* [xen-unstable test] 14011: regressions - FAIL
@ 2012-10-18 0:48 xen.org
0 siblings, 0 replies; only message in thread
From: xen.org @ 2012-10-18 0:48 UTC (permalink / raw)
To: xen-devel; +Cc: ian.jackson
flight 14011 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/14011/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-amd 5 xen-boot fail REGR. vs. 13967
test-amd64-i386-xl-multivcpu 5 xen-boot fail REGR. vs. 13967
test-amd64-i386-rhel6hvm-amd 5 xen-boot fail REGR. vs. 13967
test-amd64-amd64-pv 5 xen-boot fail REGR. vs. 13967
test-amd64-i386-xl 5 xen-boot fail REGR. vs. 13967
test-amd64-i386-pv 5 xen-boot fail REGR. vs. 13967
test-amd64-i386-pair 8 xen-boot/dst_host fail REGR. vs. 13967
test-amd64-i386-pair 7 xen-boot/src_host fail REGR. vs. 13967
test-amd64-amd64-pair 8 xen-boot/dst_host fail REGR. vs. 13967
test-amd64-amd64-pair 7 xen-boot/src_host fail REGR. vs. 13967
test-amd64-amd64-xl 5 xen-boot fail REGR. vs. 13967
test-amd64-amd64-xl-win7-amd64 5 xen-boot fail REGR. vs. 13967
test-amd64-i386-xl-winxpsp3-vcpus1 5 xen-boot fail REGR. vs. 13967
build-amd64-oldkern 4 xen-build fail REGR. vs. 13967
test-amd64-i386-xl-credit2 5 xen-boot fail REGR. vs. 13967
test-amd64-amd64-xl-win 5 xen-boot fail REGR. vs. 13967
test-amd64-amd64-xl-qemuu-win7-amd64 5 xen-boot fail REGR. vs. 13967
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-sedf-pin 5 xen-boot fail REGR. vs. 13967
test-amd64-amd64-xl-sedf 5 xen-boot fail like 13967
test-amd64-amd64-xl-qemuu-winxpsp3 9 guest-localmigrate fail like 13967
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass
test-amd64-i386-win 16 leak-check/check fail never pass
test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass
test-amd64-amd64-win 16 leak-check/check fail never pass
test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass
test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass
version targeted for testing:
xen 5c402b905e00
baseline version:
xen c1c549c4fe9e
------------------------------------------------------------
People who touched revisions under test:
Daniel De Graaf <dgdegra@tycho.nsa.gov>
Huang Ying <ying.huang@intel.com>
Ian Campbell <ian.campbell@citrix.com>
Jan Beulich <jbeulich@suse.com>
Keir Fraser <keir@xen.org>
Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Tim Deegan <tim@xen.org>
------------------------------------------------------------
jobs:
build-amd64 pass
build-i386 pass
build-amd64-oldkern fail
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl fail
test-amd64-i386-xl fail
test-amd64-i386-rhel6hvm-amd fail
test-amd64-i386-qemuu-rhel6hvm-amd fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 fail
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-i386-xl-multivcpu fail
test-amd64-amd64-pair fail
test-amd64-i386-pair fail
test-amd64-amd64-xl-sedf-pin fail
test-amd64-amd64-pv fail
test-amd64-i386-pv fail
test-amd64-amd64-xl-sedf fail
test-amd64-i386-win-vcpus1 fail
test-amd64-i386-xl-win-vcpus1 fail
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-amd64-win fail
test-amd64-i386-win fail
test-amd64-amd64-xl-win fail
test-amd64-amd64-xl-qemuu-winxpsp3 fail
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
changeset: 26073:5c402b905e00
tag: tip
user: Ian Campbell <ian.campbell@citrix.com>
date: Wed Oct 17 16:43:55 2012 +0100
arm: parameter guest handles are 32 bit on 32 bit hypervisor
Handles within structs remain 64 bit such that they are consistently
sized on both 32 and 64 bit.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26072:5529b91bd2e4
user: Ian Campbell <ian.campbell@citrix.com>
date: Wed Oct 17 16:43:54 2012 +0100
xen: remove XEN_GUEST_HANDLE(ulong)
Having both this handle (always unsigned long) and
XEN_GUEST_HANDLE(xen_ulong_t) (unsigned long on x86 and explicit size
of ARM) is confusing and error prone.
Replace the two remaining uses of the ulong handle, in grant set and
x86 set_gdt hypercalls, with xen_ulong_t.
This correctly sizes the grant frame entry as 64 bit on ARM but
leaves it as unsigned long on x86 (therefore no intended change on
x86). Likewise in set_gdt there is no actual change.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26071:2a1083b1d0c2
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Wed Oct 17 16:43:53 2012 +0100
xen: more XEN_GUEST_HANDLE_PARAM substitutions
More substitutions in this patch, not as obvious as the ones in the
previous patch.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26070:9eafdcd5ff0b
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Wed Oct 17 16:43:53 2012 +0100
xen: replace XEN_GUEST_HANDLE with XEN_GUEST_HANDLE_PARAM when appropriate
Note: these changes don't make any difference on x86.
Replace XEN_GUEST_HANDLE with XEN_GUEST_HANDLE_PARAM when it is used as
an hypercall argument.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26069:1eb4b2f7465f
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Wed Oct 17 16:43:51 2012 +0100
xen: introduce XEN_GUEST_HANDLE_PARAM
XEN_GUEST_HANDLE_PARAM is going to be used to distinguish guest pointers
stored in memory from guest pointers as hypercall parameters.
guest_handle_* macros default to XEN_GUEST_HANDLE_PARAM as return type.
Two new guest_handle_to_param and guest_handle_from_param macros are
introduced to do conversions.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26068:ed6c13501195
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Wed Oct 17 16:43:50 2012 +0100
xen: change the limit of nr_extents to UINT_MAX >> MEMOP_EXTENT_SHIFT
Currently do_memory_op has a different maximum limit for nr_extents on
32 bit and 64 bit.
Change the limit to UINT_MAX >> MEMOP_EXTENT_SHIFT, so that it is the
same in both cases.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26067:a324eea3bbc8
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Wed Oct 17 16:43:49 2012 +0100
xen: xen_ulong_t substitution
There is still an unwanted unsigned long in the xen public interface:
replace it with xen_ulong_t.
Also typedef xen_ulong_t to uint64_t on ARM.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26066:980863b9fa4b
user: Ian Campbell <ian.campbell@citrix.com>
date: Wed Oct 17 16:43:48 2012 +0100
arm: tools: add arm to foreign structs checking
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26065:b146705d70b3
user: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
date: Wed Oct 17 16:43:47 2012 +0100
xen/arm: grant table
Implement XENMAPSPACE_grant_table and grant_table_op.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Tim Deegan <tim@xen.org>
[ ijc -- fixed reject in traps.c, grant table op is a 3 argument
hypercall, rebased over "xen: arm: implement
XENMEM_add_to_physmap_range"
]
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26064:bbe986018949
user: Ian Campbell <ian.campbell@citrix.com>
date: Wed Oct 17 16:43:46 2012 +0100
xen: arm: implement XENMEM_add_to_physmap_range
This allows for foreign mappings as well as batching, fitting all that
into XENMEM_add_to_physmap wasn't possible.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Committed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 26063:1f4be6ee4619
user: Jan Beulich <jbeulich@suse.com>
date: Wed Oct 17 14:13:20 2012 +0200
x86/HPET: obtain proper lock for changing IRQ affinity
The IRQ descriptor lock should be held while adjusting the affinity of
any IRQ; the HPET channel lock isn't sufficient to protect namely
against races with moving the IRQ to a different CPU.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
changeset: 26062:ec8a091efcce
user: Huang Ying <ying.huang@intel.com>
date: Wed Oct 17 14:12:06 2012 +0200
ACPI/APEI: fix ERST MOVE_DATA instruction implementation
The src_base and dst_base fields in apei_exec_context are physical
address, so they should be ioremaped before being used in ERST
MOVE_DATA instruction.
Reported-by: Javier Martinez Canillas <martinez.javier@gmail.com>
Reported-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Huang Ying <ying.huang@intel.com>
Replace use of ioremap() by __acpi_map_table()/set_fixmap(). Fix error
handling.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Jan Beulich <jbeulich@suse.com>
changeset: 26061:4b4c0c7a6031
user: Jan Beulich <jbeulich@suse.com>
date: Wed Oct 17 11:23:10 2012 +0200
x86/oprof: adjust off-by-one counter range checks
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
changeset: 26060:4fc87c2f31a0
user: Huang Ying <ying.huang@intel.com>
date: Tue Oct 16 17:26:36 2012 +0200
ACPI: fix APEI related table size checking
On Huang Ying's machine:
erst_tab->header_length == sizeof(struct acpi_table_einj)
but Yinghai reported that on his machine,
erst_tab->header_length == sizeof(struct acpi_table_einj) -
sizeof(struct acpi_table_header)
To make erst table size checking code works on all systems, both
testing are treated as PASS.
Same situation applies to einj_tab->header_length, so corresponding
table size checking is changed in similar way too.
Originally-by: Yinghai Lu <yinghai@kernel.org>
Signed-off-by: Huang Ying <ying.huang@intel.com>
- use switch() for better readability
- add comment explaining why a formally invalid size it also being
accepted
- check erst_tab->header.length before even looking at
erst_tab->header_length
- prefer sizeof(*erst_tab) over sizeof(struct acpi_table_erst)
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
Committed-by: Jan Beulich <jbeulich@suse.com>
changeset: 26059:c1c549c4fe9e
user: Daniel De Graaf <dgdegra@tycho.nsa.gov>
date: Mon Oct 15 16:51:44 2012 +0100
xen: Add versions of rcu_lock_*_domain without IS_PRIV
These functions will be used to avoid duplication of IS_PRIV calls
that will be introduced in XSM hooks. This also fixes a build error
with XSM enabled introduced by 25925:d1c3375c3f11 which depends on
this patch.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Committed-by: Keir Fraser <keir@xen.org>
(qemu changes not included)
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2012-10-18 0:48 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-10-18 0:48 [xen-unstable test] 14011: regressions - FAIL xen.org
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).