[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable baseline-only test] 44208: regressions - FAIL
This run is configured for baseline tests only. flight 44208 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/44208/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-xsm 15 guest-start/debian.repeat fail REGR. vs. 44200 test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail REGR. vs. 44200 Regressions which are regarded as allowable (not blocking): build-amd64-rumpuserxen 6 xen-build fail blocked in 44200 build-i386-rumpuserxen 6 xen-build fail blocked in 44200 test-amd64-amd64-xl-credit2 19 guest-start/debian.repeat fail blocked in 44200 test-amd64-amd64-xl-xsm 19 guest-start/debian.repeat fail blocked in 44200 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail blocked in 44200 test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail blocked in 44200 Tests which did not succeed, but are not blocking: test-amd64-amd64-rumpuserxen-amd64 1 build-check(1) blocked n/a test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a test-armhf-armhf-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-xsm 14 guest-saverestore fail never pass test-armhf-armhf-libvirt 14 guest-saverestore fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-armhf-armhf-xl-credit2 13 saverestore-support-check fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 13 saverestore-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass test-armhf-armhf-xl-midway 13 saverestore-support-check fail never pass test-armhf-armhf-xl-midway 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 saverestore-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 13 saverestore-support-check fail never pass test-armhf-armhf-xl-rtds 12 migrate-support-check fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 11 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 12 saverestore-support-check fail never pass test-amd64-i386-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail never pass test-armhf-armhf-libvirt-raw 13 guest-saverestore fail never pass test-armhf-armhf-libvirt-raw 11 migrate-support-check fail never pass test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2 fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail never pass version targeted for testing: xen 986d9fc3bbf8a6d9d088ca22d1422bd5de249396 baseline version: xen 42391c613d42248d82f1b04c523d48bf141b75dc Last test of basis 44200 2016-03-01 03:57:40 Z 1 days Testing same since 44208 2016-03-02 13:50:31 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx> Dario Faggioli <dario.faggioli@xxxxxxxxxx> Doug Goldstein <cardoe@xxxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxxxxx> Haozhong Zhang <haozhong.zhang@xxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Parth Dixit <parth.dixit@xxxxxxxxxx> Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Shannon Zhao <shannon.zhao@xxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Tamas K Lengyel <tamas@xxxxxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen fail build-i386-rumpuserxen fail test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-xsm pass test-armhf-armhf-libvirt-xsm fail test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm fail test-armhf-armhf-xl-xsm fail test-amd64-i386-xl-xsm pass test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 blocked test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 fail test-armhf-armhf-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 blocked test-amd64-amd64-qemuu-nested-intel fail test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt fail test-amd64-i386-libvirt pass test-armhf-armhf-xl-midway pass test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-pygrub pass test-armhf-armhf-libvirt-qcow2 fail test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw fail test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds pass test-armhf-armhf-xl-rtds pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd pass test-amd64-amd64-xl-qemut-winxpsp3 pass test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Push not applicable. ------------------------------------------------------------ commit 986d9fc3bbf8a6d9d088ca22d1422bd5de249396 Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Date: Thu Feb 25 14:49:03 2016 +0000 tools/xenalyze: Actually handle case where number of ipi vectors exceeds static max find_vec() is supposed to find the vector in the list if it exists, choose an empty slot if it doesn't exist, and return null if all slots are full. However, coverity noticed that although the callers of find_vec() handle the last condition, find_vec() itself didn't. Check to see if we actually found an empty slot before attempting to initialize it. CID 1306864 Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 1065622448c1cc5a10425914f02708750046b17e Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Date: Thu Feb 25 14:49:00 2016 +0000 tools/xenalyze: Fix check for error return value fdopen returns NULL on failure, not a negative integer. CID 1306863 CID 1306858 Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 794beca91840fb8519113d40887459d20ec63f68 Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Date: Thu Feb 25 14:48:57 2016 +0000 tools/xenalyze: Avoid redundant check Coverity notices that if !head is true, that !N can never be true. Don't bother checking N, since we know it has to be at least one. CID 1354243 Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit fb579942018fafcf8c6cec04d116b9a4c5e990cd Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Date: Thu Feb 25 14:48:56 2016 +0000 tools/xenalyze: Close symbol_file after reading it ...to avoid leaking the FD and associated memory. CID 1306872 Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 95cb4bac96e95b4df2e63d5ee5ae5f080090e31e Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Wed Feb 10 16:32:39 2016 +0000 loadpolicy: only close polFd if it is valid It can be -1 at this point. CID 1055562 Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 1c3639323c270cbdbde1d7d4add582d8f8d2d5f2 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Mon Feb 29 16:11:31 2016 +0100 MAINTAINERS: remove myself from ARM (incl DT), seabios, tools and The Rest Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit b07408ec75260a626b10beae8bd1c7e240c0e8c2 Author: Doug Goldstein <cardoe@xxxxxxxxxx> Date: Mon Feb 29 16:09:09 2016 +0100 build: consolidate CONFIG_HAS_VIDEO and CONFIG_VIDEO No real advantage to keeping these separate. The use case of this from Linux is when the platform or target board has support for something but the user wants to be given the option to disable it. Signed-off-by: Doug Goldstein <cardoe@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit ff2f342d0a64a7a59bbf195f68b862156fdb6b11 Author: Doug Goldstein <cardoe@xxxxxxxxxx> Date: Mon Feb 29 16:08:43 2016 +0100 build: consolidate CONFIG_HAS_VGA and CONFIG_VGA No real advantage to keeping these separate. The use case of this from Linux is when the platform or target board has support for something but the user wants to be given the option to disable it. Signed-off-by: Doug Goldstein <cardoe@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit f471e98862f05242ae487153adc36283127d0e10 Author: Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx> Date: Mon Feb 29 16:07:49 2016 +0100 arm/monitor vm-events: implement guest-request support This patch adds ARM support for guest-request monitor vm-events. Note: on ARM hypercall instruction skipping must be done manually by the caller. This will probably be changed in a future patch. Summary of changes: == Moved to common-side: * XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST handling (moved from X86 arch_monitor_domctl_event to common monitor_domctl) * hvm_event_guest_request->vm_event_monitor_guest_request * hvm_event_traps->vm_event_monitor_traps (also added target vcpu as param) * guest-request bits from X86 'struct arch_domain' (to common 'struct domain') == ARM implementations: * do_hvm_op now handling of HVMOP_guest_request_vm_event => calls vm_event_monitor_guest_request (as on X86) * arch_monitor_get_capabilities->vm_event_monitor_get_capabilities, updated to reflect support for XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST * vm_event_init_domain (does nothing), vm_event_cleanup_domain == Misc: * vm_event_fill_regs, no longer X86-specific. ARM-side implementation of this function currently does nothing, that will be added in a separate patch. Signed-off-by: Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx> commit ef1b111beecf96abd9608a35b7498c590e3d078c Author: Haozhong Zhang <haozhong.zhang@xxxxxxxxx> Date: Mon Feb 29 16:06:40 2016 +0100 x86/hvm: setup TSC scaling ratio This patch adds a field tsc_scaling_ratio in struct hvm_domain to record the per-domain TSC scaling ratio, and sets it in tsc_set_info(). Before setting the per-domain TSC scaling ratio, we check its validity in tsc_set_info(). If an invalid ratio is given, we will leave the default value in tsc_scaling_ratio (i.e. ratio = 1) and setup guest TSC as if no TSC scaling is used: * For TSC_MODE_DEFAULT, - if a user-specified TSC frequency is given, we will set the guest TSC frequency to it; otherwise, we set it to the host TSC frequency. - if guest TSC frequency does not equal to host TSC frequency, we will emulate guest TSC (i.e. d->arch.vtsc is set to 1). In both cases, guest TSC runs in the guest TSC frequency. * For TSC_MODE_PVRDTSCP, - we set the guest TSC frequency to the host TSC frequency. - guest rdtsc is executed natively in the host TSC frequency as before. - if rdtscp is not available to guest, it will be emulated; otherwise, it will be executed natively. In both cases, guest rdtscp gets TSC in the host TSC frequency as before. Signed-off-by: Haozhong Zhang <haozhong.zhang@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> commit 1bb9a1e356a139628df261197cbc2ba5a4516f2b Author: Parth Dixit <parth.dixit@xxxxxxxxxx> Date: Mon Feb 29 16:06:07 2016 +0100 arm/acpi: read acpi memory info from uefi ACPI memory is seperate from conventional memory and should be marked as reserved while passing to DOM0. Create a new meminfo structure to store all the acpi tables listed in uefi. Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx> Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit db5fd8c3e46b379df9dd94a3730736682e42292d Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Date: Mon Feb 29 16:05:32 2016 +0100 arm/acpi: add placeholder for efi and acpi load address We will create EFI table, memory description table and some of acpi tables and we're going to map them to kinfo->gnttab_start of Dom0. Add placeholder for the starting address for loading in DOM0 and the size of new added tables. Also add a placeholder to store the new created tables. Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx> Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit 5ed0a0e2e2e26527915871f9c8bbd3d6af3e5403 Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Date: Mon Feb 29 16:04:41 2016 +0100 arm/acpi: define a enum for reserved tables It needs to copy and change the contents of some ACPI and EFI tables for Dom0. Here define a enum for those tables. Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx> Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit f2c9f13eae80c57df6b0df8c87a2eb2e86135ac0 Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Date: Mon Feb 29 16:02:57 2016 +0100 arm/acpi: add arm specific acpi header file From: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Add architecture specific definitions and calls required for acpi in new header file. Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx> Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit b7ae6ce2c54453cfb468006aa52e4908291f65a6 Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Date: Mon Feb 29 16:01:21 2016 +0100 arm/acpi: emulate io ports for arm Add macros to emulate x86 style ports for arm. This avoids modification in common code for acpi. Here just print a warning on ARM. Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx> Reviewed-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit e7e84b2edc027a49efcf5e2be3560b58e805aaff Author: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Date: Mon Feb 29 16:00:48 2016 +0100 docs: spell out limits of security support for qemu-xen Write down what emulated hardware is supported in qemu-xen. Add a way for users to ask for a change in the list. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 66c7449a4daee7a36f31635fd95c37d8f381c529 Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Date: Mon Feb 29 15:58:49 2016 +0100 credit1: avoid boosting vCPUs being "just" migrated Moving a vCPU to a different pCPU means offlining it and then waking it up, on the new pCPU. Credit1 grants BOOST priority to vCPUs that wakes up, with the aim of improving I/O latency. The net effect of this all is that vCPUs get boosted when migrating, which shouldn't happen. For instance, this causes scheduling anomalies and, potentially, performance problems, as reported here: http://lists.xen.org/archives/html/xen-devel/2015-10/msg02851.html This patch fixes this by noting down (by means of a flag) the fact that the vCPU is about to undergo a migration. This way we can tell, later, during a wakeup, whether the vCPU is migrating or unblocking, and decide whether or not to apply the boosting. Note that it is important that atomic-safe bit operations are used when manipulating vCPUs' flags. Take the chance and add a comment about this. Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |