[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 22309: regressions - FAIL
flight 22309 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/22309/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-win7-amd64 12 guest-localmigrate/x10 fail REGR. vs. 22278 test-amd64-i386-xl-winxpsp3-vcpus1 7 windows-install fail REGR. vs. 22278 test-amd64-i386-xl-win7-amd64 7 windows-install fail REGR. vs. 22278 Tests which did not succeed, but are not blocking: test-amd64-i386-freebsd10-amd64 8 guest-saverestore fail never pass test-amd64-i386-freebsd10-i386 8 guest-saverestore fail never pass test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-armhf-armhf-xl 5 xen-boot fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass version targeted for testing: xen d65da94e03935878d84818a6890403997027cfa4 baseline version: xen 4b07b3cbf29f66da6090d52e75b5fdae592c6441 ------------------------------------------------------------ People who touched revisions under test: Andre Przywara <andre.przywara@xxxxxxxxxx> Anthony PERARD <anthony.perard@xxxxxxxxxx> Daniel Kiper <daniel.kiper@xxxxxxxxxx> Eddie Dong <eddie.dong@xxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxxxxx> Keir Fraser <keir@xxxxxxx> Lan Yixun (dlan) <dennis.yxun@xxxxxxxxx> Nathan Studer <nate.studer@xxxxxxxxxxxxxxx> Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-armhf-armhf-xl fail test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-i386-freebsd10-amd64 fail test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-freebsd10-i386 fail test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-i386-xend-qemut-winxpsp3 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit d65da94e03935878d84818a6890403997027cfa4 Author: Andre Przywara <andre.przywara@xxxxxxxxxx> Date: Thu Dec 5 11:08:12 2013 +0100 arm64: enable PSCI secondary CPU bringup If the device tree contains a PSCI node and the DTB CPU node tells us to use PSCI for enabling secondary cores, we set the function pointer to the PSCI wrapper function to enable PSCI SMP bringup. Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 875c495af5f2f07d98348d1ff19277f49d18be92 Author: Andre Przywara <andre.przywara@xxxxxxxxxx> Date: Thu Dec 5 11:08:11 2013 +0100 arm32: enable PSCI secondary CPU bringup If the device tree contains a PSCI node, we bring up secondary CPUs by invoking the appropriate PSCI handler. This will take priority over platform specific functions (which could call the PSCI wrapper themselves if needed), so any PSCI enablement of a platform will automatically be used (as on Linux). Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 3702d92fe4540f52032281c88182e48962c08f57 Author: Andre Przywara <andre.przywara@xxxxxxxxxx> Date: Thu Dec 5 11:08:10 2013 +0100 arm: add a function to invoke the PSCI handler The PSCI handler is invoked via a secure monitor call with the arguments defined in registers. Copy the function from the Linux code and adjust it to work on both ARM32 and ARM64. Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 18a13b96766cfa44c0edb170ed34a1d6bfde9db1 Author: Andre Przywara <andre.przywara@xxxxxxxxxx> Date: Thu Dec 5 11:08:09 2013 +0100 arm: parse PSCI node from the host device-tree The availability of a PSCI handler is advertised in the DTB. Find and parse the node (described in the Linux device-tree binding) and save the function number for bringing up a CPU for later usage. We do some sanity checks, especially we deny using HVC as a calling method, as it does not make much sense currently under Xen. Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 4e014d63e3d611efbb5fc971ffccafda9aa2b2bb Author: Andre Przywara <andre.przywara@xxxxxxxxxx> Date: Thu Dec 5 11:08:08 2013 +0100 arm: move GIC SGI kicking into separate function Currently we unconditionally send SGIs to all cores on SMP bringup. Those SGIs (software generated interrupts) are to push a secondary core through a gate in the Xen bring up code to filter the right CPU. This gate is necessary on platforms which do not allow us to wake up a specific secondary processor and will trap all but the CPU we are trying to wake up. With PSCI we can explicitly specify the core to startup, so we don't need the kick here because the CPU will fall straight through Xen's gate. So we move the GIC kick into a function and call it explicitly from the platforms that need it. This gets us get rid of the empty cpu_up() platform functions in ARM32 and the comment in there. Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> [ ijc -- explain more about the Xen gate in the commit message ] commit fd715d2c958833a8a9bdc41287922a441d66406d Author: Andre Przywara <andre.przywara@xxxxxxxxxx> Date: Thu Dec 5 11:08:07 2013 +0100 arm: rename xen/arch/arm/psci.c into vpsci.c Follow the current convention of prefixing guest related names with "v" by renaming the guest PSCI functionality into vpsci.c to make room for the host PSCI functions. Signed-off-by: Andre Przywara <andre.przywara@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit fba6c4ba5e8563d7ce53750750ac273781bd9398 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Dec 4 17:48:56 2013 +0000 tools: libxl: testidl: initialise the KeyedUnion keyvar before the union This is Coverity CID 1135378 and 1135379. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 71952bfcbe9187765cf4010b1479af86def4fb1f Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Dec 4 14:54:21 2013 +0000 xen: arm: Enable 1:1 workaround by default I was just about to send out patches adding the 1:1 workaround to vexpress (the foundation model is a vexpress platfrom with DMA) and sunxi. That would have meant that all platforms now implement the quirk. Instead lets just make it the default and remove the quirk. In the future this will likely be set based on the presence absence of an IOMMU, perhaps with additional overrides by the platform. This results in some dead code in domain_build for dealing with the non-1:1 case. This is deliberate and is left in anticipation of IOMMU support in 4.5. PLATFORM_QUIRK_GIC_64K_STRIDE is renumbered as a side effect of this change. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit ca5690565784caa53b9889f8539c2dd9b375e419 Merge: c04fbf5... 747fb88... Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Dec 4 14:51:57 2013 +0000 Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into staging commit 747fb88881b0c448fa99a94fba3a492066df248a Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Wed Dec 4 14:46:19 2013 +0000 QEMU_TAG update commit c04fbf58558de544b96c861bb88293524fa30afc Author: Dennis Lan (dlan) <dennis.yxun@xxxxxxxxx> Date: Wed Dec 4 14:37:25 2013 +0000 xen: arm64: clear boot_first instead of boot_pgtable twice Signed-off-by: Lan Yixun (dlan) <dennis.yxun@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit fda8904bf3d149296a3dd8d3e7fc835d91b9828e Author: Anthony PERARD <anthony.perard@xxxxxxxxxx> Date: Thu Nov 28 19:44:50 2013 +0000 Update QEMU_UPSTREAM_REVISION Changing to master, otherwise we don't get the last updates. Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 2cebe22e6924439535cbf4a9f82a7d9d30c8f9c7 Author: Daniel Kiper <daniel.kiper@xxxxxxxxxx> Date: Mon Dec 2 20:13:03 2013 +0100 libxenctrl: Fix xc_interface_close() crash if it gets NULL as an argument xc_interface_close() crashes if it gets NULL as an argument. However, it just calls xc_interface_close_common() which is called by many others functions. It means that they are also vulnerable. So fix above mentioned issue by adding NULL check in xc_interface_close_common(). This way we fix similar issue in other functions which calls xc_interface_close_common() too. Signed-off-by: Daniel Kiper <daniel.kiper@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 17d34efd6751f93bec943ccc8f5b8c56c8fbb483 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Dec 3 15:13:36 2013 +0000 xen: arm: TCR_EL1 is 64-bit on arm64 Storing it in a 32-bit variable in struct arch_vcpu caused breakage over context switch. There were also several other places which stored this as the 32-bit value. Update them all. The "struct vcpu_guest_context" case needs special consideration. This struct is in theory is exposed to guests, via the VCPUOP_initialise hypercall. However as discussed in http://lists.xen.org/archives/html/xen-devel/2013-10/msg00912.html this isn't really a guest visible interface since ARM uses PSCI for VCPU bringup (VCPUOP_initialise simply isn't available) The other users of this interface are the domctls, which are not a stable API. Therefore while fixing the ttbcr size also surround the struct in ifdefs to restrict the struct to the hypervisor and the tools only (omitting the extra complexity of renaming as I suggested in the referenced thread). NB TCR_EL1 on arm64 is known as TTBCR on arm32, hence the apparent naming inconsistencies. Spotted-by: Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx> Cc: Anup Patel <anup.patel@xxxxxxxxxx> Cc: patches@xxxxxxxxxx Cc: patches@xxxxxxx commit 375c911acc373b4765c0b6e53203e37ae4eb3745 Merge: 81dcaaa... 9f0c658... Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Dec 4 14:29:39 2013 +0000 Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into staging commit 81dcaaa97a21cb397cd326fdcb8f9953ea23ceff Author: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx> Date: Tue Dec 3 17:24:27 2013 -0500 arinc: Add poolid parameter to scheduler get/set functions Signed-off-by: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx> Reviewed-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 9f0c658baedcd0f3f71c35b54965e440ffef0e45 Author: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx> Date: Wed Dec 4 13:29:00 2013 +0100 arinc: add cpu-pool support to scheduler 1. Remove the restriction that dom0 must be in the schedule, since dom-0 may not belong to the scheduler's pool. 2. Add a schedule entry for each of dom-0's vcpus as they are created. 3. Add code to deal with empty schedules in the do_schedule function. 4. Call the correct idle task for the pcpu on which the scheduling decision is being made in do_schedule. 5. Add code to prevent migration of a vcpu. 6. Implement a proper cpu_pick function, which prefers the current processor. 7. Add a scheduler lock to protect access to global variables from multiple PCPUs. These changes do not implement arinc653 multicore. Since the schedule only supports 1 vcpu entry per slot, even if the vcpus of a domain are run on multiple pcpus, the scheduler will essentially serialize their execution. Signed-off-by: Nathan Studer <nate.studer@xxxxxxxxxxxxxxx> Release-acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> commit dc37e0bfffc673f4bdce1d69ad86098bfb0ab531 Author: Daniel Kiper <daniel.kiper@xxxxxxxxxx> Date: Wed Dec 4 13:26:37 2013 +0100 x86: fix early boot command line parsing There is no reliable way to encode NUL character as a character so encode it as a number. Read: http://sourceware.org/binutils/docs/as/Characters.html. Octal and hex encoding do not work on at least one system (GNU assembler version 2.22 (x86_64-linux-gnu) using BFD version (GNU Binutils for Debian) 2.22). Without this fix e.g. no-real-mode option at the end of xen.gz command line is not detected. Signed-off-by: Daniel Kiper <daniel.kiper@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit e1978480c76e36bc22ec12657121ac91d08aca6b Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Dec 4 13:23:27 2013 +0100 nested VMX: fix I/O port exit emulation For multi-byte operations all affected ports' bits in the bitmap need to be checked, not just the first port's one. Reported-by: Matthew Daley <mattd@xxxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |