[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 22309: regressions - FAIL



flight 22309 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/22309/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-win7-amd64 12 guest-localmigrate/x10  fail REGR. vs. 22278
 test-amd64-i386-xl-winxpsp3-vcpus1  7 windows-install     fail REGR. vs. 22278
 test-amd64-i386-xl-win7-amd64  7 windows-install          fail REGR. vs. 22278

Tests which did not succeed, but are not blocking:
 test-amd64-i386-freebsd10-amd64  8 guest-saverestore           fail never pass
 test-amd64-i386-freebsd10-i386  8 guest-saverestore            fail never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-armhf-armhf-xl           5 xen-boot                     fail   never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass

version targeted for testing:
 xen                  d65da94e03935878d84818a6890403997027cfa4
baseline version:
 xen                  4b07b3cbf29f66da6090d52e75b5fdae592c6441

------------------------------------------------------------
People who touched revisions under test:
  Andre Przywara <andre.przywara@xxxxxxxxxx>
  Anthony PERARD <anthony.perard@xxxxxxxxxx>
  Daniel Kiper <daniel.kiper@xxxxxxxxxx>
  Eddie Dong <eddie.dong@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Lan Yixun (dlan) <dennis.yxun@xxxxxxxxx>
  Nathan Studer <nate.studer@xxxxxxxxxxxxxxx>
  Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          fail    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-i386-freebsd10-amd64                              fail    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               fail    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit d65da94e03935878d84818a6890403997027cfa4
Author: Andre Przywara <andre.przywara@xxxxxxxxxx>
Date:   Thu Dec 5 11:08:12 2013 +0100

    arm64: enable PSCI secondary CPU bringup
    
    If the device tree contains a PSCI node and the DTB CPU node tells us
    to use PSCI for enabling secondary cores, we set the function pointer
    to the PSCI wrapper function to enable PSCI SMP bringup.
    
    Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 875c495af5f2f07d98348d1ff19277f49d18be92
Author: Andre Przywara <andre.przywara@xxxxxxxxxx>
Date:   Thu Dec 5 11:08:11 2013 +0100

    arm32: enable PSCI secondary CPU bringup
    
    If the device tree contains a PSCI node, we bring up secondary CPUs
    by invoking the appropriate PSCI handler.
    This will take priority over platform specific functions (which could
    call the PSCI wrapper themselves if needed), so any PSCI enablement
    of a platform will automatically be used (as on Linux).
    
    Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 3702d92fe4540f52032281c88182e48962c08f57
Author: Andre Przywara <andre.przywara@xxxxxxxxxx>
Date:   Thu Dec 5 11:08:10 2013 +0100

    arm: add a function to invoke the PSCI handler
    
    The PSCI handler is invoked via a secure monitor call with the
    arguments defined in registers. Copy the function from the
    Linux code and adjust it to work on both ARM32 and ARM64.
    
    Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 18a13b96766cfa44c0edb170ed34a1d6bfde9db1
Author: Andre Przywara <andre.przywara@xxxxxxxxxx>
Date:   Thu Dec 5 11:08:09 2013 +0100

    arm: parse PSCI node from the host device-tree
    
    The availability of a PSCI handler is advertised in the DTB.
    Find and parse the node (described in the Linux device-tree binding)
    and save the function number for bringing up a CPU for later usage.
    We do some sanity checks, especially we deny using HVC as a calling
    method, as it does not make much sense currently under Xen.
    
    Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 4e014d63e3d611efbb5fc971ffccafda9aa2b2bb
Author: Andre Przywara <andre.przywara@xxxxxxxxxx>
Date:   Thu Dec 5 11:08:08 2013 +0100

    arm: move GIC SGI kicking into separate function
    
    Currently we unconditionally send SGIs to all cores on SMP bringup.
    
    Those SGIs (software generated interrupts) are to push a secondary core
    through a gate in the Xen bring up code to filter the right CPU. This gate 
is
    necessary on platforms which do not allow us to wake up a specific secondary
    processor and will trap all but the CPU we are trying to wake up.
    
    With PSCI we can explicitly specify the core to startup, so we don't need 
the
    kick here because the CPU will fall straight through Xen's gate.
    
    So we move the GIC kick into a function and call it explicitly from the
    platforms that need it. This gets us get rid of the empty cpu_up() platform
    functions in ARM32 and the comment in there.
    
    Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    [ ijc -- explain more about the Xen gate in the commit message ]

commit fd715d2c958833a8a9bdc41287922a441d66406d
Author: Andre Przywara <andre.przywara@xxxxxxxxxx>
Date:   Thu Dec 5 11:08:07 2013 +0100

    arm: rename xen/arch/arm/psci.c into vpsci.c
    
    Follow the current convention of prefixing guest related names
    with "v" by renaming the guest PSCI functionality into vpsci.c to make
    room for the host PSCI functions.
    
    Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit fba6c4ba5e8563d7ce53750750ac273781bd9398
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Dec 4 17:48:56 2013 +0000

    tools: libxl: testidl: initialise the KeyedUnion keyvar before the union
    
    This is Coverity CID 1135378 and 1135379.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 71952bfcbe9187765cf4010b1479af86def4fb1f
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Dec 4 14:54:21 2013 +0000

    xen: arm: Enable 1:1 workaround by default
    
    I was just about to send out patches adding the 1:1 workaround to vexpress
    (the foundation model is a vexpress platfrom with DMA) and sunxi.
    
    That would have meant that all platforms now implement the quirk. Instead 
lets
    just make it the default and remove the quirk.
    
    In the future this will likely be set based on the presence absence of an
    IOMMU, perhaps with additional overrides by the platform.
    
    This results in some dead code in domain_build for dealing with the non-1:1
    case. This is deliberate and is left in anticipation of IOMMU support in 
4.5.
    
    PLATFORM_QUIRK_GIC_64K_STRIDE is renumbered as a side effect of this change.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit ca5690565784caa53b9889f8539c2dd9b375e419
Merge: c04fbf5... 747fb88...
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Dec 4 14:51:57 2013 +0000

    Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into 
staging

commit 747fb88881b0c448fa99a94fba3a492066df248a
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Wed Dec 4 14:46:19 2013 +0000

    QEMU_TAG update

commit c04fbf58558de544b96c861bb88293524fa30afc
Author: Dennis Lan (dlan) <dennis.yxun@xxxxxxxxx>
Date:   Wed Dec 4 14:37:25 2013 +0000

    xen: arm64: clear boot_first instead of boot_pgtable twice
    
    Signed-off-by: Lan Yixun (dlan) <dennis.yxun@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit fda8904bf3d149296a3dd8d3e7fc835d91b9828e
Author: Anthony PERARD <anthony.perard@xxxxxxxxxx>
Date:   Thu Nov 28 19:44:50 2013 +0000

    Update QEMU_UPSTREAM_REVISION
    
    Changing to master, otherwise we don't get the last updates.
    
    Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 2cebe22e6924439535cbf4a9f82a7d9d30c8f9c7
Author: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Date:   Mon Dec 2 20:13:03 2013 +0100

    libxenctrl: Fix xc_interface_close() crash if it gets NULL as an argument
    
    xc_interface_close() crashes if it gets NULL as an argument. However,
    it just calls xc_interface_close_common() which is called by many
    others functions. It means that they are also vulnerable. So fix above
    mentioned issue by adding NULL check in xc_interface_close_common().
    This way we fix similar issue in other functions which calls
    xc_interface_close_common() too.
    
    Signed-off-by: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 17d34efd6751f93bec943ccc8f5b8c56c8fbb483
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Dec 3 15:13:36 2013 +0000

    xen: arm: TCR_EL1 is 64-bit on arm64
    
    Storing it in a 32-bit variable in struct arch_vcpu caused breakage over
    context switch.
    
    There were also several other places which stored this as the 32-bit value.
    Update them all.
    
    The "struct vcpu_guest_context" case needs special consideration. This 
struct
    is in theory is exposed to guests, via the VCPUOP_initialise hypercall.
    However as discussed in
    http://lists.xen.org/archives/html/xen-devel/2013-10/msg00912.html this 
isn't
    really a guest visible interface since ARM uses PSCI for VCPU bringup
    (VCPUOP_initialise simply isn't available) The other users of this interface
    are the domctls, which are not a stable API. Therefore while fixing the 
ttbcr
    size also surround the struct in ifdefs to restrict the struct to the
    hypervisor and the tools only (omitting the extra complexity of renaming as 
I
    suggested in the referenced thread).
    
    NB TCR_EL1 on arm64 is known as TTBCR on arm32, hence the apparent naming
    inconsistencies.
    
    Spotted-by: Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx>
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx>
    Cc: Anup Patel <anup.patel@xxxxxxxxxx>
    Cc: patches@xxxxxxxxxx
    Cc: patches@xxxxxxx

commit 375c911acc373b4765c0b6e53203e37ae4eb3745
Merge: 81dcaaa... 9f0c658...
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Dec 4 14:29:39 2013 +0000

    Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into 
staging

commit 81dcaaa97a21cb397cd326fdcb8f9953ea23ceff
Author: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx>
Date:   Tue Dec 3 17:24:27 2013 -0500

    arinc: Add poolid parameter to scheduler get/set functions
    
    Signed-off-by: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx>
    Reviewed-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 9f0c658baedcd0f3f71c35b54965e440ffef0e45
Author: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx>
Date:   Wed Dec 4 13:29:00 2013 +0100

    arinc: add cpu-pool support to scheduler
    
    1.  Remove the restriction that dom0 must be in the schedule, since dom-0 
may
    not belong to the scheduler's pool.
    2.  Add a schedule entry for each of dom-0's vcpus as they are created.
    3.  Add code to deal with empty schedules in the do_schedule function.
    4.  Call the correct idle task for the pcpu on which the scheduling decision
    is being made in do_schedule.
    5.  Add code to prevent migration of a vcpu.
    6.  Implement a proper cpu_pick function, which prefers the current 
processor.
    7.  Add a scheduler lock to protect access to global variables from multiple
        PCPUs.
    
    These changes do not implement arinc653 multicore.  Since the schedule only
    supports 1 vcpu entry per slot, even if the vcpus of a domain are run on
    multiple pcpus, the scheduler will essentially serialize their execution.
    
    Signed-off-by: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx>
    Release-acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>

commit dc37e0bfffc673f4bdce1d69ad86098bfb0ab531
Author: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Date:   Wed Dec 4 13:26:37 2013 +0100

    x86: fix early boot command line parsing
    
    There is no reliable way to encode NUL character as a character so encode
    it as a number. Read: 
http://sourceware.org/binutils/docs/as/Characters.html.
    Octal and hex encoding do not work on at least one system (GNU assembler
    version 2.22 (x86_64-linux-gnu) using BFD version (GNU Binutils for Debian) 
2.22).
    Without this fix e.g. no-real-mode option at the end of xen.gz command line
    is not detected.
    
    Signed-off-by: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit e1978480c76e36bc22ec12657121ac91d08aca6b
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Dec 4 13:23:27 2013 +0100

    nested VMX: fix I/O port exit emulation
    
    For multi-byte operations all affected ports' bits in the bitmap need
    to be checked, not just the first port's one.
    
    Reported-by: Matthew Daley <mattd@xxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.