[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 24295: trouble: broken/fail/pass
flight 24295 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/24295/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 3 host-install(3) broken REGR. vs. 24250 Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl 4 capture-logs(4) broken blocked in 24250 test-amd64-i386-xl-win7-amd64 7 windows-install fail like 24250 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass version targeted for testing: xen cedfdd43a9798e535a05690bb6f01394490d26bb baseline version: xen 9a80d5056766535ac624774b96495f8b97b1d28b ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxxxxx> Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> Tim Deegan <tim@xxxxxxx> Tsahee Zidenberg <tsahee@xxxxxxx> Xiantao Zhang <xiantao.zhang@xxxxxxxxx> Yang Zhang <yang.z.zhang@xxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-armhf-armhf-xl broken test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-i386-xend-qemut-winxpsp3 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit cedfdd43a9798e535a05690bb6f01394490d26bb Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Jan 7 16:01:14 2014 +0100 IOMMU: make page table deallocation preemptible This too can take an arbitrary amount of time. In fact, the bulk of the work is being moved to a tasklet, as handling the necessary preemption logic in line seems close to impossible given that the teardown may also be invoked on error paths. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Xiantao Zhang <xiantao.zhang@xxxxxxxxx> commit cc0a6c6c749a8693dc0e201773c10cd97e5e6ce0 Merge: 4746b5a... 81b1c7d... Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Jan 7 14:32:45 2014 +0000 Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into staging commit 4746b5adc396bb2fc963b3156eab7267c6e7e541 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Fri Dec 20 15:08:08 2013 +0000 xen: arm: context switch the aux memory attribute registers We appear to have somehow missed these. Linux doesn't actually use them and none of the processors I've looked at actually define any bits in them (so they are UNK/SBZP) but it is good form to context switch them anyway. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit 81b1c7de2339d2788352b162057e70130803f3cf Author: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> Date: Tue Jan 7 15:09:42 2014 +0100 AMD/IOMMU: fix infinite loop due to ivrs_bdf_entries larger than 16-bit value Certain AMD systems could have upto 0x10000 ivrs_bdf_entries. However, the loop variable (bdf) is declared as u16 which causes inifinite loop when parsing IOMMU event log with IO_PAGE_FAULT event. This patch changes the variable to u32 instead. Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 62d33ca1048f4e08eaeb026c7b79239b4605b636 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Jan 7 14:59:31 2014 +0100 VTD/DMAR: free() correct pointer on error from acpi_parse_one_atsr() Free the allocated structure rather than the ACPI table ATS entry. On further analysis, there is another memory leak. acpi_parse_dev_scope() could allocate scope->devices, and return with -ENOMEM. All callers of acpi_parse_dev_scope() would then free the underlying structure, loosing the pointer. These errors can only actually be reached through acpi_parse_dev_scope() (which passes type = DMAR_TYPE), but I am quite surprised Coverity didn't spot it. Coverity-ID: 1146949 Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit a9fe8c7dda440b84e178d65dcd64c0173b0a4b5d Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Jan 7 14:58:35 2014 +0100 AMD/microcode: avoid use-after-free for the microcode buffer It is possible to free the mc_old buffer and then store it for use in the case of resume. This keeps the old semantics of being able to return an error even after a successful microcode application. Coverity-ID 1146953 Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> commit 2af30e62c4e562d7a4ec4185fdab20fb29354fd8 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Jan 7 14:57:15 2014 +0100 AMD/iommu_detect: don't leak iommu structure on error paths Tweak the logic slightly to return the real errors from get_iommu_{,msi_}capabilities(), which at the moment is no functional change. Coverity-ID: 1146950 Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit b764615c391fdc2648d460245c748a3a319a296e Merge: 57a4578... f4fed54... Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Jan 7 13:50:35 2014 +0000 Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into staging commit 57a45785584e651b807eed08f3a6950d4ade0156 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 24 11:28:47 2013 +0000 xen: driver/char: fix const declaration of DT compatible list The data type for DT compatible list should be: const char * const[] __initconst Fix every serial drivers which support device tree. Spotted-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit dd3ab3881494136999138d70f4fe28ebabe8660c Author: Tsahee Zidenberg <tsahee@xxxxxxx> Date: Sun Dec 22 12:59:57 2013 +0200 ns16550: support ns16550a Ns16550a devices are Ns16550 devices with additional capabilities. Decare XEN is compatible with this device, to be able to use unmodified devicetrees. Signed-off-by: Tsahee Zidenberg <tsahee@xxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit 7dde263e6cbe2b58dbff368f8a63dfc6152a70ef Author: Tsahee Zidenberg <tsahee@xxxxxxx> Date: Sun Dec 22 13:01:31 2013 +0200 xen/dts: specific bad cell count error Specify in the error message if bad cell count is in device or parent. Signed-off-by: Tsahee Zidenberg <tsahee@xxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit 8a91554484ad6977f641b308af38f337c20e97cc Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue Dec 17 18:35:18 2013 +0000 libxc: Document xenctrl.h event channel calls Provide semantic documentation for how the libxc calls relate to the hypervisor interface, and how they are to be used. Also document the bug (present at least in Linux 3.12) that setting the evtchn fd to nonblocking doesn't in fact make xc_evtchn_pending nonblocking, and describe the appropriate workaround. Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> CC: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> CC: Jan Beulich <JBeulich@xxxxxxxx> CC: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> commit a8da8249506b55fe9314462e90cc6749fd50a5fa Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue Dec 17 18:35:17 2013 +0000 docs: Document event-channel-based suspend protocol Document the event channel protocol in xenstore-paths.markdown, in the section for ~/device/suspend/event-channel. Protocol reverse-engineered from commentary and commit messages of 4539594d46f9 Add facility to get notification of domain suspend ... 17636f47a474 Teach xc_save to use event-channel-based ... and implementations in xc_save (current version) libxl (current version) linux-2.6.18-xen (mercurial 1241:2993033a77ca) Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> CC: Keir Fraser <keir@xxxxxxx> CC: Shriram Rajagopalan <rshriram@xxxxxxxxx> commit 340702fd894add8adcdfd6c5742f41f89aa1fed2 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue Dec 17 18:35:16 2013 +0000 xen: Document that EVTCHNOP_bind_interdomain signals EVTCHNOP_bind_interdomain signals the event channel. Document this. Also explain the usual use pattern. Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> CC: Keir Fraser <keir@xxxxxxx> CC: Jan Beulich <JBeulich@xxxxxxxx> commit f63b6c6ddcb44b5551e2f7748b0f5de6d73b35e5 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue Dec 17 18:35:15 2013 +0000 xen: Document XEN_DOMCTL_subscribe Arguably this domctl is misnamed. But, for now, document its actual behaviour (reverse-engineered from the code and found in the commit message for 4539594d46f9) under its actual name. Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> CC: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> CC: Shriram Rajagopalan <rshriram@xxxxxxxxx> CC: Jan Beulich <JBeulich@xxxxxxxx> commit 36a31eb693774e61cdc119c276be90d67b675563 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue Dec 17 14:28:19 2013 +0000 xen/arm: Allow ballooning working with 1:1 memory mapping With the lack of iommu, dom0 must have a 1:1 memory mapping for all these guest physical address. When the balloon decides to give back a page to the kernel, this page must have the same address as previously. Otherwise, we will loose the 1:1 mapping and will break DMA-capable devices. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Cc: Keir Fraser <keir@xxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit f4fed540e78ac8a2bd3b1dee53a5206dde25f613 Author: Yang Zhang <yang.z.zhang@xxxxxxxxx> Date: Tue Jan 7 14:30:47 2014 +0100 VMX: Eliminate cr3 save/loading exiting when UG enabled With the feature of unrestricted guest, there should be no vmexit be triggered when guest accesses the cr3 in non-paging mode. This patch will clear the cr3 save/loading bit in vmcs control filed to eliminate cr3 access vmexit on UG avaliable hardware. The previous patch (commit c9efe34c119418a5ac776e5d91aeefcce4576518) did the same thing compare to this one. But it will cause guest fail to boot up on non-UG hardware which is repoted by Jan and it has been reverted (commit 1e2bf05ec37cf04b0e01585eae524509179f165e). This patch incorporate the fixing and guest are working well both in UG and non-UG platform with this patch. Reported-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 185e83591ce420e0b004646b55c5e4783e388531 Author: Yang Zhang <yang.z.zhang@xxxxxxxxx> Date: Tue Jan 7 14:30:21 2014 +0100 VMX,apicv: Set "NMI-window exiting" for NMI Enable NMI-window exiting if interrupt is blocked by NMI under apicv enabled platform. Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx> commit 3e06b9890c0a691388ace5a6636728998b237b90 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Jan 7 14:21:48 2014 +0100 IOMMU: make page table population preemptible Since this can take an arbitrary amount of time, the rooting domctl as well as all involved code must become aware of this requiring a continuation. The subject domain's rel_mem_list is being (ab)used for this, in a way similar to and compatible with broken page offlining. Further, operations get slightly re-ordered in assign_device(): IOMMU page tables now get set up _before_ the first device gets assigned, at once closing a small timing window in which the guest may already see the device but wouldn't be able to access it. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Xiantao Zhang <xiantao.zhang@xxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |