[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [qemu-mainline test] 30109: regressions - trouble: blocked/broken/fail/pass



flight 30109 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/30109/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386                    3 host-install(3)         broken REGR. vs. 30092
 build-i386-pvops              3 host-install(3)         broken REGR. vs. 30092
 test-amd64-amd64-xl-qemut-debianhvm-amd64 9 guest-saverestore fail REGR. vs. 
30092
 test-amd64-amd64-xl-qemuu-ovmf-amd64  3 host-install(3) broken REGR. vs. 30092
 test-amd64-amd64-xl-qemuu-winxpsp3  3 host-install(3)   broken REGR. vs. 30092

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-pcipt-intel  3 host-install(3)      broken REGR. vs. 30092

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      9 guest-start                  fail   never pass
 test-armhf-armhf-xl          10 migrate-support-check        fail   never pass
 test-amd64-i386-xl-credit2    1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      9 guest-start                  fail   never pass
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1  1 build-check(1)         blocked n/a
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-rhel6hvm-amd  1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-winxpsp3  1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-winxpsp3-vcpus1  1 build-check(1)               blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-i386-xl-win7-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-winxpsp3   1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-winxpsp3  1 build-check(1)               blocked  n/a

version targeted for testing:
 qemuu                f2426947decc96bde4f9ea50097dac66a0a48acc
baseline version:
 qemuu                30eaca3acdf17d7bcbd1213eb149c02037edfb0b

------------------------------------------------------------
People who touched revisions under test:
  Gonglei <arei.gonglei@xxxxxxxxxx>
  Jason Wang <jasowang@xxxxxxxxxx>
  Knut Omang <knut.omang@xxxxxxxxxx>
  Le Tan <tamlokveer@xxxxxxxxx>
  Michael S. Tsirkin <mst@xxxxxxxxxx>
  Peter Maydell <peter.maydell@xxxxxxxxxx>
  William Dauchy <wdauchy@xxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    fail    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-xl-pcipt-intel                              broken  
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-libvirt                                     fail    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     blocked 
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     blocked 
 test-amd64-i386-xl-winxpsp3-vcpus1                           blocked 
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-i386-xl-qemut-winxpsp3                            blocked 
 test-amd64-amd64-xl-qemuu-winxpsp3                           broken  
 test-amd64-i386-xl-qemuu-winxpsp3                            blocked 
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-amd64-i386-xl-winxpsp3                                  blocked 


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit f2426947decc96bde4f9ea50097dac66a0a48acc
Merge: 30eaca3 aad4dce
Author: Peter Maydell <peter.maydell@xxxxxxxxxx>
Date:   Tue Sep 2 16:07:31 2014 +0100

    Merge remote-tracking branch 'remotes/mst/tags/for_upstream' into staging
    
    pci, pc fixes, features
    
    A bunch of bugfixes - these will make sense for 2.1.1
    
    Initial Intel IOMMU support.
    
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    
    # gpg: Signature made Tue 02 Sep 2014 16:05:04 BST using RSA key ID D28D5469
    # gpg: Good signature from "Michael S. Tsirkin <mst@xxxxxxxxxx>"
    # gpg:                 aka "Michael S. Tsirkin <mst@xxxxxxxxxx>"
    
    * remotes/mst/tags/for_upstream:
      vhost_net: start/stop guest notifiers properly
      pci: avoid losing config updates to MSI/MSIX cap regs
      virtio-net: don't run bh on vm stopped
      ioh3420: remove unused ioh3420_init() declaration
      vhost_net: cleanup start/stop condition
      intel-iommu: add IOTLB using hash table
      intel-iommu: add context-cache to cache context-entry
      intel-iommu: add supports for queued invalidation interface
      intel-iommu: fix coding style issues around in q35.c and machine.c
      intel-iommu: add Intel IOMMU emulation to q35 and add a machine option 
"iommu" as a switch
      intel-iommu: add DMAR table to ACPI tables
      intel-iommu: introduce Intel IOMMU (VT-d) emulation
      iommu: add is_write as a parameter to the translate function of 
MemoryRegionIOMMUOps
    
    Signed-off-by: Peter Maydell <peter.maydell@xxxxxxxxxx>

commit aad4dce934649b3a398396fc2a76f215bb194ea4
Author: Jason Wang <jasowang@xxxxxxxxxx>
Date:   Tue Aug 19 12:56:29 2014 +0800

    vhost_net: start/stop guest notifiers properly
    
    commit a9f98bb5ebe6fb1869321dcc58e72041ae626ad8 vhost: multiqueue
    support changed the order of stopping the device. Previously
    vhost_dev_stop would disable backend and only afterwards, unset guest
    notifiers. We now unset guest notifiers while vhost is still
    active. This can lose interrupts causing guest networking to fail. In
    particular, this has been observed during migration.
    
    To adapt this, several other changes are needed:
    - remove the hdev->started assertion in vhost.c since we may want to
    start the guest notifiers before vhost starts and stop the guest
    notifiers after vhost is stopped.
    - introduce the vhost_net_set_vq_index() and call it before setting
    guest notifiers. This is used to guarantee vhost_net has the correct
    virtqueue index when setting guest notifiers.
    
    Cc: qemu-stable@xxxxxxxxxx
    Reported-by: "Zhangjie (HZ)" <zhangjie14@xxxxxxxxxx>
    Tested-by: William Dauchy <wdauchy@xxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Jason Wang <jasowang@xxxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit d7efb7e08e5edaac23b0dc824f72c3f353447c39
Author: Knut Omang <knut.omang@xxxxxxxxxx>
Date:   Tue Sep 2 13:00:04 2014 +0200

    pci: avoid losing config updates to MSI/MSIX cap regs
    
    Since
    commit 95d658002401e2e47a5404298ebe9508846e8a39
        msi: Invoke msi/msix_write_config from PCI core
    msix config writes are lost, the value written is always 0.
    
    Fix pci_default_write_config to avoid this.
    
    Cc: qemu-stable@xxxxxxxxxx
    Signed-off-by: Knut Omang <knut.omang@xxxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit 0187c7989a5cedd4f88bba76839cc9c44fb3fc81
Author: Michael S. Tsirkin <mst@xxxxxxxxxx>
Date:   Tue Sep 2 16:12:41 2014 +0300

    virtio-net: don't run bh on vm stopped
    
    commit 783e7706937fe15523b609b545587a028a2bdd03
        virtio-net: stop/start bh when appropriate
    
    is incomplete: BH might execute within the same main loop iteration but
    after vmstop, so in theory, we might trigger an assertion.
    I was unable to reproduce this in practice,
    but it seems clear enough that the potential is there, so worth fixing.
    
    Cc: qemu-stable@xxxxxxxxxx
    Reported-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit fc8342f7589f0ef026cfebf8d6e5eab88323c7cf
Author: Gonglei <arei.gonglei@xxxxxxxxxx>
Date:   Mon Aug 25 20:20:31 2014 +0800

    ioh3420: remove unused ioh3420_init() declaration
    
    commit 0f9b1771ccc65873a8376c81200a437aa58c2f6d
        ioh3420: Remove obsoleted, unused ioh3420_init function
    removed the implementation of ioh3420_init
    
    Drop the declaration from the header file as well.
    
    Signed-off-by: Gonglei <arei.gonglei@xxxxxxxxxx>
    Reviewed-by: Knut Omang <knut.omang@xxxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit 2d2507ef23d2a28eaeea5507ff4ec68657f1792f
Author: Michael S. Tsirkin <mst@xxxxxxxxxx>
Date:   Mon Aug 4 14:12:39 2014 +0200

    vhost_net: cleanup start/stop condition
    
    Checking vhost device internal state in vhost_net looks like
    a layering violation since vhost_net does not
    set this flag: it is set and tested by vhost.c.
    There seems to be no reason to check this:
    caller in virtio net uses its own flag,
    vhost_started, to ensure vhost is started/stopped
    as appropriate.
    
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Reviewed-by: Amos Kong <akong@xxxxxxxxxx>

commit b5a280c00840f4ebc2f40afb4f74e37e34d19f7c
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:44 2014 +0800

    intel-iommu: add IOTLB using hash table
    
    Add IOTLB to cache information about the translation of input-addresses. 
IOTLB
    use a GHashTable as cache. The key of the hash table is the logical-OR of 
gfn
    and source id after left-shifting.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit d92fa2dc6e42e8bd8470e69d85141176f98feaea
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:43 2014 +0800

    intel-iommu: add context-cache to cache context-entry
    
    Add context-cache to cache context-entry encountered on a page-walk. Each
    VTDAddressSpace has a member of VTDContextCacheEntry which represents an 
entry
    in the context-cache. Since devices with different bus_num and devfn have 
their
    respective VTDAddressSpace, this will be a good way to reference the cached
    entries.
    Each VTDContextCacheEntry will have a context_cache_gen and the cached entry
    is valid only when context_cache_gen equals 
IntelIOMMUState.context_cache_gen.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit ed7b8fbcfb888716c850c8f908f5b5329de46d7c
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:42 2014 +0800

    intel-iommu: add supports for queued invalidation interface
    
    Add supports for queued invalidation interface, an expended invalidation
    interface with extended capabilities.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit ac40aa1540baffb4984c80822da618ebb3180a4d
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:41 2014 +0800

    intel-iommu: fix coding style issues around in q35.c and machine.c
    
    Fix coding style issues around in hw/pci-host/q35.c and hw/core/machine.c.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit a52a7fdfa7512c9d095f2d5797c3c423dec43dbc
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:40 2014 +0800

    intel-iommu: add Intel IOMMU emulation to q35 and add a machine option 
"iommu" as a switch
    
    Add Intel IOMMU emulation to q35 chipset and expose it to the guest.
    1. Add a machine option. Users can use "-machine iommu=on|off" in the 
command
    line to enable/disable Intel IOMMU. The default is off.
    2. Accroding to the machine option, q35 will initialize the Intel IOMMU and
    use pci_setup_iommu() to setup q35_host_dma_iommu() as the IOMMU function 
for
    the pci bus.
    3. q35_host_dma_iommu() will return different address space according to the
    bus_num and devfn of the device.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit d4eb911935640139eef7f1dd5cf9db7141578554
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:39 2014 +0800

    intel-iommu: add DMAR table to ACPI tables
    
    Expose Intel IOMMU to the BIOS. If object of TYPE_INTEL_IOMMU_DEVICE exists,
    add DMAR table to ACPI RSDT table. For now the DMAR table indicates that 
there
    is only one hardware unit without INTR_REMAP capability on the platform.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit 1da12ec4c81330eb1ed1f29a78854bea87a23595
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:38 2014 +0800

    intel-iommu: introduce Intel IOMMU (VT-d) emulation
    
    Add support for emulating Intel IOMMU according to the VT-d specification 
for
    the q35 chipset machine. Implement the logics for DMAR (DMA remapping) 
without
    PASID support. The emulation supports register-based invalidation and 
primary
    fault logging.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

commit 8d7b8cb9c22b7aa809050800a62e89f869054b35
Author: Le Tan <tamlokveer@xxxxxxxxx>
Date:   Sat Aug 16 13:55:37 2014 +0800

    iommu: add is_write as a parameter to the translate function of 
MemoryRegionIOMMUOps
    
    Add a bool variable is_write as a parameter to the translate function of
    MemoryRegionIOMMUOps to indicate the operation of the access. It can be
    used for correct fault reporting from within the callback.
    Change the interface of related functions.
    
    Signed-off-by: Le Tan <tamlokveer@xxxxxxxxx>
    Reviewed-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
    Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.