[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 18304: regressions - trouble: broken/fail/pass
flight 18304 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/18304/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf 4 xen-build fail REGR. vs. 18260 Tests which are failing intermittently (not blocking): test-amd64-i386-qemuu-rhel6hvm-intel 7 redhat-install fail pass in 18290 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 3 host-install(3) broken pass in 18290 test-amd64-i386-qemut-rhel6hvm-intel 7 redhat-install fail in 18290 pass in 18304 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail in 18290 never pass version targeted for testing: xen 4867685f7916bb594a67f2f64a28bbf5ecb4949c baseline version: xen 9eabb0735400e2b6059dfa3f0b47a426f61f570a ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Ben Guthro <benjamin.guthro@xxxxxxxxxx> Chen Baozi <baozich@xxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> James Bulpin <james.bulpin@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxxxxx> Keir Fraser <keir.xen@xxxxxxxxx> Keir Fraser <keir@xxxxxxx Keir Fraser <keir@xxxxxxx> Marek Marczykowski <marmarek@xxxxxxxxxxxxxxxxxxxxxx> Samuel Thibault <samuel.thibault@xxxxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf fail build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 broken test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-i386-xend-qemut-winxpsp3 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 4867685f7916bb594a67f2f64a28bbf5ecb4949c Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Jul 8 13:20:20 2013 +0200 Revert "hvmloader: always include HPET table" This reverts commit e4fd0475a08fda414da27c4e57b568f147cfc07e. Conflicts: tools/firmware/hvmloader/acpi/build.c Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir.xen@xxxxxxxxx> commit 642e4f331599b42492abd9fc9450373aab02dfb6 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Jul 8 13:16:29 2013 +0200 Revert "/home/jbeulich/tmp/commit.txt" This reverts commit 80e3eddcc4896ab40c24506fd05f9795c4039b48. commit 80e3eddcc4896ab40c24506fd05f9795c4039b48 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Jul 8 13:15:10 2013 +0200 /home/jbeulich/tmp/commit.txt commit 8960761b1c0958f73bb9a4a23daa1bfad46af40e Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Mon Jul 8 11:04:27 2013 +0200 netif.h: fix typo, BLKIF -> NETIF Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 767423f20561f45795c61ef66b7526f9a567335e Author: James Bulpin <James.Bulpin@xxxxxxxxxxxxx> Date: Wed Jul 3 17:52:09 2013 +0000 docs: record reservations of device IDs under the Xen vendor ID This patch introduces a documentation file to record reservations of ranges of PCI device IDs within the Xen vendor ID 0x5853. Signed-off-by: James Bulpin <james.bulpin@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit b9fa02b9011f8baf753e1539c921804a32b228a8 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Mon Jun 17 14:47:13 2013 +0100 xen/arm32: implement VFP context switch Add support for VFP context switch on arm32 and a dummy support for arm64 Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit acd7c3f1bb2bf8ce67bb21737f566806a10e9630 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Mon Jun 17 14:47:12 2013 +0100 xen/arm: don't enable VFP on XEN during the boot We can safely remove VFP support in XEN because: - the guest will enable VFP support when a process requires it - XEN doesn't use VFP Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 2548700af698867a303e90115a1fa8aa74be5945 Author: Chen Baozi <baozich@xxxxxxxxx> Date: Thu May 9 16:31:01 2013 +0800 mini-os: eliminate duplicated definition of spin_unlock_wait Signed-off-by: Chen Baozi <baozich@xxxxxxxxx> Acked-by: Samuel Thibault <samuel.thibault@xxxxxxxxxxxx> commit af5102b81fd036976e785aa29dece8c3d2dd6577 Author: Marek Marczykowski <marmarek@xxxxxxxxxxxxxxxxxxxxxx> Date: Wed May 8 05:47:53 2013 +0200 libxl: do not call exit() in libxl_device_vtpm_list Signal error with NULL return value, do not terminate the whole process. Signed-off-by: Marek Marczykowski <marmarek@xxxxxxxxxxxxxxxxxxxxxx> Reviewed-by: Jim Fehlig <jfehlig@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit d3a55d7d9bb518efe08143d050deff9f4ee80ec1 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Jul 4 10:33:18 2013 +0200 x86/mm: Ensure useful progress in alloc_l2_table() While debugging the issue which turned out to be XSA-58, a printk in this loop showed that it was quite easy to never make useful progress, because of consistently failing the preemption check. One single l2 entry is a reasonable amount of work to do, even if an action is pending, and also assures forwards progress across repeat continuations. Tweak the continuation criteria to fail on the first iteration of the loop. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit b12649ce9e7a162dae386d32bd04c5fdc537d65c Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Thu Jul 4 10:32:44 2013 +0200 use SMP barrier in common code dealing with shared memory protocols Xen currently makes no strong distinction between the SMP barriers (smp_mb etc) and the regular barrier (mb etc). In Linux, where we inherited these names from having imported Linux code which uses them, the SMP barriers are intended to be sufficient for implementing shared-memory protocols between processors in an SMP system while the standard barriers are useful for MMIO etc. On x86 with the stronger ordering model there is not much practical difference here but ARM has weaker barriers available which are suitable for use as SMP barriers. Therefore ensure that common code uses the SMP barriers when that is all which is required. On both ARM and x86 both types of barrier are currently identical so there is no actual change. A future patch will change smp_mb to a weaker barrier on ARM. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit b0581b9214d2359207f836f4f075e978527b9a7b Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 4 10:27:39 2013 +0200 x86: make map_domain_page_global() a simple wrapper around vmap() This is in order to reduce the number of fundamental mapping mechanisms as well as to reduce the amount of code to be maintained. In the course of this the virtual space available to vmap() is being grown from 16Gb to 64Gb. Note that this requires callers of unmap_domain_page_global() to no longer pass misaligned pointers - map_domain_page_global() returns page size aligned pointers, so unmappinmg should be done accordingly. unmap_vcpu_info() violated this and is being adjusted here. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit d8a7694e5a415ac0a871f0ae58f50876ad30d619 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 4 10:26:24 2013 +0200 bitmap_*() should cope with zero size bitmaps ... to match expectations set by memset()/memcpy(). Similarly for find_{first,next}_{,zero_}_bit() on x86. __bitmap_shift_{left,right}() would also need fixing (they more generally can't cope with the shift count being larger than the bitmap size, and they perform undefined operations by possibly shifting an unsigned long value by BITS_PER_LONG bits), but since these functions aren't really used anywhere I wonder if we wouldn't better simply get rid of them. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit 966e77e9d6855274954d2d38eca2393121da477d Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 4 10:25:31 2013 +0200 x86: drop MAX_VECTOR definition .. in favor of NR_VECTORS, as being redundant and as the latter is correct in terms of its naming, while the former is off by one. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit da72c56322c012f67aad79ca6093a5f21a0a3395 Author: Ben Guthro <benjamin.guthro@xxxxxxxxxx> Date: Thu Jul 4 10:23:36 2013 +0200 x86: Restore reboot quirks by DMI, fix reboot on a number of systems The following patch ports the functionality following changeset from Linux (from 2008) to xen: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=14d7ca5c It implements an additional reboot quirk to do a PCI reset via port CF9. This also restores some code dropped in the x86_32 target removal (changeset 5d1181a5ea5e0f11d481a94b16ed00d883f9726e) which sets some quirks based on DMI matching. This will add reboot quirks on the following systems that are known to be necessary on Linux: Dell E520 Dell PowerEdge 1300 Dell PowerEdge 300 Dell OptiPlex 745 Dell OptiPlex 745 Dell OptiPlex 745 Dell OptiPlex 330 Dell OptiPlex 360 Dell OptiPlex 760 Dell PowerEdge 2400 Dell Precision T5400 Dell Precision T7400 HP Compaq Laptop Dell XPS710 Dell DXP061 Sony VGN-Z540N ASUS P4S800 Acer Aspire One A110 Apple MacBook5 Apple MacBookPro5 Apple Macmini3,1 Apple iMac9,1 Dell Latitude E6320 Dell Latitude E5420 Dell Latitude E6220 Dell Latitude E6420 Dell OptiPlex 990 Dell OptiPlex 990 Dell Latitude E6520 Dell OptiPlex 790 Dell OptiPlex 990 Dell OptiPlex 390 Dell Latitude E6320 Dell Latitude E6420 Dell Latitude E6520 I clearly have not been able to test on all of these systems. It does fix rebooting on the Dell 790, and should *not* change the reboot paths of systems not on this DMI match list. Signed-off-by: Ben Guthro <benjamin.guthro@xxxxxxxxxx> Use driver_data, thus requiring only a single handler function. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx Acked-by: Ben Guthro <benjamin.guthro@xxxxxxxxxx> commit f487767ad0e58acb6c1ed3cc56daa0fb71b1f23a Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Jul 2 21:02:33 2013 +0100 docs: Pull Xen version from canonical location rather than hard coding it and being wrong every time we branch for a release. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |