[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[qemu-mainline baseline-only test] 68339: regressions - FAIL



This run is configured for baseline tests only.

flight 68339 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68339/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               5 xen-build                 fail REGR. vs. 68328
 test-armhf-armhf-libvirt     11 guest-start               fail REGR. vs. 68328
 test-armhf-armhf-xl-xsm      15 guest-start/debian.repeat fail REGR. vs. 68328
 test-armhf-armhf-xl-vhd      14 guest-start/debian.repeat fail REGR. vs. 68328

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail like 68328
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1  9 windows-install    fail like 68328

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm  1 build-check(1)    blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm  1 build-check(1)     blocked n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-armhf-armhf-xl-midway   12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-midway   13 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-xsm      12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-xsm      13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-xsm 14 guest-saverestore            fail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     13 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 11 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-qcow2 13 guest-saverestore            fail never pass
 test-armhf-armhf-libvirt-raw 11 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 13 guest-saverestore            fail   never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      11 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      12 saverestore-support-check    fail   never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop             fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail never pass

version targeted for testing:
 qemuu                ffe22bf51065dd33022cf91f77a821d1f11c250d
baseline version:
 qemuu                e92fbc753df4fab9ee524b5ea07a51bee8b6bae4

Last test of basis    68328  2017-01-06 02:15:41 Z    2 days
Testing same since    68339  2017-01-07 13:19:15 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
  Gonglei <arei.gonglei@xxxxxxxxxx>
  Hervé Poussineau <hpoussin@xxxxxxxxxxx>
  Jason Wang <jasowang@xxxxxxxxxx>
  Longpeng(Mike) <longpeng2@xxxxxxxxxx>
  Pavel Dovgalyuk <pavel.dovgaluk@xxxxxxxxx>
  Peter Maydell <peter.maydell@xxxxxxxxxx>

jobs:
 build-amd64-xsm                                              fail    
 build-armhf-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-armhf-armhf-libvirt-xsm                                 fail    
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-armhf-armhf-xl-xsm                                      fail    
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvh-amd                                  fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          fail    
 test-amd64-amd64-xl-pvh-intel                                fail    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      pass    
 test-armhf-armhf-xl-midway                                   pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               fail    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 fail    
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-armhf-armhf-xl-vhd                                      fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass    
 test-amd64-i386-xl-qemuu-winxpsp3                            pass    


------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at
    http://osstest.xs.citrite.net/~osstest/testlogs/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Push not applicable.

------------------------------------------------------------
commit ffe22bf51065dd33022cf91f77a821d1f11c250d
Merge: a01b1e9 48ae36c
Author: Peter Maydell <peter.maydell@xxxxxxxxxx>
Date:   Fri Jan 6 15:18:09 2017 +0000

    Merge remote-tracking branch 'remotes/gonglei/tags/cryptodev-next-20161224' 
into staging
    
    cryptodev patches
    
    - add xts mode support
    - add 3DES algorithm support
    - other trivial fixes
    
    # gpg: Signature made Sat 24 Dec 2016 05:56:44 GMT
    # gpg:                using RSA key 0x2ED7FDE9063C864D
    # gpg: Good signature from "Gonglei <arei.gonglei@xxxxxxxxxx>"
    # gpg: WARNING: This key is not certified with a trusted signature!
    # gpg:          There is no indication that the signature belongs to the 
owner.
    # Primary key fingerprint: 3EF1 8E53 3459 E6D1 963A  3C05 2ED7 FDE9 063C 
864D
    
    * remotes/gonglei/tags/cryptodev-next-20161224:
      cryptodev: add 3des-ede support
      cryptodev: remove single-DES support in cryptodev
      cryptodev: add xts(aes) support
      cryptodev: fix the check of aes algorithm
    
    Signed-off-by: Peter Maydell <peter.maydell@xxxxxxxxxx>

commit a01b1e9a005d523ec6452ec7137885d11f8a30df
Merge: e92fbc7 7e354ed
Author: Peter Maydell <peter.maydell@xxxxxxxxxx>
Date:   Fri Jan 6 12:10:40 2017 +0000

    Merge remote-tracking branch 'remotes/jasowang/tags/net-pull-request' into 
staging
    
    # gpg: Signature made Fri 06 Jan 2017 02:55:49 GMT
    # gpg:                using RSA key 0xEF04965B398D6211
    # gpg: Good signature from "Jason Wang (Jason Wang on RedHat) 
<jasowang@xxxxxxxxxx>"
    # gpg: WARNING: This key is not certified with sufficiently trusted 
signatures!
    # gpg:          It is not certain that the signature belongs to the owner.
    # Primary key fingerprint: 215D 46F4 8246 689E C77F  3562 EF04 965B 398D 
6211
    
    * remotes/jasowang/tags/net-pull-request:
      fsl_etsec: Fix Tx BD ring wrapping handling
      rtl8139: correctly handle PHY reset
      record/replay: add network support
    
    Signed-off-by: Peter Maydell <peter.maydell@xxxxxxxxxx>

commit 7e354ed4df9787ff95cdb189374739e476be4f9a
Author: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
Date:   Thu Jan 5 12:26:36 2017 -0800

    fsl_etsec: Fix Tx BD ring wrapping handling
    
    Current code that handles Tx buffer desciprtor ring scanning employs the
    following algorithm:
    
        1. Restore current buffer descriptor pointer from TBPTRn
    
        2. Process current descriptor
    
        3. If current descriptor has BD_WRAP flag set set current
           descriptor pointer to start of the descriptor ring
    
        4. If current descriptor points to start of the ring exit the
           loop, otherwise increment current descriptor pointer and go
           to #2
    
        5. Store current descriptor in TBPTRn
    
    The way the code is implemented results in buffer descriptor ring being
    scanned starting at offset/descriptor #0. While covering 99% of the
    cases, this algorithm becomes problematic for a number of edge cases.
    
    Consider the following scenario: guest OS driver initializes descriptor
    ring to N individual descriptors and starts sending data out. Depending
    on the volume of traffic and probably guest OS driver implementation it
    is possible that an edge case where a packet, spread across 2
    descriptors is placed in descriptors N - 1 and 0 in that order(it is
    easy to imagine similar examples involving more than 2 descriptors).
    
    What happens then is aforementioned algorithm starts at descriptor 0,
    sees a descriptor marked as BD_LAST, which it happily sends out as a
    separate packet(very much malformed at this point) then the iteration
    continues and the first part of the original packet is tacked to the
    next transmission which ends up being bogus as well.
    
    This behvaiour can be pretty reliably observed when scp'ing data from a
    guest OS via TAP interface for files larger than 160K (every time for
    700K+).
    
    This patch changes the scanning algorithm to do the following:
    
        1. Restore "current" buffer descriptor pointer from
           TBPTRn
    
        2. If "current" descriptor does not have BD_TX_READY set, goto #6
    
        3. Process current descriptor
    
        4. If "current" descriptor has BD_WRAP flag set "current"
           descriptor pointer to start of the descriptor ring otherwise
           set increment "current" by the size of one descriptor
    
        5. Goto #1
    
        6. Save "current" buffer descriptor in TBPTRn
    
    This way we preserve the information about which descriptor was
    processed last and always start where we left off avoiding the original
    problem. On top of that, judging by the following excerpt from
    MPC8548ERM (p. 14-48):
    
    "... When the end of the TxBD ring is reached, eTSEC initializes TBPTRn
    to the value in the corresponding TBASEn. The TBPTR register is
    internally written by the eTSECâ??s DMA controller during
    transmission. The pointer increments by eight (bytes) each time a
    descriptor is closed successfully by the eTSEC..."
    
    revised algorithm might also a more correct way of emulating this aspect
    of eTSEC peripheral.
    
    Cc: Alexander Graf <agraf@xxxxxxx>
    Cc: Scott Wood <scottwood@xxxxxxxxxxxxx>
    Cc: Jason Wang <jasowang@xxxxxxxxxx>
    Cc: qemu-devel@xxxxxxxxxx
    Signed-off-by: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
    Signed-off-by: Jason Wang <jasowang@xxxxxxxxxx>

commit 30a3e70167d0b8db9ea057f270cf18d93c153ed1
Author: Hervé Poussineau <hpoussin@xxxxxxxxxxx>
Date:   Tue Dec 13 20:44:41 2016 +0100

    rtl8139: correctly handle PHY reset
    
    According to datasheet:
    "[Bit 15 of Basic Mode Control Register] sets the status and control 
registers
    of the PHY (register 0062-0074) in a default state. This bit is 
self-clearing.
    1 = software reset; 0 = normal operation."
    
    This fixes the netcard detection failure in Minoca OS.
    
    Signed-off-by: Hervé Poussineau <hpoussin@xxxxxxxxxxx>
    Signed-off-by: Jason Wang <jasowang@xxxxxxxxxx>

commit 646c5478c04297485e3e045cd8969d2ae7642004
Author: Pavel Dovgalyuk <pavel.dovgaluk@xxxxxxxxx>
Date:   Mon Sep 26 11:08:21 2016 +0300

    record/replay: add network support
    
    This patch adds support of recording and replaying network packets in
    irount rr mode.
    
    Record and replay for network interactions is performed with the network 
filter.
    Each backend must have its own instance of the replay filter as follows:
     -netdev user,id=net1 -device rtl8139,netdev=net1
     -object filter-replay,id=replay,netdev=net1
    
    Replay network filter is used to record and replay network packets. While
    recording the virtual machine this filter puts all packets coming from
    the outer world into the log. In replay mode packets from the log are
    injected into the network device. All interactions with network backend
    in replay mode are disabled.
    
    v5 changes:
     - using iov_to_buf function instead of loop
    
    Signed-off-by: Pavel Dovgalyuk <pavel.dovgaluk@xxxxxxxxx>
    Signed-off-by: Jason Wang <jasowang@xxxxxxxxxx>

commit 48ae36c0ad16bb757d4f6e243b8e9072fc8e8c8e
Author: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
Date:   Thu Dec 8 10:44:02 2016 +0800

    cryptodev: add 3des-ede support
    
    This patch add 3des-ede support for cryptodev. However this is effective
    only when backend using libgcrypt/nettle, because cipher-builtin doesn't
    support 3des-ede yet.
    
    Signed-off-by: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
    Signed-off-by: Gonglei <arei.gonglei@xxxxxxxxxx>

commit d7a2127a4c5b2d52c94d5c27a5744a055ddc14f7
Author: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
Date:   Wed Dec 7 09:11:50 2016 +0800

    cryptodev: remove single-DES support in cryptodev
    
    Single-DES is obsolete and it's broken/useless for decades, we should
    remove it in cryptodev, as suggested by Daniel.
    Guest who wants to use this obsolete cipher alg will use its built-in
    implementation instead.
    
    Signed-off-by: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
    Reviewed-by: Daniel P. Berrange <berrange@xxxxxxxxxx>
    Signed-off-by: Gonglei <arei.gonglei@xxxxxxxxxx>

commit eaa57403044c33e0f3e9c6f7c174b05e6534fec4
Author: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
Date:   Mon Dec 5 19:39:09 2016 +0800

    cryptodev: add xts(aes) support
    
    This patch add xts(aes) support.
    
    Signed-off-by: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
    Reviewed-by: Gonglei <arei.gonglei@xxxxxxxxxx>
    Signed-off-by: Gonglei <arei.gonglei@xxxxxxxxxx>

commit 465f2fedd262cbdcbfc92c181660cf85e5029515
Author: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
Date:   Mon Dec 5 19:39:08 2016 +0800

    cryptodev: fix the check of aes algorithm
    
    As the key length of xts(aes) is different with other mode of aes,
    so we should check specially in cryptodev_builtin_get_aes_algo, if
    it is xts mode.
    
    Signed-off-by: Longpeng(Mike) <longpeng2@xxxxxxxxxx>
    Reviewed-by: Gonglei <arei.gonglei@xxxxxxxxxx>
    Signed-off-by: Gonglei <arei.gonglei@xxxxxxxxxx>

_______________________________________________
osstest-output mailing list
osstest-output@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/cgi-bin/mailman/listinfo/osstest-output

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.