[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 24295: trouble: broken/fail/pass



flight 24295 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/24295/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl           3 host-install(3)         broken REGR. vs. 24250

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl           4 capture-logs(4)        broken blocked in 24250
 test-amd64-i386-xl-win7-amd64  7 windows-install              fail  like 24250

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass

version targeted for testing:
 xen                  cedfdd43a9798e535a05690bb6f01394490d26bb
baseline version:
 xen                  9a80d5056766535ac624774b96495f8b97b1d28b

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
  Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Tsahee Zidenberg <tsahee@xxxxxxx>
  Xiantao Zhang <xiantao.zhang@xxxxxxxxx>
  Yang Zhang <yang.z.zhang@xxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          broken  
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit cedfdd43a9798e535a05690bb6f01394490d26bb
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Jan 7 16:01:14 2014 +0100

    IOMMU: make page table deallocation preemptible
    
    This too can take an arbitrary amount of time.
    
    In fact, the bulk of the work is being moved to a tasklet, as handling
    the necessary preemption logic in line seems close to impossible given
    that the teardown may also be invoked on error paths.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Xiantao Zhang <xiantao.zhang@xxxxxxxxx>

commit cc0a6c6c749a8693dc0e201773c10cd97e5e6ce0
Merge: 4746b5a... 81b1c7d...
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Jan 7 14:32:45 2014 +0000

    Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into 
staging

commit 4746b5adc396bb2fc963b3156eab7267c6e7e541
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Fri Dec 20 15:08:08 2013 +0000

    xen: arm: context switch the aux memory attribute registers
    
    We appear to have somehow missed these. Linux doesn't actually use them and
    none of the processors I've looked at actually define any bits in them (so
    they are UNK/SBZP) but it is good form to context switch them anyway.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 81b1c7de2339d2788352b162057e70130803f3cf
Author: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
Date:   Tue Jan 7 15:09:42 2014 +0100

    AMD/IOMMU: fix infinite loop due to ivrs_bdf_entries larger than 16-bit 
value
    
    Certain AMD systems could have upto 0x10000 ivrs_bdf_entries.
    However, the loop variable (bdf) is declared as u16 which causes
    inifinite loop when parsing IOMMU event log with IO_PAGE_FAULT event.
    This patch changes the variable to u32 instead.
    
    Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 62d33ca1048f4e08eaeb026c7b79239b4605b636
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Jan 7 14:59:31 2014 +0100

    VTD/DMAR: free() correct pointer on error from acpi_parse_one_atsr()
    
    Free the allocated structure rather than the ACPI table ATS entry.
    
    On further analysis, there is another memory leak.  acpi_parse_dev_scope()
    could allocate scope->devices, and return with -ENOMEM.  All callers of
    acpi_parse_dev_scope() would then free the underlying structure, loosing the
    pointer.
    
    These errors can only actually be reached through acpi_parse_dev_scope()
    (which passes type = DMAR_TYPE), but I am quite surprised Coverity didn't 
spot
    it.
    
    Coverity-ID: 1146949
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit a9fe8c7dda440b84e178d65dcd64c0173b0a4b5d
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Jan 7 14:58:35 2014 +0100

    AMD/microcode: avoid use-after-free for the microcode buffer
    
    It is possible to free the mc_old buffer and then store it for use in the 
case
    of resume.
    
    This keeps the old semantics of being able to return an error even after a
    successful microcode application.
    
    Coverity-ID 1146953
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>

commit 2af30e62c4e562d7a4ec4185fdab20fb29354fd8
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Jan 7 14:57:15 2014 +0100

    AMD/iommu_detect: don't leak iommu structure on error paths
    
    Tweak the logic slightly to return the real errors from
    get_iommu_{,msi_}capabilities(), which at the moment is no functional 
change.
    
    Coverity-ID: 1146950
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit b764615c391fdc2648d460245c748a3a319a296e
Merge: 57a4578... f4fed54...
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Jan 7 13:50:35 2014 +0000

    Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into 
staging

commit 57a45785584e651b807eed08f3a6950d4ade0156
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 24 11:28:47 2013 +0000

    xen: driver/char: fix const declaration of DT compatible list
    
    The data type for DT compatible list should be:
        const char * const[]  __initconst
    
    Fix every serial drivers which support device tree.
    
    Spotted-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit dd3ab3881494136999138d70f4fe28ebabe8660c
Author: Tsahee Zidenberg <tsahee@xxxxxxx>
Date:   Sun Dec 22 12:59:57 2013 +0200

    ns16550: support ns16550a
    
    Ns16550a devices are Ns16550 devices with additional capabilities.
    Decare XEN is compatible with this device, to be able to use unmodified
    devicetrees.
    
    Signed-off-by: Tsahee Zidenberg <tsahee@xxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 7dde263e6cbe2b58dbff368f8a63dfc6152a70ef
Author: Tsahee Zidenberg <tsahee@xxxxxxx>
Date:   Sun Dec 22 13:01:31 2013 +0200

    xen/dts: specific bad cell count error
    
    Specify in the error message if bad cell count is in device or parent.
    
    Signed-off-by: Tsahee Zidenberg <tsahee@xxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>

commit 8a91554484ad6977f641b308af38f337c20e97cc
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Dec 17 18:35:18 2013 +0000

    libxc: Document xenctrl.h event channel calls
    
    Provide semantic documentation for how the libxc calls relate to the
    hypervisor interface, and how they are to be used.
    
    Also document the bug (present at least in Linux 3.12) that setting
    the evtchn fd to nonblocking doesn't in fact make xc_evtchn_pending
    nonblocking, and describe the appropriate workaround.
    
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    CC: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    CC: Jan Beulich <JBeulich@xxxxxxxx>
    CC: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

commit a8da8249506b55fe9314462e90cc6749fd50a5fa
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Dec 17 18:35:17 2013 +0000

    docs: Document event-channel-based suspend protocol
    
    Document the event channel protocol in xenstore-paths.markdown, in the
    section for ~/device/suspend/event-channel.
    
    Protocol reverse-engineered from commentary and commit messages of
      4539594d46f9  Add facility to get notification of domain suspend ...
      17636f47a474  Teach xc_save to use event-channel-based ...
    and implementations in
      xc_save (current version)
      libxl (current version)
      linux-2.6.18-xen (mercurial 1241:2993033a77ca)
    
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    CC: Keir Fraser <keir@xxxxxxx>
    CC: Shriram Rajagopalan <rshriram@xxxxxxxxx>

commit 340702fd894add8adcdfd6c5742f41f89aa1fed2
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Dec 17 18:35:16 2013 +0000

    xen: Document that EVTCHNOP_bind_interdomain signals
    
    EVTCHNOP_bind_interdomain signals the event channel.  Document this.
    
    Also explain the usual use pattern.
    
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    CC: Keir Fraser <keir@xxxxxxx>
    CC: Jan Beulich <JBeulich@xxxxxxxx>

commit f63b6c6ddcb44b5551e2f7748b0f5de6d73b35e5
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Dec 17 18:35:15 2013 +0000

    xen: Document XEN_DOMCTL_subscribe
    
    Arguably this domctl is misnamed.  But, for now, document its actual
    behaviour (reverse-engineered from the code and found in the commit
    message for 4539594d46f9) under its actual name.
    
    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    CC: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    CC: Shriram Rajagopalan <rshriram@xxxxxxxxx>
    CC: Jan Beulich <JBeulich@xxxxxxxx>

commit 36a31eb693774e61cdc119c276be90d67b675563
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Tue Dec 17 14:28:19 2013 +0000

    xen/arm: Allow ballooning working with 1:1 memory mapping
    
    With the lack of iommu, dom0 must have a 1:1 memory mapping for all
    these guest physical address. When the balloon decides to give back a
    page to the kernel, this page must have the same address as previously.
    Otherwise, we will loose the 1:1 mapping and will break DMA-capable
    devices.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Cc: Keir Fraser <keir@xxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit f4fed540e78ac8a2bd3b1dee53a5206dde25f613
Author: Yang Zhang <yang.z.zhang@xxxxxxxxx>
Date:   Tue Jan 7 14:30:47 2014 +0100

    VMX: Eliminate cr3 save/loading exiting when UG enabled
    
    With the feature of unrestricted guest, there should be no vmexit
    be triggered when guest accesses the cr3 in non-paging mode. This
    patch will clear the cr3 save/loading bit in vmcs control filed to
    eliminate cr3 access vmexit on UG avaliable hardware.
    
    The previous patch (commit c9efe34c119418a5ac776e5d91aeefcce4576518)
    did the same thing compare to this one. But it will cause guest fail
    to boot up on non-UG hardware which is repoted by Jan and it has been
    reverted (commit 1e2bf05ec37cf04b0e01585eae524509179f165e).
    
    This patch incorporate the fixing and guest are working well both in
    UG and non-UG platform with this patch.
    
    Reported-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 185e83591ce420e0b004646b55c5e4783e388531
Author: Yang Zhang <yang.z.zhang@xxxxxxxxx>
Date:   Tue Jan 7 14:30:21 2014 +0100

    VMX,apicv: Set "NMI-window exiting" for NMI
    
    Enable NMI-window exiting if interrupt is blocked by NMI under apicv enabled
    platform.
    
    Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>

commit 3e06b9890c0a691388ace5a6636728998b237b90
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Jan 7 14:21:48 2014 +0100

    IOMMU: make page table population preemptible
    
    Since this can take an arbitrary amount of time, the rooting domctl as
    well as all involved code must become aware of this requiring a
    continuation.
    
    The subject domain's rel_mem_list is being (ab)used for this, in a way
    similar to and compatible with broken page offlining.
    
    Further, operations get slightly re-ordered in assign_device(): IOMMU
    page tables now get set up _before_ the first device gets assigned, at
    once closing a small timing window in which the guest may already see
    the device but wouldn't be able to access it.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Xiantao Zhang <xiantao.zhang@xxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.