[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 22469: tolerable trouble: broken/fail/pass
flight 22469 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/22469/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-sedf 7 debian-install fail pass in 22466 test-amd64-i386-xend-qemut-winxpsp3 3 host-install(3) broken pass in 22466 test-armhf-armhf-xl 5 xen-boot fail in 22466 pass in 22469 Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-win7-amd64 7 windows-install fail like 22464 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-armhf-armhf-xl 8 debian-fixup fail never pass test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail in 22466 never pass version targeted for testing: xen 3d929ba0cd0e84548f6d35fa77da08663ba4b0d0 baseline version: xen 29cc51db84a9c15875836121c5c60cc5eb6b613e ------------------------------------------------------------ People who touched revisions under test: Ian Campbell <ian.campbell@xxxxxxxxxx> Julien Grall <julien.grall@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-armhf-armhf-xl fail test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-xl-sedf fail test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-i386-xend-qemut-winxpsp3 broken test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Pushing revision : + branch=xen-unstable + revision=3d929ba0cd0e84548f6d35fa77da08663ba4b0d0 + . cri-lock-repos ++ . cri-common +++ . cri-getconfig +++ umask 002 +++ getconfig Repos +++ perl -e ' use Osstest; readglobalconfig(); print $c{"Repos"} or die $!; ' ++ repos=/export/home/osstest/repos ++ repos_lock=/export/home/osstest/repos/lock ++ '[' x '!=' x/export/home/osstest/repos/lock ']' ++ OSSTEST_REPOS_LOCK_LOCKED=/export/home/osstest/repos/lock ++ exec with-lock-ex -w /export/home/osstest/repos/lock ./ap-push xen-unstable 3d929ba0cd0e84548f6d35fa77da08663ba4b0d0 + branch=xen-unstable + revision=3d929ba0cd0e84548f6d35fa77da08663ba4b0d0 + . cri-lock-repos ++ . cri-common +++ . cri-getconfig +++ umask 002 +++ getconfig Repos +++ perl -e ' use Osstest; readglobalconfig(); print $c{"Repos"} or die $!; ' ++ repos=/export/home/osstest/repos ++ repos_lock=/export/home/osstest/repos/lock ++ '[' x/export/home/osstest/repos/lock '!=' x/export/home/osstest/repos/lock ']' + . cri-common ++ . cri-getconfig ++ umask 002 + select_xenbranch + case "$branch" in + tree=xen + xenbranch=xen-unstable + '[' xxen = xlinux ']' + linuxbranch= + : tested/2.6.39.x + . ap-common ++ : osstest@xxxxxxxxxxxxxxxxxxxxx ++ : git://xenbits.xen.org/xen.git ++ : osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/xen.git ++ : git://xenbits.xen.org/staging/qemu-xen-unstable.git ++ : git://git.kernel.org ++ : git://git.kernel.org/pub/scm/linux/kernel/git ++ : git ++ : git://xenbits.xen.org/osstest/linux-firmware.git ++ : osstest@xxxxxxxxxxxxxxxxxxxxx:/home/osstest/ext/linux-firmware.git ++ : git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git ++ : osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/linux-pvops.git ++ : git://xenbits.xen.org/linux-pvops.git ++ : tested/linux-3.4 ++ : tested/linux-arm-xen ++ '[' xgit://xenbits.xen.org/linux-pvops.git = x ']' ++ '[' x = x ']' ++ : git://xenbits.xen.org/linux-pvops.git ++ : tested/linux-arm-xen ++ : git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git ++ : tested/2.6.39.x ++ : daily-cron.xen-unstable ++ : daily-cron.xen-unstable ++ : http://hg.uk.xensource.com/carbon/trunk/linux-2.6.27 ++ : git://xenbits.xen.org/staging/qemu-upstream-unstable.git ++ : daily-cron.xen-unstable + TREE_LINUX=osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/linux-pvops.git + TREE_QEMU_UPSTREAM=osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/qemu-upstream-unstable.git + TREE_XEN=osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/xen.git + info_linux_tree xen-unstable + case $1 in + return 1 + case "$branch" in + cd /export/home/osstest/repos/xen + git push osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/xen.git 3d929ba0cd0e84548f6d35fa77da08663ba4b0d0:master To osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/xen.git ! [rejected] 3d929ba0cd0e84548f6d35fa77da08663ba4b0d0 -> master (non-fast forward) error: failed to push some refs to 'osstest@xxxxxxxxxxxxxxxxxxxxx:/home/xen/git/xen.git' ------------------------------------------------------------ commit 3d929ba0cd0e84548f6d35fa77da08663ba4b0d0 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed Dec 18 16:54:08 2013 +0000 xen/arm: p2m: Fix hypercall preemption when domain is relinquish memory mapping The commit 84f29a9 "xen/arm: Add relinquish_p2m_mapping to remove reference on every mapped page" doesn't save correctly the next gfn when the hypercall is preempted. Instead of storing the next gfn, it store the next mfn. Fix it by using 'addr' instead of 'maddr'. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit ea5647f2abad4f6b2149933cdebe6d4f7db0094d Merge: 9383b2c... 29cc51d... Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Dec 18 14:37:01 2013 +0000 Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into staging commit 9383b2cc52629d77879952fda712463871ea2fe7 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:58 2013 +0000 xen/arm: grant-table: Support read-only mapping Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 8e3079c48187aa6d04686ddb51afa10234cdbcf0 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:57 2013 +0000 xen/arm: Set foreign page type to p2m_map_foreign Xen needs to know that the current page belongs to another domain. Also take a reference to this page. The current process to add a foreign page is: 1) get the page from the foreign p2m 2) take a reference on the page with the foreign domain in parameters 3) add the page to the current domain p2m If the foreign domain drops the page: - before 2), get_page will return NULL because the page doesn't belong anymore to the domain - after 2), the current domain already have a reference. Write will occur to an old page which is not yet released. It can corrupt the foreign domain. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 84f29a98dc31fcf4a6bbf380601f4b3651c761f8 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:56 2013 +0000 xen/arm: Add relinquish_p2m_mapping to remove reference on every mapped page This function will be called when the domain relinquishes its memory. It removes refcount on every mapped page to a valid MFN. Currently, Xen doesn't take reference on every new mapping but only for foreign mapping. Restrict the function only on foreign mapping. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 9486a8d07ba8d8385d7902fbc815f5e257da13df Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:55 2013 +0000 xen/arm: Handle remove foreign mapping Modify get_page_from_gfn to take reference on foreign mapping. This will avoid specific handling in the common code. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit bc10bb6134e858722177ca60ea06574fa9911ab8 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:54 2013 +0000 xen/arm: Retrieve p2m type in get_page_from_gfn Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 10f875d7d50e113423e087e6b682f9fc14862661 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:53 2013 +0000 xen/arm: p2m: Extend p2m_lookup parameters to retrieve the p2m type Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 18651cc81bf46884cc0100574e9f41ebe91f93f8 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:52 2013 +0000 xen/arm: Store p2m type in each page of the guest Use the field 'avail' to store the type of the page. Rename it to 'type' for convenience. The information stored in this field will be retrieved in a future patch to change the behaviour when the page is removed. Also introduce guest_physmap_add_entry to map and set a specific p2m type for a page. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 587db6905046fd55f70f0d9fbbf7ff6a8d2ef58a Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:51 2013 +0000 xen/arm: Implement p2m_type_t as an enum Until now, Xen doesn't know the type of the page (ram, foreign page, mmio,...). Introduce p2m_type_t with basic types: - p2m_invalid: Nothing is mapped here - p2m_ram_rw: Normal read/write guest RAM - p2m_ram_ro: Read-only guest RAM - p2m_mmio_direct: Read/write mapping of device memory - p2m_map_foreign: RAM page from foreign guest - p2m_grant_map_rw: Read/write grant mapping - p2m_grant_map_ro: Read-only grant mapping Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit ef8f305c6b4dd9e81e4c87ce3a251d779ff2301d Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:50 2013 +0000 xen/arm: move mfn_to_p2m_entry in arch/arm/p2m.c The function mfn_to_p2m_entry will be extended in a following patch to handle p2m_type_t. It will break compilation because p2m_type_t is not defined (interdependence between includes). It's easier to move the function in arch/arm/p2m.c and it's not harmful as the function is only used in this file. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 2bfa5c7fdd8e24279f3f1d28f434cfe923565bea Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 16:27:49 2013 +0000 xen/arm: Introduce steps in domain_relinquish_resource In a later patch, a new step will be added. It will avoid to check every step when the function was preempted. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit cd50b8cae268fc66969e2f3858e79c244a0eea0b Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Dec 18 13:39:14 2013 +0000 xen: arm: process XENMEM_add_to_physmap_range forwards not backwards. Jan points out that processing the list backwards is rather counter intuitive and that the effect of the hypercall can differ between forwards and backwards processing (e.g. in the presence of duplicate idx or gpfn, which would be unusual but as Jan says, users are a creative bunch) Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Cc: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |