WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [xen-unstable test] 8018: tolerable FAIL

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [xen-unstable test] 8018: tolerable FAIL
From: xen.org <ian.jackson@xxxxxxxxxxxxx>
Date: Sat, 9 Jul 2011 20:39:21 +0100
Cc: ian.jackson@xxxxxxxxxxxxx
Delivery-date: Sat, 09 Jul 2011 12:40:18 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
flight 8018 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/8018/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-i386-rhel6hvm-intel 12 guest-localmigrate/x10       fail  like 8006
 test-amd64-xcpkern-i386-rhel6hvm-intel 14 guest-start.2        fail never pass
 test-amd64-xcpkern-i386-rhel6hvm-amd 14 guest-start.2          fail never pass
 test-amd64-i386-rhel6hvm-amd 12 guest-localmigrate/x10       fail    like 8000
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-win  16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-xl-win 13 guest-stop                   fail never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-i386-xcpkern-i386-win   16 leak-check/check             fail   never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass

version targeted for testing:
 xen                  00d2c5ca26fd
baseline version:
 xen                  21ff10d9a617

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Christoph Egger <Christoph.Egger@xxxxxxx>
  Fabio Fantoni <fabio.fantoni@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
  KUWAMURA Shin'ya <kuwa@xxxxxxxxxxxxxx>
  Liu, Jinsong <jinsong.liu@xxxxxxxxx>
  Olaf Hering <olaf@xxxxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
  Roger Cruz <roger.cruz@xxxxxxxxxxxxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Tom Goetz <tom.goetz@xxxxxxxxxxxxxxxxxxx>
  Zhigang Wang <zhigang.x.wang@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           pass    
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-xcpkern-i386-xl                                   pass    
 test-i386-xcpkern-i386-xl                                    pass    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-xcpkern-i386-xl-credit2                           pass    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-xcpkern-i386-xl-multivcpu                         pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-xcpkern-i386-pair                                 pass    
 test-i386-xcpkern-i386-pair                                  pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-xcpkern-i386-pv                                   pass    
 test-i386-xcpkern-i386-pv                                    pass    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-xcpkern-i386-win                                  fail    
 test-i386-xcpkern-i386-win                                   fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    
 test-amd64-xcpkern-i386-xl-win                               fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23675:00d2c5ca26fd
tag:         tip
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Fri Jul 08 18:35:24 2011 +0100
    
    libxl: do not use tap disk backend other than for raw and vhd
    
    tap does not support qcow/qcow2; update disk_try_backend accordingly.
    
    Break out the "backend not suitable for this format" message so it can
    be reused.  Remove now-redundant reporting from
    libxl_device_disk_local_attach and replace with abort().
    
    Reported-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   23674:443c6a7b6079
user:        Zhigang Wang <zhigang.x.wang@xxxxxxxxxx>
date:        Fri Jul 08 18:12:26 2011 +0100
    
    tools: fix shared loop device detection in block hotplug script
    
    We need to cope with 0 or more '0' prefixed to '$dev':
    
      # stat -c '%D' "/system.img"
      13
      # losetup -a
      /dev/loop0: [0013]:12062248 (/system.img)
    
    Signed-off-by: Zhigang Wang <zhigang.x.wang@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   23673:0648846b4d17
user:        Fabio Fantoni <fabio.fantoni@xxxxxxxxxx>
date:        Fri Jul 08 18:10:48 2011 +0100
    
    tools: Improved LSB headers in init.d scripts
    
    xendomains service now working also without xend service
    
    Signed-off-by: Fabio Fantoni <fabio.fantoni@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   23672:88823213a478
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Fri Jul 08 13:23:05 2011 +0100
    
    x86-64/EFI: discard .comment.* sections
    
    The SuSE version of gcc produces a non-standard section named
    .comment.SUSE.OPTs, but the PE32+ handling in binutils can't really
    deal with any section to be placed at virtual address zero (and not
    needing to be loaded). Even if binutils did, at least the UEFI
    implementation in EDK 1.06 doesn't look at the section characteristics
    at all, and hence would attempt to load such a section, and fail or
    corrupt other data.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    
    
changeset:   23671:d1a2861b9caa
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Fri Jul 08 13:21:53 2011 +0100
    
    x86-64/physdevop: reduce generated code duplication
    
    At least all the helper functions can be used by both the native and
    the compat-mode implementations, requiring their parameters to be
    adjusted.
    
    Additionally, rather than having the compat mode wrapper source file
    blindly define the native structures to be replaced by the compat mode
    ones, replace unnecessary (un-)definitions by layout match checks.
    
    In a second step, do_physdev_op() could be split into a part that
    needs
    re-compilation for compat mode handling and one that can be used for
    native and compat mode.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    
    
changeset:   23670:6ba6b11c48e1
user:        Keir Fraser <keir@xxxxxxx>
date:        Fri Jul 08 13:20:09 2011 +0100
    
    Revert 23664:3e3c0a8be9f9
    
    
changeset:   23669:d80088d2c12f
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Fri Jul 08 11:44:23 2011 +0100
    
    x86/mm: fix 32-bit p2m type lookups
    
    23300:4b0692880dfa moved a check for 0 into p2m_flags_to_type()
    and removed it from its caller, but the new check is only
    compiled in 64-bit builds.
    
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23668:0c17d96922d4
user:        Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
date:        Fri Jul 08 08:42:30 2011 +0100
    
    ns16550: Implement suspend handler.
    
    For PCI type cards, you need to disable the timer code during
    suspend. Otherwise during resume, the timer can be put on the
    heap as its being resumed and corrupt it resulting in a crash.
    
    Signed-off-by: Roger Cruz <roger.cruz@xxxxxxxxxxxxxxxxxxx>
    Signed-off-by: Tom Goetz <tom.goetz@xxxxxxxxxxxxxxxxxxx>
    Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    
    
changeset:   23667:4c70f4c5a8a3
user:        KUWAMURA Shin'ya <kuwa@xxxxxxxxxxxxxx>
date:        Fri Jul 08 08:39:26 2011 +0100
    
    [IA64] kexec: fix ia64 build
    
    23408:1fc3347850c7 causes the following error:
      machine_kexec.c:106: error: static declaration of
      'machine_kexec_get_xen' follows non-static declaration
      /xen-unstable.hg/xen/include/xen/kexec.h:39: error: previous
      declaration of 'machine_kexec_get_xen' was here
    
    Signed-off-by: KUWAMURA Shin'ya <kuwa@xxxxxxxxxxxxxx>
    
    
changeset:   23666:b96f8bdcaa15
user:        Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
date:        Fri Jul 08 08:38:35 2011 +0100
    
    KEXEC: disconnect all PCI devices from the PCI bus on crash
    
    In the case of a crash, IOMMU DMA remapping gets turned off so that
    the kdump kernel may boot.  However, this is warned as being dangerous
    in the VTD specification if a DMA transaction is in progress.
    
    Also, in the case of a crash, DMA transactions and interrupts from
    peripheral devices such as network cards are likely to keep coming in.
    Without DMA remapping enabled, the transactions will be writing over
    low memory, corrupting the crash state, and perhaps even the kdump
    reserved memory.
    
    Therefore, on the crash path, we can disconnect all PCI devices from
    their respective buses so that they are no longer able to be DMA
    busmasters.  This reduces the risk of DMA transactions corrupting
    state (and will also reduce spurious interrupts arriving to the kdump
    kernel) until the kdump kernel and properly reset the PCI devices.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    
    
changeset:   23665:1ed49fb67fea
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Fri Jul 08 08:35:00 2011 +0100
    
    libelf: "required" features should also be reported as "supported"
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    
    
changeset:   23664:3e3c0a8be9f9
user:        Jan Beulich <jbeulich@xxxxxxxxxx>
date:        Fri Jul 08 08:34:29 2011 +0100
    
    add privileged/unprivileged kernel feature indication
    
    With our switching away from supporting 32-bit Dom0 operation, users
    complained that attempts (perhaps due to lack of knowledge of that
    change) to boot the no longer privileged kernel in Dom0 resulted in
    apparently silent failure. To make the mismatch explicit and visible,
    add feature flags that the kernel can set to indicate operation in
    what modes it supports. For backward compatibility, absence of both
    feature flags is taken to indicate a kernel that may be capable of
    operating in both modes.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    
    
changeset:   23663:b8a244309780
user:        Kevin Tian <kevin.tian@xxxxxxxxx>
date:        Fri Jul 08 08:33:01 2011 +0100
    
    xenpm: clean up print messages
    
    Signed-off-by Kevin Tian <kevin.tian@xxxxxxxxx>
    
    
changeset:   23662:2faba14bac13
user:        Kevin Tian <kevin.tian@xxxxxxxxx>
date:        Fri Jul 08 08:32:37 2011 +0100
    
    cpuidle: initialize default Cstate information
    
    C0/C1 should be always available when cpuidle is enabled in Xen.
    When there's case that Dom0 doesn't register ACPI Cstate information,
    e.g. due to BIOS issue or acpi processor module  is not installed,
    this patch provides basic C0/C1 information available to xenpm tool.
    
    Signed-off-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    
    
changeset:   23661:8fe6f4be18aa
user:        Paul Durrant <paul.durrant@xxxxxxxxxx>
date:        Fri Jul 08 08:31:10 2011 +0100
    
    x86/hvm: Don't expose CPUID time leaf when not using PVRDTSCP
    
    Some versions of Oracle's Solaris PV drivers make a check that the
    maximal Xen hypervisor CPUID leaf is <= base leaf + 2 and refuse to
    work if this is not the case.  The addition of the time leaf makes the
    maximal leaf == base leaf + 3 so this patch introduces a workaround
    that obscures the time leaf unless PVRDTSCP is in operation.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    
    
changeset:   23660:c86b78b44b32
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Fri Jul 08 08:30:56 2011 +0100
    
    nestedsvm: allow l1 guest to use OSXSAVE
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    
    
changeset:   23659:7fe0331986c5
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Fri Jul 08 08:30:41 2011 +0100
    
    x86 cpu: Fix bug: unify cpu_dev attr as __cpuinitdata
    
    Currently different x86 cpu define different attr for cpu_dev.
    Some cpu define as __initdata, this would be risk under cpu hotplug.
    This patch fix the bug, unify them as __cpuinitdata, as what AMD cpu
    define now.
    
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
                   Shan, Haitao <haitao.shan@xxxxxxxxx>
    
    
changeset:   23658:21ff10d9a617
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Thu Jul 07 12:35:05 2011 +0100
    
    libxl: fix incorrect return of ERROR_INVAL from disk_try_backend
    
    disk_try_backend is supposed to return 0 or the disk backend format.
    
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
========================================
commit cd776ee9408ff127f934a707c1a339ee600bc127
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Jun 28 13:50:53 2011 +0100

    qemu-char.c: fix incorrect CONFIG_STUBDOM handling
    
    qemu-char.c:1123:7: warning: "CONFIG_STUBDOM" is not defined [-Wundef]
    
    Signed-off-by: Olaf Hering <olaf@xxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [xen-unstable test] 8018: tolerable FAIL, xen . org <=