[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 14575: trouble: broken/fail/pass
flight 14575 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/14575/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-credit2 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 14565 test-amd64-amd64-pv 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-xl 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-qemut-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-qemuu-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-rhel6hvm-amd 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-xl-win-vcpus1 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-qemut-win-vcpus1 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-pair 4 host-install/dst_host(4) broken REGR. vs. 14565 test-amd64-i386-pair 3 host-install/src_host(3) broken REGR. vs. 14565 test-amd64-i386-pv 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-xl-multivcpu 3 host-install(3) broken REGR. vs. 14565 test-amd64-amd64-win 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-xl-qemut-win7-amd64 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-qemuu-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-win-vcpus1 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-xl-win7-amd64 3 host-install(3) broken REGR. vs. 14565 test-amd64-amd64-xl 3 host-install(3) broken REGR. vs. 14565 test-amd64-amd64-xl-winxpsp3 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs. 14565 test-amd64-i386-xl-qemut-win-vcpus1 3 host-install(3) broken REGR. vs. 14565 test-amd64-amd64-pair 3 host-install/src_host(3) broken REGR. vs. 14565 test-amd64-amd64-pair 4 host-install/dst_host(4) broken REGR. vs. 14565 test-amd64-i386-xend-qemut-winxpsp3 3 host-install(3) broken REGR. vs. 14565 test-amd64-amd64-xl-qemut-winxpsp3 3 host-install(3) broken REGR. vs. 14565 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-pcipt-intel 3 host-install(3) broken REGR. vs. 14565 test-amd64-amd64-xl-sedf-pin 10 guest-saverestore fail like 14565 test-amd64-amd64-xl-sedf 3 host-install(3) broken REGR. vs. 14565 Tests which did not succeed, but are not blocking: test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-i386-qemut-win 16 leak-check/check fail never pass test-amd64-amd64-xl-win 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-qemut-win 16 leak-check/check fail never pass test-amd64-amd64-xl-qemut-win 13 guest-stop fail never pass version targeted for testing: xen dc81777ca115 baseline version: xen bc624b00d6d6 ------------------------------------------------------------ People who touched revisions under test: David Vrabel <david.vrabel@xxxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <ian.jackson.citrix.com> Jan Beulich <jbeulich@xxxxxxxx> Keir Fraser <keir@xxxxxxx> Liu Jinsong <jinsong.liu@xxxxxxxxx> Samuel Thibault <samuel.thibault@xxxxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Tim Deegan <tim@xxxxxxx> Wei Huang <wei.huang2@xxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl broken test-amd64-i386-xl broken test-amd64-i386-rhel6hvm-amd broken test-amd64-i386-qemut-rhel6hvm-amd broken test-amd64-i386-qemuu-rhel6hvm-amd broken test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 broken test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 broken test-amd64-i386-xl-credit2 broken test-amd64-amd64-xl-pcipt-intel broken test-amd64-i386-rhel6hvm-intel broken test-amd64-i386-qemut-rhel6hvm-intel broken test-amd64-i386-qemuu-rhel6hvm-intel broken test-amd64-i386-xl-multivcpu broken test-amd64-amd64-pair broken test-amd64-i386-pair broken test-amd64-amd64-xl-sedf-pin fail test-amd64-amd64-pv broken test-amd64-i386-pv broken test-amd64-amd64-xl-sedf broken test-amd64-i386-win-vcpus1 broken test-amd64-i386-qemut-win-vcpus1 broken test-amd64-i386-xl-qemut-win-vcpus1 broken test-amd64-i386-xl-win-vcpus1 broken test-amd64-i386-xl-qemut-winxpsp3-vcpus1 broken test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-win broken test-amd64-i386-win fail test-amd64-amd64-qemut-win fail test-amd64-i386-qemut-win fail test-amd64-amd64-xl-qemut-win fail test-amd64-amd64-xl-win fail test-amd64-i386-xend-qemut-winxpsp3 broken test-amd64-amd64-xl-qemut-winxpsp3 broken test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 broken ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 26243:dc81777ca115 tag: tip user: Liu Jinsong <jinsong.liu@xxxxxxxxx> date: Thu Dec 06 10:47:22 2012 +0000 X86/vMCE: handle broken page with regard to migration At the sender xc_domain_save has a key point: 'to query the types of all the pages with xc_get_pfn_type_batch' 1) if broken page occur before the key point, migration will be fine since proper pfn_type and pfn number will be transferred to the target and then take appropriate action; 2) if broken page occur after the key point, whole system will crash and no need care migration any more; At the target Target will populates pages for guest. As for the case of broken page, we prefer to keep the type of the page for the sake of seamless migration. Target will set p2m as p2m_ram_broken for broken page. If guest access the broken page again it will kill itself as expected. Suggested-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Signed-off-by: Liu Jinsong <jinsong.liu@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26242:89bd3c43f883 user: George Dunlap <george.dunlap@xxxxxxxxxxxxx> date: Thu Dec 06 10:19:08 2012 +0000 libxl: Make an internal function explicitly check existence of expected paths libxl__device_disk_from_xs_be() was failing without error for some missing xenstore nodes in a backend, while assuming (without checking) that other nodes were valid, causing a crash when another internal error wrote these nodes in the wrong place. Make this function consistent by: * Checking the existence of all nodes before using * Choosing a default only when the node is not written in device_disk_add() * Failing with log msg if any node written by device_disk_add() is not present * Returning an error on failure * Disposing of the structure before returning using libxl_device_disk_displose() Also make the callers of the function pay attention to the error and behave appropriately. In the case of libxl__append_disk_list_of_type(), this means only incrementing *ndisks as the disk structures are successfully initialized. Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26241:d3c96e02e532 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Thu Dec 06 10:19:08 2012 +0000 xen/arm: disable interrupts on return_to_hypervisor At the moment it is possible to reach return_to_hypervisor with interrupts enabled (it happens all the times when we are actually going back to hypervisor mode, when we don't take the return_to_guest path). If that happens we risk loosing the content of ELR_hyp: if we receive an interrupt right after restoring ELR_hyp, once we come back we'll have a different value in ELR_hyp and the original is lost. In order to make the return_to_hypervisor path safe, we disable interrupts before restoring any registers. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26240:0c96325e2c8f user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Thu Dec 06 10:19:07 2012 +0000 README: docs/pdf/user.pdf was deleted in 24563:4271634e4c86 Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26239:4b6d74b093bc user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Thu Dec 06 10:19:06 2012 +0000 gitignore: ignore xen-foreign/arm.h Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26238:53805e238cca user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Thu Dec 06 10:56:53 2012 +0100 MAINTAINERS: Reference stable maintenance policy I also couldn't resist fixing a typo and adding a reference to http://wiki.xen.org/wiki/Submitting_Xen_Patches for the normal case as well. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Jan Beulich <jbeulich@xxxxxxxx> changeset: 26237:85ea612be837 user: Samuel Thibault <samuel.thibault@xxxxxxxxxxxx> date: Thu Dec 06 09:22:31 2012 +0000 mini-os: drop shutdown variables when CONFIG_XENBUS=n Shutdown variables are meaningless when CONFIG_XENBUS=n since no shutdown event will ever happen. Better make sure that no code tries to use it and never get the hoped shutdown event. Signed-off-by: Samuel Thibault <samuel.thibault@xxxxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 26236:51767f7f6ccc user: David Vrabel <david.vrabel@xxxxxxxxxx> date: Thu Dec 06 09:21:49 2012 +0000 MAINTAINERS: Device tree is maintained by the ARM maintainers Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 26235:670b07e8d738 user: Jan Beulich <jbeulich@xxxxxxxx> date: Wed Dec 05 09:52:14 2012 +0100 IOMMU/ATS: fix maximum queue depth calculation The capabilities register field is a 5-bit value, and the 5 bits all being zero actually means 32 entries. Under the assumption that amd_iommu_flush_iotlb() really just tried to correct for the miscalculation above when adding 32 to the value, that adjustment is also being removed. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by Xiantao Zhang <xiantao.zhang@xxxxxxxxx> Acked-by: Wei Huang <wei.huang2@xxxxxxx> changeset: 26234:bc624b00d6d6 user: Jan Beulich <jbeulich@xxxxxxxx> date: Tue Dec 04 18:38:31 2012 +0000 x86: get_page_from_gfn() must return NULL for invalid GFNs ... also in the non-translated case. This is XSA-32 / CVE-2012-xxxx. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> Committed-by: Ian Jackson <ian.jackson.citrix.com> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |