[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [xen-4.4-testing test] 30367: regressions - FAIL



On 24/09/14 08:20, xen.org wrote:
> flight 30367 xen-4.4-testing real [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/30367/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>  test-amd64-amd64-xl-win7-amd64  7 windows-install         fail REGR. vs. 
> 30239

Can we just nuke this test?  It has never worked reliably, and now only
serves to delay movement from staging-4.4 to stable-4.4

~Andrew

>
> Tests which did not succeed, but are not blocking:
>  test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)               blocked 
> n/a
>  test-amd64-i386-rumpuserxen-i386  1 build-check(1)               blocked  n/a
>  test-amd64-i386-libvirt       9 guest-start                  fail   never 
> pass
>  test-amd64-amd64-libvirt      9 guest-start                  fail   never 
> pass
>  test-armhf-armhf-xl          10 migrate-support-check        fail   never 
> pass
>  test-armhf-armhf-libvirt      9 guest-start                  fail   never 
> pass
>  test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never 
> pass
>  build-amd64-rumpuserxen       6 xen-build                    fail   never 
> pass
>  build-i386-rumpuserxen        6 xen-build                    fail   never 
> pass
>  test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never 
> pass
>  test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check        fail never 
> pass
>  test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never 
> pass
>  test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never 
> pass
>  test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never 
> pass
>  test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never 
> pass
>  test-amd64-i386-xend-winxpsp3 17 leak-check/check             fail  never 
> pass
>  test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never 
> pass
>  test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never 
> pass
>  test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never 
> pass
>  test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never 
> pass
>  test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never 
> pass
>  test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never 
> pass
>
> version targeted for testing:
>  xen                  a299a3e88a387de88489d6a6f61bebdafc95ebe5
> baseline version:
>  xen                  be84c34e642f06107be8096b7e90dd0c86f13164
>
> ------------------------------------------------------------
> People who touched revisions under test:
>   Andrei LUTAS <vlutas@xxxxxxxxxxxxxxx>
>   Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>   Jan Beulich <jbeulich@xxxxxxxx>
>   Keir Fraser <keir@xxxxxxx>
> ------------------------------------------------------------
>
> jobs:
>  build-amd64-xend                                             pass    
>  build-i386-xend                                              pass    
>  build-amd64                                                  pass    
>  build-armhf                                                  pass    
>  build-i386                                                   pass    
>  build-amd64-libvirt                                          pass    
>  build-armhf-libvirt                                          pass    
>  build-i386-libvirt                                           pass    
>  build-amd64-pvops                                            pass    
>  build-armhf-pvops                                            pass    
>  build-i386-pvops                                             pass    
>  build-amd64-rumpuserxen                                      fail    
>  build-i386-rumpuserxen                                       fail    
>  test-amd64-amd64-xl                                          pass    
>  test-armhf-armhf-xl                                          pass    
>  test-amd64-i386-xl                                           pass    
>  test-amd64-i386-rhel6hvm-amd                                 pass    
>  test-amd64-i386-qemut-rhel6hvm-amd                           pass    
>  test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
>  test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
>  test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
>  test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
>  test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
>  test-amd64-i386-freebsd10-amd64                              pass    
>  test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
>  test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
>  test-amd64-amd64-rumpuserxen-amd64                           blocked 
>  test-amd64-amd64-xl-qemut-win7-amd64                         fail    
>  test-amd64-i386-xl-qemut-win7-amd64                          fail    
>  test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
>  test-amd64-i386-xl-qemuu-win7-amd64                          fail    
>  test-amd64-amd64-xl-win7-amd64                               fail    
>  test-amd64-i386-xl-win7-amd64                                fail    
>  test-amd64-i386-xl-credit2                                   pass    
>  test-amd64-i386-freebsd10-i386                               pass    
>  test-amd64-i386-rumpuserxen-i386                             blocked 
>  test-amd64-amd64-xl-pcipt-intel                              fail    
>  test-amd64-i386-rhel6hvm-intel                               pass    
>  test-amd64-i386-qemut-rhel6hvm-intel                         pass    
>  test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
>  test-amd64-amd64-libvirt                                     fail    
>  test-armhf-armhf-libvirt                                     fail    
>  test-amd64-i386-libvirt                                      fail    
>  test-amd64-i386-xl-multivcpu                                 pass    
>  test-amd64-amd64-pair                                        pass    
>  test-amd64-i386-pair                                         pass    
>  test-amd64-amd64-xl-sedf-pin                                 pass    
>  test-amd64-amd64-pv                                          pass    
>  test-amd64-i386-pv                                           pass    
>  test-amd64-amd64-xl-sedf                                     pass    
>  test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
>  test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
>  test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
>  test-amd64-i386-xend-qemut-winxpsp3                          fail    
>  test-amd64-amd64-xl-qemut-winxpsp3                           fail    
>  test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
>  test-amd64-i386-xend-winxpsp3                                fail    
>  test-amd64-amd64-xl-winxpsp3                                 fail    
>
>
> ------------------------------------------------------------
> sg-report-flight on osstest.cam.xci-test.com
> logs: /home/xc_osstest/logs
> images: /home/xc_osstest/images
>
> Logs, config files, etc. are available at
>     http://www.chiark.greenend.org.uk/~xensrcts/logs
>
> Test harness code can be found at
>     http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
>
>
> Not pushing.
>
> ------------------------------------------------------------
> commit a299a3e88a387de88489d6a6f61bebdafc95ebe5
> Author: Jan Beulich <jbeulich@xxxxxxxx>
> Date:   Tue Sep 23 14:40:51 2014 +0200
>
>     x86emul: only emulate software interrupt injection for real mode
>     
>     Protected mode emulation currently lacks proper privilege checking of
>     the referenced IDT entry, and there's currently no legitimate way for
>     any of the respective instructions to reach the emulator when the guest
>     is in protected mode.
>     
>     This is XSA-106.
>     
>     Reported-by: Andrei LUTAS <vlutas@xxxxxxxxxxxxxxx>
>     Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
>     Acked-by: Keir Fraser <keir@xxxxxxx>
>     master commit: 346d4545569928b652c40c7815c1732676f8587c
>     master date: 2014-09-23 14:33:50 +0200
>
> commit 510f1717827b54e27acd86e1781bb472a10cc72a
> Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> Date:   Tue Sep 23 14:40:12 2014 +0200
>
>     x86/emulate: check cpl for all privileged instructions
>     
>     Without this, it is possible for userspace to load its own IDT or GDT.
>     
>     This is XSA-105.
>     
>     Reported-by: Andrei LUTAS <vlutas@xxxxxxxxxxxxxxx>
>     Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>     Tested-by: Andrei LUTAS <vlutas@xxxxxxxxxxxxxxx>
>     Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
>     master commit: 0e442727ceccfa32a7276cccd205b4722e68fdc1
>     master date: 2014-09-23 14:33:06 +0200
>
> commit 20429b1274fe9ed0b40e73c295fa79b70c1bf80e
> Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> Date:   Tue Sep 23 14:39:05 2014 +0200
>
>     x86/shadow: fix race condition sampling the dirty vram state
>     
>     d->arch.hvm_domain.dirty_vram must be read with the domain's paging lock 
> held.
>     
>     If not, two concurrent hypercalls could both end up attempting to free
>     dirty_vram (the second of which will free a wild pointer), or both end up
>     allocating a new dirty_vram structure (the first of which will be leaked).
>     
>     This is XSA-104.
>     
>     Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>     Reviewed-by: Tim Deegan <tim@xxxxxxx>
>     master commit: 46a49b91f1026f64430b84dd83e845a33f06415e
>     master date: 2014-09-23 14:31:47 +0200
> (qemu changes not included)
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.