[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 9901: regressions - FAIL



flight 9901 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/9901/

Regressions :-(

Tests which did not succeed and are blocking:
 test-amd64-i386-rhel6hvm-intel  7 redhat-install           fail REGR. vs. 9855
 test-amd64-i386-rhel6hvm-amd  7 redhat-install             fail REGR. vs. 9855
 test-amd64-amd64-xl-win       7 windows-install            fail REGR. vs. 9855
 test-amd64-i386-win-vcpus1    7 windows-install            fail REGR. vs. 9855
 test-amd64-i386-win           7 windows-install            fail REGR. vs. 9855
 test-amd64-i386-xl-win-vcpus1  7 windows-install           fail REGR. vs. 9855
 test-i386-i386-win            7 windows-install            fail REGR. vs. 9855
 test-i386-i386-xl-win         7 windows-install            fail REGR. vs. 9855
 test-amd64-amd64-win          7 windows-install            fail REGR. vs. 9855

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-xl-sedf     14 guest-localmigrate/x10       fail    like 9855
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass

version targeted for testing:
 xen                  335e8273a3f3
baseline version:
 xen                  dbdc840f8f62

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Charles Arnold <carnold@xxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
  Juergen Gross <juergen.gross@xxxxxxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   24167:335e8273a3f3
tag:         tip
user:        Keir Fraser <keir@xxxxxxx>
date:        Sat Nov 19 22:13:51 2011 +0000
    
    x86: Fix RCU locking in XENMEM_add_to_physmap.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24166:fe3e9d0c123c
user:        Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
date:        Fri Nov 18 13:43:26 2011 +0000
    
    iommu: Introduce per cpu flag (iommu_dont_flush_iotlb) to avoid unnecessary 
iotlb flush
    
    Add cpu flag that will be checked by the iommu low level code
    to skip iotlb flushes. iommu_iotlb_flush shall be called explicitly.
    
    Signed-off-by: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24165:89a4d97731c5
user:        Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
date:        Fri Nov 18 13:42:46 2011 +0000
    
    hvmloader: Change memory relocation loop when overlap with PCI hole
    
    Change the way we relocate the memory page if they overlap with pci
    hole.  Use new map space (XENMAPSPACE_gmfn_range) to move the loop
    into xen.
    
    This code usually get triggered when a device is pass through to a
    guest and the PCI hole has to be extended to have enough room to map
    the device BARs.  The PCI hole will starts lower and it might overlap
    with some RAM that has been alocated for the guest. That usually
    happen if the guest has more than 4G of RAM.  We have to relocate
    those pages in high mem otherwise they won't be accessible.
    
    Signed-off-by: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24164:707d27fe03e7
user:        Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
date:        Fri Nov 18 13:42:08 2011 +0000
    
    mm: New XENMEM space, XENMAPSPACE_gmfn_range
    
    XENMAPSPACE_gmfn_range is like XENMAPSPACE_gmfn but it runs on
    a range of pages. The size of the range is defined in a new field.
    
    This new field .size is located in the 16 bits padding between .domid
    and .space in struct xen_add_to_physmap to stay compatible with older
    versions.
    
    Signed-off-by: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24163:7a9a1261a6b0
user:        Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
date:        Fri Nov 18 13:41:33 2011 +0000
    
    add_to_physmap: Move the code for XENMEM_add_to_physmap
    
    Move the code for the XENMEM_add_to_physmap case into it's own
    function (xenmem_add_to_physmap).
    
    Signed-off-by: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24162:9a1a71f7bef2
user:        Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
date:        Fri Nov 18 13:40:56 2011 +0000
    
    iommu: Introduce iommu_flush and iommu_flush_all.
    
    Signed-off-by: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24161:aeb628c5af3f
user:        Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
date:        Fri Nov 18 13:40:19 2011 +0000
    
    vtd: Refactor iotlb flush code
    
    Factorize the iotlb flush code from map_page and unmap_page into
    it's own function.
    
    Signed-off-by: Jean Guyader <jean.guyader@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24160:d7e6bfa114d0
user:        Juergen Gross <juergen.gross@xxxxxxxxxxxxxx>
date:        Fri Nov 18 13:34:43 2011 +0000
    
    sched_sedf: Avoid panic when adjusting sedf parameters
    
    When using sedf scheduler in a cpupool the system might panic when
    setting sedf scheduling parameters for a domain.  Introduces
    for_each_domain_in_cpupool macro as it is usable 4 times now.  Add
    appropriate locking in cpupool_unassign_cpu().
    
    Signed-off-by: Juergen Gross <juergen.gross@xxxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24159:0965e589fdcc
user:        Paul Durrant <paul.durrant@xxxxxxxxxx>
date:        Fri Nov 18 13:32:50 2011 +0000
    
    hvmloader: Add configuration options to selectively disable S3 and S4 ACPI 
power states.
    
    Introduce acpi_s3 and acpi_s4 configuration options (default=1). The
    S3 and S4 packages are moved into separate SSDTs and their inclusion
    is controlled by the new configuration options.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24158:4fa1c13f8bb1
user:        Paul Durrant <paul.durrant@xxxxxxxxxx>
date:        Fri Nov 18 13:31:43 2011 +0000
    
    hvmloader: Move acpi_enabled out of hvm_info_table into xenstore
    
    Since hvmloader has a xentore client, use a platform key in xenstore
    to indicate whether ACPI is enabled or not rather than the shared
    hvm_info_table structure.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24157:7b5e1cb94bfa
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Fri Nov 18 09:22:45 2011 +0100
    
    x86/xsave: provide guests with finit-like environment
    
    Without the use of xsave, guests get their initial floating point
    environment set up with finit. At least NetWare actually depends on
    this (in particular on all exceptions being masked), so to be
    consistent set the same environment also when using xsave. This is
    also in line with all SSE exceptions getting masked initially.
    
    To avoid further fragile casts in xstate_alloc_save_area() the patch
    also changes xsave_struct's fpu_see member to have actually usable
    fields.
    
    The patch was tested in its technically identical, but modified-file-
    wise different 4.1.2 version.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Tested-by: Charles Arnold <carnold@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   24156:f29b5bd6e25f
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Fri Nov 18 09:21:24 2011 +0100
    
    x86/IRQ: prevent vector sharing within IO-APICs
    
    Following the prevention of vector sharing for MSIs, this change
    enforces the same within IO-APICs: Pin based interrupts use the IO-APIC
    as their identifying device under the AMD IOMMU (and just like for
    MSIs, only the identifying device is used to remap interrupts here,
    with no regard to an interrupt's destination).
    
    Additionally, LAPIC initiated EOIs (for level triggered interrupts) too
    use only the vector for identifying which interrupts to end. While this
    generally causes no significant problem (at worst an interrupt would be
    re-raised without a new interrupt event actually having occurred), it
    still seems better to avoid the situation.
    
    For this second aspect, a distinction is being made between the
    traditional and the directed-EOI cases: In the former, vectors should
    not be shared throughout all IO-APICs in the system, while in the
    latter case only individual IO-APICs need to be contrained (or, if the
    firmware indicates so, sub- groups of them having the same GSI appear
    at multiple pins).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    
    
changeset:   24155:0d50e704834f
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Fri Nov 18 09:18:41 2011 +0100
    
    x86/IO-APIC: refine EOI-ing of migrating level interrupts
    
    Rather than going through all IO-APICs and calling io_apic_eoi_vector()
    for the vector in question, just use eoi_IO_APIC_irq().
    
    This in turn allows to eliminate quite a bit of other code.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    
    
changeset:   24154:dbdc840f8f62
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Nov 16 18:21:14 2011 +0000
    
    elf: Fix Elf64 types and structs to match the specification.
    
    The layouts were actually correct, but the type names were a bit
    messed up.
    
    Original patch by Volker Eckert <volker.eckert@xxxxxxxxxx>
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
========================================
commit 52834188eedfbbca5636fd869d4c86b3b3044439
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Nov 1 18:42:55 2011 +0000

    qemu-xen: remove i386-dm/README.hvm-pv-magic-ioport-disable
    
    I have just proposed a patch to add this to xen-unstable.hg as
    docs/misc/hvm-emulated-unplug.markdown. This repo is not a place where 
people
    look for docs, plus we are transitioning to upstream qemu.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.