[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 11558: regressions - FAIL



flight 11558 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/11558/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-rhel6hvm-intel  4 xen-install             fail REGR. vs. 11275
 test-amd64-i386-xl-multivcpu  4 xen-install               fail REGR. vs. 11275
 test-amd64-i386-pv            4 xen-install               fail REGR. vs. 11275
 test-amd64-i386-xl-credit2    4 xen-install               fail REGR. vs. 11275
 test-amd64-i386-rhel6hvm-amd  4 xen-install               fail REGR. vs. 11275
 test-amd64-i386-pair          6 xen-install/dst_host      fail REGR. vs. 11275
 test-amd64-i386-pair          5 xen-install/src_host      fail REGR. vs. 11275
 build-i386-oldkern            4 xen-build                 fail REGR. vs. 11275
 test-amd64-i386-xl            4 xen-install               fail REGR. vs. 11275
 build-i386                    4 xen-build                 fail REGR. vs. 11275
 test-amd64-i386-xend-winxpsp3  4 xen-install              fail REGR. vs. 11275
 test-amd64-i386-xl-win-vcpus1  4 xen-install              fail REGR. vs. 11275
 test-amd64-i386-win-vcpus1    4 xen-install               fail REGR. vs. 11275
 test-amd64-i386-win           4 xen-install               fail REGR. vs. 11275
 test-amd64-i386-xl-win7-amd64  4 xen-install              fail REGR. vs. 11275
 test-amd64-i386-xl-winxpsp3-vcpus1  4 xen-install         fail REGR. vs. 11275

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-win          7 windows-install              fail   like 11217

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-i386-i386-pv             1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl             1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pair           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-i386-i386-xl-win         1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win            1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-winxpsp3    1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass

version targeted for testing:
 xen                  137c16a83e40
baseline version:
 xen                  80fdf2182bc6

------------------------------------------------------------
People who touched revisions under test:
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Marcus Granado <marcus.granado@xxxxxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   fail    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           fail    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           fail    
 test-i386-i386-xl                                            blocked 
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   fail    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-i386-xl-multivcpu                                 fail    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         fail    
 test-i386-i386-pair                                          blocked 
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           fail    
 test-i386-i386-pv                                            blocked 
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           blocked 
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        blocked 
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   blocked 


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   24544:137c16a83e40
tag:         tip
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:42:12 2012 +0000
    
    libelf-loader: introduce elf_load_image
    
    Implement a new function, called elf_load_image, to perform the
    actually copy of the elf image and clearing the padding.  The function
    is implemented as memcpy and memset when the library is built as part
    of the tools, but it is implemented as raw_copy_to_guest and
    raw_clear_guest when built as part of Xen, so that it can be safely
    called with an HVM style dom0.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24543:d6cdbc4fe078
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:41:27 2012 +0000
    
    Introduce clear_user and clear_guest
    
    Introduce clear_user for x86 and ia64, shamelessly taken from Linux.
    The x86 version is the 32 bit clear_user implementation.  Introduce
    clear_guest for x86 and ia64. The x86 implementation is based on
    clear_user and a new clear_user_hvm function.  The ia64 implementation
    is actually in xencomm and it is based on xencomm_copy_to_guest.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Jan Beulich <JBeulich@xxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24542:37eefb79503c
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:40:35 2012 +0000
    
    xen: implement an signed 64 bit division helper function
    
    Implement a C function to perform 64 bit signed division and return
    both quotient and remainder.
    Useful as an helper function to implement __aeabi_ldivmod.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24541:96e071fbefd7
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:39:58 2012 +0000
    
    A collection of fixes to Xen common files
    
    - call free_xenoprof_pages only ifdef CONFIG_XENOPROF;
    - define PRI_stime as PRId64 in an header file;
    - respect boundaries in is_kernel_*;
    - implement is_kernel_rodata;
    - guest_physmap_add_page should be ((void)0).
    - fix guest_physmap_add_page;
    - introduce CONFIG_XENOPROF;
    - define _srodata and _erodata as const char*.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24540:ab0eab766edb
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:39:11 2012 +0000
    
    Include some header files that are not automatically included on all archs
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24539:95e07258d189
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:38:34 2012 +0000
    
    Move cpufreq option parsing to cpufreq.c
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24538:5bb22a6871f6
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:36:54 2012 +0000
    
    xenoprof: Make the escape code consistent across 32 and 64-bit xen
    
    At the moment, the xenoprof escape code is defined as "~0UL".
    Unfortunately, this expands to 0xffffffff on 32-bit systems
    and 0xffffffffffffffff on 64-bit systems; with the result that
    while 32-on-32 and 64-in-64 work fine, 32-on-64 (also known as
    "compat mode") is broken.
    
    This patch makes the definition consistent across architectures.
    In so doing, it will break old-32-bit-on-new-Xen, and vice versa;
    but this was seen as an acceptable thing to do.
    
    Signed-off-by: Marcus Granado <marcus.granado@xxxxxxxxxxxxx>
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24537:3c0a533d3af0
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:36:29 2012 +0000
    
    xenoprof: Handle 32-bit guest stacks properly in a 64-bit hypervisor
    
    The dump_guest_backtrace() function attempted to walk the stack
    based on the assumption that the guest and hypervisor pointer sizes
    were the same; thus any 32-bit guest running under 64-bit hypervisor
    would have unreliable results.
    
    In 64-bit mode, read the 32-bit stack frame properly.
    
    Signed-off-by: Marcus Granado <marcus.granado@xxxxxxxxxxxxx>
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24536:212cf37d50e1
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Mon Jan 23 09:36:01 2012 +0000
    
    xenoprof: Adjust indentation
    
    Bring indentation into Xen hypervisor standard coding style.
    
    No functional changes.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24535:fb81b807c154
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Mon Jan 23 09:35:17 2012 +0000
    
    x86/vMSI: miscellaneous fixes
    
    This addresses a number of problems in msixtbl_{read,write}():
    - address alignment was not checked, allowing for memory corruption in
      the hypervisor (write case) or returning of hypervisor private data
      to the guest (read case)
    - the interrupt mask bit was permitted to be written by the guest
      (while Xen's interrupt flow control routines need to control it)
    - MAX_MSIX_TABLE_{ENTRIES,PAGES} were pointlessly defined to plain
      numbers (making it unobvious why they have these values, and making
      the latter non-portable)
    - MAX_MSIX_TABLE_PAGES was also off by one (failing to account for a
      non-zero table offset); this was also affecting host MSI-X code
    - struct msixtbl_entry's table_flags[] was one element larger than
      necessary due to improper open-coding of BITS_TO_LONGS()
    - msixtbl_read() unconditionally accessed the physical table, even
      though the data was only needed in a quarter of all cases
    - various calculations were done unnecessarily for both of the rather
      distinct code paths in msixtbl_read()
    
    Additionally it is unclear on what basis MAX_MSIX_ACC_ENTRIES was
    chosen to be 3.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24534:eca719b621a1
user:        Keir Fraser <keir@xxxxxxx>
date:        Sun Jan 22 10:20:03 2012 +0000
    
    x86/hvm: No need to arch_set_info_guest() before restoring per-vcpu HVM 
state.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24533:80fdf2182bc6
user:        Keir Fraser <keir@xxxxxxx>
date:        Sat Jan 21 17:15:40 2012 +0000
    
    tools/libvchan: Beef up the CPU barriers in libvchan.
    
    Although they were sufficient for x86, they weren't safe more generally.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
========================================
commit bb36d632e4cabf47882adff07a45c6702c4a5b30
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jan 5 17:16:46 2012 +0000

    qemu-xen: adjust MSI-X related log messages
    
    Several of these messages we coded using line continuation within a
    string literal. This is generally not recommended and also lead to odd
    sequences of many blanks in the middle of the messages.
    
    The message indicating a discarded write due to MSI-X already being
    enabled doesn't need to be issued when a write doesn't actually modify
    the current value. Adjust the surrounding logic accordingly, and
    eliminate some redundancy as well as the sometimes unnecessary access
    to the physical MSI-X table.
    
    Finally, adjust the wording of a few messages to be more precise and/or
    more useful.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.