[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 9098: regressions - trouble: blocked/fail



flight 9098 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/9098/

Regressions :-(

Tests which did not succeed and are blocking:
 build-amd64                   4 xen-build                  fail REGR. vs. 8995
 build-i386-oldkern            4 xen-build                  fail REGR. vs. 8995
 build-i386                    4 xen-build                  fail REGR. vs. 8995
 build-amd64-oldkern           4 xen-build                  fail REGR. vs. 8995

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-xl-pcipt-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pv             1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pv           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl             1 xen-build-check(1)           blocked  n/a
 build-amd64-pvops             4 kernel-build                 fail    like 8991
 test-amd64-amd64-xl-sedf      1 xen-build-check(1)           blocked  n/a
 build-i386-pvops              4 kernel-build                 fail    like 8991
 test-i386-i386-xl-win         1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pair           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pair         1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win-vcpus1  1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win-vcpus1    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-win          1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)           blocked  n/a

version targeted for testing:
 xen                  b113d626cfaf
baseline version:
 xen                  a422e2a4451e

------------------------------------------------------------
People who touched revisions under test:
  Andreas Herrmann <herrmann.der.user@xxxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Lasse Collin <lasse.collin@xxxxxxxxxxx>
  Olaf Hering <olaf@xxxxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
  Thomas Renninger <trenn@xxxxxxx>
  Tim Deegan <tim@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-oldkern                                          fail    
 build-i386-oldkern                                           fail    
 build-amd64-pvops                                            fail    
 build-i386-pvops                                             fail    
 test-amd64-amd64-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-i386-i386-xl                                            blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-amd64-xl-pcipt-intel                              blocked 
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-i386-i386-pair                                          blocked 
 test-amd64-amd64-pv                                          blocked 
 test-amd64-i386-pv                                           blocked 
 test-i386-i386-pv                                            blocked 
 test-amd64-amd64-xl-sedf                                     blocked 
 test-amd64-i386-win-vcpus1                                   blocked 
 test-amd64-i386-xl-win-vcpus1                                blocked 
 test-amd64-amd64-win                                         blocked 
 test-amd64-i386-win                                          blocked 
 test-i386-i386-win                                           blocked 
 test-amd64-amd64-xl-win                                      blocked 
 test-i386-i386-xl-win                                        blocked 


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23876:b113d626cfaf
tag:         tip
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Sep 27 17:32:16 2011 +0100
    
    xl: fixup "xl save" command line handling.
    
    The save file paramter is required so ensure we have enough arguments.
    
    The config filename is optional so do not use argv[optind+3], which
    may well happen to be NULL when the paramter is not present but
    relying on that is pretty gross.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   23875:ade44be5b936
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 27 16:15:09 2011 +0100
    
    AMD-IOMMU: fix initialization order (after 23863:9e0259239822)
    
    That original patch caused alloc_ivrs_mappings() to be called too
    early, so things get moved back to where they were, just converting
    the single call there to a loop over all IOMMUs.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23874:651aed73b39c
user:        Olaf Hering <olafiaepfle.de>
date:        Mon Sep 26 22:19:42 2011 +0100
    
    xenpaging: track number of paged pages in struct domain
    
    The toolstack should know how many pages are paged-out at a given point
    in time so it could make smarter decisions about how many pages should
    be paged or ballooned.
    
    Add a new member to xen_domctl_getdomaininfo and bump interface version.
    Use the new member in xc_dominfo_t.
    The SONAME of libxc should be changed if this patch gets applied.
    
    Signed-off-by: Olaf Hering <olaf@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Committed-by: Tim Deegan <tim@xxxxxxx>
    
    
changeset:   23873:fef59e4eaf8d
user:        Paul Durrant <paul.durrant@xxxxxxxxxx>
date:        Mon Sep 26 22:10:21 2011 +0100
    
    Add save/restore support for viridian APIC assist pfn.
    
    c/s 17b754cab7b0 introduced a per-VCPU viridian structure to
    store the APIC assist pfn. This patch adds support for save and
    restore of that value.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Committed-by: Tim Deegan <tim@xxxxxxx>
    
    
changeset:   23872:cc339ab1d917
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Thu Sep 22 18:37:06 2011 +0100
    
    tools: fix install of lomount
    
    $(BIN) went away in 23124:e3d4c34b14a3.
    
    Also there are no *.so, *.a or *.rpm built in here
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
changeset:   23871:503ee256fecf
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:35:30 2011 +0100
    
    x86: ucode-amd: Don't warn when no ucode is available for a CPU revision
    
    This patch originally comes from the Linus mainline kernel (2.6.33),
    find below the patch details:
    
    From: Andreas Herrmann <herrmann.der.user@xxxxxxxxxxxxxx>
    
    There is no point in warning when there is no ucode available
    for a specific CPU revision. Currently the container-file, which
    provides the AMD ucode patches for OS load, contains only a few
    ucode patches.
    
    It's already clearly indicated by the printed patch_level
    whenever new ucode was available and an update happened. So the
    warning message is of no help but rather annoying on systems
    with many CPUs.
    
    Signed-off-by: Thomas Renninger <trenn@xxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23870:5c97b02f48fc
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:34:27 2011 +0100
    
    XZ: Fix incorrect XZ_BUF_ERROR
    
    From: Lasse Collin <lasse.collin@xxxxxxxxxxx>
    
    xz_dec_run() could incorrectly return XZ_BUF_ERROR if all of the
    following was true:
    
     - The caller knows how many bytes of output to expect and only
       provides
       that much output space.
    
     - When the last output bytes are decoded, the caller-provided input
       buffer ends right before the LZMA2 end of payload marker.  So LZMA2
       won't provide more output anymore, but it won't know it yet and
       thus
       won't return XZ_STREAM_END yet.
    
     - A BCJ filter is in use and it hasn't left any unfiltered bytes in
       the
       temp buffer.  This can happen with any BCJ filter, but in practice
       it's more likely with filters other than the x86 BCJ.
    
    This fixes <https://bugzilla.redhat.com/show_bug.cgi?id=3D735408>
    where Squashfs thinks that a valid file system is corrupt.
    
    This also fixes a similar bug in single-call mode where the
    uncompressed size of a block using BCJ + LZMA2 was 0 bytes and caller
    provided no output space.  Many empty .xz files don't contain any
    blocks and thus don't trigger this bug.
    
    This also tweaks a closely related detail: xz_dec_bcj_run() could call
    xz_dec_lzma2_run() to decode into temp buffer when it was known to be
    useless.  This was harmless although it wasted a minuscule number of
    CPU cycles.
    
    Signed-off-by: Lasse Collin <lasse.collin@xxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23869:db1ea4b127cd
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:33:48 2011 +0100
    
    XZ decompressor: Fix decoding of empty LZMA2 streams
    
    From: Lasse Collin <lasse.collin@xxxxxxxxxxx>
    
    The old code considered valid empty LZMA2 streams to be corrupt.
    Note that a typical empty .xz file has no LZMA2 data at all,
    and thus most .xz files having no uncompressed data are handled
    correctly even without this fix.
    
    Signed-off-by: Lasse Collin <lasse.collin@xxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23868:28147fd781af
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:32:34 2011 +0100
    
    VT-d: fix off-by-one error in RMRR validation
    
    (base_addr,end_addr) is an inclusive range, and hence there shouldn't
    be a subtraction of 1 in the second invocation of page_is_ram_type().
    For RMRRs covering a single page that actually resulted in the
    immediately preceding page to get checked (which could have resulted
    in a false warning).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23867:571b6e90dfb4
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:31:44 2011 +0100
    
    VT-d: eliminate a mis-use of pcidevs_lock
    
    dma_pte_clear_one() shouldn't acquire this global lock for the purpose
    of processing a per-domain list. Furthermore the function a few lines
    earlier has a comment stating that acquiring pcidevs_lock isn't
    necessary here (whether that's really correct is another question).
    
    Use the domain's mappin_lock instead to protect the mapped_rmrrs list.
    Fold domain_rmrr_mapped() into its sole caller so that the otherwise
    implicit dependency on pcidevs_lock there becomes more obvious (see
    the comment there).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23866:47ec1d405af9
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:31:02 2011 +0100
    
    x86: IO-APIC code has no dependency on PCI
    
    The IRQ handling code requires pcidevs_lock to be held only for MSI
    interrupts.
    
    As the handling of which was now fully moved into msi.c (i.e. while
    applying fine without, the patch needs to be applied after the one
    titled "x86: split MSI IRQ chip"), io_apic.c now also doesn't need to
    include PCI headers anymore.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23865:d6e01c7853cf
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:29:19 2011 +0100
    
    PCI multi-seg: config space accessor adjustments
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23864:314b147d524d
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:28:38 2011 +0100
    
    PCI multi-seg: Pass-through adjustments
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23863:9e0259239822
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:28:03 2011 +0100
    
    PCI multi-seg: AMD-IOMMU specific adjustments
    
    There are two places here where it is entirely unclear to me where the
    necessary PCI segment number should be taken from (as IVMD descriptors
    don't have such, only IVHD ones do). AMD confirmed that for the time
    being it is acceptable to imply that only segment 0 exists.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23862:85418e168527
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:27:26 2011 +0100
    
    PCI multi-seg: VT-d specific adjustments
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23861:ec7c81fbe0de
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Sep 22 18:26:54 2011 +0100
    
    PCI multi-seg: adjust domctl interface
    
    Again, a couple of directly related functions at once get adjusted to
    account for the segment number.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23860:a422e2a4451e
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Sun Sep 18 00:26:52 2011 +0100
    
    x86: split MSI IRQ chip
    
    With the .end() accessor having become optional and noting that
    several of the accessors' behavior really depends on the result of
    msi_maskable_irq(), the splits the MSI IRQ chip type into two - one
    for the maskable ones, and the other for the (MSI only) non-maskable
    ones.
    
    At once the implementation of those methods gets moved from io_apic.c
    to msi.c.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
========================================
commit cd776ee9408ff127f934a707c1a339ee600bc127
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Jun 28 13:50:53 2011 +0100

    qemu-char.c: fix incorrect CONFIG_STUBDOM handling
    
    qemu-char.c:1123:7: warning: "CONFIG_STUBDOM" is not defined [-Wundef]
    
    Signed-off-by: Olaf Hering <olaf@xxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.