldkern                                          fail     
 build-i386-oldkern                                           fail     
 build-amd64-pvops                                            pass     
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          blocked  
 test-amd64-i386-xl                                           blocked  
 test-i386-i386-xl                                            blocked  
 test-amd64-xcpkern-i386-xl                                   blocked  
 test-i386-xcpkern-i386-xl                                    blocked  
 test-amd64-i386-rhel6hvm-amd                                 blocked  
 test-amd64-xcpkern-i386-rhel6hvm-amd                         blocked  
 test-amd64-i386-xl-credit2                                   blocked  
 test-amd64-xcpkern-i386-xl-credit2                           blocked  
 test-amd64-i386-rhel6hvm-intel                               blocked  
 test-amd64-xcpkern-i386-rhel6hvm-intel                       blocked  
 test-amd64-i386-xl-multivcpu                                 blocked  
 test-amd64-xcpkern-i386-xl-multivcpu                         blocked  
 test-amd64-amd64-pair                                        blocked  
 test-amd64-i386-pair                                         blocked  
 test-i386-i386-pair                                          blocked  
 test-amd64-xcpkern-i386-pair                                 blocked  
 test-i386-xcpkern-i386-pair                                  blocked  
 test-amd64-amd64-pv                                          blocked  
 test-amd64-i386-pv                                           blocked  
 test-i386-i386-pv                                            blocked  
 test-amd64-xcpkern-i386-pv                                   blocked  
 test-i386-xcpkern-i386-pv                                    blocked  
 test-amd64-i386-win-vcpus1                                   blocked  
 test-amd64-i386-xl-win-vcpus1                                blocked  
 test-amd64-amd64-win                                         blocked  
 test-amd64-i386-win                                          blocked  
 test-i386-i386-win                                           blocked  
 test-amd64-xcpkern-i386-win                                  blocked  
 test-i386-xcpkern-i386-win                                   blocked  
 test-amd64-amd64-xl-win                                      blocked  
 test-i386-i386-xl-win                                        blocked  
 test-amd64-xcpkern-i386-xl-win                               blocked  

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

changeset:   22878:7ada6faef565
tag:         tip
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 17:26:31 2011 +0000
    hvm: fix XSAVE leaf 0 EBX size calculation
    Fixes a size calculation bug when enabled bits in XFEATURE_MASK (xcr0)
    aren't contiguous.
    Current for_loop will stop when xcr0 feature bit is 0. But in reality,
    the bits can be non-contiguous. One example is that LWP is bit 62 on
    AMD platform. This patch iterates through all bits to calculate the
    size for enabled features.
    Signed-off-by: Wei Huang <wei.huang2@xxxxxxx>
changeset:   22877:575d2f40acc4
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 17:22:44 2011 +0000
    trace: Change trace_var argument to void*, to match __trace_var
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
changeset:   22876:93212e5c88f6
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 17:21:17 2011 +0000
    hvm_op: Clean up new mem_access and inject_trap ops.
    Firstly, they are only for use from privileged entities, so mark them
    as usable only by code defining __XEN_TOOLS__.
    Secondly, the check for must-not-operate-on-myself can be done more
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
changeset:   22875:1f588baf1242
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 17:10:31 2011 +0000
    xsm/flask: Fix permission tables
    At some point, it seems that someone manually added Flask permission
    definitions to one header file without updating the corresponding
    policy configuration or the other related table.  The end result is
    that we can get uninterpretable AVC messages like this:
    # xl dmesg | grep avc
    (XEN) avc:  denied  { 0x4000000 } for domid=0
    scontext=system_u:system_r:dom0_t tcontext=system_u:system_r:domU_t
    Fix this by updating the flask config and regenerating the headers
    from it.  In the future, this can be further improved by integrating
    the automatic generation of the headers into the build process as is
    presently done in SELinux.
    Signed-off-by: Stephen Smalley <sds@xxxxxxxxxxxxx>
changeset:   22874:24a4487c9bef
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 17:09:32 2011 +0000
    xsm: Fix compilation error (unused variable)
    Signed-off-by:  Stephen Smalley <sds@xxxxxxxxxxxxx>
changeset:   22873:186162762071
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 17:03:09 2011 +0000
    hvm amd: Fix 32bit guest VM save/restore issues associated with SYSENTER 
    This patch turn-on SYSENTER MSRs interception for 32bit guest VMs on
    AMD CPUs. With it, hvm_svm.guest_sysenter_xx fields always contain the
    canonical version of SYSENTER MSRs and are used in guest save/restore.
    The data fields in VMCB save area are updated as necessary.
    Reported-by: James Harper <james.harper@xxxxxxxxxxxxxxxx>
    Signed-off-by: Wei Huang <wei.huang2@xxxxxxx>
changeset:   22872:cba9a84d32fb
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 16:54:01 2011 +0000
    amd iommu: Fix a xen crash after pci-attach
    pci-detach triggers IO page table deallocation if the last passthru
    device has been removed from pdev list, and this will result a BUG on
    amd systems for next pci-attach. This patch fixes this issue.
    Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
changeset:   22871:23f60ba52fff
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Feb 06 16:07:27 2011 +0000
    cpupool: Check for memory allocation failure on switching schedulers
    When switching schedulers on a physical cpu due to a cpupool operation
    check for a potential memory allocation failure and stop the operation
    Signed-off-by: Juergen Gross <juergen.gross@xxxxxxxxxxxxxx>
changeset:   22870:544b103b4d97
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Fri Feb 04 18:47:39 2011 +0000
    libxl: vncviewer: make autopass work properly
    The file we write the vnc password to must be rewound back to the
    beginning, or the vnc viewer will simply get EOF.
    When the syscalls for communicating the password to the vnc client
    fail, bomb out with an error messsage rather than blundering on (and
    probably producing a spurious password prompt).
    Following this patch, xl vncviewer --autopass works, provided the qemu
    patch for writing the password to xenstore has also been applied.
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   22869:c77353cb2ebb
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Fri Feb 04 18:47:20 2011 +0000
    libxl: vncviewer: unconditionally read listen port address and password
    The /local/domain/DOMID/device/vfb/0/backend path is irrelevant.
    libxl does not create it, so the branch would never be taken.
    Instead, simply read the target paths of interest.
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   22868:3cd9f9db5c21
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Fri Feb 04 18:46:22 2011 +0000
    libxl: vncviewer: fix use-after-free
    This bug can prevent xl vncviewer from working at all.
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   22867:f4d29a2c45ca
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Fri Feb 04 18:46:00 2011 +0000
    libxl: actually print an error when execve (in libxl__exec) fails
    The header comment says libxl__exec logs errors.  So it should do so.
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   22866:ed9ef3b07d2a
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Fri Feb 04 18:45:26 2011 +0000
    libxl: SECURITY: always honour request for vnc password
    qemu only sets a password on its vnc display if the value for the -vnc
    option has the ",password" modifier.  The code for constructing
    qemu-dm options was broken and only added this modifier for one of the
    Unfortunately there does not appear to be any code for passing the vnc
    password to upstream qemu (ie, in the case where
    libxl_build_device_model_args_new is called).  To avoid accidentally
    running the domain without a password, check for this situation and
    fail an assertion.  This will have to be revisited after 4.1.
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   22865:25d7e5e2ceea
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Fri Feb 04 18:43:53 2011 +0000
    QEMU_TAG update
changeset:   22864:d5863e86c05b
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Fri Feb 04 18:29:55 2011 +0000
    libxl: fix console autoconnect with pygrub, by invoking xenconsole twice
    When using pygrub we have to connect to the console twice: once at the
    beginning to connect to pygrub and a second time after creating the pv
    console to connect to the guest's console.
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   22863:6399079b44f3
user:        Stefano Stabellini <sstabellini@xxxxxxxxxxxxx>
date:        Fri Feb 04 17:41:37 2011 +0000
    Update list of VT-D maintainers.
changeset:   22862:068b3f19ef9a
user:        Andre Przywara <andre.przywara@xxxxxxx>
date:        Fri Feb 04 17:32:39 2011 +0000
    xl: fix broken xl vcpu-list output (tool hangs on large machines)
    The algorithm for printing the CPU affinity in a condensed way
    looks for a set bit in a zero-byte:
                 for (i = 0; !(pcpumap & 1); ++i, pcpumap >>= 1)
    Looking at the code I found that it is entirely broken if more than 8
    CPUs are used. Beside that endless loop issue the output is totally
    bogus except for the "any CPU" case, which is handled explicitly earlier.
    I tried to fix it, but the whole approach does not work if the outer
    loops actually iterates (executing more than once).
    This fix reimplements the whole algorithm in a clean (though not much
    optimized way). It survived some unit-testing.
    Signed-off-by: Andre Przywara <andre.przywara@xxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   22861:4bdb78db22b6
user:        Allen Kay <allen.m.kay@xxxxxxxxx>
date:        Wed Feb 02 17:06:36 2011 +0000
    libxl: pass gfx_passthru parameter to QEMU
    Pass gfx_passthru parameter to QEMU.  Keep it boolean for now as QEMU
    does not expect any other integer value.
    Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.