[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.1-testing test] 6541: regressions - FAIL



flight 6541 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/6541/

Regressions :-(

Tests which did not succeed and are blocking:
 test-amd64-i386-rhel6hvm-intel  7 redhat-install           fail REGR. vs. 6432
 test-amd64-i386-win           7 windows-install            fail REGR. vs. 6432

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-rhel6hvm-amd  8 guest-saverestore            fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-xcpkern-i386-rhel6hvm-amd  8 guest-saverestore      fail never pass
 test-amd64-xcpkern-i386-rhel6hvm-intel  8 guest-saverestore    fail never pass
 test-amd64-xcpkern-i386-win  16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-xl-credit2 11 guest-localmigrate        fail like 6412
 test-amd64-xcpkern-i386-xl-win 13 guest-stop                   fail never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-i386-xcpkern-i386-win   16 leak-check/check             fail   never pass

version targeted for testing:
 xen                  64644ab2c2e3
baseline version:
 xen                  d4352abf3450

------------------------------------------------------------
People who touched revisions under test:
  Allen Kay <allen.m.kay@xxxxxxxxx>
  Gianni Tedesco <gianni.tedesco@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Wei Gang <gang.wei@xxxxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   pass     
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           pass     
 build-amd64-pvops                                            pass     
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          pass     
 test-amd64-i386-xl                                           pass     
 test-i386-i386-xl                                            pass     
 test-amd64-xcpkern-i386-xl                                   pass     
 test-i386-xcpkern-i386-xl                                    pass     
 test-amd64-i386-rhel6hvm-amd                                 fail     
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   pass     
 test-amd64-xcpkern-i386-xl-credit2                           fail     
 test-amd64-i386-rhel6hvm-intel                               fail     
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 pass     
 test-amd64-xcpkern-i386-xl-multivcpu                         pass     
 test-amd64-amd64-pair                                        pass     
 test-amd64-i386-pair                                         pass     
 test-i386-i386-pair                                          pass     
 test-amd64-xcpkern-i386-pair                                 pass     
 test-i386-xcpkern-i386-pair                                  pass     
 test-amd64-amd64-pv                                          pass     
 test-amd64-i386-pv                                           pass     
 test-i386-i386-pv                                            pass     
 test-amd64-xcpkern-i386-pv                                   pass     
 test-i386-xcpkern-i386-pv                                    pass     
 test-amd64-i386-win-vcpus1                                   fail     
 test-amd64-i386-xl-win-vcpus1                                fail     
 test-amd64-amd64-win                                         fail     
 test-amd64-i386-win                                          fail     
 test-i386-i386-win                                           fail     
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   fail     
 test-amd64-amd64-xl-win                                      fail     
 test-i386-i386-xl-win                                        fail     
 test-amd64-xcpkern-i386-xl-win                               fail     


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23002:64644ab2c2e3
tag:         tip
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Mar 16 17:11:54 2011 +0000
    
    Added signature for changeset 32203061c1f7
    
    
changeset:   23001:99431ce765ba
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Mar 16 17:11:38 2011 +0000
    
    Added tag 4.1.0-rc7 for changeset 32203061c1f7
    
    
changeset:   23000:32203061c1f7
tag:         4.1.0-rc7
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Mar 16 17:11:30 2011 +0000
    
    Update Xen version to 4.1.0-rc7
    
    
changeset:   22999:01ac4fa9541e
user:        Allen M Kay <allen.m.kay@xxxxxxxxx>
date:        Wed Mar 16 17:08:27 2011 +0000
    
    libxl: passthrough: avoid passing through devices not owned by pciback
    
    This patch makes sure the passthrough device belongs to pciback before
    allow them passthrough to the guest.  There are still many other
    checks missing.
    
    xm terminates the guest startup process when this type of condition is
    found.  This patch just allows the guest to continue to boot but with
    no device passthrough.
    
    Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>
    Acked-by: Gianni Tedesco <gianni.tedesco@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   22998:762155e9debd
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Tue Mar 15 13:55:40 2011 +0000
    
    x86: run-time callers of map_pages_to_xen() must check for errors
    
    Again, (out-of-memory) errors must not cause hypervisor crashes, and
    hence ought to be propagated.
    
    This also adjusts the cache attribute changing loop in
    get_page_from_l1e() to not go through an unnecessary iteration. While
    this could be considered mere cleanup, it is actually a requirement
    for the subsequent now necessary error recovery path.
    
    Also make a few functions static, easing the check for potential
    callers needing adjustment.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   22997:5f28dcea1355
    xen-unstable date:        Wed Mar 09 16:15:36 2011 +0000
    
    
    x86: don't BUG() post-boot in alloc_xen_pagetable()
    
    Instead, propagate the condition to the caller, all of which also get
    adjusted to check for that situation.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   22996:1eeccafe9042
    xen-unstable date:        Wed Mar 09 16:14:59 2011 +0000
    
    
changeset:   22997:cd4d0c5dfa27
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Mon Mar 14 17:21:13 2011 +0000
    
    _csched_cpu_pick(): don't return CPUs outside vCPU's affinity mask
    
    This fixes a fairly blatant bug I introduced in c/s 20377:cff23354d026
    - I wonder how this went unnoticed for so long.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23039:c40da47621d8
    xen-unstable date:        Mon Mar 14 17:19:22 2011 +0000
    
    
changeset:   22996:6ac812f16e13
user:        Gianni Tedesco <gianni.tedesco@xxxxxxxxxx>
date:        Mon Mar 14 17:14:16 2011 +0000
    
    Allow tools to map arbitrarily large machphys_mfn_list on 32bit dom0
    
    This permits suspend/resume to work with 32bit dom0/tools when system
    memory extends beyond 160GB (and up to 1TB).
    
    AFAICT the limit to MACH2PHYS_COMPAT_NR_ENTRIES is redundant since
    that refers to a limit in 32bit guest compat mappings under 64bit
    hypervisors, not userspace where there may be gigabytes of useful
    virtual space available for this.
    
    Suggested-by: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
    Signed-off-by: Gianni Tedesco <gianni.tedesco@xxxxxxxxxx>
    xen-unstable changeset:   23038:39f5947b1576
    xen-unstable date:        Mon Mar 14 17:13:15 2011 +0000
    
    
changeset:   22995:9175944daf48
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Mon Mar 14 17:08:00 2011 +0000
    
    x86: fix cpu_sibling_map initialization when topology CPUID leaf is present
    
    c/s 21811:12f0618400de broke this by not properly initializing struct
    cpuinfo_x86's x86_num_siblings member (other than Linux, where this is
    a global variable, it is being maintained per CPU by Xen).
    
    Hyper-threaded CPUs with CPUID leaf 0xb present had therefore all
    cpu_sibling_map-s with just a single bit set, thus improperly feeding
    the scheduler.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23037:a29b35408950
    xen-unstable date:        Mon Mar 14 17:05:21 2011 +0000
    
    
changeset:   22994:5dda35f1f32f
user:        Wei Gang <gang.wei@xxxxxxxxx>
date:        Mon Mar 14 17:07:29 2011 +0000
    
    x86: add volatile prefix for cpuid asm clauses
    
    cpuid results are possible to be changed now. For example, changing
    CR4.OSXSAVE bit or setting MSR XCR_XFEATURE_ENABLED_MASK may change
    XSAVE related cpuid leave return values.
    
    The volatile prefix is required to avoid the second cpuid calls
    following some possible changing operations being optimized in
    incorrect way by compiler.
    
    The sample bug is in xsave_init while debug=3Dn. The second call to
    cpuid_count() may be optimized and lead to a BUG_ON case while compare
    xsave_cntxt_size with ebx.
    
    Signed-off-by: Wei Gang <gang.wei@xxxxxxxxx>
    xen-unstable changeset:   23036:9a15ff175e00
    xen-unstable date:        Mon Mar 14 17:04:42 2011 +0000
    
    
changeset:   22993:842aed720b84
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Mon Mar 14 17:00:34 2011 +0000
    
    x86_64: fix error checking in arch_set_info_guest()
    
    Cannot specify user mode execution without specifying user-mode
    pagetables.
    
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23034:c79aae866ad8
    xen-unstable date:        Mon Mar 14 16:59:49 2011 +0000
    
    
changeset:   22992:d4352abf3450
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Sat Mar 12 13:25:44 2011 +0000
    
    x86/HPET: fix initialization order
    
    At least the legacy path can enter its interrupt handler callout while
    initialization is still in progress - that handler checks whether
    ->event_handler is non-NULL, and hence all other initialization must
    happen before setting this field.
    
    Do the same to the MSI initialization just in case (and to keep the
    code in sync).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    Acked-by: Wei Gang <gang.wei@xxxxxxxxx>
    xen-unstable changeset:   23030:87aa1277eae0
    xen-unstable date:        Sat Mar 12 13:19:02 2011 +0000
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.