[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.1-testing test] 7610: regressions - FAIL

flight 7610 xen-4.1-testing real [real]

Regressions :-(

Tests which did not succeed and are blocking:
 build-i386-oldkern            4 xen-build                  fail REGR. vs. 7576

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-i386-rhel6hvm-intel 14 guest-start.2                fail never pass
 test-amd64-xcpkern-i386-rhel6hvm-amd 12 guest-localmigrate/x10 fail never pass
 test-amd64-xcpkern-i386-rhel6hvm-intel 14 guest-start.2        fail never pass
 test-amd64-i386-rhel6hvm-amd 14 guest-start.2                fail   never pass
 test-amd64-xcpkern-i386-xl-win 13 guest-stop                   fail never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-xcpkern-i386-win  16 leak-check/check             fail   never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-i386-xcpkern-i386-win   16 leak-check/check             fail   never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass

version targeted for testing:
 xen                  9d1afc143a61
baseline version:
 xen                  73a8061b01f1

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>

 build-i386-xcpkern                                           pass    
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           fail    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-xcpkern-i386-xl                                   pass    
 test-i386-xcpkern-i386-xl                                    pass    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-xcpkern-i386-xl-credit2                           pass    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-xcpkern-i386-xl-multivcpu                         pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-xcpkern-i386-pair                                 pass    
 test-i386-xcpkern-i386-pair                                  pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-xcpkern-i386-pv                                   pass    
 test-i386-xcpkern-i386-pv                                    pass    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-xcpkern-i386-win                                  fail    
 test-i386-xcpkern-i386-win                                   fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    
 test-amd64-xcpkern-i386-xl-win                               fail    

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

changeset:   23085:9d1afc143a61
tag:         tip
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Jun 15 20:46:18 2011 +0100
    x86_emulate: Fix decode of FUCOMIP %stN.
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23546:d25f2c114ace
    xen-unstable date:        Wed Jun 15 20:33:58 2011 +0100
changeset:   23084:ed4f19a76860
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Wed Jun 15 20:45:54 2011 +0100
    x86-64: fix incorrect assertion in __maddr_to_virt()
    When memory map sparseness reduction is in use, machine address ranges
    can't validly be compared directly against the total size of the
    direct mapping range.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23543:a8edfacd4b5e
    xen-unstable date:        Wed Jun 15 20:24:09 2011 +0100
changeset:   23083:198076343360
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Wed Jun 15 20:45:20 2011 +0100
    x86/hvm: Crash domain rather than guest on unexpected PIO IO state
    Under certain conditions, if an IO gets into an unexpected state,
    hvmemul_do_io can return X86EMUL_UNHANDLEABLE.  Unfortunately,
    handle_pio() does not expect this state, and calls BUG() if it sees
    it, crashing the host.
    Other HVM io-related code crashes the guest in this case.  This patch
    makes handle_pio() do the same.
    The crash was seen when executing crash_guest in dom0 to forcibly
    crash the guest.
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    xen-unstable changeset:   23538:35b4220c98bc
    xen-unstable date:        Wed Jun 15 16:05:14 2011 +0100
changeset:   23082:d105e0a98b58
user:        Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
date:        Wed Jun 15 20:44:44 2011 +0100
    x86/apic: fix potential Protection Fault during shutdown
    This is a rare case, but if the BIOS is set to uniprocessor, and Xen
    is booted with 'lapic x2apic', Xen will switch into x2apic mode, which
    will cause a protection fault when disabling the local APIC.  This
    leads to a general protection fault as this code is also in the fault
    When x2apic mode is enabled, the only tranlsation which does
    not result in a protection fault is to clear both the EN and EXTD
    bits, which is safe to do in all cases, even if you are in xapic
    mode rather than x2apic mode.
    The linux code from which this is derrived is protected by an
    if ( ! x2apic_mode ...) clause which is how they get away with it.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23512:0feb98534a87
    xen-unstable date:        Tue Jun 14 12:47:45 2011 +0100
changeset:   23081:3d1a9facbc28
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Jun 15 20:44:09 2011 +0100
    x86: Fix argument checking in (privileged) function cpu_add().
    Thanks to John McDermott <john.mcdermott@xxxxxxxxxxxx> for spotting.
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23505:5a557fda70a9
    xen-unstable date:        Fri Jun 10 08:08:44 2011 +0100
changeset:   23080:49ed2ca8c1a2
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Jun 15 20:43:30 2011 +0100
    Update Xen version to 4.1.2-rc1-pre
changeset:   23079:73a8061b01f1
user:        Keir Fraser <keir@xxxxxxx>
date:        Tue Jun 14 14:02:48 2011 +0100
    Added signature for changeset ab0e3dac2c63
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.