[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 26306: regressions - FAIL



flight 26306 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/26306/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 11 guest-saverestore.2 fail REGR. vs. 
26273

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      9 guest-start                  fail   never pass
 test-amd64-i386-libvirt       9 guest-start                  fail   never pass
 test-armhf-armhf-libvirt      9 guest-start                  fail   never pass
 test-armhf-armhf-xl          10 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-i386-xl-winxpsp3  14 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass

version targeted for testing:
 xen                  2cd6bf3653a2b983c90bf3af42d199c499db4165
baseline version:
 xen                  11dba84796d852123da9d47f63b06aedaf9eeb01

------------------------------------------------------------
People who touched revisions under test:
  Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx>
  Christoph Egger <chegger@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
  Kai Huang <kai.huang@xxxxxxxxxxxxxxx>
  Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     fail    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-i386-xl-qemut-winxpsp3                            fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xl-qemuu-winxpsp3                            fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-amd64-i386-xl-winxpsp3                                  fail    


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 2cd6bf3653a2b983c90bf3af42d199c499db4165
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed May 14 15:12:01 2014 +0100

    tools: arm: remove code to check for a DTB appended to the kernel
    
    The code to check for an appended DTB was confusing and unnecessary. Since 
we
    know the size of the kernel binary passed to us we should just load the 
entire
    thing into guest RAM (subject to the limits checks). Removing this code 
avoids
    a whole raft of overflow and alignment issues.
    
    We also need to validate the limits of the segment where we intend to load 
the
    kernel to avoid overflow issues.
    
    For ARM32 we control the load address, but we need to validate the size. The
    entry point is only relevant within the guest so we don't need to worry 
about
    that.
    
    For ARM64 we need to validate both the load address (which is the same as 
the
    entry point) and the size.
    
    This is XSA-95.
    
    Reported-by: Thomas Leonard <talex5@xxxxxxxxx>
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 6d49536d844a2685a50281c5385a093a61911987
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue May 13 16:50:27 2014 +0100

    xen/arm: Don't give IOMMU devices to dom0 when iommu is disabled
    
    When iommu={disable,off,no,false} is given to Xen command line, the IOMMU
    framework won't specify that the device shouldn't be passthrough to DOM0.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 7d0f4a2cad3faa6dbecca87b1b11cf19ce06cd97
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue May 13 16:50:26 2014 +0100

    MAINTAINERS: Add drivers/passthrough/arm
    
    Add the ARM IOMMU directory to "ARM ARCHITECTURE" part
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Cc: Keir Fraser <keir@xxxxxxx>
    Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Cc: Jan Beulich <jbeulich@xxxxxxxx>

commit 4a3bdfe07440eb7ecd23f13379cf909f8aa4ab26
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue May 13 16:50:25 2014 +0100

    xen/passthrough: Introduce IOMMU ARM architecture
    
    This patch contains the architecture to use IOMMUs on ARM. There is no
    IOMMU drivers on this patch.
    
    In this implementation, IOMMU page table will be shared with the P2M.
    
    The code will run through the device tree and will initialize every IOMMU.
    It's possible to have multiple IOMMUs on the same platform, but they must
    be handled with the same driver. For now, there is no support for using
    multiple iommu drivers at runtime.
    
    Each new IOMMU drivers should contain:
    
    static const char * const myiommu_dt_compat[] __initconst =
    {
        /* list of device compatible with the drivers. Will be matched with
         * the "compatible" property on the device tree
         */
        NULL,
    };
    
    DT_DEVICE_START(myiommu, "MY IOMMU", DEVICE_IOMMU)
            .compatible = myiommu_compatible,
            .init = myiommu_init,
    DT_DEVICE_END
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Cc: Xiantao Zhang <xiantao.zhang@xxxxxxxxx>
    Cc: Jan Beulich <jbeulich@xxxxxxxx>

commit df6d39cbeba73ba7e1c27b9496c38169b5ec05f8
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue May 13 16:50:24 2014 +0100

    xen/passthrough: iommu: Basic support of device tree assignment
    
    Add IOMMU helpers to support device tree assignment/deassignment. This patch
    introduces 2 new fields in the dt_device_node:
        - is_protected: Does the device is protected by an IOMMU
        - domain_list: Pointer to the next device assigned to the same
        domain
    
    This commit contains only support to protected a device with DOM0.
    Device passthrough to another guest won't work out-of-box.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Cc: Xiantao Zhang <xiantao.zhang@xxxxxxxxx>

commit dfd60b0750c2ca79e27145622c412642b0bc8d90
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue May 13 16:50:17 2014 +0100

    xen/arm: Introduce flush_tlb_domain
    
    The pattern p2m_load_VTTBR(d) -> flush_tlb -> 
p2m_load_VTTBR(current->domain)
    is used in few places.
    
    Replace this usage by flush_tlb_domain which will take care of this pattern.
    This will help to the readability of apply_p2m_changes which begin to be 
big.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    [ ijc -- s/lisibility/readability/, s/speficied/specified/ ]

commit a07084525c126c596326dc1442dd218f522f51b4
Author: Kai Huang <kai.huang@xxxxxxxxxxxxxxx>
Date:   Wed May 14 10:54:39 2014 +0200

    x86/MCE: bypass uninitialized vcpu in vMCE injection
    
    Dom0 may bring up less number of vCPUs than xen hypervisor actually created 
for
    it, and in this case, on Intel platform, vMCE injection to dom0 will fail 
due to
    injecting vMCE to uninitialized vcpu, and cause dom0 crash.
    
    Signed-off-by: Kai Huang <kai.huang@xxxxxxxxxxxxxxx>
    Acked-by: Christoph Egger <chegger@xxxxxxxxx>

commit 4905b35c1dd425acb99665f26f1c4cf910b4284e
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed May 14 10:51:37 2014 +0200

    iommu: introduce arch specific code
    
    Currently the structure hvm_iommu (xen/include/xen/hvm/iommu.h) contains
    x86 specific fields.
    
    This patch creates:
        - arch_hvm_iommu structure which will contain architecture depend
        fields
        - arch_iommu_domain_{init,destroy} function to execute arch
        specific during domain creation/destruction
    
    Also move iommu_use_hap_pt and domain_hvm_iommu in asm-x86/iommu.h.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx>
    Tested-by: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx>

commit 5979e0c92559333287122ff072aa6ad247bd088a
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed May 14 10:50:22 2014 +0200

    iommu: split generic code
    
    The generic IOMMU framework code (xen/drivers/passthrough/iommu.c) contains
    functions specific to x86 and PCI.
    
    Split the framework in 3 distincts files:
        - iommu.c: contains generic functions shared between x86 and ARM
                   (when it will be supported)
        - pci.c: contains specific functions for PCI passthrough
        - x86/iommu.c: contains specific functions for x86
    
    io.c contains x86 HVM specific code. Only compile for x86.
    
    This patch is mostly code movement in new files.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit fc49666e811db269539bc9557608504b5f332bfb
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed May 14 10:49:17 2014 +0200

    passthrough: rework hwdom_pvh_reqs to use it also on ARM
    
    Hardware domain on ARM will have the same requirements as hwdom PVH when 
iommu
    is enabled. Both PVH and ARM guest has paging mode translate enabled, so Xen
    can use it to know if it needs to check the requirements.
    
    Rename the function and remove "pvh" word in the panic message.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 2246d8483ed212a5998c108806937d24a76740d0
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed May 14 10:48:37 2014 +0200

    passthrough: vtd: iommu_set_hwdom_mapping is VTD specific
    
    This function was exported in common header. Rename it and move the 
declaration
    in drivers/passtrough/vtd/extern.h
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit aabea69d45d1ba45a5a7771da181a1477036d615
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed May 14 10:48:16 2014 +0200

    passthrough: amd: rename iommu_has_feature into amd_iommu_has_feature
    
    This function is AMD specific and the name will clash with a newly function
    added in the IOMMU framework.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx>

commit e91b65382425113772445f78c1a223fc1e6b7dbf
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed May 14 10:47:02 2014 +0200

    passthrough: amd: Remove domain_id from hvm_iommu
    
    The structure hvm_iommu contains a shadow value of domain->domain_id. There
    is no reason to not directly use domain->domain_id.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.