[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 20366: regressions - FAIL

flight 20366 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-win7-amd64  7 windows-install   fail REGR. vs. 20140

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-armhf-armhf-xl           5 xen-boot                     fail   never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass

version targeted for testing:
 xen                  c56cdf93750fd978aebd69dc113f12cc770ff8e3
baseline version:
 xen                  84f04d8f0dbfc24a48ee888011ca7410b7bbafc5

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Xiantao Zhang <xiantao.zhang@xxxxxxxxx>

 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          fail    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

commit c56cdf93750fd978aebd69dc113f12cc770ff8e3
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Oct 9 12:11:48 2013 +0200

    hvm/vidirian: Avoid printing page_to_mfn(NULL) on error paths
    While working in the viridian code, I noticed that 4cb6c4f4941
    "x86/hvm: Use get_page_from_gfn() instead of get_gfn()/put_gfn."
    introduced two error paths where page_to_mfn(NULL) would be formatted and
    presented as a bad MFN.  This provides junk in the warning rather than
    something useful.
    These two codepaths are fixed up to match their counterpart in
    While auditing the other changes from 4cb6c4f4941, I noticed a small
    optimisation which could be made by changing the order of the validity 
    to remove 6 NULL pointer checks.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 839b966e3f587bbb1a0d954230fb3904330dccb6
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Oct 9 12:10:46 2013 +0200

    x86/traps: improvements to {rd,wr}msr_hypervisor_regs()
    Coverity ID: 1055249 1055250
    Coverity was complaining that the switch statments contained dead code in
    their default statements.  While this is quite minor, the code flow in
    wrmsr_hypervisor_regs() was sufficiently opaque that I felt it approprate to
    Other improvements include:
     * not shadowing the function parameter 'idx'.
     * use of PAGE_{SHIFT,SIZE} instead of opencoded numbers.
     * a more descriptive error message for attempting to write invalid indicies
       for hypercall pages.
    There is no behavioural change as a result.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit c4d3ccbfb50fa7603595b9bc16b1bba4647d21f1
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Oct 8 17:48:33 2013 +0100

    xen/x86: Remove GB macro in asm-x86/config.h
    Commit 983843e "xen: Add macros MB and GB" introduce a generic GB macro.
    By mistake, the macro in asm-x86/config.h was not removed. This is result to
    a compilation error when Xen is build for x86.
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    CC: Keir Fraser <keir@xxxxxxx>
    CC: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit d96e7b898136ff88ee5c8fac9e0ae8a695e37d9b
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Fri Sep 27 17:56:37 2013 +0100

    xen/dts: Support Linux initrd DT bindings
    Linux uses the property linux,initrd-start and linux,initrd-end to know 
    the initrd lives in memory.
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit e501dc9aa9100c5a6ffa21234f37d2f66403cc30
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Fri Sep 27 17:56:36 2013 +0100

    xen/arm: Add support to load initrd in dom0
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 14c616eca8630f11b24969e06cacfc945ebf3b12
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Fri Sep 27 17:56:35 2013 +0100

    xen/dts: Use ROUNDUP macro instead of the internal ALIGN
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 7ac2e731e94616fd156f16d86ddcf23beabcb1fc
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Fri Sep 27 17:56:34 2013 +0100

    xen: Add macro ROUNDUP
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    CC: Jan Beulich <jbeulich@xxxxxxxx>

commit 983843e7907ce75bdf97efa0b9f67db7b64e5765
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Fri Sep 27 17:56:33 2013 +0100

    xen: Add macros MB and GB
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    CC: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 081c4d400db24790b43ce344e6b5449b0800c253
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Oct 8 11:09:22 2013 +0200

    x86/HPET: basic cleanup
    * Strip trailing whitespace
    * Remove redundant definitions
    * Update stale documentation links
    * Move hpet_address into __initdata
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 1c240f1bfed56a459a9cde5100b12bfca4275f26
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Oct 8 11:06:48 2013 +0200

    VT-d: fix suspected data race condition in iommu_set_root_entry()
    Coverity ID: 1054967
    Coverity spotted that iommu->root_maddr was optionally allocated within the
    protection of the iommu->lock, but was referenced with the protection of the
    iommu->register_lock, and freed without any lock.
    Luckily, the code as-is is not vulnerable to the potential risks identified.
    However, the alloc_pgtable_maddr() is far more appropriately done in
    iommu_alloc(), removing a set of spinlock calls, and a possibility for the
    iommu setup to fail later than iommu_alloc() with an -ENOMEM.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Xiantao Zhang <xiantao.zhang@xxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.