xen.org
2013-Jul-10 10:31 UTC
[xen-unstable test] 18304: regressions - trouble: broken/fail/pass
flight 18304 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/18304/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 xen-build fail REGR. vs. 18260
Tests which are failing intermittently (not blocking):
test-amd64-i386-qemuu-rhel6hvm-intel 7 redhat-install fail pass in 18290
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 3 host-install(3) broken pass in 18290
test-amd64-i386-qemut-rhel6hvm-intel 7 redhat-install fail in 18290 pass in
18304
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass
test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass
test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail in 18290 never pass
version targeted for testing:
xen 4867685f7916bb594a67f2f64a28bbf5ecb4949c
baseline version:
xen 9eabb0735400e2b6059dfa3f0b47a426f61f570a
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
Ben Guthro <benjamin.guthro@citrix.com>
Chen Baozi <baozich@gmail.com>
Ian Campbell <ian.campbell@citrix.com>
James Bulpin <james.bulpin@citrix.com>
Jan Beulich <jbeulich@suse.com>
Julien Grall <julien.grall@linaro.org>
Keir Fraser <keir.xen@gmail.com>
Keir Fraser <keir@xen.org
Keir Fraser <keir@xen.org>
Marek Marczykowski <marmarek@invisiblethingslab.com>
Samuel Thibault <samuel.thibault@ens-lyon.org>
Wei Liu <wei.liu2@citrix.com>
------------------------------------------------------------
jobs:
build-amd64 pass
build-armhf fail
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl pass
test-amd64-i386-xl pass
test-amd64-i386-rhel6hvm-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd pass
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 pass
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel pass
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel fail
test-amd64-i386-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-amd64-amd64-xl-sedf-pin pass
test-amd64-amd64-pv pass
test-amd64-i386-pv pass
test-amd64-amd64-xl-sedf pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 broken
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-i386-xend-qemut-winxpsp3 fail
test-amd64-amd64-xl-qemut-winxpsp3 fail
test-amd64-amd64-xl-qemuu-winxpsp3 fail
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 4867685f7916bb594a67f2f64a28bbf5ecb4949c
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon Jul 8 13:20:20 2013 +0200
Revert "hvmloader: always include HPET table"
This reverts commit e4fd0475a08fda414da27c4e57b568f147cfc07e.
Conflicts:
tools/firmware/hvmloader/acpi/build.c
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir.xen@gmail.com>
commit 642e4f331599b42492abd9fc9450373aab02dfb6
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon Jul 8 13:16:29 2013 +0200
Revert "/home/jbeulich/tmp/commit.txt"
This reverts commit 80e3eddcc4896ab40c24506fd05f9795c4039b48.
commit 80e3eddcc4896ab40c24506fd05f9795c4039b48
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon Jul 8 13:15:10 2013 +0200
/home/jbeulich/tmp/commit.txt
commit 8960761b1c0958f73bb9a4a23daa1bfad46af40e
Author: Wei Liu <wei.liu2@citrix.com>
Date: Mon Jul 8 11:04:27 2013 +0200
netif.h: fix typo, BLKIF -> NETIF
Signed-off-by: Wei Liu <wei.liu2@citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 767423f20561f45795c61ef66b7526f9a567335e
Author: James Bulpin <James.Bulpin@eu.citrix.com>
Date: Wed Jul 3 17:52:09 2013 +0000
docs: record reservations of device IDs under the Xen vendor ID
This patch introduces a documentation file to record reservations of
ranges of PCI device IDs within the Xen vendor ID 0x5853.
Signed-off-by: James Bulpin <james.bulpin@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
commit b9fa02b9011f8baf753e1539c921804a32b228a8
Author: Julien Grall <julien.grall@linaro.org>
Date: Mon Jun 17 14:47:13 2013 +0100
xen/arm32: implement VFP context switch
Add support for VFP context switch on arm32 and a dummy support for arm64
Signed-off-by: Julien Grall <julien.grall@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit acd7c3f1bb2bf8ce67bb21737f566806a10e9630
Author: Julien Grall <julien.grall@linaro.org>
Date: Mon Jun 17 14:47:12 2013 +0100
xen/arm: don''t enable VFP on XEN during the boot
We can safely remove VFP support in XEN because:
- the guest will enable VFP support when a process requires it
- XEN doesn''t use VFP
Signed-off-by: Julien Grall <julien.grall@linaro.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 2548700af698867a303e90115a1fa8aa74be5945
Author: Chen Baozi <baozich@gmail.com>
Date: Thu May 9 16:31:01 2013 +0800
mini-os: eliminate duplicated definition of spin_unlock_wait
Signed-off-by: Chen Baozi <baozich@gmail.com>
Acked-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
commit af5102b81fd036976e785aa29dece8c3d2dd6577
Author: Marek Marczykowski <marmarek@invisiblethingslab.com>
Date: Wed May 8 05:47:53 2013 +0200
libxl: do not call exit() in libxl_device_vtpm_list
Signal error with NULL return value, do not terminate the whole process.
Signed-off-by: Marek Marczykowski <marmarek@invisiblethingslab.com>
Reviewed-by: Jim Fehlig <jfehlig@suse.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit d3a55d7d9bb518efe08143d050deff9f4ee80ec1
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Thu Jul 4 10:33:18 2013 +0200
x86/mm: Ensure useful progress in alloc_l2_table()
While debugging the issue which turned out to be XSA-58, a printk in this
loop
showed that it was quite easy to never make useful progress, because of
consistently failing the preemption check.
One single l2 entry is a reasonable amount of work to do, even if an action
is
pending, and also assures forwards progress across repeat continuations.
Tweak the continuation criteria to fail on the first iteration of the loop.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
commit b12649ce9e7a162dae386d32bd04c5fdc537d65c
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Thu Jul 4 10:32:44 2013 +0200
use SMP barrier in common code dealing with shared memory protocols
Xen currently makes no strong distinction between the SMP barriers (smp_mb
etc) and the regular barrier (mb etc). In Linux, where we inherited these
names from having imported Linux code which uses them, the SMP barriers are
intended to be sufficient for implementing shared-memory protocols between
processors in an SMP system while the standard barriers are useful for MMIO
etc.
On x86 with the stronger ordering model there is not much practical
difference
here but ARM has weaker barriers available which are suitable for use as SMP
barriers.
Therefore ensure that common code uses the SMP barriers when that is all
which
is required.
On both ARM and x86 both types of barrier are currently identical so there
is
no actual change. A future patch will change smp_mb to a weaker barrier on
ARM.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
commit b0581b9214d2359207f836f4f075e978527b9a7b
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Jul 4 10:27:39 2013 +0200
x86: make map_domain_page_global() a simple wrapper around vmap()
This is in order to reduce the number of fundamental mapping mechanisms
as well as to reduce the amount of code to be maintained. In the course
of this the virtual space available to vmap() is being grown from 16Gb
to 64Gb.
Note that this requires callers of unmap_domain_page_global() to no
longer pass misaligned pointers - map_domain_page_global() returns page
size aligned pointers, so unmappinmg should be done accordingly.
unmap_vcpu_info() violated this and is being adjusted here.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
commit d8a7694e5a415ac0a871f0ae58f50876ad30d619
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Jul 4 10:26:24 2013 +0200
bitmap_*() should cope with zero size bitmaps
... to match expectations set by memset()/memcpy().
Similarly for find_{first,next}_{,zero_}_bit() on x86.
__bitmap_shift_{left,right}() would also need fixing (they more
generally can''t cope with the shift count being larger than the
bitmap
size, and they perform undefined operations by possibly shifting an
unsigned long value by BITS_PER_LONG bits), but since these functions
aren''t really used anywhere I wonder if we wouldn''t better
simply get
rid of them.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
commit 966e77e9d6855274954d2d38eca2393121da477d
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Jul 4 10:25:31 2013 +0200
x86: drop MAX_VECTOR definition
.. in favor of NR_VECTORS, as being redundant and as the latter is
correct in terms of its naming, while the former is off by one.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit da72c56322c012f67aad79ca6093a5f21a0a3395
Author: Ben Guthro <benjamin.guthro@citrix.com>
Date: Thu Jul 4 10:23:36 2013 +0200
x86: Restore reboot quirks by DMI, fix reboot on a number of systems
The following patch ports the functionality following changeset from
Linux (from 2008) to xen:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=14d7ca5c
It implements an additional reboot quirk to do a PCI reset via port
CF9.
This also restores some code dropped in the x86_32 target removal
(changeset 5d1181a5ea5e0f11d481a94b16ed00d883f9726e) which sets some
quirks based on DMI matching.
This will add reboot quirks on the following systems that are known to
be necessary on Linux:
Dell E520
Dell PowerEdge 1300
Dell PowerEdge 300
Dell OptiPlex 745
Dell OptiPlex 745
Dell OptiPlex 745
Dell OptiPlex 330
Dell OptiPlex 360
Dell OptiPlex 760
Dell PowerEdge 2400
Dell Precision T5400
Dell Precision T7400
HP Compaq Laptop
Dell XPS710
Dell DXP061
Sony VGN-Z540N
ASUS P4S800
Acer Aspire One A110
Apple MacBook5
Apple MacBookPro5
Apple Macmini3,1
Apple iMac9,1
Dell Latitude E6320
Dell Latitude E5420
Dell Latitude E6220
Dell Latitude E6420
Dell OptiPlex 990
Dell OptiPlex 990
Dell Latitude E6520
Dell OptiPlex 790
Dell OptiPlex 990
Dell OptiPlex 390
Dell Latitude E6320
Dell Latitude E6420
Dell Latitude E6520
I clearly have not been able to test on all of these systems.
It does fix rebooting on the Dell 790, and should *not* change the
reboot paths of systems not on this DMI match list.
Signed-off-by: Ben Guthro <benjamin.guthro@citrix.com>
Use driver_data, thus requiring only a single handler function.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org
Acked-by: Ben Guthro <benjamin.guthro@citrix.com>
commit f487767ad0e58acb6c1ed3cc56daa0fb71b1f23a
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Tue Jul 2 21:02:33 2013 +0100
docs: Pull Xen version from canonical location
rather than hard coding it and being wrong every time we branch for a
release.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
(qemu changes not included)