[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 13801: regressions - FAIL



flight 13801 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13801/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-win7-amd64 12 guest-localmigrate/x10  fail REGR. vs. 13799

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf-pin 10 guest-saverestore            fail   like 13799
 test-amd64-amd64-xl-qemuu-winxpsp3  9 guest-localmigrate       fail like 13799
 test-amd64-amd64-xl-qemuu-win7-amd64  9 guest-localmigrate     fail like 13799

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass

version targeted for testing:
 xen                  d1c3375c3f11
baseline version:
 xen                  3bf63fcfacd1

------------------------------------------------------------
People who touched revisions under test:
  Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
  Christoph Egger <Christoph.Egger@xxxxxxx>
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Gang Wei <gang.wei@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Jiongxi Li <jiongxi.li@xxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Steven Maresca <steve@xxxxxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Yang Zhang <yang.z.zhang@xxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-amd64-amd64-xl-win                                      fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   25925:d1c3375c3f11
tag:         tip
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Mon Sep 17 21:12:21 2012 +0100
    
    xsm/flask: add domain relabel support
    
    This adds the ability to change a domain's XSM label after creation.
    The new label will be used for all future access checks; however,
    existing event channels and memory mappings will remain valid even if
    their creation would be denied by the new label.
    
    With appropriate security policy and hooks in the domain builder, this
    can be used to create domains that the domain builder does not have
    access to after building. It can also be used to allow a domain to
    drop privileges - for example, prior to launching a user-supplied
    kernel loaded by a pv-grub stubdom.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25924:383f0b427494
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Mon Sep 17 21:10:39 2012 +0100
    
    xsm/flask: remove unneeded create_sid field
    
    This field was only used to populate the ssid of dom0, which can be
    handled explicitly in the domain creation hook. This also removes the
    unnecessary permission check on the creation of dom0.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25923:6804e9092670
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Mon Sep 17 21:10:07 2012 +0100
    
    xsm/flask: remove inherited class attributes
    
    The ability to declare common permission blocks shared across multiple
    classes is not currently used in Xen. Currently, support for this
    feature is broken in the header generation scripts, and it is not
    expected that this feature will be used in the future, so remove the
    dead code.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25922:c2578dd96b83
user:        Jiongxi Li <jiongxi.li@xxxxxxxxx>
date:        Mon Sep 17 21:06:02 2012 +0100
    
    xen: add virtual x2apic support for apicv
    
    basically to benefit from apicv, we need clear MSR bitmap for
    corresponding x2apic MSRs:
      0x800 - 0x8ff: no read intercept for apicv register virtualization
      TPR,EOI,SELF-IPI: no write intercept for virtual interrupt
        delivery
    
    Signed-off-by: Jiongxi Li <jiongxi.li@xxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25921:713b8849b11a
user:        Jiongxi Li <jiongxi.li@xxxxxxxxx>
date:        Mon Sep 17 21:05:11 2012 +0100
    
    xen: enable Virtual-interrupt delivery
    
    Virtual interrupt delivery avoids Xen to inject vAPIC interrupts
    manually, which is fully taken care of by the hardware. This needs
    some special awareness into existing interrupr injection path:
    For pending interrupt from vLAPIC, instead of direct injection, we may
    need update architecture specific indicators before resuming to guest.
    Before returning to guest, RVI should be updated if any pending IRRs
    EOI exit bitmap controls whether an EOI write should cause VM-Exit. If
    set, a trap-like induced EOI VM-Exit is triggered. The approach here
    is to manipulate EOI exit bitmap based on value of TMR. Level
    triggered irq requires a hook in vLAPIC EOI write, so that vIOAPIC EOI
    is triggered and emulated
    
    Signed-off-by: Gang Wei <gang.wei@xxxxxxxxx>
    Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>
    Signed-off-by: Jiongxi Li <jiongxi.li@xxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25920:ec60de627945
user:        Jiongxi Li <jiongxi.li@xxxxxxxxx>
date:        Mon Sep 17 21:04:08 2012 +0100
    
    xen: enable APIC-Register Virtualization
    
    Add APIC register virtualization support
     - APIC read doesn't cause VM-Exit
     - APIC write becomes trap-like
    
    Signed-off-by: Gang Wei <gang.wei@xxxxxxxxx>
    Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>
    Signed-off-by: Jiongxi Li <jiongxi.li@xxxxxxxxx>
    
    
changeset:   25919:62de66cec48a
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Mon Sep 17 17:57:24 2012 +0100
    
    MCE: use new common mce handler on AMD CPUs
    
    Factor common machine check handler out of intel specific code
    and move it into common files.
    Replace old common mce handler with new one and use it on AMD CPUs.
    No functional changes on Intel side.
    While here fix some whitespace nits and comments.
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25918:7ab899e46347
user:        Steven Maresca <steve@xxxxxxxxxxxx>
date:        Mon Sep 17 17:55:12 2012 +0100
    
    mem_event: fix regression affecting CR3, CR4 memory events
    
    This is a patch repairing a regression in code previously functional
    in 4.1.x. It appears that, during some refactoring work, calls to
    hvm_memory_event_cr3 and hvm_memory_event_cr4 were lost.
    
    These functions were originally called in mov_to_cr() of vmx.c, but
    the commit  http://xenbits.xen.org/hg/xen-unstable.hg/rev/1276926e3795
    abstracted the original code into generic functions up a level in
    hvm.c, dropping these calls in the process.
    
    Signed-off-by: Steven Maresca <steve@xxxxxxxxxxxx>
    Acked-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25917:5ba70e030b47
user:        Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
date:        Mon Sep 17 17:51:57 2012 +0100
    
    Extra check in grant table code for mapping of shared frame
    
    Signed-off-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25916:3bf63fcfacd1
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Mon Sep 17 11:17:05 2012 +0100
    
    tools: drop ia64 only foreign structs from headers
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.