[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.0-testing test] 6563: regressions - FAIL



flight 6563 xen-4.0-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/6563/

Regressions :-(

Tests which did not succeed and are blocking:
 build-amd64-pvops             4 kernel-build               fail REGR. vs. 6351
 test-amd64-xcpkern-i386-pair  8 xen-boot/dst_host          fail REGR. vs. 6351
 test-amd64-xcpkern-i386-rhel6hvm-amd  5 xen-boot           fail REGR. vs. 6351
 test-amd64-xcpkern-i386-rhel6hvm-intel  5 xen-boot         fail REGR. vs. 6351

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-pair         1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pv           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-win          1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  7 redhat-install               fail   never pass
 test-amd64-i386-rhel6hvm-intel  7 redhat-install               fail never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-xl-credit2   15 guest-stop                   fail   never pass
 test-amd64-i386-xl-multivcpu 15 guest-stop                   fail   never pass
 test-amd64-i386-xl-win-vcpus1  7 windows-install              fail  never pass
 test-amd64-i386-xl           15 guest-stop                   fail   never pass
 test-amd64-xcpkern-i386-pv   18 leak-check/check             fail    like 6343
 test-amd64-xcpkern-i386-win  16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-xl-credit2  9 guest-start          fail REGR. vs. 6351
 test-amd64-xcpkern-i386-xl-multivcpu 15 guest-stop             fail never pass
 test-amd64-xcpkern-i386-xl-win  7 windows-install              fail never pass
 test-amd64-xcpkern-i386-xl   15 guest-stop                   fail   never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-i386-i386-xl-win         7 windows-install              fail   never pass
 test-i386-i386-xl            15 guest-stop                   fail   never pass
 test-i386-xcpkern-i386-win   16 leak-check/check             fail   never pass
 test-i386-xcpkern-i386-xl    15 guest-stop                   fail   never pass

version targeted for testing:
 xen                  999693539839
baseline version:
 xen                  61c7b61085c5

------------------------------------------------------------
People who touched revisions under test:
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Shriram Rajagopalan <rshriram@xxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Wei Gang <gang.wei@xxxxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   pass     
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           pass     
 build-amd64-pvops                                            fail     
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          blocked  
 test-amd64-i386-xl                                           fail     
 test-i386-i386-xl                                            fail     
 test-amd64-xcpkern-i386-xl                                   fail     
 test-i386-xcpkern-i386-xl                                    fail     
 test-amd64-i386-rhel6hvm-amd                                 fail     
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   fail     
 test-amd64-xcpkern-i386-xl-credit2                           fail     
 test-amd64-i386-rhel6hvm-intel                               fail     
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 fail     
 test-amd64-xcpkern-i386-xl-multivcpu                         fail     
 test-amd64-amd64-pair                                        blocked  
 test-amd64-i386-pair                                         pass     
 test-i386-i386-pair                                          pass     
 test-amd64-xcpkern-i386-pair                                 fail     
 test-i386-xcpkern-i386-pair                                  pass     
 test-amd64-amd64-pv                                          blocked  
 test-amd64-i386-pv                                           pass     
 test-i386-i386-pv                                            pass     
 test-amd64-xcpkern-i386-pv                                   fail     
 test-i386-xcpkern-i386-pv                                    pass     
 test-amd64-i386-win-vcpus1                                   fail     
 test-amd64-i386-xl-win-vcpus1                                fail     
 test-amd64-amd64-win                                         blocked  
 test-amd64-i386-win                                          fail     
 test-i386-i386-win                                           fail     
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   fail     
 test-amd64-amd64-xl-win                                      blocked  
 test-i386-i386-xl-win                                        fail     
 test-amd64-xcpkern-i386-xl-win                               fail     


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   21463:999693539839
tag:         tip
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Tue Mar 15 13:57:11 2011 +0000
    
    x86: run-time callers of map_pages_to_xen() must check for errors
    
    Again, (out-of-memory) errors must not cause hypervisor crashes, and
    hence ought to be propagated.
    
    This also adjusts the cache attribute changing loop in
    get_page_from_l1e() to not go through an unnecessary iteration. While
    this could be considered mere cleanup, it is actually a requirement
    for the subsequent now necessary error recovery path.
    
    Also make a few functions static, easing the check for potential
    callers needing adjustment.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   22997:5f28dcea1355
    xen-unstable date:        Wed Mar 09 16:15:36 2011 +0000
    
    
    x86: don't BUG() post-boot in alloc_xen_pagetable()
    
    Instead, propagate the condition to the caller, all of which also get
    adjusted to check for that situation.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   22996:1eeccafe9042
    xen-unstable date:        Wed Mar 09 16:14:59 2011 +0000
    
    
changeset:   21462:80e6045111e1
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Mon Mar 14 17:21:52 2011 +0000
    
    _csched_cpu_pick(): don't return CPUs outside vCPU's affinity mask
    
    This fixes a fairly blatant bug I introduced in c/s 20377:cff23354d026
    - I wonder how this went unnoticed for so long.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23039:c40da47621d8
    xen-unstable date:        Mon Mar 14 17:19:22 2011 +0000
    
    
changeset:   21461:ee088a0b5cb8
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Mon Mar 14 17:00:58 2011 +0000
    
    x86_64: fix error checking in arch_set_info_guest()
    
    Cannot specify user mode execution without specifying user-mode
    pagetables.
    
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23034:c79aae866ad8
    xen-unstable date:        Mon Mar 14 16:59:49 2011 +0000
    
    
changeset:   21460:b024d5ecc194
user:        Shriram Rajagopalan <rshriram@xxxxxxxxx>
date:        Mon Mar 14 16:58:08 2011 +0000
    
    libxc: fix incorrect scanning of pfn array in pagebuf during migration
    
    xc_domain_restore.c:apply_batch function makes two passes over the
    pfn_types array in pagebuf to allocate the needed MFNs. The curbatch
    parameter to this function specifies the array offset in pfn_types,
    from where the current scan should begin. But this variable is not
    taken into account (index always starts at 0) during the two
    passes. While this [bug] does not manifest itsef during save/restore
    or live migration, under Remus, xc_domain_restore fails due to corrupt
    guest page tables.
    
    (This appears to have been broken by 21588:6c3d8aec202d which reverted
    two changesets from before Remus support was added and hence
    reintroduced some none-Remus compatible bits.)
    
    Signed-off-by: Shriram Rajagopalan <rshriram@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    xen-unstable changeset:   22967:5bc39222773d
    xen-unstable date:        Thu Mar 03 16:55:27 2011 +0000
    
    
changeset:   21459:f637d2ec63b3
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Sat Mar 12 13:28:05 2011 +0000
    
    x86/HPET: fix initialization order
    
    At least the legacy path can enter its interrupt handler callout while
    initialization is still in progress - that handler checks whether
    ->event_handler is non-NULL, and hence all other initialization must
    happen before setting this field.
    
    Do the same to the MSI initialization just in case (and to keep the
    code in sync).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    Acked-by: Wei Gang <gang.wei@xxxxxxxxx>
    xen-unstable changeset:   23030:87aa1277eae0
    xen-unstable date:        Sat Mar 12 13:19:02 2011 +0000
    
    
changeset:   21458:7ddf29d515fb
user:        Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
date:        Thu Mar 10 18:39:48 2011 +0000
    
    tools: provide startup script for libxl
    
    In Xen 4.0 there is no /etc/init.d/xencommons.  This means that in
    most situations you don't get xenstored, and xl doesn't work, unless
    you do something shonky like starting and then immediately stopping
    xend.
    
    To test xl, my automatic testing system therefore provides its own
    init script to start xenstored and xenconsoled.  This script was
    created by borrowing from /etc/init.d/xend and other init scripts in
    various versions of xen.hg.
    
    Here it is[1], as a new "xencommons" script.  The user will still have
    to add appropriate rc links, and only a script for Linux is provided.
    
    We do not want to backport the refactoring of /etc/init.d/xend, so
    xend users should not enable this script.
    
    [1] Copied from osstest.git#78c59993ab536b8c39c5a00a xenlightdaemons.
    
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
    
    
changeset:   21457:61c7b61085c5
user:        Keir Fraser <keir@xxxxxxx>
date:        Tue Mar 08 16:25:02 2011 +0000
    
    x86_emulate: FPU 0xda instructions have a 32-bit memory operand, not 64-bit.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   22993:22eb31eb688a
    xen-unstable date:        Tue Mar 08 16:14:55 2011 +0000
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.