WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [xen-4.1-testing test] 6788: regressions - FAIL

To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] [xen-4.1-testing test] 6788: regressions - FAIL
From: xen.org <ian.jackson@xxxxxxxxxxxxx>
Date: Fri, 8 Apr 2011 04:38:26 +0100
Cc: ian.jackson@xxxxxxxxxxxxx
Delivery-date: Thu, 07 Apr 2011 20:39:17 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
flight 6788 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/6788/

Regressions :-(

Tests which did not succeed and are blocking:
 test-i386-xcpkern-i386-pair  16 guest-start                fail REGR. vs. 6741

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-rhel6hvm-amd  8 guest-saverestore            fail   never pass
 test-amd64-i386-rhel6hvm-intel  8 guest-saverestore            fail never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-xcpkern-i386-rhel6hvm-amd  8 guest-saverestore      fail never pass
 test-amd64-xcpkern-i386-rhel6hvm-intel  8 guest-saverestore    fail never pass
 test-amd64-xcpkern-i386-win  16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-xl-win 13 guest-stop                   fail never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-i386-xcpkern-i386-win   16 leak-check/check             fail   never pass

version targeted for testing:
 xen                  dbf2ddf652dc
baseline version:
 xen                  8c372258147b

------------------------------------------------------------
People who touched revisions under test:
  Christoph Egger <Christoph.Egger@xxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Gianni Tedesco <gianni.tedesco@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Liu, Jinsong <jinsong.liu@xxxxxxxxx>
  Machon Gregory <mbgrego@xxxxxxxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Wei Huang <wei.huang2@xxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   pass     
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           pass     
 build-amd64-pvops                                            pass     
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          pass     
 test-amd64-i386-xl                                           pass     
 test-i386-i386-xl                                            pass     
 test-amd64-xcpkern-i386-xl                                   pass     
 test-i386-xcpkern-i386-xl                                    pass     
 test-amd64-i386-rhel6hvm-amd                                 fail     
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   pass     
 test-amd64-xcpkern-i386-xl-credit2                           pass     
 test-amd64-i386-rhel6hvm-intel                               fail     
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 pass     
 test-amd64-xcpkern-i386-xl-multivcpu                         pass     
 test-amd64-amd64-pair                                        pass     
 test-amd64-i386-pair                                         pass     
 test-i386-i386-pair                                          pass     
 test-amd64-xcpkern-i386-pair                                 pass     
 test-i386-xcpkern-i386-pair                                  fail     
 test-amd64-amd64-pv                                          pass     
 test-amd64-i386-pv                                           pass     
 test-i386-i386-pv                                            pass     
 test-amd64-xcpkern-i386-pv                                   pass     
 test-i386-xcpkern-i386-pv                                    pass     
 test-amd64-i386-win-vcpus1                                   fail     
 test-amd64-i386-xl-win-vcpus1                                fail     
 test-amd64-amd64-win                                         fail     
 test-amd64-i386-win                                          fail     
 test-i386-i386-win                                           fail     
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   fail     
 test-amd64-amd64-xl-win                                      fail     
 test-i386-i386-xl-win                                        fail     
 test-amd64-xcpkern-i386-xl-win                               fail     


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23025:dbf2ddf652dc
tag:         tip
user:        Gianni Tedesco <gianni.tedesco@xxxxxxxxxx>
date:        Thu Apr 07 15:26:58 2011 +0100
    
    libxc: set all VCPU's online by default in HVM info table
    
    This sets a saner default for the cpu-online-map by setting all bits
    to 1. The default assumption ought to be that nr-vcpus ==
    nr-vcpus-at-start. If that is not true, then the toolstack must modify
    the bitmap, but if it is true, the toolstack oughtn't need to do
    anything further.
    
    Signed-off-by: Gianni Tedesco <gianni.tedesco@xxxxxxxxxx>
    xen-unstable changeset:   23179:2b66b83b19b6
    xen-unstable date:        Thu Apr 07 12:13:58 2011 +0100
    
    
changeset:   23024:f8e4c95e60e3
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Thu Apr 07 15:26:21 2011 +0100
    
    X86: offline/broken page handler for pod cache
    
    When offline a page, or, when a broken page occur, the page maybe
    populated, or, may at pod cache.  This patch is to handle the
    offline/broken page at pod cache.  It scan pod cache, if hit, remove
    and replace it, and then put the offline/broken page to
    page_offlined_list/page_broken_list
    
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
    xen-unstable changeset:   23178:fd8b81db422d
    xen-unstable date:        Thu Apr 07 12:12:38 2011 +0100
    
    
changeset:   23023:6499fa345f3d
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Thu Apr 07 15:25:02 2011 +0100
    
    X86: Fix mce offline page bug
    
    c/s 19913 break mce offline page logic:
    For page_state_is(pg, free), it's impossible to trigger the case;
    For page_state_is(pg, offlined), it in fact didn't offline related
    page;
    
    This patch fix the bug, and remove an ambiguous comment.
    
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
    xen-unstable changeset:   23177:d8bb2de119de
    xen-unstable date:        Thu Apr 07 12:12:01 2011 +0100
    
    
changeset:   23022:91ac583dee94
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Thu Apr 07 15:23:47 2011 +0100
    
    x86/hvm: load CPU structures from xen versions <=3.4
    
    Xen 4.0 added "msr_tsc_aux" in the middle of the hvm_hw_cpu structure,
    making it incompatible with pre-3.4 savefiles.  This patch uses the
    recently introduced backwards-compatibility infrastructure to convert
    the old to the new.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    xen-unstable changeset:   23172:dc8b05d22a59
    xen-unstable date:        Wed Apr 06 11:40:54 2011 +0100
    
    
changeset:   23021:483c15299857
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Thu Apr 07 15:23:16 2011 +0100
    
    hvm: infrastructure for backwards-compatible loading
    
    The hvm_save code is used to save and restore hypervisor-related hvm
    state, either for classic save/restore, or for migration (including
    remus).  This is meant to be backwards-compatible across some
    hypervisor versions; but if it does change, there is no way to handle
    the old format as well as the new.
    
    This patch introduces the infrastructure to allow a single older
    version ("compat") of any given "save type" to be defined, along with
    a function to turn the "old" version into the "new" version.  If the
    size check fails for the "normal" version, it will check the "compat"
    version, and if it matches, will read the old entry and call the
    conversion function.
    
    This patch involves some preprocessor hackery, but I'm only extending
    the hackery that's already there.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    xen-unstable changeset:   23171:6a5830de7b54
    xen-unstable date:        Wed Apr 06 11:40:51 2011 +0100
    
    
changeset:   23020:6b9cca2fc3df
user:        Wei Huang <wei.huang2@xxxxxxx>
date:        Thu Apr 07 15:22:06 2011 +0100
    
    x86, amd, MTRR: remove k8_enable_fixed_iorrs()
    
    AMD64 defines two special bits (bit 3 and 4) RdMem and WrMem in fixed
    MTRR type. Their values are supposed to be 0 after BIOS hands the
    control to OS according to AMD BKDG. Unless OS specificially turn them
    on, they are kept 0 all the time. As a result, k8_enable_fixed_iorrs()
    is unnecessary and removed from upstream kernel (see
    https://patchwork.kernel.org/patch/11425/). This patch does the same
    thing.
    
    Signed-off-by: Wei Huang <wei.huang2@xxxxxxx>
    xen-unstable changeset:   23154:42fa70e0761b
    xen-unstable date:        Wed Apr 06 09:02:13 2011 +0100
    
    
changeset:   23019:4db893357bab
user:        Wei Huang <wei.huang2@xxxxxxx>
date:        Thu Apr 07 15:21:41 2011 +0100
    
    x86, amd, MTRR: correct DramModEn bit of SYS_CFG MSR
    
    Some buggy BIOS might set SYS_CFG DramModEn bit to 1, which can cause
    unexpected behavior on AMD platforms. This patch clears DramModEn bit
    if it is 1.
    
    Signed-off-by: Wei Huang <wei.huang2@xxxxxxx>
    xen-unstable changeset:   23153:8fb61c9ebe49
    xen-unstable date:        Wed Apr 06 09:01:31 2011 +0100
    
    
changeset:   23018:bdb1fc99e5a9
user:        Machon Gregory <mbgrego@xxxxxxxxxxxxxx>
date:        Thu Apr 07 15:20:32 2011 +0100
    
    xsm: Error code consistency
    
    Signed-off-by: Machon Gregory <mbgrego@xxxxxxxxxxxxxx>
    xen-unstable changeset:   23140:967e1925775c
    xen-unstable date:        Mon Apr 04 15:54:45 2011 +0100
    
    
changeset:   23017:dc8e2e30af63
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Thu Apr 07 15:19:52 2011 +0100
    
    x86/mm: fix PSE alignment checks in pagetable walker.
    
    The PSE handling doesn't check bits 1...8 (or 1...9 for non-PAE
    guests) being zero, thus allowing bad (not 2Mb/4Mb aligned) large
    pages to be handled.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    xen-unstable changeset:   23138:777aaa2172c8
    xen-unstable date:        Mon Apr 04 10:38:27 2011 +0100
    
    
changeset:   23016:8c372258147b
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Sat Apr 02 16:06:45 2011 +0100
    
    xen: fix reloc.S generation for non-gnu toolchain
    
    The output of AT&T UNIX and GNU od(1) are different.
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    xen-unstable changeset:   23130:0e88c781a8a8
    xen-unstable date:        Sat Apr 02 15:53:35 2011 +0100
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [xen-4.1-testing test] 6788: regressions - FAIL, xen . org <=