[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.4-testing test] 30537: regressions - FAIL

flight 30537 xen-4.4-testing real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 12 guest-localmigrate.2 fail REGR. 
vs. 30377

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf     11 guest-saverestore         fail REGR. vs. 30377

Tests which did not succeed, but are not blocking:
 test-amd64-i386-rumpuserxen-i386  1 build-check(1)               blocked  n/a
 test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)               blocked n/a
 test-amd64-amd64-libvirt      9 guest-start                  fail   never pass
 test-amd64-i386-libvirt       9 guest-start                  fail   never pass
 test-armhf-armhf-libvirt      9 guest-start                  fail   never pass
 test-armhf-armhf-xl          10 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 build-i386-rumpuserxen        6 xen-build                    fail   never pass
 build-amd64-rumpuserxen       6 xen-build                    fail   never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass
 test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check        fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xend-winxpsp3 17 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass

version targeted for testing:
 xen                  b46a92326fe68625d7563da3f8f06164654757e3
baseline version:
 xen                  a299a3e88a387de88489d6a6f61bebdafc95ebe5

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
  Sander Eikelenboom <linux@xxxxxxxxxxxxxx>
  Santosh Jodh <Santosh.Jodh@xxxxxxxxxx>
  Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
  Yang Zhang <yang.z.zhang@xxxxxxxxx>

 build-amd64-xend                                             pass    
 build-i386-xend                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      fail    
 build-i386-rumpuserxen                                       fail    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             blocked 
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     fail    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    

sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

commit b46a92326fe68625d7563da3f8f06164654757e3
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Oct 1 15:06:39 2014 +0200

    VT-d: suppress UR signaling for further desktop chipsets
    This extends commit d6cb14b34f ("VT-d: suppress UR signaling for
    desktop chipsets") as per the finally obtained list of affected
    chipsets from Intel.
    Also pad the IDs we had listed there before to full 4 hex digits.
    This is CVE-2013-3495 / XSA-59.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Yang Zhang <yang.z.zhang@xxxxxxxxx>
    master commit: 3e2331d271cc0882e4013c8f20398c46c35f90a1
    master date: 2014-09-18 15:03:22 +0200

commit ae5c3023da9a2cfa869f78094e5da3b89361a915
Author: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
Date:   Wed Oct 1 15:05:40 2014 +0200

    x86/NMI: allow processing unknown NMIs when watchdog is enabled
    Change NMI processing so that if watchdog=force is passed on the
    command-line and the NMI is not caused by a perf counter overflow (i.e.
    likely not a watchdog "tick"), the NMI is handled by the unknown NMI
    This allows injection of NMIs from IPMI controllers that don't set the
    IOCK/SERR bits to trigger the unknown NMI handler rather than be
    Signed-off-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Fix command line parsing (don't enable the watchdog on e.g.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    x86/NMI: allow passing just "watchdog" again
    This capability got inadvertently lost in commit 3ea2ba980a ("x86/NMI:
    allow processing unknown NMIs when watchdog is enabled") due to an
    oversight of mine.
    Reported-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 3ea2ba980afe7356c613c8e1ba00d223d1c25412
    master date: 2014-08-28 16:11:37 +0200
    master commit: fd553ae5f0f57baa63d033bedee84f607de57d33
    master date: 2014-09-03 15:09:59 +0200

commit 755a81ec9860c3f2291e275c13832d58677b39bf
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Oct 1 15:03:52 2014 +0200

    x86/ats: Disable Address Translation Services by default
    Xen cannot safely use any ATS functionality until it gains asynchronous 
    invalidation support, because of the current synchronous wait for 
    Do not turn ATS on by default.
    While editing the default in the command line documentation, correct the
    statement regarding PCI Passthrough.  ATS is purely a performance
    optimisation, and is certainly not required for PCI Passthrough to function.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
    master commit: ad6eddb742577d182e634785bcfaf92732a50024
    master date: 2014-08-28 16:05:10 +0200

commit 607f9586d144e7f4a0a503f3c1b8cd9ec1fce6da
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Oct 1 15:02:42 2014 +0200

    x86/irq: process softirqs in irq keyhandlers
    Large machines with lots of interrupts can trip over the Xen watchdog.
    Suggested-by: Santosh Jodh <Santosh.Jodh@xxxxxxxxxx>
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Tested-by: Santosh Jodh <Santosh.Jodh@xxxxxxxxxx>
    x86/IO-APIC: don't process softirqs during early boot
    Commit e13b320399 ("x86/irq: process softirqs in irq keyhandlers")
    made this unconditional, but the boot time use of __print_IO_APIC()
    (when "apic_verbosity=debug" was given) can't tolerate that.
    Reported-by: Sander Eikelenboom <linux@xxxxxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Tested-by:  Sander Eikelenboom <linux@xxxxxxxxxxxxxx>
    master commit: e13b3203990706db1313ec2aadd9a30b249ee793
    master date: 2014-08-22 14:32:45 +0200
    master commit: bd083922f9e78ed19ef98e7de372e5f568402ed3
    master date: 2014-08-26 17:56:52 +0200

commit 539238ab7a19f8df6743ea96ab4906980b5c2f35
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Oct 1 15:01:57 2014 +0200

    VMX: fix DebugCtl MSR clearing
    The previous shortcut was wrong, as it bypassed the necessary vmwrite:
    All we really want to avoid if the guest writes zero is to add the MSR
    to the host-load list.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    master commit: dfa625e15f3d6c374637f2bb789e1f444c2781c3
    master date: 2014-08-22 14:29:37 +0200

commit c6de14eebd7b414c25094e942f24b2791d7c66c2
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Oct 1 14:59:00 2014 +0200

    x86/HVM: properly bound x2APIC MSR range
    While the write path change appears to be purely cosmetic (but still
    gets done here for consistency), the read side mistake permitted
    accesses beyond the virtual APIC page.
    Note that while this isn't fully in line with the specification
    (digesting MSRs 0x800-0xBFF for the x2APIC), this is the minimal
    possible fix addressing the security issue and getting x2APIC related
    code into a consistent shape (elsewhere a 256 rather than 1024 wide
    window is being used too). This will be dealt with subsequently.
    This is CVE-2014-7188 / XSA-108.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 61fdda7acf3de11f3d50d50e5b4f4ecfac7e0d04
    master date: 2014-10-01 14:54:47 +0200
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.