[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 14011: regressions - FAIL
flight 14011 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/14011/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemuu-rhel6hvm-amd 5 xen-boot fail REGR. vs. 13967 test-amd64-i386-xl-multivcpu 5 xen-boot fail REGR. vs. 13967 test-amd64-i386-rhel6hvm-amd 5 xen-boot fail REGR. vs. 13967 test-amd64-amd64-pv 5 xen-boot fail REGR. vs. 13967 test-amd64-i386-xl 5 xen-boot fail REGR. vs. 13967 test-amd64-i386-pv 5 xen-boot fail REGR. vs. 13967 test-amd64-i386-pair 8 xen-boot/dst_host fail REGR. vs. 13967 test-amd64-i386-pair 7 xen-boot/src_host fail REGR. vs. 13967 test-amd64-amd64-pair 8 xen-boot/dst_host fail REGR. vs. 13967 test-amd64-amd64-pair 7 xen-boot/src_host fail REGR. vs. 13967 test-amd64-amd64-xl 5 xen-boot fail REGR. vs. 13967 test-amd64-amd64-xl-win7-amd64 5 xen-boot fail REGR. vs. 13967 test-amd64-i386-xl-winxpsp3-vcpus1 5 xen-boot fail REGR. vs. 13967 build-amd64-oldkern 4 xen-build fail REGR. vs. 13967 test-amd64-i386-xl-credit2 5 xen-boot fail REGR. vs. 13967 test-amd64-amd64-xl-win 5 xen-boot fail REGR. vs. 13967 test-amd64-amd64-xl-qemuu-win7-amd64 5 xen-boot fail REGR. vs. 13967 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-sedf-pin 5 xen-boot fail REGR. vs. 13967 test-amd64-amd64-xl-sedf 5 xen-boot fail like 13967 test-amd64-amd64-xl-qemuu-winxpsp3 9 guest-localmigrate fail like 13967 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass version targeted for testing: xen 5c402b905e00 baseline version: xen c1c549c4fe9e ------------------------------------------------------------ People who touched revisions under test: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Huang Ying <ying.huang@xxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Keir Fraser <keir@xxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Tim Deegan <tim@xxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 pass build-amd64-oldkern fail build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl fail test-amd64-i386-xl fail test-amd64-i386-rhel6hvm-amd fail test-amd64-i386-qemuu-rhel6hvm-amd fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 fail test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu fail test-amd64-amd64-pair fail test-amd64-i386-pair fail test-amd64-amd64-xl-sedf-pin fail test-amd64-amd64-pv fail test-amd64-i386-pv fail test-amd64-amd64-xl-sedf fail test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-amd64-amd64-xl-win fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 26073:5c402b905e00 tag: tip user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Wed Oct 17 16:43:55 2012 +0100 arm: parameter guest handles are 32 bit on 32 bit hypervisor Handles within structs remain 64 bit such that they are consistently sized on both 32 and 64 bit. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26072:5529b91bd2e4 user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Wed Oct 17 16:43:54 2012 +0100 xen: remove XEN_GUEST_HANDLE(ulong) Having both this handle (always unsigned long) and XEN_GUEST_HANDLE(xen_ulong_t) (unsigned long on x86 and explicit size of ARM) is confusing and error prone. Replace the two remaining uses of the ulong handle, in grant set and x86 set_gdt hypercalls, with xen_ulong_t. This correctly sizes the grant frame entry as 64 bit on ARM but leaves it as unsigned long on x86 (therefore no intended change on x86). Likewise in set_gdt there is no actual change. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26071:2a1083b1d0c2 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Wed Oct 17 16:43:53 2012 +0100 xen: more XEN_GUEST_HANDLE_PARAM substitutions More substitutions in this patch, not as obvious as the ones in the previous patch. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26070:9eafdcd5ff0b user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Wed Oct 17 16:43:53 2012 +0100 xen: replace XEN_GUEST_HANDLE with XEN_GUEST_HANDLE_PARAM when appropriate Note: these changes don't make any difference on x86. Replace XEN_GUEST_HANDLE with XEN_GUEST_HANDLE_PARAM when it is used as an hypercall argument. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26069:1eb4b2f7465f user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Wed Oct 17 16:43:51 2012 +0100 xen: introduce XEN_GUEST_HANDLE_PARAM XEN_GUEST_HANDLE_PARAM is going to be used to distinguish guest pointers stored in memory from guest pointers as hypercall parameters. guest_handle_* macros default to XEN_GUEST_HANDLE_PARAM as return type. Two new guest_handle_to_param and guest_handle_from_param macros are introduced to do conversions. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26068:ed6c13501195 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Wed Oct 17 16:43:50 2012 +0100 xen: change the limit of nr_extents to UINT_MAX >> MEMOP_EXTENT_SHIFT Currently do_memory_op has a different maximum limit for nr_extents on 32 bit and 64 bit. Change the limit to UINT_MAX >> MEMOP_EXTENT_SHIFT, so that it is the same in both cases. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26067:a324eea3bbc8 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Wed Oct 17 16:43:49 2012 +0100 xen: xen_ulong_t substitution There is still an unwanted unsigned long in the xen public interface: replace it with xen_ulong_t. Also typedef xen_ulong_t to uint64_t on ARM. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26066:980863b9fa4b user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Wed Oct 17 16:43:48 2012 +0100 arm: tools: add arm to foreign structs checking Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26065:b146705d70b3 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Wed Oct 17 16:43:47 2012 +0100 xen/arm: grant table Implement XENMAPSPACE_grant_table and grant_table_op. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> [ ijc -- fixed reject in traps.c, grant table op is a 3 argument hypercall, rebased over "xen: arm: implement XENMEM_add_to_physmap_range" ] Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26064:bbe986018949 user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Wed Oct 17 16:43:46 2012 +0100 xen: arm: implement XENMEM_add_to_physmap_range This allows for foreign mappings as well as batching, fitting all that into XENMEM_add_to_physmap wasn't possible. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx> changeset: 26063:1f4be6ee4619 user: Jan Beulich <jbeulich@xxxxxxxx> date: Wed Oct 17 14:13:20 2012 +0200 x86/HPET: obtain proper lock for changing IRQ affinity The IRQ descriptor lock should be held while adjusting the affinity of any IRQ; the HPET channel lock isn't sufficient to protect namely against races with moving the IRQ to a different CPU. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> changeset: 26062:ec8a091efcce user: Huang Ying <ying.huang@xxxxxxxxx> date: Wed Oct 17 14:12:06 2012 +0200 ACPI/APEI: fix ERST MOVE_DATA instruction implementation The src_base and dst_base fields in apei_exec_context are physical address, so they should be ioremaped before being used in ERST MOVE_DATA instruction. Reported-by: Javier Martinez Canillas <martinez.javier@xxxxxxxxx> Reported-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Signed-off-by: Huang Ying <ying.huang@xxxxxxxxx> Replace use of ioremap() by __acpi_map_table()/set_fixmap(). Fix error handling. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Jan Beulich <jbeulich@xxxxxxxx> changeset: 26061:4b4c0c7a6031 user: Jan Beulich <jbeulich@xxxxxxxx> date: Wed Oct 17 11:23:10 2012 +0200 x86/oprof: adjust off-by-one counter range checks Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> changeset: 26060:4fc87c2f31a0 user: Huang Ying <ying.huang@xxxxxxxxx> date: Tue Oct 16 17:26:36 2012 +0200 ACPI: fix APEI related table size checking On Huang Ying's machine: erst_tab->header_length == sizeof(struct acpi_table_einj) but Yinghai reported that on his machine, erst_tab->header_length == sizeof(struct acpi_table_einj) - sizeof(struct acpi_table_header) To make erst table size checking code works on all systems, both testing are treated as PASS. Same situation applies to einj_tab->header_length, so corresponding table size checking is changed in similar way too. Originally-by: Yinghai Lu <yinghai@xxxxxxxxxx> Signed-off-by: Huang Ying <ying.huang@xxxxxxxxx> - use switch() for better readability - add comment explaining why a formally invalid size it also being accepted - check erst_tab->header.length before even looking at erst_tab->header_length - prefer sizeof(*erst_tab) over sizeof(struct acpi_table_erst) Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> Committed-by: Jan Beulich <jbeulich@xxxxxxxx> changeset: 26059:c1c549c4fe9e user: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> date: Mon Oct 15 16:51:44 2012 +0100 xen: Add versions of rcu_lock_*_domain without IS_PRIV These functions will be used to avoid duplication of IS_PRIV calls that will be introduced in XSM hooks. This also fixes a build error with XSM enabled introduced by 25925:d1c3375c3f11 which depends on this patch. Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |