[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 11558: regressions - FAIL
flight 11558 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/11558/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rhel6hvm-intel 4 xen-install fail REGR. vs. 11275 test-amd64-i386-xl-multivcpu 4 xen-install fail REGR. vs. 11275 test-amd64-i386-pv 4 xen-install fail REGR. vs. 11275 test-amd64-i386-xl-credit2 4 xen-install fail REGR. vs. 11275 test-amd64-i386-rhel6hvm-amd 4 xen-install fail REGR. vs. 11275 test-amd64-i386-pair 6 xen-install/dst_host fail REGR. vs. 11275 test-amd64-i386-pair 5 xen-install/src_host fail REGR. vs. 11275 build-i386-oldkern 4 xen-build fail REGR. vs. 11275 test-amd64-i386-xl 4 xen-install fail REGR. vs. 11275 build-i386 4 xen-build fail REGR. vs. 11275 test-amd64-i386-xend-winxpsp3 4 xen-install fail REGR. vs. 11275 test-amd64-i386-xl-win-vcpus1 4 xen-install fail REGR. vs. 11275 test-amd64-i386-win-vcpus1 4 xen-install fail REGR. vs. 11275 test-amd64-i386-win 4 xen-install fail REGR. vs. 11275 test-amd64-i386-xl-win7-amd64 4 xen-install fail REGR. vs. 11275 test-amd64-i386-xl-winxpsp3-vcpus1 4 xen-install fail REGR. vs. 11275 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-win 7 windows-install fail like 11217 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-i386-i386-pv 1 xen-build-check(1) blocked n/a test-i386-i386-xl 1 xen-build-check(1) blocked n/a test-i386-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win 13 guest-stop fail never pass test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a test-i386-i386-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass version targeted for testing: xen 137c16a83e40 baseline version: xen 80fdf2182bc6 ------------------------------------------------------------ People who touched revisions under test: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Keir Fraser <keir@xxxxxxx> Marcus Granado <marcus.granado@xxxxxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Tim Deegan <Tim.Deegan@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 fail build-amd64-oldkern pass build-i386-oldkern fail build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl fail test-i386-i386-xl blocked test-amd64-i386-rhel6hvm-amd fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 fail test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu fail test-amd64-amd64-pair pass test-amd64-i386-pair fail test-i386-i386-pair blocked test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv fail test-i386-i386-pv blocked test-amd64-amd64-xl-sedf pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win blocked test-amd64-amd64-xl-win fail test-i386-i386-xl-win blocked test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail test-i386-i386-xl-winxpsp3 blocked ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 24544:137c16a83e40 tag: tip user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Mon Jan 23 09:42:12 2012 +0000 libelf-loader: introduce elf_load_image Implement a new function, called elf_load_image, to perform the actually copy of the elf image and clearing the padding. The function is implemented as memcpy and memset when the library is built as part of the tools, but it is implemented as raw_copy_to_guest and raw_clear_guest when built as part of Xen, so that it can be safely called with an HVM style dom0. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24543:d6cdbc4fe078 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Mon Jan 23 09:41:27 2012 +0000 Introduce clear_user and clear_guest Introduce clear_user for x86 and ia64, shamelessly taken from Linux. The x86 version is the 32 bit clear_user implementation. Introduce clear_guest for x86 and ia64. The x86 implementation is based on clear_user and a new clear_user_hvm function. The ia64 implementation is actually in xencomm and it is based on xencomm_copy_to_guest. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Jan Beulich <JBeulich@xxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24542:37eefb79503c user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Mon Jan 23 09:40:35 2012 +0000 xen: implement an signed 64 bit division helper function Implement a C function to perform 64 bit signed division and return both quotient and remainder. Useful as an helper function to implement __aeabi_ldivmod. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24541:96e071fbefd7 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Mon Jan 23 09:39:58 2012 +0000 A collection of fixes to Xen common files - call free_xenoprof_pages only ifdef CONFIG_XENOPROF; - define PRI_stime as PRId64 in an header file; - respect boundaries in is_kernel_*; - implement is_kernel_rodata; - guest_physmap_add_page should be ((void)0). - fix guest_physmap_add_page; - introduce CONFIG_XENOPROF; - define _srodata and _erodata as const char*. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24540:ab0eab766edb user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Mon Jan 23 09:39:11 2012 +0000 Include some header files that are not automatically included on all archs Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24539:95e07258d189 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Mon Jan 23 09:38:34 2012 +0000 Move cpufreq option parsing to cpufreq.c Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24538:5bb22a6871f6 user: George Dunlap <george.dunlap@xxxxxxxxxxxxx> date: Mon Jan 23 09:36:54 2012 +0000 xenoprof: Make the escape code consistent across 32 and 64-bit xen At the moment, the xenoprof escape code is defined as "~0UL". Unfortunately, this expands to 0xffffffff on 32-bit systems and 0xffffffffffffffff on 64-bit systems; with the result that while 32-on-32 and 64-in-64 work fine, 32-on-64 (also known as "compat mode") is broken. This patch makes the definition consistent across architectures. In so doing, it will break old-32-bit-on-new-Xen, and vice versa; but this was seen as an acceptable thing to do. Signed-off-by: Marcus Granado <marcus.granado@xxxxxxxxxxxxx> Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24537:3c0a533d3af0 user: George Dunlap <george.dunlap@xxxxxxxxxxxxx> date: Mon Jan 23 09:36:29 2012 +0000 xenoprof: Handle 32-bit guest stacks properly in a 64-bit hypervisor The dump_guest_backtrace() function attempted to walk the stack based on the assumption that the guest and hypervisor pointer sizes were the same; thus any 32-bit guest running under 64-bit hypervisor would have unreliable results. In 64-bit mode, read the 32-bit stack frame properly. Signed-off-by: Marcus Granado <marcus.granado@xxxxxxxxxxxxx> Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24536:212cf37d50e1 user: George Dunlap <george.dunlap@xxxxxxxxxxxxx> date: Mon Jan 23 09:36:01 2012 +0000 xenoprof: Adjust indentation Bring indentation into Xen hypervisor standard coding style. No functional changes. Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24535:fb81b807c154 user: Jan Beulich <jbeulich@xxxxxxxx> date: Mon Jan 23 09:35:17 2012 +0000 x86/vMSI: miscellaneous fixes This addresses a number of problems in msixtbl_{read,write}(): - address alignment was not checked, allowing for memory corruption in the hypervisor (write case) or returning of hypervisor private data to the guest (read case) - the interrupt mask bit was permitted to be written by the guest (while Xen's interrupt flow control routines need to control it) - MAX_MSIX_TABLE_{ENTRIES,PAGES} were pointlessly defined to plain numbers (making it unobvious why they have these values, and making the latter non-portable) - MAX_MSIX_TABLE_PAGES was also off by one (failing to account for a non-zero table offset); this was also affecting host MSI-X code - struct msixtbl_entry's table_flags[] was one element larger than necessary due to improper open-coding of BITS_TO_LONGS() - msixtbl_read() unconditionally accessed the physical table, even though the data was only needed in a quarter of all cases - various calculations were done unnecessarily for both of the rather distinct code paths in msixtbl_read() Additionally it is unclear on what basis MAX_MSIX_ACC_ENTRIES was chosen to be 3. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> changeset: 24534:eca719b621a1 user: Keir Fraser <keir@xxxxxxx> date: Sun Jan 22 10:20:03 2012 +0000 x86/hvm: No need to arch_set_info_guest() before restoring per-vcpu HVM state. Signed-off-by: Keir Fraser <keir@xxxxxxx> changeset: 24533:80fdf2182bc6 user: Keir Fraser <keir@xxxxxxx> date: Sat Jan 21 17:15:40 2012 +0000 tools/libvchan: Beef up the CPU barriers in libvchan. Although they were sufficient for x86, they weren't safe more generally. Signed-off-by: Keir Fraser <keir@xxxxxxx> ======================================== commit bb36d632e4cabf47882adff07a45c6702c4a5b30 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jan 5 17:16:46 2012 +0000 qemu-xen: adjust MSI-X related log messages Several of these messages we coded using line continuation within a string literal. This is generally not recommended and also lead to odd sequences of many blanks in the middle of the messages. The message indicating a discarded write due to MSI-X already being enabled doesn't need to be issued when a write doesn't actually modify the current value. Adjust the surrounding logic accordingly, and eliminate some redundancy as well as the sometimes unnecessary access to the physical MSI-X table. Finally, adjust the wording of a few messages to be more precise and/or more useful. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |