[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 78548: regressions - FAIL

flight 78548 xen-unstable-smoke real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemuu-debianhvm-i386 12 guest-saverestore fail REGR. vs. 

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  ef17887d848dae0ca46231b47bf30d3c1d4aa87d
baseline version:
 xen                  162a81abb1c55ff77a3fcc82c7971a766ca122f6

Last test of basis    78522  2016-01-19 13:01:25 Z    0 days
Failing since         78539  2016-01-19 16:01:48 Z    0 days    2 attempts
Testing same since    78548  2016-01-19 18:03:08 Z    0 days    1 attempts

People who touched revisions under test:
  Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Malcolm Crossley <malcolm.crossley@xxxxxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

 build-amd64                                                  pass
 build-armhf                                                  pass
 build-amd64-libvirt                                          pass
 test-armhf-armhf-xl                                          pass
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     fail
 test-amd64-amd64-libvirt                                     pass

sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at

Explanation of these reports, and of osstest in general, is at

Test harness code can be found at

Not pushing.

commit ef17887d848dae0ca46231b47bf30d3c1d4aa87d
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Jan 19 11:56:50 2016 +0000

    docs: correct descriptions of gnttab_max_{, maptrack}_frames

    gnttab_max_frames incorrectly referred to numbers of grant tab
    operations and gnttab_max_maptrack_frames was confusingly worded.

    Add the default for gnttab_max_frames while here (it's currently the
    same on all arches since no arch uses the available arch override) and
    adjust the default for gnttab_max_maptrack_frames to match the normal

    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit aa037dc9d3e09850f8a0e4ba9fba8e487f8a64cc
Author: Malcolm Crossley <malcolm.crossley@xxxxxxxxxx>
Date:   Tue Jan 19 11:27:56 2016 +0000

    xenpm: Add option to report average CPU frequency

    The average is calculated over the period of time from the last
    xenpm report of the average CPU frequency.

    Reporting the average CPU frequency helps confirm the level of turbo
    boost being achieved per CPU.

    Signed-off-by: Malcolm Crossley <malcolm.crossley@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 1e72eebd21a5bdb799fa1fbc0eb60c4b58e30af8
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Tue Jan 19 12:03:05 2016 +0000

    libxc: fix comment in xc__hypercall_bounce_pre

    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit 38a048a3c6f44008a83ac77aecac01a7bce0e7d1
Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Date:   Thu Jan 7 17:19:07 2016 -0500

    libxc: Defer initialization of start_page for HVM guests

    With commit 8c45adec18e0 ("libxc: create unmapped initrd in domain
    builder if supported") location of ramdisk may not be available to
    HVMlite guests by the time alloc_magic_pages_hvm() is invoked if the
    guest supports unmapped initrd.

    So let's move ramdisk info initialization (along with a few other
    operations that are not directly related to allocating magic/special
    pages) from alloc_magic_pages_hvm() to bootlate_hvm().

    Since we now split allocation and mapping of the start_info segment
    let's stash it, along with cmdline length, in xc_dom_image so that we
    can check whether we are mapping correctly-sized range.

    We can also stop using xc_dom_image.start_info_pfn and leave it for
    PV(H) guests only.

    Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Acked-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit eb68c40ba5d0212adc176290f09e4ee133c96e83
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Tue Jan 19 16:08:39 2016 +0100

    x86/HVM: add padding to struct hvm_hw_cpu

    So that the size of the structure is the same on 32 and 64bit.

    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 805b7484b85e77b15c68e837b3d7b77053182d37
Author: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
Date:   Tue Jan 19 16:07:59 2016 +0100

    svm: remove redundant TSC scaling in svm_set_tsc_offset()

    Now every caller passes an already scaled offset to
    svm_set_tsc_offset(), so it's not necessary to recalculate a scaled TSC
    offset in svm_set_tsc_offset().

    Signed-off-by: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
    Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>

commit eab8a90be723d742d607aff2005ea0ab521bfd6a
Author: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
Date:   Tue Jan 19 16:07:39 2016 +0100

    x86/time: scale host TSC in pvclock properly

    This patch makes the pvclock return the scaled host TSC and
    corresponding scaling parameters to HVM domains if guest TSC is not
    emulated and TSC scaling is enabled.

    Signed-off-by: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
    Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>

commit 52fd9a46f6e9eb050a6b402ce3b04fa57907acc5
Author: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
Date:   Tue Jan 19 16:07:15 2016 +0100

    x86/hvm: scale host TSC when setting/getting guest TSC

    The existing hvm_[set|get]_guest_tsc_fixed() calculate the guest TSC by
    adding the TSC offset to the host TSC. When the TSC scaling is enabled,
    the host TSC should be scaled first. This patch adds the scaling logic
    to those two functions.

    Signed-off-by: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
    Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>

commit c2ba8c24f34426c993afa841bf94d933d2461cd9
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Tue Jan 19 16:06:31 2016 +0100

    elfnotes: check phys_entry against UNSET_ADDR32

    And introduce UNSET_ADDR32.

    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.