This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-devel] [xen-4.0-testing test] 7088: trouble: blocked/broken/fail/pa

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [xen-4.0-testing test] 7088: trouble: blocked/broken/fail/pass
From: xen.org <ian.jackson@xxxxxxxxxxxxx>
Date: Tue, 17 May 2011 04:28:03 +0100
Cc: ian.jackson@xxxxxxxxxxxxx
Delivery-date: Mon, 16 May 2011 20:28:51 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
flight 7088 xen-4.0-testing real [real]

Failures and problems with tests :-(

Tests which did not succeed and are blocking:
 build-amd64-pvops             2 host-install(2)              broken
 build-i386                    2 host-install(2)              broken

Tests which are failing intermittently (not blocking):
 test-amd64-i386-pair          6 xen-install/dst_host         fail pass in 7085
 test-amd64-i386-pair          5 xen-install/src_host         fail pass in 7085
 test-amd64-i386-pv            4 xen-install                  fail pass in 7085
 test-amd64-i386-rhel6hvm-amd  4 xen-install                  fail pass in 7085
 test-amd64-i386-rhel6hvm-intel  4 xen-install                fail pass in 7085
 test-amd64-i386-win-vcpus1    4 xen-install                  fail pass in 7085
 test-amd64-i386-win           4 xen-install                  fail pass in 7085
 test-amd64-i386-xl-credit2    4 xen-install                  fail pass in 7085
 test-amd64-i386-xl-multivcpu  4 xen-install                  fail pass in 7085
 test-amd64-i386-xl-win-vcpus1  4 xen-install                 fail pass in 7085
 test-amd64-i386-xl            4 xen-install                  fail pass in 7085
 test-amd64-xcpkern-i386-pair  6 xen-install/dst_host         fail pass in 7085
 test-amd64-xcpkern-i386-pair  5 xen-install/src_host         fail pass in 7085
 test-amd64-xcpkern-i386-pv    4 xen-install                  fail pass in 7085
 test-amd64-xcpkern-i386-rhel6hvm-amd  4 xen-install          fail pass in 7085
 test-amd64-xcpkern-i386-rhel6hvm-intel  4 xen-install        fail pass in 7085
 test-amd64-xcpkern-i386-win   4 xen-install                  fail pass in 7085
 test-amd64-xcpkern-i386-xl-credit2  4 xen-install            fail pass in 7085
 test-amd64-xcpkern-i386-xl-multivcpu  4 xen-install          fail pass in 7085
 test-amd64-xcpkern-i386-xl-win  4 xen-install                fail pass in 7085
 test-amd64-xcpkern-i386-xl    4 xen-install                  fail pass in 7085

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-pair         1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pv           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-win          1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pair           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pv             1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win            1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-win         1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl             1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pair   1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pv     1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-win    1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-xl     1 xen-build-check(1)           blocked  n/a

version targeted for testing:
 xen                  26a4cedefec0
baseline version:
 xen                  b85a9e58ec3a

People who touched revisions under test:
  Allen Kay <allen.m.kay@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Igor Mammedov <imammedo@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>

 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   broken   
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           pass     
 build-amd64-pvops                                            broken   
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          blocked  
 test-amd64-i386-xl                                           fail     
 test-i386-i386-xl                                            blocked  
 test-amd64-xcpkern-i386-xl                                   fail     
 test-i386-xcpkern-i386-xl                                    blocked  
 test-amd64-i386-rhel6hvm-amd                                 fail     
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   fail     
 test-amd64-xcpkern-i386-xl-credit2                           fail     
 test-amd64-i386-rhel6hvm-intel                               fail     
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 fail     
 test-amd64-xcpkern-i386-xl-multivcpu                         fail     
 test-amd64-amd64-pair                                        blocked  
 test-amd64-i386-pair                                         fail     
 test-i386-i386-pair                                          blocked  
 test-amd64-xcpkern-i386-pair                                 fail     
 test-i386-xcpkern-i386-pair                                  blocked  
 test-amd64-amd64-pv                                          blocked  
 test-amd64-i386-pv                                           fail     
 test-i386-i386-pv                                            blocked  
 test-amd64-xcpkern-i386-pv                                   fail     
 test-i386-xcpkern-i386-pv                                    blocked  
 test-amd64-i386-win-vcpus1                                   fail     
 test-amd64-i386-xl-win-vcpus1                                fail     
 test-amd64-amd64-win                                         blocked  
 test-amd64-i386-win                                          fail     
 test-i386-i386-win                                           blocked  
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   blocked  
 test-amd64-amd64-xl-win                                      blocked  
 test-i386-i386-xl-win                                        blocked  
 test-amd64-xcpkern-i386-xl-win                               fail     

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

changeset:   21489:26a4cedefec0
tag:         tip
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Mon May 16 13:41:58 2011 +0100
    x86-64: remove left over uses of .got entries
    These were caused by some declarations happening before the compiler
    would have seen the visibility pragma.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23345:ba4bd20e581a
    xen-unstable date:        Mon May 16 13:32:37 2011 +0100
changeset:   21488:f9355c999a0f
user:        Igor Mammedov <imammedo@xxxxxxxxxx>
date:        Mon May 16 13:41:25 2011 +0100
    VT-d: Fix resource leaks on error paths
    On error exit from functions, maped pages should be unmapped
    and acquired locks released.
    Signed-off-by: Igor Mammedov <imammedo@xxxxxxxxxx>
    Acked-by: Allen Kay <allen.m.kay@xxxxxxxxx>
    xen-unstable changeset:   23343:edcf8fc77b64
    xen-unstable date:        Mon May 16 13:29:24 2011 +0100
changeset:   21487:0e31cda80a7b
user:        Keir Fraser <keir@xxxxxxx>
date:        Mon May 16 13:40:51 2011 +0100
    x86/tsc: Remove incorrect assertion from cstate_restore_tsc()...
    ..fix and move to write_tsc().
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23342:16d12acccacf
    xen-unstable date:        Mon May 16 13:24:05 2011 +0100
changeset:   21486:44eb0ea74022
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Mon May 16 13:39:51 2011 +0100
    x86/ioapic: avoid gcc 4.6 warnings about uninitialised variables
    gcc 4.6 complains:
            io_apic.c: In function 'restore_IO_APIC_setup':
            error: '*((void *)&entry+4)' may be used uninitialized in this
            function [-Werror=uninitialized]
            io_apic.c:221:32: note: '*((void *)&entry+4)' was declared
            error: 'entry' may be used uninitialized in this function
            io_apic.c:221:32: note: 'entry' was declared here
            cc1: all warnings being treated as errors
    Add functions to read/write an entire IO APIC entry using an explicit
    union to allow gcc to spot the initialisation.
    Reported as Debian bug #625438, thanks to Matthias Klose.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23341:87084ca76c9c
    xen-unstable date:        Mon May 16 13:13:41 2011 +0100
changeset:   21485:b85a9e58ec3a
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu May 12 18:07:45 2011 +0100
    x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted 
    In the absence of VT-d interrupt remapping support, a device can send
    arbitrary APIC messages to host CPUs. One class of attack that results
    is to confuse the hypervisor by delivering asynchronous interrupts to
    vectors that are expected to handle only synchronous
    We block this class of attack by:
    (1) setting APIC.TPR=0x10, to block all interrupts below vector
    0x20. This blocks delivery to all architectural exception vectors.
    (2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82
    (hypercall). In these cases we BUG if we detect we are handling a
    hardware interrupt -- turning a potentially more severe infiltration
    into a straightforward system crash (i.e, DoS).
    Thanks to Invisible Things Lab <http://www.invisiblethingslab.com>
    for discovery and detailed investigation of this attack.
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23337:cc91832a02c7
    xen-unstable date:        Thu May 12 16:39:31 2011 +0100
(qemu changes not included)

Xen-devel mailing list

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [xen-4.0-testing test] 7088: trouble: blocked/broken/fail/pass, xen . org <=