* [xen-unstable test] 56811: regressions - FAIL
@ 2015-05-21 3:34 osstest service user
2015-05-21 6:43 ` Jan Beulich
0 siblings, 1 reply; 4+ messages in thread
From: osstest service user @ 2015-05-21 3:34 UTC (permalink / raw)
To: xen-devel; +Cc: ian.jackson
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1: Type: text/plain, Size: 15809 bytes --]
flight 56811 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56811/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-multivcpu 17 leak-check/check fail REGR. vs. 56375
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-freebsd10-amd64 13 guest-localmigrate fail REGR. vs. 56375
test-amd64-amd64-libvirt 11 guest-start fail REGR. vs. 56375
test-amd64-i386-freebsd10-i386 13 guest-localmigrate fail like 56375
test-armhf-armhf-libvirt 11 guest-start fail like 56375
test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 56375
test-amd64-i386-libvirt 11 guest-start fail like 56375
test-amd64-amd64-rumpuserxen-amd64 15 rumpuserxen-demo-xenstorels/xenstorels.repeat fail like 56544-bisect
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass
test-amd64-amd64-xl-xsm 11 guest-start fail never pass
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass
test-amd64-i386-xl-xsm 11 guest-start fail never pass
test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass
test-amd64-amd64-libvirt-xsm 11 guest-start fail never pass
test-amd64-i386-libvirt-xsm 11 guest-start fail never pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass
test-armhf-armhf-libvirt-xsm 11 guest-start fail never pass
test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass
test-armhf-armhf-xl-xsm 11 guest-start fail never pass
test-armhf-armhf-xl-arndale 12 migrate-support-check fail never pass
test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass
test-armhf-armhf-xl-cubietruck 12 migrate-support-check fail never pass
test-armhf-armhf-xl-sedf-pin 12 migrate-support-check fail never pass
test-armhf-armhf-xl 12 migrate-support-check fail never pass
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass
test-armhf-armhf-xl-sedf 12 migrate-support-check fail never pass
test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail never pass
version targeted for testing:
xen 1037e33c88bb0e1fe530c164f242df17030102e1
baseline version:
xen e13013dbf1d5997915548a3b5f1c39594d8c1d7b
------------------------------------------------------------
People who touched revisions under test:
David Vrabel <david.vrabel@citrix.com>
George Dunlap <george.dunlap@eu.citrix.com>
Ian Campbell <ian.campbell@citrix.com>
Jan Beulich <jbeulich@suse.com>
Julien Grall <julien.grall@citrix.com> (ARM)
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Roger Pau Monné <roger.pau@citrix.com>
------------------------------------------------------------
jobs:
build-amd64-xsm pass
build-armhf-xsm pass
build-i386-xsm pass
build-amd64 pass
build-armhf pass
build-i386 pass
build-amd64-libvirt pass
build-armhf-libvirt pass
build-i386-libvirt pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-armhf-pvops pass
build-i386-pvops pass
build-amd64-rumpuserxen pass
build-i386-rumpuserxen pass
test-amd64-amd64-xl pass
test-armhf-armhf-xl pass
test-amd64-i386-xl pass
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm fail
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm fail
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm fail
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm fail
test-amd64-amd64-libvirt-xsm fail
test-armhf-armhf-libvirt-xsm fail
test-amd64-i386-libvirt-xsm fail
test-amd64-amd64-xl-xsm fail
test-armhf-armhf-xl-xsm fail
test-amd64-i386-xl-xsm fail
test-amd64-amd64-xl-pvh-amd fail
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd pass
test-amd64-amd64-xl-qemut-debianhvm-amd64 pass
test-amd64-i386-xl-qemut-debianhvm-amd64 pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-freebsd10-amd64 fail
test-amd64-amd64-xl-qemuu-ovmf-amd64 pass
test-amd64-i386-xl-qemuu-ovmf-amd64 pass
test-amd64-amd64-rumpuserxen-amd64 fail
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-i386-xl-qemuu-win7-amd64 pass
test-armhf-armhf-xl-arndale pass
test-amd64-amd64-xl-credit2 pass
test-armhf-armhf-xl-credit2 pass
test-armhf-armhf-xl-cubietruck pass
test-amd64-i386-freebsd10-i386 fail
test-amd64-i386-rumpuserxen-i386 pass
test-amd64-amd64-xl-pvh-intel fail
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-amd64-libvirt fail
test-armhf-armhf-libvirt fail
test-amd64-i386-libvirt fail
test-amd64-amd64-xl-multivcpu pass
test-armhf-armhf-xl-multivcpu fail
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-amd64-amd64-xl-sedf-pin pass
test-armhf-armhf-xl-sedf-pin pass
test-amd64-amd64-xl-sedf pass
test-armhf-armhf-xl-sedf pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass
test-amd64-amd64-xl-qemut-winxpsp3 pass
test-amd64-i386-xl-qemut-winxpsp3 pass
test-amd64-amd64-xl-qemuu-winxpsp3 pass
test-amd64-i386-xl-qemuu-winxpsp3 pass
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 1037e33c88bb0e1fe530c164f242df17030102e1
Author: David Vrabel <david.vrabel@citrix.com>
Date: Tue May 19 15:49:22 2015 +0200
spinlock: fix build with older GCC
Older GCC versions such as 4.3 cannot have initializers for the
members of anonymous structures, so initialize .head_tail instead.
Use a SPINLOCK_TICKET_INC define so this initializer is near the
spinlock_tickets_t definition (in case the structure changes requiring
changes to the initializer).
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
Reported-and-tested-by: Jan Beulich <jbeulich@suse.com>
commit db83975f0fcd30370392ed288a7bd2420624ed4e
Author: Jan Beulich <jbeulich@suse.com>
Date: Tue May 19 11:35:30 2015 +0200
x86/EFI: keep EFI runtime services top level page tables up-to-date
Updates to idle_pg_table[] need to be mirrored into the page tables
used for invoking EFI runtime services.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 0d7a599afff0665c74f328f6af85e556688d7908
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 18 12:34:44 2015 +0200
Revert "x86: rework paging_log_dirty_op to work with hvm guests"
This reverts commit a809eeea06d20b115d78f12e473502bcb6209844, as it
breaks PV log dirty mode handling.
commit 08c902a39f5f7aa0e1d5fe664b2b8db458d4fb73
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 18 12:11:31 2015 +0200
x86emul: also put_fpu() on error paths
fail_if() and generate_exception_if() could theoretically bypass the
normal flow reaching put_fpu(), and not invoking it would leave the
fpu_exception_callback pointer in place, allowing for the callback to
be called at an unexpected time. Luckily the two
generate_exception_if()-s that would actually trigger this are
currently commented out, so this is not (yet) a (security) issue.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit e4ad2836842ac114e7791963d56ebd02dd4c384f
Author: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Date: Fri May 15 16:12:22 2015 -0400
xentrace: Implement cpu mask range parsing of human values (-c).
Instead of just using -c 0x<some hex value> we can
also use: -c <starting cpu>-<end cpu>, -c <cpu1>,<cpu2>, or a
combination of them, or 'all' for all cpus.
This new format can include just singular CPUs: -c <cpu1>,
or ranges without an start or end (and xentrace will figure out
the values), such as: -c -<cpu2> (which will include cpu0, cpu1,
and cpu2) or -c <cpu2>- (which will include cpu2 and up to MAX_CPUS).
That should make it easier to trace the right CPU if
using this along with 'xl vcpu-list'.
The code has been lifted from the Linux kernel, see file
lib/bitmap.c, function __bitmap_parselist.
To make the old behavior and the new function work, we check
to see if the arguments have '0x' in them. If they do
we use the old style parsing (limited to 32 CPUs). If that
does not exist we use the new parsing.
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
commit a809eeea06d20b115d78f12e473502bcb6209844
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri May 15 10:08:33 2015 +0200
x86: rework paging_log_dirty_op to work with hvm guests
When the caller of paging_log_dirty_op is a hvm guest Xen would choke when
trying to copy the dirty bitmap to the guest because the paging lock is
already held.
Fix this by independently mapping each page of the guest bitmap as needed
without the paging lock held.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
commit acc0899ef41e763c665c542beca6809049fac11c
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri May 15 10:07:50 2015 +0200
x86/hap: make hap_track_dirty_vram use non-contiguous memory for temporary map
Just like it's done for shadow_track_dirty_vram allocate the temporary
buffer using non-contiguous memory.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
commit bd1b4a71b325933a08099676515a7cc8235d7144
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri May 15 10:07:20 2015 +0200
x86/shadow: fix shadow_track_dirty_vram to work on hvm guests
Modify shadow_track_dirty_vram to use a local buffer and then flush to the
guest without the paging_lock held. This is modeled after
hap_track_dirty_vram.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
commit f278fcf19ce15f7b7ee69181560b5884a5e12b66
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri May 15 10:06:04 2015 +0200
introduce a helper to allocate non-contiguous memory
The allocator uses independent calls to alloc_domheap_pages in order to get
the desired amount of memory and then maps all the independent physical
addresses into a contiguous virtual address space.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Tested-by: Julien Grall <julien.grall@citrix.com> (ARM)
Reviewed-by: Tim Deegan <tim@xen.org>
commit e62e49e6d5d4e8d22f3df0b75443ede65a812435
Author: David Vrabel <david.vrabel@citrix.com>
Date: Fri May 15 09:52:25 2015 +0200
x86,arm: remove asm/spinlock.h from all architectures
Now that all architecture use a common ticket lock implementation for
spinlocks, remove the architecture specific byte lock implementations.
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
Acked-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 45fcc4568c5162b00fb3907fb158af82dd484a3d
Author: David Vrabel <david.vrabel@citrix.com>
Date: Fri May 15 09:49:12 2015 +0200
use ticket locks for spin locks
Replace the byte locks with ticket locks. Ticket locks are: a) fair;
and b) peform better when contented since they spin without an atomic
operation.
The lock is split into two ticket values: head and tail. A locker
acquires a ticket by (atomically) increasing tail and using the
previous tail value. A CPU holds the lock if its ticket == head. The
lock is released by increasing head.
spin_lock_irq() and spin_lock_irqsave() now spin with irqs disabled
(previously, they would spin with irqs enabled if possible). This is
required to prevent deadlocks when the irq handler tries to take the
same lock with a higher ticket.
Architectures need only provide arch_fetch_and_add() and two barriers:
arch_lock_acquire_barrier() and arch_lock_release_barrier().
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
(qemu changes not included)
[-- Attachment #2: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [xen-unstable test] 56811: regressions - FAIL
2015-05-21 3:34 [xen-unstable test] 56811: regressions - FAIL osstest service user
@ 2015-05-21 6:43 ` Jan Beulich
2015-05-21 8:45 ` Ian Campbell
0 siblings, 1 reply; 4+ messages in thread
From: Jan Beulich @ 2015-05-21 6:43 UTC (permalink / raw)
To: xen-devel; +Cc: ian.jackson
>>> On 21.05.15 at 05:34, <osstest@xenbits.xen.org> wrote:
> flight 56811 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/56811/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-armhf-armhf-xl-multivcpu 17 leak-check/check fail REGR. vs. 56375
Anyone having an idea about this one?
Jan
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [xen-unstable test] 56811: regressions - FAIL
2015-05-21 6:43 ` Jan Beulich
@ 2015-05-21 8:45 ` Ian Campbell
2015-05-22 14:41 ` Ian Campbell
0 siblings, 1 reply; 4+ messages in thread
From: Ian Campbell @ 2015-05-21 8:45 UTC (permalink / raw)
To: Jan Beulich; +Cc: xen-devel, ian.jackson
On Thu, 2015-05-21 at 07:43 +0100, Jan Beulich wrote:
> >>> On 21.05.15 at 05:34, <osstest@xenbits.xen.org> wrote:
> > flight 56811 xen-unstable real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/56811/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
> > including tests which could not be run:
> > test-armhf-armhf-xl-multivcpu 17 leak-check/check fail REGR. vs. 56375
>
> Anyone having an idea about this one?
I posted <1432115769.12989.219.camel@citrix.com> in reply to "56759:
regressions - FAIL".
The only thing in that range which is even vaguely plausibly related
(IMHO) is the spinlock thing but why it is not just ARM specific but
multivcpu specific _and_ somehow affecting xenstore or hotplug scripts I
cannot fathom...
The bisector is still working on it at
http://logs.test-lab.xenproject.org/osstest/results/bisect.xen-unstable.test-armhf-armhf-xl-multivcpu.leak-check--check.html although I'm not sure if it is actually going to produce a result.
Ian.
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [xen-unstable test] 56811: regressions - FAIL
2015-05-21 8:45 ` Ian Campbell
@ 2015-05-22 14:41 ` Ian Campbell
0 siblings, 0 replies; 4+ messages in thread
From: Ian Campbell @ 2015-05-22 14:41 UTC (permalink / raw)
To: Jan Beulich; +Cc: xen-devel, ian.jackson
On Thu, 2015-05-21 at 09:45 +0100, Ian Campbell wrote:
> The bisector is still working on it at
> http://logs.test-lab.xenproject.org/osstest/results/bisect.xen-unstable.test-armhf-armhf-xl-multivcpu.leak-check--check.html although I'm not sure if it is actually going to produce a result.
It seems unlikely to at this stage.
I've setup the CT on my desk and it is running the multivcpu job now,
lets see if it repros...
Ian.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2015-05-22 14:41 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-05-21 3:34 [xen-unstable test] 56811: regressions - FAIL osstest service user
2015-05-21 6:43 ` Jan Beulich
2015-05-21 8:45 ` Ian Campbell
2015-05-22 14:41 ` Ian Campbell
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.