[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 21201: regressions - FAIL

flight 21201 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemuu-win7-amd64  8 guest-saverestore fail REGR. vs. 21104

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-armhf-armhf-xl           5 xen-boot                     fail   never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass

version targeted for testing:
 xen                  b3cbe129d07ac9a41175491fdd3c882641588350
baseline version:
 xen                  170fa9967176c8627fe2e75dbe1dc5212019afde

People who touched revisions under test:
  Chen Baozi <baozich@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
  Julien Grall <julien.linaro.org>
  Keir Fraser <keir@xxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          fail    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

commit b3cbe129d07ac9a41175491fdd3c882641588350
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Thu Oct 10 15:43:45 2013 +0100

    xen: arm: Ensure HCR_EL2.RW is set correctly when building dom0
    copy_to_user and friends rely on this, since the address transalation
    functions (guest VA -> MFN) will truncate VA to the appropriate size.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 80a7e7eaa177af948b1f4cc954bf2d39ee182724
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Thu Oct 10 15:43:44 2013 +0100

    xen: arm: correctly round down MFN to 1GB boundary make sure pagetable mask 
macros as physaddr size
    ~FIRST_MASK is nothing like correct for rounding down an MFN. It is the
    inverse *and* an address not a framenumber so wrong in every dimension! We
    cannot use FIRST_MASK since that would mask off any zeroeth level bits.
    Instead calculate the correct value from FIRST_SIZE.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 8e782d0191d260c1a143f081fa0a30c2a4182aee
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Thu Oct 10 15:43:43 2013 +0100

    xen: arm: make sure pagetable mask macros have appropriate size
    {ZEROETH,FIRST,SECOND,THIRD}_MASK are used with physical addresses which may
    be larger than 32 bits. Therefore ensure that they are wide enough by 
    to paddr_t otherwise we may truncate addresses on 32-bit.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit d2766bee0f1f0fc1c4dbf30dcc9a43b91d5f19ce
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Thu Oct 10 15:43:42 2013 +0100

    xen: arm: map entire memory banks on arm64
    Currently we only map regions which are not part of boot modules. However we
    subsequently free at least some of those modules to the heaps in
    discard_initial_modules and if we were unluckly with sizing/location we 
    end up adding unmapped pages to the heap.
    The heaps on 64-bit use 1GB mappings, so in practice this is probably pretty
    unlikely and I've not actually seen it.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 50257e96b77c51b3eeb06ab68e7bd48ba2a8752b
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Thu Oct 10 15:43:41 2013 +0100

    xen: arm: Enable 40 bit addressing in VTCR for arm64
    This requires setting the v8 specific VTCR_EL2.PS field. These bits are
    UNK/SBZP on v7.
    Also the TS0SZ field is described slightly differently for v8, so update the
    comment to reflect this.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit e4d7c89e34bf62eda5118d61caef9858c38cdf57
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Thu Oct 10 15:43:40 2013 +0100

    xen: correct xenheap_bits after "xen: support RAM at addresses 0 and 4096"
    This is incorrect after commit 1aac966e24e which shuffled the zones up by 
    I've observed failures on arm64 systems with RAM at 
    since xenheap_bits ends up as 35 instead of 36 (which is the zone with all 
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    Cc: Tim Deegan <tim@xxxxxxx>

commit a067a9b960f6328e6bff620f7ab24096427bcc14
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Mon Oct 21 10:21:23 2013 +0100

    xen: arm: fix usage of bootargs for Xen.
    The chosen node's bootargs property should be used for Xen if there is a 
    kernel multiboot module with a command line, not just if xen,dom0-bootargs 
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.linaro.org>

commit badd47de999561ac31b7b6b7b2c3b34ef0476dad
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Oct 22 17:12:14 2013 +0100

    xen: arm: correct XEN_COMPILE_ARCH autodetection for arm64
    At least on aarch64 openSUSE running with qemu-user-aarch64 "uname -m" 
    "aarch64" and not "armv8" so include that in the seddery. There's no harm
    leaving the existing armv8 rune too so do so.
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 6c21cb36e263de2db8716b477157a5b6cd531e1e
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Oct 22 11:51:48 2013 +0100

    xen/arm: Allocate memory for dom0 from the bottom with the 1:1 Workaround
    On Linux, the option CONFIG_ARM_PATCH_PHYS_VIRT (by default enabled) allows
    the Kernel to be loaded anywhere (or nearly) by patching the translation
    pv<->virt at boot time.
    The current solution in Linux assuming that the delta physical address -
    virtual address is always negative. A positive delta will destroy all the
    optimisation to modify only a part of the translation instruction (add/sub).
    By default, Xen is allocating memory from the top of memory and then
    goes down. To avoid booting issue with Linux, we must allocate memory
    from the bottom (ie starting from 0).
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 466abd6b3866cda0866c03a9d7673f299d6f6754
Author: Chen Baozi <baozich@xxxxxxxxx>
Date:   Tue Oct 15 16:45:31 2013 +0800

    xen/arm: implement smp initialization callbacks for omap5
    Signed-off-by: Chen Baozi <baozich@xxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 96dfb26efab1de0d1a1bdb84987f13ab1be3498d
Author: Chen Baozi <baozich@xxxxxxxxx>
Date:   Tue Oct 15 16:45:29 2013 +0800

    xen/arm: fix a typo in comment of PLATFORM_QUIRK_DOM0_MAPPING_11
    Signed-off-by: Chen Baozi <baozich@xxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit d319a371decf9f851e4b9c18c4e123b9d2e16a57
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Thu Oct 24 09:47:50 2013 +0100

    netif.h: Add IPv6 related changes
    My recent patch series to Linux netback added IPv6 checksum
    offload and GSO support. This involved making some changes to the
    copy of netif.h in Linux.
    This patch adds those changes to the canonical copy of netif.h.
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 55021ff9ab691f8c79c1f881aa8ac40ae1cd4ab9
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed Oct 23 17:28:47 2013 +0100

    xen/arm: add_to_physmap_one: Avoid to map mfn 0 if an error occurs
    By default, the function add_to_physmap_one set mfn to 0. Some code paths 
    result to an error, continue and the map the mfn 0 (valid on ARM) to the
    slot given by the guest.
    To fix the problem, return directly an error if sanity check has failed.
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.