[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 7111: regressions - FAIL
flight 7111 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/7111/ Regressions :-( Tests which did not succeed and are blocking: test-i386-i386-win 7 windows-install fail REGR. vs. 7084 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-amd64-xl-win 13 guest-stop fail never pass test-amd64-i386-rhel6hvm-amd 8 guest-saverestore fail never pass test-amd64-i386-rhel6hvm-intel 8 guest-saverestore fail never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass test-amd64-xcpkern-i386-rhel6hvm-amd 8 guest-saverestore fail never pass test-amd64-xcpkern-i386-rhel6hvm-intel 8 guest-saverestore fail never pass test-amd64-xcpkern-i386-win 16 leak-check/check fail never pass test-amd64-xcpkern-i386-xl-win 13 guest-stop fail never pass test-i386-i386-xl-win 13 guest-stop fail never pass test-i386-xcpkern-i386-win 16 leak-check/check fail never pass version targeted for testing: xen f531ed84b066 baseline version: xen f9bb0bbea7c2 ------------------------------------------------------------ People who touched revisions under test: Allen Kay <allen.m.kay@xxxxxxxxx> Christoph Egger <Christoph.Egger@xxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Igor Mammedov <imammedo@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxxxx> Keir Fraser <keir@xxxxxxx> Liu, Jinsong <jinsong.liu@xxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Tim Deegan <Tim.Deegan@xxxxxxxxxx> Zhou Peng <zhoupeng@xxxxxxxxxxxxxxx> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl pass test-i386-i386-xl pass test-amd64-xcpkern-i386-xl pass test-i386-xcpkern-i386-xl pass test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 pass test-amd64-xcpkern-i386-xl-credit2 pass test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu pass test-amd64-xcpkern-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-i386-i386-pair pass test-amd64-xcpkern-i386-pair pass test-i386-xcpkern-i386-pair pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-xcpkern-i386-pv pass test-i386-xcpkern-i386-pv pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win fail test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win fail test-amd64-amd64-xl-win fail test-i386-i386-xl-win fail test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 23350:f531ed84b066 tag: tip user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Tue May 17 17:32:19 2011 +0100 tools: xl: add option to run in foreground but still monitor for reboot etc Split daemonization option out from monitoring a domain for reboot etc. The 'e' option continues to disable both and a new 'F'(oreground) option disables only daemonization. When I'm debugging xl in the foreground this is often the behaviour I would like. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> changeset: 23349:c152b707f876 user: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> date: Tue May 17 17:28:12 2011 +0100 libxl: Fix apic/acpi confusion "apic" was written a couple of times where "acpi" was meant. Signed-off-by: Zhou Peng <zhoupeng@xxxxxxxxxxxxxxx> Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Acked-by: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> changeset: 23348:3e8e1800d472 user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Tue May 17 13:55:45 2011 +0100 x86: further adjustments to arch_set_info_guest() after c/s 23142:f5e8d152a565 The adjustments to v->arch.user_regs.eflags and the initialization of the int80 direct trap must be done earlier (namely before the function may bail because of inconsistencies between input and stored state on an already initialised vCPU) so that stored state is consistent, and for arch_get_info_guest() to not have its eflags related BUG_ON() triggered. Further, v->arch.pv_vcpu.ctrlreg[] indices 3 and 1 aren't being kept up to date while the domain is running, so consistency checks must instead be done against v->arch.guest_table{,_user}. Additionally, for 64-bit pv domains, CR1 must also be checked to be consistent with the kernel mode setting for the vCPU, and the whole CR1 checking should not be done for 32-bit pv domains. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> changeset: 23347:e5757cc64c8f user: Tim Deegan <Tim.Deegan@xxxxxxxxxx> date: Mon May 16 13:34:25 2011 +0100 Build target to wrap dist/install in a .deb archive. Adds "make deb", which does a "make dist" build and wraps the resulting dist/install files in dist/xen-<version>.deb This is _not_ a "packaged" version of Xen for Debian users, nor is it intended to compete with anyone else's packaging efforts. In particular it doesn't do any of the boot-time or fstab fixups needed to actually start the xen tools. It's just a quick hack for developers to be able to quickly install and uninstall a Xen build on a test box. Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> changeset: 23346:792928bd905a user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Mon May 16 13:33:10 2011 +0100 amd-iommu: two more __init annotations Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> changeset: 23345:ba4bd20e581a user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Mon May 16 13:32:37 2011 +0100 x86-64: remove left over uses of .got entries These were caused by some declarations happening before the compiler would have seen the visibility pragma. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> changeset: 23344:776b0c3e6544 user: Christoph Egger <Christoph.Egger@xxxxxxx> date: Mon May 16 13:31:42 2011 +0100 nestedsvm: fix fpu context switch Two different vmcb's are used to run l1 guest and l2 guest. When host xen switches physical FPU to a different cpu while l1 or l2 guest is running we need to sync CR0.TS bit in the other vmcb. Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx> Reviewed-by: Uwe Dannowski <Uwe.Dannowski@xxxxxxx> Reviewed-by: Wei Huang <Wei.Huang2@xxxxxxx> changeset: 23343:edcf8fc77b64 user: Igor Mammedov <imammedo@xxxxxxxxxx> date: Mon May 16 13:29:24 2011 +0100 VT-d: Fix resource leaks on error paths On error exit from functions, maped pages should be unmapped and acquired locks released. Signed-off-by: Igor Mammedov <imammedo@xxxxxxxxxx> Acked-by: Allen Kay <allen.m.kay@xxxxxxxxx> changeset: 23342:16d12acccacf user: Keir Fraser <keir@xxxxxxx> date: Mon May 16 13:24:05 2011 +0100 x86/tsc: Remove incorrect assertion from cstate_restore_tsc()... ..fix and move to write_tsc(). Signed-off-by: Keir Fraser <keir@xxxxxxx> changeset: 23341:87084ca76c9c user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Mon May 16 13:13:41 2011 +0100 x86/ioapic: avoid gcc 4.6 warnings about uninitialised variables gcc 4.6 complains: io_apic.c: In function 'restore_IO_APIC_setup': /build/user-xen_4.1.0-3-amd64-zSon7K/xen-4.1.0/debian/build/build-hypervisor_amd64_amd64/xen/include/asm/io_apic.h:150:26: error: '*((void *)&entry+4)' may be used uninitialized in this function [-Werror=uninitialized] io_apic.c:221:32: note: '*((void *)&entry+4)' was declared here /build/user-xen_4.1.0-3-amd64-zSon7K/xen-4.1.0/debian/build/build-hypervisor_amd64_amd64/xen/include/asm/io_apic.h:150:26: error: 'entry' may be used uninitialized in this function [-Werror=uninitialized] io_apic.c:221:32: note: 'entry' was declared here cc1: all warnings being treated as errors Add functions to read/write an entire IO APIC entry using an explicit union to allow gcc to spot the initialisation. Reported as Debian bug #625438, thanks to Matthias Klose. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxxxx> changeset: 23340:216c2efeb246 user: Liu, Jinsong <jinsong.liu@xxxxxxxxx> date: Mon May 16 13:12:03 2011 +0100 x86/mca: simplify mce action, and some update of mem err handler for future SRAR extension This patch simplify mce_action(). Basically the 2 set of mce status flags MCA_... and MCER_... are highly functional similar. This patch remove the redundant middle-level flag MCA_..., and its related data structure and function, so that mce_action() logic is more clean and simpler. This patch also update mem err handler. intel_memerr_dhandler() will be commonly used by SRAO and SRAR, so for the extension of future SRAR case, this patch remove the default fail flag from intel_memerr_dhandler() outside to SRAO/SRAR level, since only SRAO/SRAR handler itself has the knowledge of how to handle the failure when mem err handler fail. Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx> changeset: 23339:f9bb0bbea7c2 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Thu May 12 16:42:54 2011 +0100 x86: Check for valid pirq values in hvm_domain_use_pirq Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |