flight 58727 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/58727/
Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 15 rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 58663 test-amd64-amd64-xl-qemuu-win7-amd64 9 windows-install fail REGR. vs. 58663 Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 58618 test-amd64-i386-libvirt-xsm 11 guest-start fail like 58663 test-amd64-i386-libvirt 11 guest-start fail like 58663 test-amd64-amd64-libvirt-xsm 11 guest-start fail like 58663 test-amd64-amd64-libvirt 11 guest-start fail like 58663 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 58663 test-armhf-armhf-libvirt-xsm 11 guest-start fail like 58663 test-armhf-armhf-libvirt 11 guest-start fail like 58663 Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-armhf-armhf-xl-arndale 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass test-armhf-armhf-xl-cubietruck 12 migrate-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf-pin 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf 12 migrate-support-check fail never pass version targeted for testing: xen b7007bc6f9a45cef9262b1ec4280eb67140a5112 baseline version: xen fcbfaf9d260adbdb9352d6300b9f63c4ed443d49 ------------------------------------------------------------ People who touched revisions under test: David Scott <dave.sc...@citrix.com> David Vrabel <david.vra...@citrix.com> George Dunlap <george.dun...@eu.citrix.com> Ian Campbell <ian.campb...@citrix.com> Jan Beulich <jbeul...@suse.com> Juergen Gross <jgr...@suse.com> Roger Pau Monne <roger....@citrix.com> Roger Pau Monné <roger....@citrix.com> Ross Lagerwall <ross.lagerw...@citrix.com> Wei Liu <wei.l...@citrix.com> Wei Wang <wei.w.w...@intel.com> ------------------------------------------------------------ jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm fail test-amd64-amd64-libvirt-xsm fail test-armhf-armhf-libvirt-xsm fail test-amd64-i386-libvirt-xsm fail test-amd64-amd64-xl-xsm pass test-armhf-armhf-xl-xsm pass test-amd64-i386-xl-xsm pass test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 fail test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-armhf-armhf-xl-cubietruck pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt fail test-armhf-armhf-libvirt fail test-amd64-i386-libvirt fail test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-armhf-armhf-xl-sedf-pin pass test-amd64-amd64-xl-sedf pass test-armhf-armhf-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-xl-qemut-winxpsp3 pass test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit b7007bc6f9a45cef9262b1ec4280eb67140a5112 Author: Jan Beulich <jbeul...@suse.com> Date: Thu Jun 18 16:44:15 2015 +0200 x86/HVM: avoid pointer wraparound in bufioreq handling The number of slots per page being 511 (i.e. not a power of two) means that the (32-bit) read and write indexes going beyond 2^32 will likely disturb operation. Extend I/O req server creation so the caller can indicate that it is using suitable atomic accesses where needed (not all accesses to the two pointers really need to be atomic), allowing the hypervisor to atomically canonicalize both pointers when both have gone through at least one cycle. Signed-off-by: Jan Beulich <jbeul...@suse.com> Acked-by: Ian Campbell <ian.campb...@citrix.com> Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com> commit cc0fa33fe8b6c2c8ed9d078705070b62ec396051 Author: Jan Beulich <jbeul...@suse.com> Date: Thu Jun 18 16:42:56 2015 +0200 x86/HAP: prefer is_..._domain() over is_..._vcpu() In hvm_hap_nested_page_fault() latch the current domain alongside the current vCPU into a local variable, making use of it where possible also beyond what the title says. Signed-off-by: Jan Beulich <jbeul...@suse.com> Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com> commit 42ef6ec965cb93e17b485caa860ff09d8a932733 Author: Jan Beulich <jbeul...@suse.com> Date: Thu Jun 18 16:42:26 2015 +0200 x86/mm: prefer is_..._domain() over is_..._vcpu() ... when the domain pointer is already available. Signed-off-by: Jan Beulich <jbeul...@suse.com> Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com> commit 12fb4a5ac037763713f373416af9f230fbe374ab Author: Wei Wang <wei.w.w...@intel.com> Date: Thu Jun 18 16:07:40 2015 +0200 x86: add a common interface for cpu matching Add a common interface for matching the current cpu against an array of x86_cpu_ids. Also change mwait-idle.c to use it. Signed-off-by: Wei Wang <wei.w.w...@intel.com> commit 2d67a7a4d37a4759bcd7f2ee2d740497ad669c7d Author: Jan Beulich <jbeul...@suse.com> Date: Thu Jun 18 15:07:10 2015 +0200 x86: synchronize PCI config space access decoding Both PV and HVM logic have similar but not similar enough code here. Synchronize the two so that - in the HVM case we don't unconditionally try to access extended config space - in the PV case we pass a correct range to the XSM hook - in the PV case we don't needlessly deny access when the operation isn't really on PCI config space All this along with sharing the macros HVM already had here. Signed-off-by: Jan Beulich <jbeul...@suse.com> Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com> commit d89d78912179fb6591f43abff879f43e37ba4654 Author: Jan Beulich <jbeul...@suse.com> Date: Thu Jun 18 14:55:18 2015 +0200 slightly simplify SCHEDOP_remote_shutdown handling There's no need for two exit paths each using rcu_unlock_domain() on its own here. Signed-off-by: Jan Beulich <jbeul...@suse.com> Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com> Acked-by: George Dunlap <george.dun...@eu.citrix.com> commit e156654d4eb2fdeb524e6b40838767a5dc918966 Author: David Vrabel <david.vra...@citrix.com> Date: Thu Jun 18 14:54:25 2015 +0200 evtchn: remove the locking when unmasking an event channel The event channel lock is no longer required to check if the port is valid. Signed-off-by: David Vrabel <david.vra...@citrix.com> commit 01280dc19cf3da089f98faf4f524b54b5a191df0 Author: David Vrabel <david.vra...@citrix.com> Date: Thu Jun 18 14:53:23 2015 +0200 evtchn: simplify port_is_valid() By keeping a count of the number of currently valid event channels, port_is_valid() can be simplified. d->valid_evtchns is only increased (while holding d->event_lock), so port_is_valid() may be safely called without taking the lock (this will be useful later). Signed-off-by: David Vrabel <david.vra...@citrix.com> commit e320f14c6ad5e423c5fae088e69a72c42c9ad678 Author: Juergen Gross <jgr...@suse.com> Date: Thu Jun 18 14:52:32 2015 +0200 pvusb: don't rely on linux kernel macros for the interface The interface description of pvUSB lacks some access macros as using linux kernel macros is assumed to work well. This solution is rather unfriendly for pvusb implementations being outside the linux kernel. Additionally things will break quite unpleasent in case the linux kernel implementation is changed. To avoid these problems define own macros for accessing bitfields of the interface and for values of several structure members. While working on the file add some more comments, especially for the xenstore interface. Signed-off-by: Juergen Gross <jgr...@suse.com> commit d962aa44e4128ea677ce8407fc2483d94f007d91 Author: Wei Liu <wei.l...@citrix.com> Date: Wed Jun 17 20:39:49 2015 +0100 oxenstored: fix del_watches and del_transactions The statement to reset nb_watches should be in del_watches, not del_transactions. Signed-off-by: Wei Liu <wei.l...@citrix.com> Cc: David Scott <dave.sc...@citrix.com> Acked-by: David Scott <dave.sc...@citrix.com> [ ijc -- fix syntax error by adding a ";" to the previous line in the new location and removing from the previous line in the old ] commit c6ef839d84726cf420a0381174f0f8ffac6ffd84 Author: Wei Liu <wei.l...@citrix.com> Date: Wed Jun 17 12:08:38 2015 +0100 libxl: refactor toolstack save restore code This patch does following things: 1. Document v1 format. 2. Factor out function to handle QEMU restore data and function to handle v1 blob for restore path. 3. Refactor save function to generate different blobs in the order specified in format specification. 4. Change functions to use "goto out" idiom. No functional changes introduced. Signed-off-by: Wei Liu <wei.l...@citrix.com> Acked-by: Ian Campbell <ian.campb...@citrix.com> commit d45e9b7c53428a2aa4d067927e7ef5e30783fb8b Author: Ian Campbell <ian.campb...@citrix.com> Date: Wed Jun 17 13:37:00 2015 +0100 xen: arm: Do not expose PMU to domain 0 It uses a PPI which we cannot route to a guest, and will surely need more support than just that anyway. I noticed this on Mustang with UEFI where the built in DTB contains a node of this type. According to linux/Documentation/devicetree/bindings/arm/pmu.txt the ARM v7 (Cortex-A{7,15}) PMUs require a PPI too, so blacklist them as well. Signed-off-by: Ian Campbell <ian.campb...@citrix.com> Reviewed-by: Julien Grall <julien.gr...@citrix.com> commit 06ee606aaf976ea653840b8a7ee3d424fb765f32 Author: Roger Pau Monne <roger....@citrix.com> Date: Thu Jun 11 18:05:20 2015 +0200 libxc: fix xc_dom_load_elf_symtab xc_dom_load_elf_symtab was incorrectly trying to perform the same calculations already done in elf_parse_bsdsyms when load == 0 is used. Instead of trying to repeat the calculations, just trust what elf_parse_bsdsyms has already accounted for. This also simplifies the code by allowing the non-load case to return earlier. Signed-off-by: Roger Pau Monné <roger....@citrix.com> Cc: Ian Jackson <ian.jack...@eu.citrix.com> Cc: Stefano Stabellini <stefano.stabell...@eu.citrix.com> Cc: Ian Campbell <ian.campb...@citrix.com> Cc: Wei Liu <wei.l...@citrix.com> Acked-by: Wei Liu <wei.l...@citrix.com> commit 415b58c184b483ee31811a22d31bebcbb34b159c Author: Ross Lagerwall <ross.lagerw...@citrix.com> Date: Mon Jun 15 11:12:07 2015 +0100 tools/libxc: Batch memory allocations for PV guests The current code for allocating memory for PV guests batches the hypercalls to allocate memory by allocating 1024*1024 extents of order 0 at a time. To make this faster, first try allocating extents of order 9 (2 MiB) before falling back to the order 0 allocating if the order 9 allocation fails. On my test machine this reduced the time to start a 128 GiB PV guest by about 60 seconds. Signed-off-by: Ross Lagerwall <ross.lagerw...@citrix.com> Acked-by: Wei Liu <wei.l...@citrix.com> commit f8c72b526129ad2d8e0a1c578632d390380fd984 Author: Wei Liu <wei.l...@citrix.com> Date: Tue Jun 9 11:08:14 2015 +0100 oxenstored: implement XS_RESET_WATCHES Signed-off-by: Wei Liu <wei.l...@citrix.com> Acked-by: David Scott <dave.sc...@citrix.com> commit e1e566ca08b274cb1822f9faafdc9cabfba1ffe1 Author: Wei Liu <wei.l...@citrix.com> Date: Thu Jun 4 11:23:01 2015 +0100 libxc: unify handling of vNUMA layout This patch does the following: 1. Use local variables for dummy vNUMA layout in PV case. 2. Avoid leaking dummy layout back to caller in PV case. 3. Use local variables to reference vNUMA layout (whether it is dummy or provided by caller) for both PV and HVM. Signed-off-by: Wei Liu <wei.l...@citrix.com> Reviewed-by: Boris Ostrovsky <boris.ostrov...@oracle.com> Acked-by: Ian Campbell <ian.campb...@citrix.com> commit 08974f3d2f7df9ebabfae1c9336c2ad309c4c7d0 Author: Wei Liu <wei.l...@citrix.com> Date: Wed Jun 3 11:44:50 2015 +0100 libxl: clean up qemu-save and qemu-resume files These files are leaked when using qemu-trad stubdom. They are intermediate files created by libxc. Unfortunately they don't fit well in our userdata scheme. Clean them up after we destroy all userdata, we're sure they are not useful anymore at that point. Signed-off-by: Wei Liu <wei.l...@citrix.com> Acked-by: Ian Campbell <ian.campb...@citrix.com> (qemu changes not included)
_______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel