[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 59833: regressions - FAIL
flight 59833 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/59833/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 12 guest-localmigrate fail REGR. vs. 59817 test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 59817 Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail like 59817 test-amd64-amd64-rumpuserxen-amd64 15 rumpuserxen-demo-xenstorels/xenstorels.repeat fail like 59817 test-armhf-armhf-xl-rtds 11 guest-start fail like 59817 test-amd64-i386-xl-qemut-debianhvm-amd64 11 guest-saverestore fail like 59817 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 59817 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 59817 Tests which did not succeed, but are not blocking: test-amd64-i386-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-cubietruck 12 migrate-support-check fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail never pass version targeted for testing: xen 9256f66c1606cd9339412bff7fbc7bd9e8beb28c baseline version: xen 7c60c2da3160766a265cb84c7411ff2c9cbd8d0b Last test of basis 59817 2015-07-22 07:29:29 Z 3 days Testing same since 59833 2015-07-23 10:56:30 Z 1 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> Dario Faggioli <dario.faggioli@xxxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Roger Pau Monné <roger.pau@xxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm fail test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm fail test-amd64-amd64-libvirt-xsm pass test-armhf-armhf-libvirt-xsm pass test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm pass test-armhf-armhf-xl-xsm pass test-amd64-i386-xl-xsm pass test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 fail test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 fail test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-armhf-armhf-xl-cubietruck pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt pass test-amd64-i386-libvirt pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu fail test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-rtds pass test-armhf-armhf-xl-rtds fail test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-xl-qemut-winxpsp3 pass test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 9256f66c1606cd9339412bff7fbc7bd9e8beb28c Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 23 10:17:08 2015 +0200 x86/PCI: intercept all PV Dom0 MMCFG writes ... to hook up pci_conf_write_intercept() even for Dom0 not using method 1 accesses for the base part of PCI device config space. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit aa7c1fdf9dd04a1287f4770906b2c41b88a28228 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 23 10:16:27 2015 +0200 x86/MSI: properly track guest masking requests ... by monitoring writes to the mask register. This allows reverting the main effect of the XSA-129 patches in qemu. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 372900faf88d424136315cbd5d440fdcf22566a2 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 23 10:16:03 2015 +0200 x86/MSI-X: reduce fiddling with control register during restore Rather than disabling and enabling MSI-X once per vector, do it just once per device. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 0dba393db07331e9cff42df10e95b67547dfdb3e Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 23 10:15:39 2015 +0200 x86/MSI-X: access MSI-X table only after having enabled MSI-X As done in Linux by f598282f51 ("PCI: Fix the NIU MSI-X problem in a better way") and its broken predecessor, make sure we don't access the MSI-X table without having enabled MSI-X first, using the mask-all flag instead to prevent interrupts from occurring. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 082fdc6ce85e5b603f8fb24553cf200e3b67889f Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 23 10:14:59 2015 +0200 x86/MSI-X: be more careful during teardown When a device gets detached from a guest, pciback will clear its command register, thus disabling both memory and I/O decoding. The disabled memory decoding, however, has an effect on the MSI-X table accesses the hypervisor does: These won't have the intended effect anymore. Even worse, for PCIe devices (but not SR-IOV virtual functions) such accesses may (will?) be treated as Unsupported Requests, causing respective errors to be surfaced, potentially in the form of NMIs that may be fatal to the hypervisor or Dom0 is different ways. Hence rather than carrying out these accesses, we should avoid them where we can, and use alternative (e.g. PCI config space based) mechanisms to achieve at least the same effect. At this time it continues to be unclear whether this is fixing an actual bug or is rather just working around bogus (but apparently common) system behavior. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 484d7c852e4ff79c945406ed28b5db63a5a0b7f3 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 23 10:14:13 2015 +0200 x86/MSI-X: track host and guest mask-all requests separately Host uses of the bits will be added subsequently, and must not be overridden by guests (including Dom0, namely when acting on behalf of a guest). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit a88b72fddd046a0978242411276861039ec99ad0 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jul 23 10:13:12 2015 +0200 x86/PCI: add config space abstract write intercept logic This is to be used by MSI code, and later to also be hooked up to MMCFG accesses by Dom0. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit ce6ce4a8a88fa7930838fc9fa06300bc43713671 Merge: a08b914 afba7c6 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Jul 22 15:55:14 2015 +0100 Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into staging commit afba7c6d9566f1556117b78e767f9678433a1f01 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Wed Jul 22 16:53:22 2015 +0200 remove non-POSIX error codes Xen was using some non-POSIX error codes that are removed in this patch. For future reference, the list of POSIX error codes has been obtained from: http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/errno.h.html The error codes already present and defined as optional (XSR), have been left in place. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Release-acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit e919fb2ac32a27c262fee8a40c044008b3f8fd09 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Wed Jul 22 16:47:09 2015 +0200 replace non-POSIX error codes Some DOMCTLs returned non-POSIX error codes, replace them with POSIX compilant values instead. EBADRQC and EBADSLT are replaced by EDOM, while EUSERS is replaced with EOVERFLOW. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Replace two EDOM uses. Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Release-acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 21a85ed569e59c5968b770a913a83a6b45213be7 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Wed Jul 22 16:45:35 2015 +0200 x86/libxl: replace non-POSIX error codes used by PSR code PSR was using EBADSLT and EUSERS which are not POSIX error codes, replace them with ENOTSOCK and EOVERFLOW respectively. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Release-acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit a08b914807b14a8328d005079d774e7f8efd1d24 Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Date: Tue Jul 21 19:31:57 2015 +0200 xl: fix vcpus to vnode assignement in config file In fact, right now, the following (legitimate) configuration: vcpus = '4' vnuma = [ [ "pnode=0","size=512","vcpus=0,1","vdistances=10,20" ], [ "pnode=1","size=512","vcpus=2,3","vdistances=20,10" ] ] Produces the following error: # xl create /etc/xen/test.cfg Parsing config from /etc/xen/test.cfg xl: maxvcpus < vcpu That is because, we only process the first element of the "vcpus=" list (of each vnode specification). Therefore, in the above case, we only see 2 vcpus, out of 4, being assigned to the vnodes, and hence the error. What we need is either a multidimentional array, or a bitmap, to temporary store the vcpus of a vnode, while parsing the vnuma config entry. Let's use the latter, which happens to also make it easier to copy the outcome of the parsing to its final destination in b_info, if everything goes ok. Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit bc299d01b925d934219b6e8c29fadcd1f1a9210b Author: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> Date: Wed Jul 22 14:15:37 2015 +0200 x86/psr: remove invalid cpu_to_socket call cpu_to_socket() can't give correct socket value in CPU_PREPARE notifier as at that time phys_proc_id has not yet been initialized (the value is its default 0 in this case) which is incorrect for sockets other than socket 0. cos_to_cbm now is pre-allocated in CPU_PREPARE notifier and then consumed in CPU_STARTING notifier. Signed-off-by: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> commit 23d72aaa0ccb206b0447b1efa9f1012f093162ee Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Jul 22 14:15:12 2015 +0200 libxl: fix build with glibc < 2.9 htobe*() and be*toh() don't exist there. While replacing the 32-bit ones with hton() and ntoh() would be possible, there wouldn't be an obvious replacement for the 64-bit ones. Hence just take what current glibc (2.21) has (assuming __bswap_*() exists, which it does back to at least 2.4 according to my checking). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |