This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-devel] [xen-unstable test] 7111: regressions - FAIL

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [xen-unstable test] 7111: regressions - FAIL
From: xen.org <ian.jackson@xxxxxxxxxxxxx>
Date: Wed, 18 May 2011 02:21:20 +0100
Cc: ian.jackson@xxxxxxxxxxxxx
Delivery-date: Tue, 17 May 2011 18:22:54 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
flight 7111 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking:
 test-i386-i386-win            7 windows-install            fail REGR. vs. 7084

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-rhel6hvm-amd  8 guest-saverestore            fail   never pass
 test-amd64-i386-rhel6hvm-intel  8 guest-saverestore            fail never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-xcpkern-i386-rhel6hvm-amd  8 guest-saverestore      fail never pass
 test-amd64-xcpkern-i386-rhel6hvm-intel  8 guest-saverestore    fail never pass
 test-amd64-xcpkern-i386-win  16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-xl-win 13 guest-stop                   fail never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-i386-xcpkern-i386-win   16 leak-check/check             fail   never pass

version targeted for testing:
 xen                  f531ed84b066
baseline version:
 xen                  f9bb0bbea7c2

People who touched revisions under test:
  Allen Kay <allen.m.kay@xxxxxxxxx>
  Christoph Egger <Christoph.Egger@xxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Igor Mammedov <imammedo@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Liu, Jinsong <jinsong.liu@xxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Zhou Peng <zhoupeng@xxxxxxxxxxxxxxx>

 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   pass     
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           pass     
 build-amd64-pvops                                            pass     
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          pass     
 test-amd64-i386-xl                                           pass     
 test-i386-i386-xl                                            pass     
 test-amd64-xcpkern-i386-xl                                   pass     
 test-i386-xcpkern-i386-xl                                    pass     
 test-amd64-i386-rhel6hvm-amd                                 fail     
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   pass     
 test-amd64-xcpkern-i386-xl-credit2                           pass     
 test-amd64-i386-rhel6hvm-intel                               fail     
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 pass     
 test-amd64-xcpkern-i386-xl-multivcpu                         pass     
 test-amd64-amd64-pair                                        pass     
 test-amd64-i386-pair                                         pass     
 test-i386-i386-pair                                          pass     
 test-amd64-xcpkern-i386-pair                                 pass     
 test-i386-xcpkern-i386-pair                                  pass     
 test-amd64-amd64-pv                                          pass     
 test-amd64-i386-pv                                           pass     
 test-i386-i386-pv                                            pass     
 test-amd64-xcpkern-i386-pv                                   pass     
 test-i386-xcpkern-i386-pv                                    pass     
 test-amd64-i386-win-vcpus1                                   fail     
 test-amd64-i386-xl-win-vcpus1                                fail     
 test-amd64-amd64-win                                         fail     
 test-amd64-i386-win                                          fail     
 test-i386-i386-win                                           fail     
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   fail     
 test-amd64-amd64-xl-win                                      fail     
 test-i386-i386-xl-win                                        fail     
 test-amd64-xcpkern-i386-xl-win                               fail     

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

changeset:   23350:f531ed84b066
tag:         tip
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue May 17 17:32:19 2011 +0100
    tools: xl: add option to run in foreground but still monitor for reboot etc
    Split daemonization option out from monitoring a domain for reboot
    etc. The 'e' option continues to disable both and a new 'F'(oreground)
    option disables only daemonization.
    When I'm debugging xl in the foreground this is often the behaviour I
    would like.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   23349:c152b707f876
user:        Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
date:        Tue May 17 17:28:12 2011 +0100
    libxl: Fix apic/acpi confusion
    "apic" was written a couple of times where "acpi" was meant.
    Signed-off-by: Zhou Peng <zhoupeng@xxxxxxxxxxxxxxx>
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   23348:3e8e1800d472
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Tue May 17 13:55:45 2011 +0100
    x86: further adjustments to arch_set_info_guest() after c/s 
    The adjustments to v->arch.user_regs.eflags and the initialization of
    the int80 direct trap must be done earlier (namely before the function
    may bail because of inconsistencies between input and stored state on
    an already initialised vCPU) so that stored state is consistent, and
    for arch_get_info_guest() to not have its eflags related BUG_ON()
    Further, v->arch.pv_vcpu.ctrlreg[] indices 3 and 1 aren't being kept
    up to date while the domain is running, so consistency checks must
    instead be done against v->arch.guest_table{,_user}.
    Additionally, for 64-bit pv domains, CR1 must also be checked to be
    consistent with the kernel mode setting for the vCPU, and the whole
    CR1 checking should not be done for 32-bit pv domains.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
changeset:   23347:e5757cc64c8f
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Mon May 16 13:34:25 2011 +0100
    Build target to wrap dist/install in a .deb archive.
    Adds "make deb", which does a "make dist" build and wraps the
    resulting dist/install files in dist/xen-<version>.deb
    This is _not_ a "packaged" version of Xen for Debian users, nor is it
    intended to compete with anyone else's packaging efforts.  In
    particular it doesn't do any of the boot-time or fstab fixups needed
    to actually start the xen tools.  It's just a quick hack for
    developers to be able to quickly install and uninstall a Xen build on
    a test box.
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
changeset:   23346:792928bd905a
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Mon May 16 13:33:10 2011 +0100
    amd-iommu: two more __init annotations
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
changeset:   23345:ba4bd20e581a
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Mon May 16 13:32:37 2011 +0100
    x86-64: remove left over uses of .got entries
    These were caused by some declarations happening before the compiler
    would have seen the visibility pragma.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
changeset:   23344:776b0c3e6544
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Mon May 16 13:31:42 2011 +0100
    nestedsvm: fix fpu context switch
    Two different vmcb's are used to run l1 guest and l2 guest.
    When host xen switches physical FPU to a different cpu while
    l1 or l2 guest is running we need to sync CR0.TS bit in the
    other vmcb.
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Reviewed-by: Uwe Dannowski <Uwe.Dannowski@xxxxxxx>
    Reviewed-by: Wei Huang <Wei.Huang2@xxxxxxx>
changeset:   23343:edcf8fc77b64
user:        Igor Mammedov <imammedo@xxxxxxxxxx>
date:        Mon May 16 13:29:24 2011 +0100
    VT-d: Fix resource leaks on error paths
    On error exit from functions, maped pages should be unmapped
    and acquired locks released.
    Signed-off-by: Igor Mammedov <imammedo@xxxxxxxxxx>
    Acked-by: Allen Kay <allen.m.kay@xxxxxxxxx>
changeset:   23342:16d12acccacf
user:        Keir Fraser <keir@xxxxxxx>
date:        Mon May 16 13:24:05 2011 +0100
    x86/tsc: Remove incorrect assertion from cstate_restore_tsc()...
    ..fix and move to write_tsc().
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
changeset:   23341:87084ca76c9c
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Mon May 16 13:13:41 2011 +0100
    x86/ioapic: avoid gcc 4.6 warnings about uninitialised variables
    gcc 4.6 complains:
            io_apic.c: In function 'restore_IO_APIC_setup':
            error: '*((void *)&entry+4)' may be used uninitialized in this
            function [-Werror=uninitialized]
            io_apic.c:221:32: note: '*((void *)&entry+4)' was declared
            error: 'entry' may be used uninitialized in this function
            io_apic.c:221:32: note: 'entry' was declared here
            cc1: all warnings being treated as errors
    Add functions to read/write an entire IO APIC entry using an explicit
    union to allow gcc to spot the initialisation.
    Reported as Debian bug #625438, thanks to Matthias Klose.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxxxx>
changeset:   23340:216c2efeb246
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Mon May 16 13:12:03 2011 +0100
    x86/mca: simplify mce action, and some update of mem err handler for
    future SRAR extension
    This patch simplify mce_action(). Basically the 2 set of mce status
    flags MCA_... and MCER_... are highly functional similar. This patch
    remove the redundant middle-level flag MCA_..., and its related data
    structure and function, so that mce_action() logic is more clean and
    simpler.  This patch also update mem err
    handler. intel_memerr_dhandler() will be commonly used by SRAO and
    SRAR, so for the extension of future SRAR case, this patch remove the
    default fail flag from intel_memerr_dhandler() outside to SRAO/SRAR
    level, since only SRAO/SRAR handler itself has the knowledge of how to
    handle the failure when mem err handler fail.
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
changeset:   23339:f9bb0bbea7c2
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Thu May 12 16:42:54 2011 +0100
    x86: Check for valid pirq values in hvm_domain_use_pirq
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [xen-unstable test] 7111: regressions - FAIL, xen . org <=