[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 26920: regressions - FAIL



flight 26920 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/26920/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 13 guest-localmigrate/x10 fail REGR. 
vs. 26871

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf     11 guest-saverestore         fail REGR. vs. 26871

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt      9 guest-start                  fail   never pass
 test-amd64-i386-libvirt       9 guest-start                  fail   never pass
 test-amd64-amd64-libvirt      9 guest-start                  fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-armhf-armhf-xl          10 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass
 test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-winxpsp3  14 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass

version targeted for testing:
 xen                  e6390ad57bdf11881e6375f6227b5a594b4bcc3f
baseline version:
 xen                  7f8d8abcf6dfb85fae591a547b24f9b27d92272c

------------------------------------------------------------
People who touched revisions under test:
  Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx>
  Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  Christoph Egger <chegger@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      pass    
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    fail    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     fail    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-i386-xl-qemut-winxpsp3                            fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xl-qemuu-winxpsp3                            fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-amd64-i386-xl-winxpsp3                                  fail    


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit e6390ad57bdf11881e6375f6227b5a594b4bcc3f
Author: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
Date:   Mon Jun 2 10:32:22 2014 +0200

    dom0: add opt_dom0pvh to setup.c
    
    Finally last patch in the series to enable creation of pvh dom0.
    A pvh dom0 is created by adding dom0pvh to grub xen command line.
    
    Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
    Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

commit 594e6fd413d646521cc29b38bc89f897b4570977
Author: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
Date:   Mon Jun 2 10:31:49 2014 +0200

    pvh dom0: allow get_pg_owner for translated domains if pvh
    
    When creating a PV guest, toolstack on pvh dom0 will do_mmuext_op
    to pin guest tables. do_mmuext_op calls get_pg_owner, which must allow
    foreign mappings for pvh.
    
    Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>

commit 50fe6e737059a98e8a5242a7616e4cdcb60988c2
Author: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
Date:   Mon Jun 2 10:30:47 2014 +0200

    pvh dom0: add and remove foreign pages
    
    In this patch, a new function, p2m_add_foreign(), is added
    to map pages from a foreign guest into dom0 for various purposes
    like domU creation, running xentrace, etc... Such pages are
    typed p2m_map_foreign.  Note, it is the nature of such pages
    that a refcnt is held during their stay in the p2m. The
    refcnt is added and released in the low level ept function
    atomic_write_ept_entry. That macro is converted to a function to allow
    for such refcounting, which only applies to leaf entries in the ept.
    Furthermore, please note that paging/sharing is disabled if the
    controlling or hardware domain is pvh. Any enabling of those features
    would need to ensure refcnt are properly maintained for foreign types,
    or paging/sharing is skipped for foreign types.
    
    Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>

commit 03d745c8bfbf45df39eb453ff1e7787b856c4368
Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Date:   Mon Jun 2 10:20:23 2014 +0200

    x86: correctly report max number of hypervisor leaves
    
    Commit def0bbd31 provided support for changing max number of
    hypervisor cpuid leaves (in leaf 0x4000xx00). It also made the
    hypervisor incorrectly report this number for guests that
    use default value (i.e. don't specify leaf 0x4000xx00 in config
    file)
    
    Reported-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>

commit 071a4c70a634f7d4f74cde4086ff3202968538c9
Author: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx>
Date:   Mon Jun 2 10:19:27 2014 +0200

    x86, amd_ucode: flip revision numbers in printk
    
    A failure would result in log message like so-
    (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
                                               ^^^^^^^^^^^^^^^^^^^^^^
    The above message has the revision numbers inverted. Fix this.
    
    Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx>

commit 518576c6cbdaa2640865f1baa813c1b4d48c469f
Author: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx>
Date:   Mon Jun 2 10:18:07 2014 +0200

    x86,mce: consolidate AMD mcheck initialization
    
    amd_k8.c did a lot of common work and very little K8
    specific work. So merge init functions of amd_f10.c and
    amd_k8.c and move it into the common amd_mcheck_init
    handler. With that done, there is not much left in either
    files, so fold all code into just one file - mce_amd.c
    
    While at it, update the comments regarding documentation
    with correct URL's and revision numbers.
    
    Also, update copyright info.
    
    Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx>
    Acked-by: Christoph Egger <chegger@xxxxxxxxx>

commit 41b41c0b0d2e1b83929adcc8de703ea0cc2417a6
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Mon Jun 2 10:02:25 2014 +0200

    ioreq-server: make buffered ioreq handling optional
    
    Some emulators will only register regions that require non-buffered
    access. (In practice the only region that a guest uses buffered access
    for today is the VGA aperture from 0xa0000-0xbffff). This patch therefore
    makes allocation of the buffered ioreq page and event channel optional for
    secondary ioreq servers.
    
    If a guest attempts buffered access to an ioreq server that does not
    support it, the access will be handled via the normal synchronous path.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 85a787c97be0b80e429cd7cbba8448ebb9244aa5
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Mon Jun 2 10:01:27 2014 +0200

    ioreq-server: remove p2m entries when server is enabled
    
    For secondary servers, add a hvm op to enable/disable the server. The
    server will not accept IO until it is enabled and the act of enabling
    the server removes its pages from the guest p2m, thus preventing the guest
    from directly mapping the pages and synthesizing ioreqs.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 434ae6517af2388572fa24c6c9904822cc75180b
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Mon Jun 2 09:40:43 2014 +0200

    ioreq-server: add support for multiple servers
    
    The previous single ioreq server that was created on demand now
    becomes the default server and an API is created to allow secondary
    servers, which handle specific IO ranges or PCI devices, to be added.
    
    When the guest issues an IO the list of secondary servers is checked
    for a matching IO range or PCI device. If none is found then the IO
    is passed to the default server.
    
    Secondary servers use guest pages to communicate with emulators, in
    the same way as the default server. These pages need to be in the
    guest physmap otherwise there is no suitable reference that can be
    queried by an emulator in order to map them. Therefore a pool of
    pages in the current E820 reserved region, just below the special
    pages is used. Secondary servers allocate from and free to this pool
    as they are created and destroyed.
    
    The size of the pool is currently hardcoded in the domain build at a
    value of 8. This should be sufficient for now and both the location and
    size of the pool can be modified in future without any need to change the
    API.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    Fix build errors in xen/xsm/dummy.c and xen/xsm/flask/hooks.c with XSM
    enabled.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
========================================

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.