xen.org
2013-Nov-19 02:53 UTC
[xen-unstable test] 22009: regressions - trouble: blocked/broken/fail/pass
flight 22009 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/22009/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf 2 host-install(2) broken REGR. vs. 21995 build-amd64-oldkern 4 xen-build fail REGR. vs. 21995 build-amd64-pvops 4 kernel-build fail REGR. vs. 21995 build-armhf-pvops 4 kernel-build fail REGR. vs. 21995 build-amd64 4 xen-build fail REGR. vs. 21995 Tests which did not succeed, but are not blocking: test-amd64-i386-qemut-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-sedf 1 xen-build-check(1) blocked n/a test-amd64-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-sedf-pin 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-pcipt-intel 1 xen-build-check(1) blocked n/a test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-qemut-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-armhf-armhf-xl 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-i386-xend-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemut-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xend-qemut-winxpsp3 1 xen-build-check(1) blocked n/a version targeted for testing: xen a0eaa86e753766a06d740bd125c0cb8b3358babf baseline version: xen 6757efe1bf50ac7ff68fa4dd7d9333529f70ae9a ------------------------------------------------------------ People who touched revisions under test: Eddie Dong <eddie.dong@intel.com> Ian Jackson <ian.jackson@eu.citrix.com> Jan Beulich <jbeulich@suse.com> Keir Fraser <keir@xen.org> Roger Pau Monné <roger.pau@citrix.com> ------------------------------------------------------------ jobs: build-amd64 fail build-armhf broken build-i386 pass build-amd64-oldkern fail build-i386-oldkern pass build-amd64-pvops fail build-armhf-pvops fail build-i386-pvops pass test-amd64-amd64-xl blocked test-armhf-armhf-xl blocked test-amd64-i386-xl blocked test-amd64-i386-rhel6hvm-amd blocked test-amd64-i386-qemut-rhel6hvm-amd blocked test-amd64-i386-qemuu-rhel6hvm-amd blocked test-amd64-amd64-xl-qemut-win7-amd64 blocked test-amd64-i386-xl-qemut-win7-amd64 blocked test-amd64-amd64-xl-qemuu-win7-amd64 blocked test-amd64-amd64-xl-win7-amd64 blocked test-amd64-i386-xl-win7-amd64 blocked test-amd64-i386-xl-credit2 blocked test-amd64-amd64-xl-pcipt-intel blocked test-amd64-i386-rhel6hvm-intel blocked test-amd64-i386-qemut-rhel6hvm-intel blocked test-amd64-i386-qemuu-rhel6hvm-intel blocked test-amd64-i386-xl-multivcpu blocked test-amd64-amd64-pair blocked test-amd64-i386-pair blocked test-amd64-amd64-xl-sedf-pin blocked test-amd64-amd64-pv blocked test-amd64-i386-pv blocked test-amd64-amd64-xl-sedf blocked test-amd64-i386-xl-qemut-winxpsp3-vcpus1 blocked test-amd64-i386-xl-winxpsp3-vcpus1 blocked test-amd64-i386-xend-qemut-winxpsp3 blocked test-amd64-amd64-xl-qemut-winxpsp3 blocked test-amd64-amd64-xl-qemuu-winxpsp3 blocked test-amd64-i386-xend-winxpsp3 blocked test-amd64-amd64-xl-winxpsp3 blocked ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit a0eaa86e753766a06d740bd125c0cb8b3358babf Author: Roger Pau Monne <roger.pau@citrix.com> Date: Fri Sep 13 10:53:58 2013 +0200 libxl: add device backend listener in order to launch backends Add the necessary logic in libxl to allow it to act as a listener for launching backends in a driver domain, replacing udev (like we already do on Dom0). This new functionality is acomplished by watching the domain backend path (/local/domain/<domid>/backend) and reacting to device creation/destruction. The way to launch this listener daemon is from xl, using the newly introduced "devd" command. The command will daemonize by default, using "xldevd.log" as it''s logfile. Optionally the user can force the execution of the listener in the foreground by passing the "-F" option to the devd command. Current backends handled by this daemon include Qdisk, vbd and vif device types. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit 6d8dbac551d37fe3b4a6f70317fcaeba086d8589 Author: Roger Pau Monne <roger.pau@citrix.com> Date: Fri Sep 20 17:55:32 2013 +0200 libxl: revert 326a7b74 When running libxl from a driver domain there''s no xenstore pid file (because xenstore is not running on the driver domain). Also, at that point in libxl initialization there''s no way to know wether libxl is running on a domain different than Dom0, so just revert the change in order to allow libxl to work on driver domains. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit 64559b173749d00a9447c6391b37c19e5e4cb4f5 Author: Roger Pau Monne <roger.pau@citrix.com> Date: Fri Sep 20 17:14:09 2013 +0200 xl: put daemonize code in it''s own function Move the daemonizer code from create_domain into it''s own function that can be called from other places different than create_domain. This will be used to daemonize the driver domain backend handler. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit 5cf2bea385d1bdd409f06789220910876c0ab17d Author: Roger Pau Monne <roger.pau@citrix.com> Date: Thu Sep 19 15:33:59 2013 +0200 libxl: add Qdisk backend launch helper Current Qemu launch functions in libxl require the usage of data structures only avaialbe on domain creation. All this information is not need in order to launch a Qemu instance to serve Qdisk backends, so introduce a new simplified helper that can be used to launch Qemu/Qdisk, that will be used to launch Qdisk in driver domains. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Cc: Anthony PERARD <anthony.perard@citrix.com> Cc: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit 4b33540e8ce55acf19ec8c3f6706efaecdfd57ea Author: Roger Pau Monne <roger.pau@citrix.com> Date: Thu Sep 19 11:17:45 2013 +0200 libxl: don''t launch Qemu on Dom0 for Qdisk devices on driver domains In libxl__need_xenpv_qemu check that the backend domain of the Qdisk device is Dom0 before launching a Qemu instance in the toolstack domain. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit f39b1af257e32108fa356ee8c20313a221e31983 Author: Roger Pau Monne <roger.pau@citrix.com> Date: Wed Sep 18 17:35:00 2013 +0200 libxl: remove the Qemu bodge for driver domain devices When Qemu is launched from a driver domain to act as a PV disk backend we can make sure that Qemu is running before detaching devices, so there''s no need for the bodge there. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit f36df037ba8813207275b7094966436fcbb30060 Author: Roger Pau Monne <roger.pau@citrix.com> Date: Fri Sep 27 11:37:04 2013 +0200 libxl: synchronize device removal when using driver domains Synchronize the clean up of the backend from the toolstack domain when the driver domain has actually finished closing the backend for the device. This is accomplished by waiting for the driver domain to remove the directory containing the backend keys, then the toolstack domain will finish the cleanup by removing the empty folders on the backend path. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit 51e20c55808cfe3e51b45f6ff2a45775170fa5e4 Author: Roger Pau Monne <roger.pau@citrix.com> Date: Wed Sep 18 13:15:14 2013 +0200 libxl: don''t remove device frontend path from driver domains A domain different than LIBXL_TOOLSTACK_DOMID should not try to remove the frontend paths of a device. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit d1cb516db2155e4967a8c805425d3ae560713e28 Author: Roger Pau Monne <roger.pau@citrix.com> Date: Wed Sep 18 12:42:47 2013 +0200 libxl: create a local xenstore libxl and device-model dir for guests If libxl is executed inside a guest domain it needs write access to the local libxl xenstore dir (/local/<domid>/libxl) to store internal data. This also applies to Qemu which needs a /local/<domid>/device-model xenstore directory. This patch creates the mentioned directories for each guest launched from libxl. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> commit a5db2c7aab7a638d84f22ac8fe5089d81175438b Author: Jan Beulich <jbeulich@suse.com> Date: Mon Nov 18 13:57:20 2013 +0100 x86: consider modules when cutting off memory The code in question runs after module ranges got already removed from the E820 table, so when determining the new maximum page/PDX we need to explicitly take them into account. Furthermore we need to round up the ending addresses here, in order to fully cover eventual partial trailing pages. Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> commit 85c72f9fe764ed96f5c149efcdd69ab7c18bfe3d Author: Jan Beulich <jbeulich@suse.com> Date: Mon Nov 18 13:55:55 2013 +0100 VT-d: fix TLB flushing in dma_pte_clear_one() The third parameter of __intel_iommu_iotlb_flush() is to indicate whether the to be flushed entry was a present one. A few lines before, we bailed if !dma_pte_present(*pte), so there''s no need to check the flag here again - we can simply always pass TRUE here. This is XSA-78. Suggested-by: Cheng Yueqiang <yqcheng.2008@phdis.smu.edu.sg> Signed-off-by: Jan Beulich <jbeulich@suse.com> Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com> Acked-by: Keir Fraser <keir@xen.org> commit e02b14e531a95399fc9d8647ec3cc6f310a7d455 Author: Jan Beulich <jbeulich@suse.com> Date: Mon Nov 18 09:39:01 2013 +0100 nested VMX: don''t ignore mapping errors Rather than ignoring failures to map the virtual VMCS as well as MSR or I/O port bitmaps, convert those into failures of the respective instructions (avoiding to dereference NULL pointers). Ultimately such failures should be handled transparently (by using transient mappings when they actually need to be accessed, just like nested SVM does). Signed-off-by: Jan Beulich <jbeulich@suse.com> Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com> Acked-by: Eddie Dong <eddie.dong@intel.com> (qemu changes not included) --===============1850952783150249372=Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel --===============1850952783150249372==--