[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 10018: regressions - FAIL



flight 10018 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/10018/

Regressions :-(

Tests which did not succeed and are blocking:
 build-amd64                   4 xen-build                  fail REGR. vs. 9956
 build-i386-oldkern            4 xen-build                  fail REGR. vs. 9956
 build-i386                    4 xen-build                  fail REGR. vs. 9956
 build-amd64-oldkern           4 xen-build                  fail REGR. vs. 9956

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pv             1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pv           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl             1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pair           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-sedf      1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pair         1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win-vcpus1    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win-vcpus1  1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-win         1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-win          1 xen-build-check(1)           blocked  n/a

version targeted for testing:
 xen                  84b3e46aa7d2
baseline version:
 xen                  0a0c02a61676

------------------------------------------------------------
People who touched revisions under test:
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Wei Wang <wei.wang2@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-oldkern                                          fail    
 build-i386-oldkern                                           fail    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-i386-i386-xl                                            blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-amd64-xl-pcipt-intel                              blocked 
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-i386-i386-pair                                          blocked 
 test-amd64-amd64-pv                                          blocked 
 test-amd64-i386-pv                                           blocked 
 test-i386-i386-pv                                            blocked 
 test-amd64-amd64-xl-sedf                                     blocked 
 test-amd64-i386-win-vcpus1                                   blocked 
 test-amd64-i386-xl-win-vcpus1                                blocked 
 test-amd64-amd64-win                                         blocked 
 test-amd64-i386-win                                          blocked 
 test-i386-i386-win                                           blocked 
 test-amd64-amd64-xl-win                                      blocked 
 test-i386-i386-xl-win                                        blocked 


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   24187:84b3e46aa7d2
tag:         tip
user:        Paul Durrant <paul.durrant@xxxxxxxxxx>
date:        Wed Nov 23 12:03:37 2011 +0000
    
    libxl: Prevent xl save from segfaulting when control/shutdown key is removed
    
    To acknowledge the tools' setting of control/shutdown it is normal for
    PV drivers to rm the key. This leads to libxl__xs_read() returning
    NULL and thus a subsequent strcmp on the return value will cause a
    segfault.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24186:7aa5838499d1
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Wed Nov 23 11:15:31 2011 +0000
    
    tools: use system libaio for blktap1 as well.
    
    24184:4ecd3615e726 missed this because I was accidentally testing with a
    .config containing CONFIG_SYSTEM_LIBAIO=n. Tools tree now fully rebuilt
    without this. There were no other issues.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24185:f88c745575bb
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Nov 22 18:51:13 2011 +0000
    
    docs: remove some fatally out of date documentation
    
    I think these are better off deleted than remaining to confuse people.
    
    docs/misc/blkif-drivers-explained.txt:
    
     - Talks about Xen 2.0 beta, talks about the old pre-xenstored IPC 
mechanism.
    
    docs/misc/cpuid-config-for-guest.txt:
    
     - Doesn't really say anything, in particular doesn't actually describe how 
to
       configure CPUID.
    
    docs/misc/hg-cheatsheet.txt:
    
     - Not out of date per-se wrt mercural but talk about Xen 2.0 and gives URLs
       under www.cl.cam.ac.uk. Talks a lot about bitkeeper. Given that 
mercurial is
       hardly unusual anymore I think there must be better guides out there so 
this
       one is not worth resurecting.
    
    docs/misc/network_setup.txt:
    
     - This is more comprehensively documented on the wiki these days.
    
    docs/misc/VMX_changes.txt:
    
     - Is basically a changelog from the initial implementation of VMX in 2004.
    
    I'm not sure about some of the other docs, but these ones seemed fairly
    obvious.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24184:4ecd3615e726
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Nov 22 17:24:51 2011 +0000
    
    tools: use system installed libaio by default.
    
    I could have sworn I did this years ago.
    
    IIRC the need for our own copy was due to the use of io_set_eventfd which is
    not present in version 0.3.106. However it is in 0.3.107 the first version 
of
    which was uploaded to Debian in June 2008 (I can't find a better reference 
for
    the release date).
    
    The necessary version is available in Debian Lenny onwards and is in at 
least
    RHEL 6, Fedora 13 and OpenSuSE 11.3. The necessary version appears to not be
    available in RHEL 5 or SLES 11 which is why I haven't simply nuked the in 
tree
    version.
    
    This is based on tools-system-libaio.diff from the Debian packaging 
although I
    have made it optional (but default on).
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24183:53bec838bb08
parent:      24182:8edcd2e3f3f1
parent:      24181:2b5c6fff0e5b
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Tue Nov 22 17:09:12 2011 +0000
    
    Merge
    
    
changeset:   24182:8edcd2e3f3f1
parent:      24180:b21b6c91c1f4
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Tue Nov 22 17:07:32 2011 +0000
    
    xenstore: xenbus cannot be opened read-only
    
    In order to read keys from xenstore, the xenstore libraries need to
    write the request to the xenbus socket. This means that the socket
    cannot be opened read-only.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24181:2b5c6fff0e5b
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Nov 22 17:22:31 2011 +0100
    
    move pci_find_ext_capability() into common PCI code
    
    There's nothing architecture specific about it. It requires, however,
    that x86-32's pci_conf_read32() tolerates register accesses above 255
    (for consistency the adjustment is done to all pci_conf_readNN()
    functions).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24180:b21b6c91c1f4
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Tue Nov 22 16:19:48 2011 +0000
    
    libxl: Add a vkbd frontend/backend pair for HVM guests
    
    Linux PV on HVM guests can use vkbd, so add a vkbd frontend/backend
    pair for HVM guests by default.  It is useful because it doesn't
    require frequent qemu wakeups as the usb keyboard/mouse does.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24179:99a567be1978
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Tue Nov 22 16:19:11 2011 +0000
    
    Update QEMU_TAG
    
    
changeset:   24178:1f2a06dbbb69
user:        Keir Fraser <keir@xxxxxxx>
date:        Tue Nov 22 15:35:26 2011 +0000
    
    debug: Add domain/vcpu pause_count info to 'd' key.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24177:d3859e348951
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Tue Nov 22 13:29:48 2011 +0000
    
    xsm/flask: fix resource list range checks
    
    The FLASK security checks for resource ranges were not implemented
    correctly - only the permissions on the endpoints of a range were
    checked, instead of all items contained in the range. This would allow
    certain resources (I/O ports, I/O memory) to be used by domains in
    contravention to security policy.
    
    This also corrects a bug where adding overlapping resource ranges did
    not trigger an error.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24176:0db9c1fc8213
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Tue Nov 22 13:29:01 2011 +0000
    
    xsm/flask: Use correct flag to detect writable grant mappings
    
    The flags passed to xsm_grant_mapref are the flags from the map
    operation (GNTMAP_*), not status flags (GTF_*).
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24175:2bc6c29b14a7
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Tue Nov 22 13:27:19 2011 +0000
    
    amd iommu: Support INVALIDATE_IOMMU_ALL command.
    
    It is one of the new architectural commands supported by iommu v2.
    It instructs iommu to clear all address translation and interrupt
    remapping caches for all devices and all domains.
    
    Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24174:9a5e973305a8
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Tue Nov 22 13:26:46 2011 +0000
    
    amd iommu: Factor out iommu command handling functions,
    and move them into a new file.
    
    Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24173:28c295c82ff6
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Tue Nov 22 13:26:11 2011 +0000
    
    amd iommu: Fix incorrect definitions.
    
    Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24172:883f1c35810e
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Tue Nov 22 13:25:42 2011 +0000
    
    amd iommu: Advertise iommu extended feature bits to xen.
    
    Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24171:fe80909663c1
user:        Keir Fraser <keir@xxxxxxx>
date:        Tue Nov 22 13:00:21 2011 +0000
    
    x86,waitqueue: Allocate whole page for shadow stack.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24170:334d3ec1130c
user:        Keir Fraser <keir@xxxxxxx>
date:        Tue Nov 22 12:53:48 2011 +0000
    
    x86,vmx: Remove broken and unused __vmptrst().
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24169:0a0c02a61676
user:        Keir Fraser <keir@xxxxxxx>
date:        Mon Nov 21 21:28:34 2011 +0000
    
    hvmloader: Fix memory relocation loop.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
========================================
commit 9b33a3e5603ecd3ceca482a72c6ff8e951afb6d2
Author: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
Date:   Tue Nov 22 16:12:40 2011 +0000

    qemu-xen: add vkbd support for PV on HVM guests
    
    Register the vkbd backend even when running as device emulator for HVM
    guests: it is useful because it doesn't need a frequent timer like usb.
    
    Check whether the XenInput DisplayState has been set in the initialise
    state, rather than the input state.
    In case the DisplayState hasn't been set and there is no vfb for this
    domain, then set the XenInput DisplayState to the default one.
    
    An equivalent patch has already been committed in upstream qemu.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.