[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 22466: regressions - FAIL



flight 22466 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/22466/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl           5 xen-boot                  fail REGR. vs. 22464

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-win7-amd64  7 windows-install              fail  like 22464

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass

version targeted for testing:
 xen                  3d929ba0cd0e84548f6d35fa77da08663ba4b0d0
baseline version:
 xen                  29cc51db84a9c15875836121c5c60cc5eb6b613e

------------------------------------------------------------
People who touched revisions under test:
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          fail    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 3d929ba0cd0e84548f6d35fa77da08663ba4b0d0
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Wed Dec 18 16:54:08 2013 +0000

    xen/arm: p2m: Fix hypercall preemption when domain is relinquish memory 
mapping
    
    The commit 84f29a9 "xen/arm: Add relinquish_p2m_mapping to remove reference 
on
    every mapped page" doesn't save correctly the next gfn when the hypercall
    is preempted.
    
    Instead of storing the next gfn, it store the next mfn. Fix it by using
    'addr' instead of 'maddr'.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit ea5647f2abad4f6b2149933cdebe6d4f7db0094d
Merge: 9383b2c... 29cc51d...
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Dec 18 14:37:01 2013 +0000

    Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into 
staging

commit 9383b2cc52629d77879952fda712463871ea2fe7
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:58 2013 +0000

    xen/arm: grant-table: Support read-only mapping
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 8e3079c48187aa6d04686ddb51afa10234cdbcf0
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:57 2013 +0000

    xen/arm: Set foreign page type to p2m_map_foreign
    
    Xen needs to know that the current page belongs to another domain. Also take
    a reference to this page.
    
    The current process to add a foreign page is:
       1) get the page from the foreign p2m
       2) take a reference on the page with the foreign domain in parameters
       3) add the page to the current domain p2m
    
    If the foreign domain drops the page:
        - before 2), get_page will return NULL because the page doesn't
        belong anymore to the domain
        - after 2), the current domain already have a reference. Write will
        occur to an old page which is not yet released. It can corrupt the 
foreign
        domain.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 84f29a98dc31fcf4a6bbf380601f4b3651c761f8
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:56 2013 +0000

    xen/arm: Add relinquish_p2m_mapping to remove reference on every mapped page
    
    This function will be called when the domain relinquishes its memory.
    It removes refcount on every mapped page to a valid MFN.
    
    Currently, Xen doesn't take reference on every new mapping but only for 
foreign
    mapping. Restrict the function only on foreign mapping.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 9486a8d07ba8d8385d7902fbc815f5e257da13df
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:55 2013 +0000

    xen/arm: Handle remove foreign mapping
    
    Modify get_page_from_gfn to take reference on foreign mapping. This will 
avoid
    specific handling in the common code.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit bc10bb6134e858722177ca60ea06574fa9911ab8
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:54 2013 +0000

    xen/arm: Retrieve p2m type in get_page_from_gfn
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 10f875d7d50e113423e087e6b682f9fc14862661
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:53 2013 +0000

    xen/arm: p2m: Extend p2m_lookup parameters to retrieve the p2m type
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 18651cc81bf46884cc0100574e9f41ebe91f93f8
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:52 2013 +0000

    xen/arm: Store p2m type in each page of the guest
    
    Use the field 'avail' to store the type of the page. Rename it to 'type' for
    convenience.
    The information stored in this field will be retrieved in a future patch to
    change the behaviour when the page is removed.
    
    Also introduce guest_physmap_add_entry to map and set a specific p2m type 
for
    a page.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 587db6905046fd55f70f0d9fbbf7ff6a8d2ef58a
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:51 2013 +0000

    xen/arm: Implement p2m_type_t as an enum
    
    Until now, Xen doesn't know the type of the page (ram, foreign page, 
mmio,...).
    Introduce p2m_type_t with basic types:
        - p2m_invalid: Nothing is mapped here
        - p2m_ram_rw: Normal read/write guest RAM
        - p2m_ram_ro: Read-only guest RAM
        - p2m_mmio_direct: Read/write mapping of device memory
        - p2m_map_foreign: RAM page from foreign guest
        - p2m_grant_map_rw: Read/write grant mapping
        - p2m_grant_map_ro: Read-only grant mapping
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit ef8f305c6b4dd9e81e4c87ce3a251d779ff2301d
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:50 2013 +0000

    xen/arm: move mfn_to_p2m_entry in arch/arm/p2m.c
    
    The function mfn_to_p2m_entry will be extended in a following patch to 
handle
    p2m_type_t. It will break compilation because p2m_type_t is not defined
    (interdependence between includes).
    It's easier to move the function in arch/arm/p2m.c and it's not harmful as 
the
    function is only used in this file.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 2bfa5c7fdd8e24279f3f1d28f434cfe923565bea
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 16:27:49 2013 +0000

    xen/arm: Introduce steps in domain_relinquish_resource
    
    In a later patch, a new step will be added. It will avoid to check every 
step
    when the function was preempted.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit cd50b8cae268fc66969e2f3858e79c244a0eea0b
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Dec 18 13:39:14 2013 +0000

    xen: arm: process XENMEM_add_to_physmap_range forwards not backwards.
    
    Jan points out that processing the list backwards is rather counter 
intuitive
    and that the effect of the hypercall can differ between forwards and 
backwards
    processing (e.g. in the presence of duplicate idx or gpfn, which would be
    unusual but as Jan says, users are a creative bunch)
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Cc: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.