[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 34181: regressions - FAIL

flight 34181 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-rumpuserxen-amd64 11 rumpuserxen-demo-xenstorels/xenstorels 
fail REGR. vs. 34137

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-pair        17 guest-migrate/src_host/dst_host fail like 34137

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-sedf     10 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-sedf-pin 10 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 10 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-midway   10 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          10 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     11 guest-stop                   fail   never pass
 test-armhf-armhf-libvirt     10 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      10 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pvh-amd   9 guest-start                  fail   never pass
 test-armhf-armhf-xl-credit2   5 xen-boot                     fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-amd64-libvirt     10 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pvh-intel  9 guest-start                  fail  never pass
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-i386-xl-winxpsp3  14 guest-stop                   fail   never pass
 test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop                fail never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass

version targeted for testing:
 xen                  441256a532dd737905ce335506d2ffcf0ff0db7c
baseline version:
 xen                  a1b4af132077de694054d757fea4573d482c8b3a

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Daniel Kiper <daniel.kiper@xxxxxxxxxx>
  Ed White <edmund.h.white@xxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      pass    
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-xl-pvh-amd                                  fail    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           fail    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  fail    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-amd64-xl-pvh-intel                                fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      pass    
 test-armhf-armhf-xl-midway                                   pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         fail    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-armhf-armhf-xl-sedf-pin                                 pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-armhf-armhf-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-i386-xl-qemut-winxpsp3                            fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xl-qemuu-winxpsp3                            fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-amd64-i386-xl-winxpsp3                                  fail    

sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

commit 441256a532dd737905ce335506d2ffcf0ff0db7c
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Tue Feb 3 13:47:08 2015 +0000

    rump kernels: use new platform macro
    Starting from rump kernel changeset 91d5623 ("Renaming platform macros,
    app-tools and autoconf target string"), __RUMPUSER_XEN__ and __RUMPAPP__
    are deleted. We are supposed to use __RUMPRUN__ instead.
    We still keep __RUMPUSER_XEN__ for now in order to make xen-unstable
    pass osstest push gate. I will remove __RUMPUSER_XEN__ later.
    Related discussion:
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit c58ba78c84eecf4b7ed5e68d744c555112f8ad14
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Feb 3 11:40:10 2015 +0100

    evtchn: alter the alloc/free xen event channel functions to take a domain
    The resource behind an event channel is domain centric rather than vcpu
    This change allows mem_event_disable() to avoid arbitrarily referencing
    d->vcpu[0] just to pass the domain.
    No functional change.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    A few cosmetic adjustments.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 10dcec844fee36b97a72f85181341a080727e02b
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Feb 3 11:39:17 2015 +0100

    x86: provide build time option to support up to 123Tb of memory
    As this requires growing struct page_info from 32 to 48 bytes as well
    as shrinking the always accessible direct mapped memory range from 5Tb
    to 3.5Tb, this isn't being introduced as a general or default enabled
    A side effect of the change to x86's mm.h is that asm/mm.h may no
    longer be included directly. Hence in the few places where this was done,
    xen/mm.h is being substituted (indirectly in the hvm/mtrr.h case).
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 1c3808f4b5249691d9e15ec8d268158d52c6d899
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Feb 3 11:38:22 2015 +0100

    IOMMU/x86: correct page_list_first() use
    Comparing its result against NULL is unsafe when page lists use normal
    list entries for linking together - page_list_empty() needs to be used
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>

commit 8f1ddea9f0d757d4c685689c12db8765ae800b1e
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Feb 3 11:36:39 2015 +0100

    x86/mm: allow for building without shadow mode support
    Considering the complexity of the code, it seems to be a reasonable
    thing to allow people to disable that code entirely even outside the
    immediate need for this by the next patch.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 4b3a4238d6babe93a8620405a8785c50aa988f23
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Feb 3 11:35:01 2015 +0100

    x86/shadow: don't needlessly expose internal functions
    ... and drop an unused one.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>

commit c04822de14328cbfbce0305b938b81690f79d74c
Author: Tim Deegan <tim@xxxxxxx>
Date:   Tue Feb 3 11:34:12 2015 +0100

    x86/shadow: tidy up fragmentary page lists in multi-page shadows
    Multi-page shadows are linked together using the 'list' field.  When
    those shadows are in the pinned list, the list fragments are spliced
    into the pinned list; otherwise they have no associated list head.
    Rework the code that handles these fragments to use the page_list
    interface rather than manipulating the fields directly.  This makes
    the code cleaner, and allows the 'list' field to be either the
    compact pdx form or a normal list_entry.
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Introduce sh_terminate_list() and make it use LIST_POISON*.
    Move helper array of shadow_size() into common.c.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>

commit 1663bdbe1a3e5fe41c898a67c6ac4d30730d8394
Author: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Date:   Tue Feb 3 11:31:27 2015 +0100

    x86/boot/reloc: mask out MBI_BOOTDEV from mbi flags
    ..because it is ignored by Xen.
    Signed-off-by: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 24fdc89e48b737d5131863621df56cb76914ffba
Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Date:   Tue Feb 3 11:30:40 2015 +0100

    x86/VPMU: handle APIC_LVTPC accesses
    Don't have the hypervisor update APIC_LVTPC when _it_ thinks the vector
    should be updated. Instead, handle guest's APIC_LVTPC accesses and write 
    the guest explicitly wanted (but only when VPMU is enabled).
    This is updated version of commit 8097616fbdda that was reverted by
    cc3404093c85. Unlike the previous version, we don't update APIC_LVTPC
    when VPMU is disabled to avoid interfering with NMI watchdog (which
    runs only when VPMU is off).
    Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>

commit e5e09b5c46444b0ab8450c6d6ee8316d4016ac18
Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Date:   Tue Feb 3 11:30:09 2015 +0100

    x86/VPMU: disable when NMI watchdog is on
    NMI watchdog sets APIC_LVTPC register to generate an NMI when PMU counter
    overflow occurs. This may be overwritten by VPMU code later, effectively
    turning off the watchdog.
    We should disable VPMU when NMI watchdog is running.
    Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 2c2fbca65a78cbdf05c36a7acd8b201549074458
Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Date:   Tue Feb 3 11:29:28 2015 +0100

    x86: cleanup usage of nmi_watchdog
    Use NMI_NONE when testing whether NMI watchdog is off.
    Remove unused NMI_INVALID macro.
    Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 8fe99c468d977ee077ef064618973e0aca578117
Author: Ed White <edmund.h.white@xxxxxxxxx>
Date:   Tue Feb 3 11:27:46 2015 +0100

    x86/mm: introduce a p2m class
    Use the class to differentiate between host and nested p2m's, and
    potentially other classes in the future.
    Fix p2m class checks that implicitly assume nested and host are
    the only two classes that will ever exist.
    Signed-off-by: Ed White <edmund.h.white@xxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit e1890c4261d62ad4ddca23dc2305ae636b3b4c14
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Feb 3 11:25:47 2015 +0100

    time: widen wallclock seconds to 64 bits
    Linux is in the process of converting their seconds representation to
    64 bits, so in order to support it consistently we should follow suit
    (which at some point in quite a few years we'd have to do anyway). To
    represent this in struct shared_info we leverage a 32-bit hole in
    x86-64's and arm's variant of the structure; for x86-32 guests the only
    (reasonable) choice we have is to put the extension in struct
    A note on the conditional suppressing the xen_wc_sec_hi helper macro
    definition in the ix86 case for hypervisor and tools: Neither of the
    two actually need this, and its presence causes the tools to fail to
    build (due to the inclusion of both the x86-64 and x86-32 variants of
    the header).
    As a secondary change, x86's do_platform_op() gets a pointless
    initializer as well as a pointless assignment of that same variable
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.