flight 6690 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/6690/ Regressions :-( Tests which did not succeed and are blocking: build-i386-oldkern 4 xen-build fail REGR. vs. 6658 build-i386 4 xen-build fail REGR. vs. 6658 test-amd64-amd64-pair 16 guest-start fail REGR. vs. 6658 test-amd64-amd64-pv 9 guest-start fail REGR. vs. 6658 test-amd64-amd64-win 7 windows-install fail REGR. vs. 6658 test-amd64-i386-pair 6 xen-install/dst_host fail REGR. vs. 6658 test-amd64-i386-pair 5 xen-install/src_host fail REGR. vs. 6658 test-amd64-i386-pv 4 xen-install fail REGR. vs. 6658 test-amd64-i386-rhel6hvm-amd 4 xen-install fail REGR. vs. 6658 test-amd64-i386-rhel6hvm-intel 4 xen-install fail REGR. vs. 6658 test-amd64-i386-win-vcpus1 4 xen-install fail REGR. vs. 6658 test-amd64-i386-win 4 xen-install fail REGR. vs. 6658 test-amd64-i386-xl-credit2 4 xen-install fail REGR. vs. 6658 test-amd64-i386-xl-multivcpu 4 xen-install fail REGR. vs. 6658 test-amd64-i386-xl-win-vcpus1 4 xen-install fail REGR. vs. 6658 test-amd64-i386-xl 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-pair 6 xen-install/dst_host fail REGR. vs. 6658 test-amd64-xcpkern-i386-pair 5 xen-install/src_host fail REGR. vs. 6658 test-amd64-xcpkern-i386-pv 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-rhel6hvm-amd 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-rhel6hvm-intel 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-win 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-xl-credit2 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-xl-multivcpu 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-xl-win 4 xen-install fail REGR. vs. 6658 test-amd64-xcpkern-i386-xl 4 xen-install fail REGR. vs. 6658 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-xl-win 13 guest-stop fail never pass test-i386-i386-pair 1 xen-build-check(1) blocked n/a test-i386-i386-pv 1 xen-build-check(1) blocked n/a test-i386-i386-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-win 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a version targeted for testing: xen 48dac730a93b baseline version: xen a65612bcbb92 ------------------------------------------------------------ People who touched revisions under test: Gang Wei <gang.wei@intel.com> Ian Campbell <ian.campbell@citrix.com> Jan Beulich <jbeulich@novell.com> Keir Fraser <keir@xen.org> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 fail build-amd64-oldkern pass build-i386-oldkern fail build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl fail test-i386-i386-xl blocked test-amd64-xcpkern-i386-xl fail test-i386-xcpkern-i386-xl blocked test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 fail test-amd64-xcpkern-i386-xl-credit2 fail test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu fail test-amd64-xcpkern-i386-xl-multivcpu fail test-amd64-amd64-pair fail test-amd64-i386-pair fail test-i386-i386-pair blocked test-amd64-xcpkern-i386-pair fail test-i386-xcpkern-i386-pair blocked test-amd64-amd64-pv fail test-amd64-i386-pv fail test-i386-i386-pv blocked test-amd64-xcpkern-i386-pv fail test-i386-xcpkern-i386-pv blocked test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win blocked test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win blocked test-amd64-amd64-xl-win fail test-i386-i386-xl-win blocked test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 23103:48dac730a93b tag: tip user: Keir Fraser <keir@xen.org> date: Sat Mar 26 09:42:01 2011 +0000 x86: __pirq_guest_eoi() must check it is called for a fully guest-bound irq before accessing desc->action. Signed-off-by: Keir Fraser <keir@xen.org> changeset: 23102:8f001d864fef user: Jan Beulich <jbeulich@novell.com> date: Sat Mar 26 09:30:38 2011 +0000 x86/ATS: remove unreferenced lock member from struct pci_ats_dev Otherwise this may give the false impression that some explicit locking is done in this code. Signed-off-by: Jan Beulich <jbeulich@novell.com> changeset: 23101:dd386a4b6595 user: Jan Beulich <jbeulich@novell.com> date: Sat Mar 26 09:30:04 2011 +0000 x86: fix tboot after c/s 23013:65d26504e843 (ACPI cleanup) TXT code calls acpi_parse_dmar() with a transient copy of the DMAR table, and hence storing the pointer for later reference was wrong. Obtain the pointer in acpi_dmar_init() instead. Signed-off-by: Jan Beulich <jbeulich@novell.com> Tested-by: Gang Wei <gang.wei@intel.com> changeset: 23100:ef8dd40422c8 user: Keir Fraser <keir@xen.org> date: Sat Mar 26 08:27:41 2011 +0000 Remove spin_barrier_irq(). It is pointless. Add a barrier-appropriate consistency check to spinlock.c, and add code comments to explain why barrier operations are more relaxed than lock-acquisition operations. Signed-off-by: Keir Fraser <keir@xen.org> changeset: 23099:612171ff82ea user: Keir Fraser <keir@xen.org> date: Sat Mar 26 08:03:21 2011 +0000 rwlock: Allow to scale to 2^31-1 readers on x86. Also rework to match the ''trylock'' style of raw function used for spinlocks. Inspired by Jan Beulich''s patch to do similar improved scaling. Signed-off-by: Keir Fraser <keir@xen.org> changeset: 23098:c9f745c153ec user: Keir Fraser <keir@xen.org> date: Fri Mar 25 21:59:20 2011 +0000 tools: vnet: Remove Build has been broken since at least 18969:d6889b3b6423 (early 2009) and it has been unhooked from the top level build since forever AFAICT. The last actual development (as opposed to tree wide cleanups and build fixes) appears to have been 11594:6d7bba6443ef in 2006. The functionality of vnet has apparently been superceded by VLANs, ebtables, Ethernet-over-IP etc all of which are well integrated with upstream kernels and distros. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Signed-off-by: Keir Fraser <keir@xen.org> changeset: 23097:2aeebd5cbbad user: Keir Fraser <keir@xen.org> date: Fri Mar 25 21:47:57 2011 +0000 Remove unmaintained Access Control Module (ACM) from hypervisor. Signed-off-by: Keir Fraser <keir@xen.org> changeset: 23096:a65612bcbb92 user: Jan Beulich <jbeulich@novell.com> date: Fri Mar 25 09:03:17 2011 +0000 x86/hpet: eliminate cpumask_lock According to the (now getting removed) comment in struct hpet_event_channel, this was to prevent accessing a CPU''s timer_deadline after it got cleared from cpumask. This can be done without a lock altogether - hpet_broadcast_exit() can simply clear the bit, and handle_hpet_broadcast() can read timer_deadline before looking at the mask a second time (the cpumask bit was already found set by the surrounding loop). Signed-off-by: Jan Beulich <jbeulich@novell.com> Acked-by: Gang Wei <gang.wei@intel.com> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel