[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 26920: regressions - FAIL
flight 26920 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/26920/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 13 guest-localmigrate/x10 fail REGR. vs. 26871 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-sedf 11 guest-saverestore fail REGR. vs. 26871 Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 9 guest-start fail never pass test-amd64-i386-libvirt 9 guest-start fail never pass test-amd64-amd64-libvirt 9 guest-start fail never pass test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-armhf-armhf-xl 10 migrate-support-check fail never pass test-amd64-amd64-xl-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xl-winxpsp3 14 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop fail never pass version targeted for testing: xen e6390ad57bdf11881e6375f6227b5a594b4bcc3f baseline version: xen 7f8d8abcf6dfb85fae591a547b24f9b27d92272c ------------------------------------------------------------ People who touched revisions under test: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx> Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Christoph Egger <chegger@xxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> Paul Durrant <paul.durrant@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 fail test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt fail test-armhf-armhf-libvirt fail test-amd64-i386-libvirt fail test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-xl-sedf fail test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xl-qemuu-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail test-amd64-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on osstest.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit e6390ad57bdf11881e6375f6227b5a594b4bcc3f Author: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> Date: Mon Jun 2 10:32:22 2014 +0200 dom0: add opt_dom0pvh to setup.c Finally last patch in the series to enable creation of pvh dom0. A pvh dom0 is created by adding dom0pvh to grub xen command line. Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> commit 594e6fd413d646521cc29b38bc89f897b4570977 Author: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> Date: Mon Jun 2 10:31:49 2014 +0200 pvh dom0: allow get_pg_owner for translated domains if pvh When creating a PV guest, toolstack on pvh dom0 will do_mmuext_op to pin guest tables. do_mmuext_op calls get_pg_owner, which must allow foreign mappings for pvh. Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> commit 50fe6e737059a98e8a5242a7616e4cdcb60988c2 Author: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> Date: Mon Jun 2 10:30:47 2014 +0200 pvh dom0: add and remove foreign pages In this patch, a new function, p2m_add_foreign(), is added to map pages from a foreign guest into dom0 for various purposes like domU creation, running xentrace, etc... Such pages are typed p2m_map_foreign. Note, it is the nature of such pages that a refcnt is held during their stay in the p2m. The refcnt is added and released in the low level ept function atomic_write_ept_entry. That macro is converted to a function to allow for such refcounting, which only applies to leaf entries in the ept. Furthermore, please note that paging/sharing is disabled if the controlling or hardware domain is pvh. Any enabling of those features would need to ensure refcnt are properly maintained for foreign types, or paging/sharing is skipped for foreign types. Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> Reviewed-by: Tim Deegan <tim@xxxxxxx> commit 03d745c8bfbf45df39eb453ff1e7787b856c4368 Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Date: Mon Jun 2 10:20:23 2014 +0200 x86: correctly report max number of hypervisor leaves Commit def0bbd31 provided support for changing max number of hypervisor cpuid leaves (in leaf 0x4000xx00). It also made the hypervisor incorrectly report this number for guests that use default value (i.e. don't specify leaf 0x4000xx00 in config file) Reported-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> commit 071a4c70a634f7d4f74cde4086ff3202968538c9 Author: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx> Date: Mon Jun 2 10:19:27 2014 +0200 x86, amd_ucode: flip revision numbers in printk A failure would result in log message like so- (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed ^^^^^^^^^^^^^^^^^^^^^^ The above message has the revision numbers inverted. Fix this. Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx> commit 518576c6cbdaa2640865f1baa813c1b4d48c469f Author: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx> Date: Mon Jun 2 10:18:07 2014 +0200 x86,mce: consolidate AMD mcheck initialization amd_k8.c did a lot of common work and very little K8 specific work. So merge init functions of amd_f10.c and amd_k8.c and move it into the common amd_mcheck_init handler. With that done, there is not much left in either files, so fold all code into just one file - mce_amd.c While at it, update the comments regarding documentation with correct URL's and revision numbers. Also, update copyright info. Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx> Acked-by: Christoph Egger <chegger@xxxxxxxxx> commit 41b41c0b0d2e1b83929adcc8de703ea0cc2417a6 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Mon Jun 2 10:02:25 2014 +0200 ioreq-server: make buffered ioreq handling optional Some emulators will only register regions that require non-buffered access. (In practice the only region that a guest uses buffered access for today is the VGA aperture from 0xa0000-0xbffff). This patch therefore makes allocation of the buffered ioreq page and event channel optional for secondary ioreq servers. If a guest attempts buffered access to an ioreq server that does not support it, the access will be handled via the normal synchronous path. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit 85a787c97be0b80e429cd7cbba8448ebb9244aa5 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Mon Jun 2 10:01:27 2014 +0200 ioreq-server: remove p2m entries when server is enabled For secondary servers, add a hvm op to enable/disable the server. The server will not accept IO until it is enabled and the act of enabling the server removes its pages from the guest p2m, thus preventing the guest from directly mapping the pages and synthesizing ioreqs. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit 434ae6517af2388572fa24c6c9904822cc75180b Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Mon Jun 2 09:40:43 2014 +0200 ioreq-server: add support for multiple servers The previous single ioreq server that was created on demand now becomes the default server and an API is created to allow secondary servers, which handle specific IO ranges or PCI devices, to be added. When the guest issues an IO the list of secondary servers is checked for a matching IO range or PCI device. If none is found then the IO is passed to the default server. Secondary servers use guest pages to communicate with emulators, in the same way as the default server. These pages need to be in the guest physmap otherwise there is no suitable reference that can be queried by an emulator in order to map them. Therefore a pool of pages in the current E820 reserved region, just below the special pages is used. Secondary servers allocate from and free to this pool as they are created and destroyed. The size of the pool is currently hardcoded in the domain build at a value of 8. This should be sufficient for now and both the location and size of the pool can be modified in future without any need to change the API. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Fix build errors in xen/xsm/dummy.c and xen/xsm/flask/hooks.c with XSM enabled. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> ======================================== _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |