[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable test] 131119: regressions - trouble: broken/fail/pass
flight 131119 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/131119/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-vhd <job status> broken test-armhf-armhf-xl-vhd 4 host-install(4) broken REGR. vs. 130985 test-xtf-amd64-amd64-3 69 xtf/test-hvm64-xsa-278 fail REGR. vs. 130985 Tests which did not succeed, but are not blocking: test-xtf-amd64-amd64-1 69 xtf/test-hvm64-xsa-278 fail like 130895 test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop fail like 130985 test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 130985 test-armhf-armhf-libvirt 14 saverestore-support-check fail like 130985 test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 130985 test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 130985 test-armhf-armhf-libvirt-raw 13 saverestore-support-check fail like 130985 test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail like 130985 test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop fail like 130985 test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop fail like 130985 test-amd64-amd64-libvirt-xsm 13 migrate-support-check fail never pass test-amd64-i386-libvirt 13 migrate-support-check fail never pass test-amd64-i386-libvirt-xsm 13 migrate-support-check fail never pass test-amd64-i386-xl-pvshim 12 guest-start fail never pass test-amd64-amd64-libvirt 13 migrate-support-check fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 13 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 14 saverestore-support-check fail never pass test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2 fail never pass test-amd64-amd64-libvirt-vhd 12 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 13 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 14 saverestore-support-check fail never pass test-armhf-armhf-xl-credit1 13 migrate-support-check fail never pass test-armhf-armhf-xl-credit1 14 saverestore-support-check fail never pass test-armhf-armhf-xl-cubietruck 13 migrate-support-check fail never pass test-armhf-armhf-libvirt 13 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 migrate-support-check fail never pass test-armhf-armhf-xl-cubietruck 14 saverestore-support-check fail never pass test-armhf-armhf-xl-multivcpu 14 saverestore-support-check fail never pass test-armhf-armhf-xl 13 migrate-support-check fail never pass test-armhf-armhf-xl 14 saverestore-support-check fail never pass test-armhf-armhf-libvirt-raw 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 13 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 14 saverestore-support-check fail never pass test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop fail never pass test-amd64-i386-xl-qemuu-win10-i386 10 windows-install fail never pass test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install fail never pass test-amd64-amd64-xl-qemut-win10-i386 10 windows-install fail never pass test-amd64-i386-xl-qemut-win10-i386 10 windows-install fail never pass version targeted for testing: xen ae01a8e315fecb1914edd99980a619d387951d3f baseline version: xen 82855aba5bf91e50c81526167c11d4aeaf665e66 Last test of basis 130985 2018-12-03 17:11:24 Z 5 days Failing since 131065 2018-12-05 19:14:18 Z 3 days 2 attempts Testing same since 131119 2018-12-07 09:22:14 Z 1 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Doug Goldstein <cardoe@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Juergen Gross <jgross@xxxxxxxx> Kevin Tian <kevin.tian@xxxxxxxxx> Roger Pau Monné <roger.pau@xxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64-xsm pass build-i386-xsm pass build-amd64-xtf pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumprun pass build-i386-rumprun pass test-xtf-amd64-amd64-1 pass test-xtf-amd64-amd64-2 pass test-xtf-amd64-amd64-3 pass test-xtf-amd64-amd64-4 pass test-xtf-amd64-amd64-5 pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-xsm pass test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm pass test-amd64-i386-xl-xsm pass test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvhv2-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumprun-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-qemut-ws16-amd64 fail test-amd64-i386-xl-qemut-ws16-amd64 fail test-amd64-amd64-xl-qemuu-ws16-amd64 fail test-amd64-i386-xl-qemuu-ws16-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit1 pass test-armhf-armhf-xl-credit1 pass test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-armhf-armhf-xl-cubietruck pass test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict pass test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict pass test-amd64-amd64-examine pass test-armhf-armhf-examine pass test-amd64-i386-examine pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumprun-i386 pass test-amd64-amd64-xl-qemut-win10-i386 fail test-amd64-i386-xl-qemut-win10-i386 fail test-amd64-amd64-xl-qemuu-win10-i386 fail test-amd64-i386-xl-qemuu-win10-i386 fail test-amd64-amd64-qemuu-nested-intel pass test-amd64-amd64-xl-pvhv2-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt pass test-amd64-i386-libvirt pass test-amd64-amd64-livepatch pass test-amd64-i386-livepatch pass test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-xl-pvshim pass test-amd64-i386-xl-pvshim fail test-amd64-amd64-pygrub pass test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw pass test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds pass test-armhf-armhf-xl-rtds pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow pass test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow pass test-amd64-amd64-xl-shadow pass test-amd64-i386-xl-shadow pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd broken ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-job test-armhf-armhf-xl-vhd broken broken-step test-armhf-armhf-xl-vhd host-install(4) Not pushing. ------------------------------------------------------------ commit ae01a8e315fecb1914edd99980a619d387951d3f Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Dec 6 12:21:34 2018 +0100 ns16550: enable use of PCI MSI Which, on x86, requires fiddling with the INTx bit in PCI config space, since for internally used MSI we can't delegate this to Dom0. ns16550_init_postirq() also needs (benign) re-ordering of its operations. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> commit 69343d5af45076e5b196833f3082acf6f7248299 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Dec 6 12:20:55 2018 +0100 console: adjust IRQ initialization In order for a Xen internal PCI device driver to enable MSI on the device, we need another hook which the driver can use to create the IRQ (doing this in the init_preirq hook is too early, since IRQ code hasn't got initialized at that time yet, and doing it in init_postirq is too late because at least on x86 smp_intr_init() needs to know the IRQ number). On x86 this additionally requires a slight ordering change to IRQ initialization, to facilitate calling the new hook between basic initialization and the call path leading to smp_intr_init(). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> commit c46dba0d72e519743823c76c676858ad1af48b90 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Dec 6 12:19:04 2018 +0100 make domain_adjust_tot_pages() __must_check Even if unlikely, donate_page() should not ignore the possible need to obtain a domain reference. To make people look more closely when they add new uses of domain_adjust_tot_pages(), force its return value to be checked. This in turn requires a benign change to assign_pages(). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 88f90693c74d5877f6b343076c31739e8754fb00 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Dec 6 12:18:03 2018 +0100 x86: reduce code duplication in guest_remove_page() Quite a bit of duplicate code has accumulated on the "paging" types special case path. Re-use what can be re-used from the common path. Since it needs touching anyway, slightly re-format and extend the gdprintk() on the common path as well. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 81cfc1b3c78f5d4abafdb368ede914b1dd825a7b Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Thu Nov 22 15:49:03 2018 +0000 automation: break .gitlab-yaml into smaller files Break out files for build jobs and test jobs. Keep the top level .gitlab-ci.yaml small. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit 9f4ac0e6c2f7634757e62990cba3d531f15104a2 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Thu Nov 22 15:49:02 2018 +0000 automation: add a qemu smoke test for clang build Also rename the old test to have -gcc suffix. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit 7824baee56248474346da138b906a3a5c5420458 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Feb 26 12:45:58 2018 +0000 x86/hvm: Handle x2apic MSRs via the new guest_{rd,wr}msr() infrastructure Dispatch from the guest_{rd,wr}msr() functions. The read side should be safe outside of current context, but the write side is definitely not. As the toolstack has no legitimate reason to access the APIC registers via this interface (not least because whether they are accessible at all depends on guest settings), unilaterally reject access attempts outside of current context. Rename to guest_{rd,wr}msr_x2apic() for consistency, and alter the functions to use X86EMUL_EXCEPTION rather than X86EMUL_UNHANDLEABLE. The previous callers turned UNHANDLEABLE into EXCEPTION, but using UNHANDLEABLE will now interfere with the fallback to legacy MSR handling. While altering guest_rdmsr_x2apic() make a couple of minor improvements. Reformat the initialiser for readable[] so it indents in a more natural way, and alter high to be a 64bit integer to avoid shifting 0 by 32 in the common path. Observant people might notice that we now don't let PV guests read the x2apic MSRs. They should never have been able to in the first place. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> commit 689bc6244449fd988c32759201668738498ec261 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Mar 7 16:48:01 2018 +0000 x86: Fix APIC MSR constant names We currently have MSR_IA32_APICBASE and MSR_IA32_APICBASE_MSR which are synonymous from a naming point of view, but refer to very different things. Rename the x2APIC MSRs to MSR_X2APIC_*, which are shorter constants and visually separate the register function from the generic APIC name. For the case ranges, introduce MSR_X2APIC_LAST, rather than relying on the knowledge that there are 0x3ff MSRs architecturally reserved for x2APIC functionality. For functionality relating to the APIC_BASE MSR, use MSR_APIC_BASE for the MSR itself, but drop the MSR prefix from the other constants to shorten the names. In all cases, the fact that we are dealing with the APIC_BASE MSR is obvious from the context. No functional change (the combined binary is identical). Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> commit 17c0293b47b5dc16ae64bbd656acd26fe7d7044b Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Nov 29 18:16:01 2018 +0000 x86/cpuid: Drop the synthetic X86_FEATURE_XEN_IBPB This appears to be a vestigial remnent of an old version of the XSA-254/Spectre series, and has never been used. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit aaed4babc4b9b68faabd5a3931059ef0c66c7886 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Nov 29 18:17:45 2018 +0000 x86/spec-ctrl: Drop the bti= command line option bti= was introduced with the original Spectre fixes (Jan 2018), but by the time Speculative Store Bypass came along (May 2018), it was superceeded by the more generic spec-ctrl=. Since then, we've had LazyFPU (June 2018) and L1TF (August 2018), which means noone will be using the option. Remove it entirely - anyone who happens to accidentially be using it might now spot Xen complaining about an option it doesn't understand. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit 70739427f55d595ad1c575c47fef00c81881e9a2 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Tue Dec 4 14:04:54 2018 +0100 pci: apply workaround for Intel errata HSE43 and BDF2/BDX2 These errata affect the values read from the BAR registers, and could render vPCI (and by extension PVH Dom0 unusable). HSE43 is a Haswell erratum where a non-BAR register is implemented at the position where the first BAR of the device should be found in a Power Control Unit device. Note that there are no BARs on this device, apart from the bogus CSR register positioned on top of the first BAR. BDF2/BDX2 is a Broadwell erratum where BARs in the Home Agent device will return bogus non-zero values. In both cases the solution is to treat such devices as having no BARs in the vPCI code. Reported-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit e59441b09790801eeaf215e1d98f47b7e9daca12 Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Dec 4 14:04:20 2018 +0100 vmx: remove stale prototypes Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related implementation. Remove them. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> commit 5aa62f06681ae52c8e647194c32dba2b4c903991 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Dec 4 14:03:43 2018 +0100 x86emul: raise #GP(0) in VME mode for POPF with TF set in new value This is a check explicitly listed by the instruction page in the SDM. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 6b4600b1425ef8006efcd2cdb4c4c986309264f6 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Dec 4 14:02:46 2018 +0100 x86emul: skip VIF processing in VME mode for 16-bit POPF at IOPL 3 At IOPL 3 CR4.VME is irrelevant. Reported-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> (qemu changes not included) _______________________________________________ osstest-output mailing list osstest-output@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/osstest-output
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |