[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 22009: regressions - trouble: blocked/broken/fail/pass

flight 22009 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf                   2 host-install(2)         broken REGR. vs. 21995
 build-amd64-oldkern           4 xen-build                 fail REGR. vs. 21995
 build-amd64-pvops             4 kernel-build              fail REGR. vs. 21995
 build-armhf-pvops             4 kernel-build              fail REGR. vs. 21995
 build-amd64                   4 xen-build                 fail REGR. vs. 21995

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemut-rhel6hvm-intel  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-sedf      1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-sedf-pin  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pv           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 xen-build-check(1)           blocked n/a
 test-armhf-armhf-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-xend-winxpsp3  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pair         1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win7-amd64  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 xen-build-check(1)          blocked n/a
 test-amd64-amd64-xl-qemuu-winxpsp3  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-xl-win7-amd64  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-qemut-winxpsp3  1 xen-build-check(1)           blocked n/a
 test-amd64-amd64-xl-winxpsp3  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1  1 xen-build-check(1)     blocked n/a
 test-amd64-i386-xl-winxpsp3-vcpus1  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-xend-qemut-winxpsp3  1 xen-build-check(1)          blocked n/a

version targeted for testing:
 xen                  a0eaa86e753766a06d740bd125c0cb8b3358babf
baseline version:
 xen                  6757efe1bf50ac7ff68fa4dd7d9333529f70ae9a

People who touched revisions under test:
  Eddie Dong <eddie.dong@xxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>

 build-amd64                                                  fail    
 build-armhf                                                  broken  
 build-i386                                                   pass    
 build-amd64-oldkern                                          fail    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            fail    
 build-armhf-pvops                                            fail    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-amd64-xl-win7-amd64                               blocked 
 test-amd64-i386-xl-win7-amd64                                blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-amd64-xl-pcipt-intel                              blocked 
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-xl-sedf-pin                                 blocked 
 test-amd64-amd64-pv                                          blocked 
 test-amd64-i386-pv                                           blocked 
 test-amd64-amd64-xl-sedf                                     blocked 
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     blocked 
 test-amd64-i386-xl-winxpsp3-vcpus1                           blocked 
 test-amd64-i386-xend-qemut-winxpsp3                          blocked 
 test-amd64-amd64-xl-qemut-winxpsp3                           blocked 
 test-amd64-amd64-xl-qemuu-winxpsp3                           blocked 
 test-amd64-i386-xend-winxpsp3                                blocked 
 test-amd64-amd64-xl-winxpsp3                                 blocked 

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

commit a0eaa86e753766a06d740bd125c0cb8b3358babf
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Fri Sep 13 10:53:58 2013 +0200

    libxl: add device backend listener in order to launch backends
    Add the necessary logic in libxl to allow it to act as a listener for
    launching backends in a driver domain, replacing udev (like we already
    do on Dom0). This new functionality is acomplished by watching the
    domain backend path (/local/domain/<domid>/backend) and reacting to
    device creation/destruction.
    The way to launch this listener daemon is from xl, using the newly
    introduced "devd" command. The command will daemonize by default,
    using "xldevd.log" as it's logfile. Optionally the user can force the
    execution of the listener in the foreground by passing the "-F"
    option to the devd command.
    Current backends handled by this daemon include Qdisk, vbd and vif
    device types.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 6d8dbac551d37fe3b4a6f70317fcaeba086d8589
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Fri Sep 20 17:55:32 2013 +0200

    libxl: revert 326a7b74
    When running libxl from a driver domain there's no xenstore pid file
    (because xenstore is not running on the driver domain). Also, at that
    point in libxl initialization there's no way to know wether libxl is
    running on a domain different than Dom0, so just revert the change in
    order to allow libxl to work on driver domains.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 64559b173749d00a9447c6391b37c19e5e4cb4f5
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Fri Sep 20 17:14:09 2013 +0200

    xl: put daemonize code in it's own function
    Move the daemonizer code from create_domain into it's own function
    that can be called from other places different than create_domain.
    This will be used to daemonize the driver domain backend handler.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 5cf2bea385d1bdd409f06789220910876c0ab17d
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Thu Sep 19 15:33:59 2013 +0200

    libxl: add Qdisk backend launch helper
    Current Qemu launch functions in libxl require the usage of data
    structures only avaialbe on domain creation. All this information is
    not need in order to launch a Qemu instance to serve Qdisk backends,
    so introduce a new simplified helper that can be used to launch
    Qemu/Qdisk, that will be used to launch Qdisk in driver domains.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Cc: Anthony PERARD <anthony.perard@xxxxxxxxxx>
    Cc: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 4b33540e8ce55acf19ec8c3f6706efaecdfd57ea
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Thu Sep 19 11:17:45 2013 +0200

    libxl: don't launch Qemu on Dom0 for Qdisk devices on driver domains
    In libxl__need_xenpv_qemu check that the backend domain of the Qdisk
    device is Dom0 before launching a Qemu instance in the toolstack
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit f39b1af257e32108fa356ee8c20313a221e31983
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Wed Sep 18 17:35:00 2013 +0200

    libxl: remove the Qemu bodge for driver domain devices
    When Qemu is launched from a driver domain to act as a PV disk
    backend we can make sure that Qemu is running before detaching
    devices, so there's no need for the bodge there.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit f36df037ba8813207275b7094966436fcbb30060
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Fri Sep 27 11:37:04 2013 +0200

    libxl: synchronize device removal when using driver domains
    Synchronize the clean up of the backend from the toolstack domain when
    the driver domain has actually finished closing the backend for the
    This is accomplished by waiting for the driver domain to  remove the
    directory containing the backend keys, then the toolstack domain will
    finish the cleanup by removing the empty folders on the backend path.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 51e20c55808cfe3e51b45f6ff2a45775170fa5e4
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Wed Sep 18 13:15:14 2013 +0200

    libxl: don't remove device frontend path from driver domains
    A domain different than LIBXL_TOOLSTACK_DOMID should not try to remove
    the frontend paths of a device.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit d1cb516db2155e4967a8c805425d3ae560713e28
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Wed Sep 18 12:42:47 2013 +0200

    libxl: create a local xenstore libxl and device-model dir for guests
    If libxl is executed inside a guest domain it needs write access to
    the local libxl xenstore dir (/local/<domid>/libxl) to store internal
    data. This also applies to Qemu which needs a
    /local/<domid>/device-model xenstore directory.
    This patch creates the mentioned directories for each guest launched
    from libxl.
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit a5db2c7aab7a638d84f22ac8fe5089d81175438b
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Nov 18 13:57:20 2013 +0100

    x86: consider modules when cutting off memory
    The code in question runs after module ranges got already removed from
    the E820 table, so when determining the new maximum page/PDX we need to
    explicitly take them into account.
    Furthermore we need to round up the ending addresses here, in order to
    fully cover eventual partial trailing pages.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 85c72f9fe764ed96f5c149efcdd69ab7c18bfe3d
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Nov 18 13:55:55 2013 +0100

    VT-d: fix TLB flushing in dma_pte_clear_one()
    The third parameter of __intel_iommu_iotlb_flush() is to indicate
    whether the to be flushed entry was a present one. A few lines before,
    we bailed if !dma_pte_present(*pte), so there's no need to check the
    flag here again - we can simply always pass TRUE here.
    This is XSA-78.
    Suggested-by: Cheng Yueqiang <yqcheng.2008@xxxxxxxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit e02b14e531a95399fc9d8647ec3cc6f310a7d455
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Nov 18 09:39:01 2013 +0100

    nested VMX: don't ignore mapping errors
    Rather than ignoring failures to map the virtual VMCS as well as MSR or
    I/O port bitmaps, convert those into failures of the respective
    instructions (avoiding to dereference NULL pointers). Ultimately such
    failures should be handled transparently (by using transient mappings
    when they actually need to be accessed, just like nested SVM does).
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.