[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 26306: regressions - FAIL
flight 26306 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/26306/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 11 guest-saverestore.2 fail REGR. vs. 26273 Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 9 guest-start fail never pass test-amd64-i386-libvirt 9 guest-start fail never pass test-armhf-armhf-libvirt 9 guest-start fail never pass test-armhf-armhf-xl 10 migrate-support-check fail never pass test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-winxpsp3 14 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop fail never pass version targeted for testing: xen 2cd6bf3653a2b983c90bf3af42d199c499db4165 baseline version: xen 11dba84796d852123da9d47f63b06aedaf9eeb01 ------------------------------------------------------------ People who touched revisions under test: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx> Christoph Egger <chegger@xxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxxxxx> Kai Huang <kai.huang@xxxxxxxxxxxxxxx> Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt fail test-armhf-armhf-libvirt fail test-amd64-i386-libvirt fail test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xl-qemuu-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail test-amd64-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on osstest.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 2cd6bf3653a2b983c90bf3af42d199c499db4165 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed May 14 15:12:01 2014 +0100 tools: arm: remove code to check for a DTB appended to the kernel The code to check for an appended DTB was confusing and unnecessary. Since we know the size of the kernel binary passed to us we should just load the entire thing into guest RAM (subject to the limits checks). Removing this code avoids a whole raft of overflow and alignment issues. We also need to validate the limits of the segment where we intend to load the kernel to avoid overflow issues. For ARM32 we control the load address, but we need to validate the size. The entry point is only relevant within the guest so we don't need to worry about that. For ARM64 we need to validate both the load address (which is the same as the entry point) and the size. This is XSA-95. Reported-by: Thomas Leonard <talex5@xxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 6d49536d844a2685a50281c5385a093a61911987 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue May 13 16:50:27 2014 +0100 xen/arm: Don't give IOMMU devices to dom0 when iommu is disabled When iommu={disable,off,no,false} is given to Xen command line, the IOMMU framework won't specify that the device shouldn't be passthrough to DOM0. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 7d0f4a2cad3faa6dbecca87b1b11cf19ce06cd97 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue May 13 16:50:26 2014 +0100 MAINTAINERS: Add drivers/passthrough/arm Add the ARM IOMMU directory to "ARM ARCHITECTURE" part Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Cc: Keir Fraser <keir@xxxxxxx> Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Cc: Jan Beulich <jbeulich@xxxxxxxx> commit 4a3bdfe07440eb7ecd23f13379cf909f8aa4ab26 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue May 13 16:50:25 2014 +0100 xen/passthrough: Introduce IOMMU ARM architecture This patch contains the architecture to use IOMMUs on ARM. There is no IOMMU drivers on this patch. In this implementation, IOMMU page table will be shared with the P2M. The code will run through the device tree and will initialize every IOMMU. It's possible to have multiple IOMMUs on the same platform, but they must be handled with the same driver. For now, there is no support for using multiple iommu drivers at runtime. Each new IOMMU drivers should contain: static const char * const myiommu_dt_compat[] __initconst = { /* list of device compatible with the drivers. Will be matched with * the "compatible" property on the device tree */ NULL, }; DT_DEVICE_START(myiommu, "MY IOMMU", DEVICE_IOMMU) .compatible = myiommu_compatible, .init = myiommu_init, DT_DEVICE_END Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Cc: Xiantao Zhang <xiantao.zhang@xxxxxxxxx> Cc: Jan Beulich <jbeulich@xxxxxxxx> commit df6d39cbeba73ba7e1c27b9496c38169b5ec05f8 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue May 13 16:50:24 2014 +0100 xen/passthrough: iommu: Basic support of device tree assignment Add IOMMU helpers to support device tree assignment/deassignment. This patch introduces 2 new fields in the dt_device_node: - is_protected: Does the device is protected by an IOMMU - domain_list: Pointer to the next device assigned to the same domain This commit contains only support to protected a device with DOM0. Device passthrough to another guest won't work out-of-box. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Cc: Xiantao Zhang <xiantao.zhang@xxxxxxxxx> commit dfd60b0750c2ca79e27145622c412642b0bc8d90 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Tue May 13 16:50:17 2014 +0100 xen/arm: Introduce flush_tlb_domain The pattern p2m_load_VTTBR(d) -> flush_tlb -> p2m_load_VTTBR(current->domain) is used in few places. Replace this usage by flush_tlb_domain which will take care of this pattern. This will help to the readability of apply_p2m_changes which begin to be big. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> [ ijc -- s/lisibility/readability/, s/speficied/specified/ ] commit a07084525c126c596326dc1442dd218f522f51b4 Author: Kai Huang <kai.huang@xxxxxxxxxxxxxxx> Date: Wed May 14 10:54:39 2014 +0200 x86/MCE: bypass uninitialized vcpu in vMCE injection Dom0 may bring up less number of vCPUs than xen hypervisor actually created for it, and in this case, on Intel platform, vMCE injection to dom0 will fail due to injecting vMCE to uninitialized vcpu, and cause dom0 crash. Signed-off-by: Kai Huang <kai.huang@xxxxxxxxxxxxxxx> Acked-by: Christoph Egger <chegger@xxxxxxxxx> commit 4905b35c1dd425acb99665f26f1c4cf910b4284e Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed May 14 10:51:37 2014 +0200 iommu: introduce arch specific code Currently the structure hvm_iommu (xen/include/xen/hvm/iommu.h) contains x86 specific fields. This patch creates: - arch_hvm_iommu structure which will contain architecture depend fields - arch_iommu_domain_{init,destroy} function to execute arch specific during domain creation/destruction Also move iommu_use_hap_pt and domain_hvm_iommu in asm-x86/iommu.h. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx> Tested-by: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx> commit 5979e0c92559333287122ff072aa6ad247bd088a Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed May 14 10:50:22 2014 +0200 iommu: split generic code The generic IOMMU framework code (xen/drivers/passthrough/iommu.c) contains functions specific to x86 and PCI. Split the framework in 3 distincts files: - iommu.c: contains generic functions shared between x86 and ARM (when it will be supported) - pci.c: contains specific functions for PCI passthrough - x86/iommu.c: contains specific functions for x86 io.c contains x86 HVM specific code. Only compile for x86. This patch is mostly code movement in new files. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit fc49666e811db269539bc9557608504b5f332bfb Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed May 14 10:49:17 2014 +0200 passthrough: rework hwdom_pvh_reqs to use it also on ARM Hardware domain on ARM will have the same requirements as hwdom PVH when iommu is enabled. Both PVH and ARM guest has paging mode translate enabled, so Xen can use it to know if it needs to check the requirements. Rename the function and remove "pvh" word in the panic message. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 2246d8483ed212a5998c108806937d24a76740d0 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed May 14 10:48:37 2014 +0200 passthrough: vtd: iommu_set_hwdom_mapping is VTD specific This function was exported in common header. Rename it and move the declaration in drivers/passtrough/vtd/extern.h Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit aabea69d45d1ba45a5a7771da181a1477036d615 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed May 14 10:48:16 2014 +0200 passthrough: amd: rename iommu_has_feature into amd_iommu_has_feature This function is AMD specific and the name will clash with a newly function added in the IOMMU framework. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Aravind Gopalakrishnan <Aravind.Gopalakrishnan@xxxxxxx> commit e91b65382425113772445f78c1a223fc1e6b7dbf Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed May 14 10:47:02 2014 +0200 passthrough: amd: Remove domain_id from hvm_iommu The structure hvm_iommu contains a shadow value of domain->domain_id. There is no reason to not directly use domain->domain_id. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |