[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 18438: regressions - FAIL



flight 18438 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/18438/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-pvops              4 kernel-build              fail REGR. vs. 18431

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-qemuu-rhel6hvm-intel  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xend-winxpsp3  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-i386-qemut-rhel6hvm-intel  1 xen-build-check(1)         blocked n/a
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-xl-win7-amd64  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 xen-build-check(1)          blocked n/a
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-xend-qemut-winxpsp3  1 xen-build-check(1)          blocked n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1  1 xen-build-check(1)     blocked n/a

version targeted for testing:
 xen                  8f46b1cb99fe519ac39d10d0796c6be37fb1d178
baseline version:
 xen                  5d0ca62156d734a757656b9bcb6bf17ee76d37b4

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Bamvor Jian Zhang <bjzhang@xxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Murray <murrayie@xxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Kjetil Torgrim Homme <kjetil.homme@xxxxxxxxxxxxxxxxxx>
  Marek Marczykowski <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             fail    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           blocked 
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     blocked 
 test-amd64-i386-xl-winxpsp3-vcpus1                           blocked 
 test-amd64-i386-xend-qemut-winxpsp3                          blocked 
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                blocked 
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 8f46b1cb99fe519ac39d10d0796c6be37fb1d178
Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
Date:   Fri Jul 5 12:13:54 2013 +0100

    libxl: Allow network driver domains when run_hotplug_scritps is set
    
    As of commit 05bfd984dfe7014f1f5ea1133608b9bab589c120, hotplug scripts
    are not run if backend_domid != LIBXL_TOOSTACK_DOMID; so there is no reason
    to restrict this for network driver domains any more.
    
    This is a candidate for backporting to 4.3.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    CC: Ian Campbell <ian.campbell@xxxxxxxxxx>
    CC: Ian Jackson <ian.jackson@xxxxxxxxxx>
    CC: Jan Beulich <jbeulich@xxxxxxxx>

commit 4816f9a7d47f985dfa796dc632771201b10858e8
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Mon Jul 15 15:40:55 2013 +0100

    xen/arm: Dummy implementation of multi-bank support
    
    U-boot for the arndale board splits the memory in 8 contiguous banks and
    rewrites the memory node. So most of the memory is lost.
    
    As the frametable is only able to handle contiguous memory, use the first
    contiguous banks and warn if some of the memory banks are not used.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    [ ijc -- "some banks" -> "some memory banks" ]

commit e5078b3a1b1a2fcb45197346edbd1beff4f290c4
Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
Date:   Fri Jul 5 17:30:44 2013 +0100

    docs: Fix minor error in xm man page
    
    xm block-attach takes "r" as read-only, not "ro".
    
    This is a backport candidate for 4.3, and probably others.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 8348707ce1c76e2fecbe9d413d5d8f2085bf57cb
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Mon Jul 15 09:24:05 2013 +0100

    xen: arm: correctly configure NSACR.
    
    Previously we were setting it up twice, the second time neglecting to set 
the
    NS_SMP bit.
    
    NSACR.NS_SMP is a processor specific bit which on Cortex-A7 and -A15 
regulates
    access to the (also processor specific) ACTLR.SMP bit. Not setting 
NSACR.NS_SMP
    meant that Xen's attempts to set ACTLR.SMP was silently ignored. Setting 
this
    bit is required in order to cause the processor to take part in cache and 
TLB
    coherency protocols. Failure to set this bit leads to random memory 
corruption
    in guests (although nothing like as catastrophic as you might expect!).
    
    An alternative fix would have been to set ACTLR.SMP when in Secure World,
    however Linux expects to set ACTLR.SMP itself in NS mode, so it's a good bet
    that bootloaders will set NSACR.NS_SMP instead.
    
    While here switch to a read-modify-write of NSACR to preserve any existing
    bits -- seems safer.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 26b48cf251c6ce39c07462b833d33195c172466b
Author: Marek Marczykowski <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
Date:   Mon May 13 20:23:54 2013 +0200

    Cleanup scmversion script, fix --save-scmversion option
    
    Remove unused variable, fix erroneously removed --save-scmversion code.
    
    Signed-off-by: Marek Marczykowski <marmarek@xxxxxxxxxxxxxxxxxxxxxx>

commit 4d1759b5153ce5b0903e56fefcfdca8a03b7c246
Author: Ian Murray <murrayie@xxxxxxxxxxx>
Date:   Thu Jul 4 00:58:27 2013 +0100

    xl: support for leaving domain paused after save
    
    New feature to allow xl save to leave a domain paused after its
    memory has been saved. This is to allow disk snapshots of domU
    to be taken that exactly correspond to the memory state at save time.
    Once the snapshot(s) have been taken or whatever, the domain can be
    unpaused in the usual manner.
    
    Usage:
        xl save -p <domid> <filespec>
    
    Signed-off-by: Ian Murray <murrayie@xxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit b179c6c490ca3e3baf1ce58ecb7f87f2a8df6049
Author: Kjetil Torgrim Homme <kjetil.homme@xxxxxxxxxxxxxxxxxx>
Date:   Thu Jun 20 13:51:41 2013 +0200

    pygrub: allow user to specify an explicit offset to fs
    
    This new option overrides partition table parsing
    
    Signed-off-by: Kjetil Torgrim Homme <kjetil.homme@xxxxxxxxxxxxxxxxxx>
    Reviewed-by: Matt Wilson <msw@xxxxxxxxxx>

commit 75beb8e45133acb8795024fc6114ff557ce1c27f
Author: Bamvor Jian Zhang <bjzhang@xxxxxxxx>
Date:   Mon Jul 15 16:45:33 2013 +0800

    xen: arm: introduce Cortex-A7 support
    
    Introduce Cortex-A7 with a scalable proc_info_list which including cpu id
    and cpu initialize function.
    In head.S, search cpu specific MIDR in procinfo and call such initialize
    function. Currently, support Cortex-A7 and Cortex-A15.
    
    Signed-off-by: Bamvor Jian Zhang <bjzhang@xxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 68caac7f6f4687241a24e804a9fca19aa26fe183
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jul 17 10:21:33 2013 +0200

    x86: don't use destroy_xen_mappings() for vunmap()
    
    Its attempt to tear down intermediate page table levels may race with
    map_pages_to_xen() establishing them, and now that
    map_domain_page_global() is backed by vmap() this teardown is also
    wasteful (as it's very likely to need the same address space populated
    again within foreseeable time).
    
    As the race between vmap() and vunmap(), according to the latest stage
    tester logs, doesn't appear to be the only one still left, the patch
    also adds logging for vmap() and vunmap() uses (there shouldn't be too
    many of them, so logs shouldn't get flooded). These are supposed to
    get removed (and are made stand out clearly) as soon as we're certain
    that there's no issue left.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit e0b6459aa2236324213d8af38c44eceb6efcedc3
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jul 17 08:49:39 2013 +0200

    Viridian: cleanup
    
    - functions used only locally should be static
    - constify parameters of dump functions
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>

commit 551b3c1227318a442c1c8fc121e63d7d36d5dd12
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jul 17 08:49:08 2013 +0200

    Viridian: populate CPUID leaf 6
    
    Properly reporting hardware features we use can only help Windows in
    making decisions towards its own performance tuning.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 27815a123ad898bc4f6dd82c62b16188d6f8eef1
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jul 17 08:48:24 2013 +0200

    VMX: suppress pointless indirect calls
    
    Get the other virtual interrupt delivery related actors in sync
    with the newly added handle_eoi() one: Clear the respective pointers
    (thus avoiding the call from generic code) when the feature is
    unavailable instead of checking feature availability in the actors.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>

commit 303066fdb1e4fe816e48acd665453f58b8399e81
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jul 17 08:47:18 2013 +0200

    VMX: fix interaction of APIC-V and Viridian emulation
    
    Viridian using a synthetic MSR for issuing EOI notifications bypasses
    the normal in-processor handling, which would clear
    GUEST_INTR_STATUS.SVI. Hence we need to do this in software in order
    for future interrupts to get delivered.
    
    Based on analysis by Yang Z Zhang <yang.z.zhang@xxxxxxxxx>.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>

commit 85047d9e4f4afeb73bca1e98f705a2f4f1d51c03
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Jul 17 08:45:20 2013 +0200

    x86/cpuidle: Change logging for unknown APIC IDs
    
    Dom0 uses this hypercall to pass ACPI information to Xen.  It is not very
    uncommon for more cpus to be listed in the ACPI tables than are present on 
the
    system, particularly on systems with a common BIOS for a 2 and 4 socket 
server
    varients.
    
    As Dom0 does not control the number of entries in the ACPI tables, and is
    required to pass everything it finds to Xen, change the logging.
    
    There is now an single unconditional warning for the first unknown ID, and
    further warnings if "cpuinfo" is requested by the user on the command line.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.