[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.1-testing test] 6548: regressions - FAIL
flight 6548 xen-4.1-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/6548/ Regressions :-( Tests which did not succeed and are blocking: test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 6432 Tests which are failing intermittently (not blocking): test-amd64-i386-xl-credit2 9 guest-start fail pass in 6541 test-amd64-i386-xl 9 guest-start fail pass in 6541 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-amd64-xl-win 13 guest-stop fail never pass test-amd64-i386-rhel6hvm-amd 8 guest-saverestore fail never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass test-amd64-xcpkern-i386-rhel6hvm-amd 8 guest-saverestore fail never pass test-amd64-xcpkern-i386-rhel6hvm-intel 8 guest-saverestore fail never pass test-amd64-xcpkern-i386-win 16 leak-check/check fail never pass test-amd64-xcpkern-i386-xl-win 13 guest-stop fail never pass test-i386-i386-win 16 leak-check/check fail never pass test-i386-i386-xl-win 13 guest-stop fail never pass test-i386-xcpkern-i386-win 16 leak-check/check fail never pass version targeted for testing: xen 64644ab2c2e3 baseline version: xen d4352abf3450 ------------------------------------------------------------ People who touched revisions under test: Allen Kay <allen.m.kay@xxxxxxxxx> Gianni Tedesco <gianni.tedesco@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxxxx> Keir Fraser <keir@xxxxxxx> Tim Deegan <Tim.Deegan@xxxxxxxxxx> Wei Gang <gang.wei@xxxxxxxxx> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl fail test-i386-i386-xl pass test-amd64-xcpkern-i386-xl pass test-i386-xcpkern-i386-xl pass test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 fail test-amd64-xcpkern-i386-xl-credit2 pass test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu pass test-amd64-xcpkern-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-i386-i386-pair pass test-amd64-xcpkern-i386-pair pass test-i386-xcpkern-i386-pair pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-xcpkern-i386-pv pass test-i386-xcpkern-i386-pv pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win fail test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win fail test-amd64-amd64-xl-win fail test-i386-i386-xl-win fail test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 23002:64644ab2c2e3 tag: tip user: Keir Fraser <keir@xxxxxxx> date: Wed Mar 16 17:11:54 2011 +0000 Added signature for changeset 32203061c1f7 changeset: 23001:99431ce765ba user: Keir Fraser <keir@xxxxxxx> date: Wed Mar 16 17:11:38 2011 +0000 Added tag 4.1.0-rc7 for changeset 32203061c1f7 changeset: 23000:32203061c1f7 tag: 4.1.0-rc7 user: Keir Fraser <keir@xxxxxxx> date: Wed Mar 16 17:11:30 2011 +0000 Update Xen version to 4.1.0-rc7 changeset: 22999:01ac4fa9541e user: Allen M Kay <allen.m.kay@xxxxxxxxx> date: Wed Mar 16 17:08:27 2011 +0000 libxl: passthrough: avoid passing through devices not owned by pciback This patch makes sure the passthrough device belongs to pciback before allow them passthrough to the guest. There are still many other checks missing. xm terminates the guest startup process when this type of condition is found. This patch just allows the guest to continue to boot but with no device passthrough. Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx> Acked-by: Gianni Tedesco <gianni.tedesco@xxxxxxxxxx> Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> changeset: 22998:762155e9debd user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Tue Mar 15 13:55:40 2011 +0000 x86: run-time callers of map_pages_to_xen() must check for errors Again, (out-of-memory) errors must not cause hypervisor crashes, and hence ought to be propagated. This also adjusts the cache attribute changing loop in get_page_from_l1e() to not go through an unnecessary iteration. While this could be considered mere cleanup, it is actually a requirement for the subsequent now necessary error recovery path. Also make a few functions static, easing the check for potential callers needing adjustment. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> xen-unstable changeset: 22997:5f28dcea1355 xen-unstable date: Wed Mar 09 16:15:36 2011 +0000 x86: don't BUG() post-boot in alloc_xen_pagetable() Instead, propagate the condition to the caller, all of which also get adjusted to check for that situation. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> xen-unstable changeset: 22996:1eeccafe9042 xen-unstable date: Wed Mar 09 16:14:59 2011 +0000 changeset: 22997:cd4d0c5dfa27 user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Mon Mar 14 17:21:13 2011 +0000 _csched_cpu_pick(): don't return CPUs outside vCPU's affinity mask This fixes a fairly blatant bug I introduced in c/s 20377:cff23354d026 - I wonder how this went unnoticed for so long. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> xen-unstable changeset: 23039:c40da47621d8 xen-unstable date: Mon Mar 14 17:19:22 2011 +0000 changeset: 22996:6ac812f16e13 user: Gianni Tedesco <gianni.tedesco@xxxxxxxxxx> date: Mon Mar 14 17:14:16 2011 +0000 Allow tools to map arbitrarily large machphys_mfn_list on 32bit dom0 This permits suspend/resume to work with 32bit dom0/tools when system memory extends beyond 160GB (and up to 1TB). AFAICT the limit to MACH2PHYS_COMPAT_NR_ENTRIES is redundant since that refers to a limit in 32bit guest compat mappings under 64bit hypervisors, not userspace where there may be gigabytes of useful virtual space available for this. Suggested-by: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx> Signed-off-by: Gianni Tedesco <gianni.tedesco@xxxxxxxxxx> xen-unstable changeset: 23038:39f5947b1576 xen-unstable date: Mon Mar 14 17:13:15 2011 +0000 changeset: 22995:9175944daf48 user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Mon Mar 14 17:08:00 2011 +0000 x86: fix cpu_sibling_map initialization when topology CPUID leaf is present c/s 21811:12f0618400de broke this by not properly initializing struct cpuinfo_x86's x86_num_siblings member (other than Linux, where this is a global variable, it is being maintained per CPU by Xen). Hyper-threaded CPUs with CPUID leaf 0xb present had therefore all cpu_sibling_map-s with just a single bit set, thus improperly feeding the scheduler. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> xen-unstable changeset: 23037:a29b35408950 xen-unstable date: Mon Mar 14 17:05:21 2011 +0000 changeset: 22994:5dda35f1f32f user: Wei Gang <gang.wei@xxxxxxxxx> date: Mon Mar 14 17:07:29 2011 +0000 x86: add volatile prefix for cpuid asm clauses cpuid results are possible to be changed now. For example, changing CR4.OSXSAVE bit or setting MSR XCR_XFEATURE_ENABLED_MASK may change XSAVE related cpuid leave return values. The volatile prefix is required to avoid the second cpuid calls following some possible changing operations being optimized in incorrect way by compiler. The sample bug is in xsave_init while debug=3Dn. The second call to cpuid_count() may be optimized and lead to a BUG_ON case while compare xsave_cntxt_size with ebx. Signed-off-by: Wei Gang <gang.wei@xxxxxxxxx> xen-unstable changeset: 23036:9a15ff175e00 xen-unstable date: Mon Mar 14 17:04:42 2011 +0000 changeset: 22993:842aed720b84 user: Tim Deegan <Tim.Deegan@xxxxxxxxxx> date: Mon Mar 14 17:00:34 2011 +0000 x86_64: fix error checking in arch_set_info_guest() Cannot specify user mode execution without specifying user-mode pagetables. Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23034:c79aae866ad8 xen-unstable date: Mon Mar 14 16:59:49 2011 +0000 changeset: 22992:d4352abf3450 user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Sat Mar 12 13:25:44 2011 +0000 x86/HPET: fix initialization order At least the legacy path can enter its interrupt handler callout while initialization is still in progress - that handler checks whether ->event_handler is non-NULL, and hence all other initialization must happen before setting this field. Do the same to the MSI initialization just in case (and to keep the code in sync). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> Acked-by: Wei Gang <gang.wei@xxxxxxxxx> xen-unstable changeset: 23030:87aa1277eae0 xen-unstable date: Sat Mar 12 13:19:02 2011 +0000 (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |