[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 12120: regressions - FAIL



flight 12120 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/12120/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-i386-i386-pair          16 guest-start               fail REGR. vs. 12104

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-qemuu-rhel6hvm-amd  9 guest-start.2            fail like 12104
 test-i386-i386-win           14 guest-start.2                fail   like 12104

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-qemuu-rhel6hvm-intel  9 guest-start.2          fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-i386-rhel6hvm-amd 11 leak-check/check             fail   never pass
 test-amd64-i386-rhel6hvm-intel 11 leak-check/check             fail never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-i386-i386-xl-qemuu-winxpsp3  7 windows-install            fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3  7 windows-install          fail never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-qemuu-win7-amd64  7 windows-install        fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-i386-i386-xl-winxpsp3   13 guest-stop                   fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass

version targeted for testing:
 xen                  d7fe4cd831a0
baseline version:
 xen                  a7bacdc5449a

------------------------------------------------------------
People who touched revisions under test:
  Attilio Rao <attilio.rao@xxxxxxxxxx>
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Dietmar Hahn <dietmar.hahn@xxxxxxxxxxxxxx>
  Ian Campbell <Ian.Campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Liu, Jinsong <jinsong.liu@xxxxxxxxx>
  Olaf Hering <olaf@xxxxxxxxx>
  Roger Pau Monne <roger.pau@xxxxxxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-i386-qemuu-rhel6hvm-intel                         fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          fail    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   24911:d7fe4cd831a0
tag:         tip
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Wed Feb 29 17:01:41 2012 +0000
    
    configure: do not require Bison or Flex
    
    This isn't required because we also checkin the generated files.  A
    more complete fix might also allow the user to force regeneration but
    I didn't bother here.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24910:e439559f50eb
user:        Attilio Rao <attilio.rao@xxxxxxxxxx>
date:        Wed Feb 29 16:25:38 2012 +0000
    
    libxl, xl: Add the bios option to specify the bios to load
    
    Signed-off-by: Attilio Rao <attilio.rao@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24909:fa3f08ce6b75
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Feb 29 15:11:31 2012 +0000
    
    Revert 24897:f25e5785327e "Export configure variables to hypervisor build"
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24908:39283113682e
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Feb 29 14:38:28 2012 +0000
    
    tools: xencommons: revert accidental hunk in 24905:2b5cf6bde62d
    
    24905:2b5cf6bde62d accidentally contained a change to
    tools/hotplug/Linux/init.d/xencommons.  That change is probably OK but
    should not be in 24905 so remove it.
    
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24907:24117fff2fe1
user:        Roger Pau Monne <roger.pau@xxxxxxxxxxxxx>
date:        Wed Feb 29 14:36:04 2012 +0000
    
    install: remove old checks from install.sh
    
    Signed-off-by: Roger Pau Monne <roger.pau@xxxxxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24906:606af3fbd6fc
user:        Olaf Hering <olaf@xxxxxxxxx>
date:        Wed Feb 29 14:32:51 2012 +0000
    
    libxl: use libxl wrapper for yajl_gen_alloc
    
    To fix compile errors with libyajl2:
     * use libxl_yajl_gen_alloc()
     * use libxl_yajl_length
     * link xl with -lyajl for yajl_gen_string()
    
    Signed-off-by: Olaf Hering <olaf@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24905:2b5cf6bde62d
user:        Olaf Hering <olaf@xxxxxxxxx>
date:        Wed Feb 29 14:31:59 2012 +0000
    
    libxl: rename libxl__yajl_gen_alloc
    
    libxl__yajl_gen_alloc() is called by generic code,
    rename it to libx_yajl_gen_alloc().
    
    Signed-off-by: Olaf Hering <olaf@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   24904:93d379d11cbb
user:        Dietmar Hahn <dietmar.hahn@xxxxxxxxxxxxxx>
date:        Wed Feb 29 13:51:42 2012 +0000
    
    vpmu: No need for two initialisation functions
    
    With the changeset 24529:87854d3bed93 we got 2 initialisation
    functions for the arch specific stuff. This is no more needed.
    
    Signed-off-by: Dietmar Hahn <dietmar.hahn@xxxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24903:bea68a25f368
user:        Dietmar Hahn <dietmar.hahn@xxxxxxxxxxxxxx>
date:        Wed Feb 29 13:51:12 2012 +0000
    
    vpmu: cleanup structures
    
    - struct msr_load_store_entry is unused
    - struct pmumsr is only used in the vmx part
    
    Signed-off-by: Dietmar Hahn <dietmar.hahn@xxxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24902:57706facdbdd
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Wed Feb 29 13:48:41 2012 +0000
    
    xsm: expose context of event channel peers
    
    This hypercall allows a domain to identify the security context of a
    domain that it is communicating with using the interdomain event
    channel that it is using for the communication. This can be used to
    augment Xen's security permissions with intra-domain security checks.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24901:b8adaf598a6a
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Wed Feb 29 13:47:41 2012 +0000
    
    xsm/flask: buffer AVC messages for output
    
    When multiple CPUs hit an AVC audit message, the resulting output in
    the ring buffer and serial console is garbled due to the audit process
    using many separate printk invocations for each message. Change the
    AVC audit process to use a temporary buffer and output the contents
    once the entire audit message is complete.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24900:2e6c3194c3b2
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Wed Feb 29 13:47:11 2012 +0000
    
    xsm/flask: clean interdomain event channel hook
    
    Don't attempt to relabel the already-bound half of the event channel
    pair created by an interdomain event channel. This relabeling also
    performed an incorrect check that the destination domain is permitted
    to create the reverse event channel, which may not be true if the
    unbound channel was created by the domain builder (like the xenstore
    channel).
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24899:ea7a07622a43
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Wed Feb 29 13:46:32 2012 +0000
    
    xsm: label xen-consumer event channels
    
    Event channels created during the domain build process for HVM domains
    did not call the XSM creation hook. Since these channels are used
    internally by Xen, redirect them to DOMAIN_INVAID instead of failing
    to create if the XSM hook fails the permissions check.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24898:be9d56fada86
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Feb 29 13:43:44 2012 +0000
    
    Update autoconf-generated configure script.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24897:f25e5785327e
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Wed Feb 29 13:40:25 2012 +0000
    
    build: Export configure variables to hypervisor build
    
    Since the introduction of autoconf, builds with XSM enabled in .config
    have been broken unless FLASK_ENABLE was explicitly set. Since the
    setting in .config has apparently been deprecated in favor of an
    autoconf --enable-xsm, add config/Xen.mk to export this to Xen. This
    also makes --disable-debug and some paths to be pulled from the
    configure process in the hypervisor build.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24896:d6c72d5ab780
user:        Attilio Rao <attilio.rao@xxxxxxxxxx>
date:        Wed Feb 29 13:33:51 2012 +0000
    
    hvmloader: drop the ovmf32 support and rename ovmf64 -> ovmf.
    
    - Remove the 15cpus hack from ovmf because it should be unnecessary on
    nowadays windows/EFI supported.
    
    Signed-off-by: Attilio Rao <attilio.rao@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24895:a43eeaedf61c
user:        Tim Deegan <tim@xxxxxxx>
date:        Tue Feb 28 10:17:27 2012 +0000
    
    arm: Handle booting on SMP platforms
    
    Make all non-boot CPUs wait forever instead of trying to boot in parallel.
    
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
changeset:   24894:d19a254197d7
user:        Tim Deegan <tim@xxxxxxx>
date:        Tue Feb 28 10:17:27 2012 +0000
    
    arm: strip xen binary
    
    The symbols in it are wrong anyway and will only confuse people
    who ought to be looking at xen-syms.
    
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
changeset:   24893:72551f578776
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Tue Feb 28 09:06:27 2012 +0100
    
    X86: expose HLE/RTM features to dom0
    
    Intel recently release 2 new features, HLE and TRM.
    Refer to http://software.intel.com/file/41417.
    This patch expose them to dom0.
    
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
    Committed-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   24892:a7bacdc5449a
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Mon Feb 27 17:05:18 2012 +0000
    
    Update SEABIOS_UPSTREAM_TAG
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
    
    
========================================
commit 128de2549c5f24e4a437b86bd2e46f023976d50a
Author: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
Date:   Mon Feb 20 16:21:47 2012 +0000

    Intel GPU passthrough: Host bridge config space
    
    Expose more host bridge config space value to make the driver happy
    for all the different revisions of the device.
    
    Signed-off-by: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.