[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 31873: trouble: blocked/broken/fail/pass



flight 31873 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31873/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-pvops             3 host-install(3)         broken REGR. vs. 31853
 build-armhf                   3 host-install(3)         broken REGR. vs. 31853
 build-i386-oldkern            3 host-install(3)         broken REGR. vs. 31853

Tests which are failing intermittently (not blocking):
 test-amd64-i386-freebsd10-i386  5 xen-boot                  fail pass in 31861
 test-amd64-amd64-xl-sedf-pin  5 xen-boot           fail in 31861 pass in 31873
 test-amd64-amd64-xl-qemuu-ovmf-amd64 13 guest-localmigrate/x10 fail in 31861 
pass in 31873
 test-amd64-amd64-xl-qemut-winxpsp3 3 host-install(3) broken in 31861 pass in 
31873

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-pair        17 guest-migrate/src_host/dst_host fail like 31853

Tests which did not succeed, but are not blocking:
 build-armhf-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      9 guest-start                  fail   never pass
 test-amd64-i386-libvirt       9 guest-start                  fail   never pass
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass
 test-amd64-i386-xl-winxpsp3  14 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-armhf-armhf-libvirt      9 guest-start           fail in 31861 never pass
 test-armhf-armhf-xl          10 migrate-support-check fail in 31861 never pass

version targeted for testing:
 xen                  d85728a3c5e112383e99fc23825fd238a4fb8c63
baseline version:
 xen                  104072fc1c7e6ed117c70fa7f91ecc9946f8f654

------------------------------------------------------------
People who touched revisions under test:
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
  Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  broken  
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          blocked 
 build-i386-libvirt                                           pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           broken  
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      pass    
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               fail    
 test-amd64-i386-rumpuserxen-i386                             pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     fail    
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         fail    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-i386-xl-qemut-winxpsp3                            fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xl-qemuu-winxpsp3                            fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-amd64-i386-xl-winxpsp3                                  fail    


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary

broken-step build-armhf-pvops host-install(3)
broken-step build-armhf host-install(3)
broken-step build-i386-oldkern host-install(3)

Not pushing.

------------------------------------------------------------
commit d85728a3c5e112383e99fc23825fd238a4fb8c63
Merge: 8f4023d 13f72e9
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Nov 25 16:24:19 2014 +0000

    Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into 
staging

commit 13f72e92a32380e94cb0c86725a1b38a6d191461
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Nov 25 17:21:52 2014 +0100

    vNUMA: rename interface structures
    
    No-one (including me) paid attention during review that these
    structures don't adhere to the naming requirements of the public
    interface: Consistently use xen_ prefixes at least for all new
    additions.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Release-Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

commit 8f4023dd7d77de7b2c1af77e86637202a33f948a
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Thu Nov 20 15:48:47 2014 +0000

    libxc: don't leak buffer containing the uncompressed PV kernel
    
    The libxc xc_dom_* infrastructure uses a very simple malloc memory pool 
which
    is freed by xc_dom_release. However the various xc_try_*_decode routines 
(other
    than the gzip one) just use plain malloc/realloc and therefore the buffer 
ends
    up leaked.
    
    The memory pool currently supports mmap'd buffers as well as a directly
    allocated buffers, however the try decode routines make use of realloc and 
do
    not fit well into this model. Introduce a concept of an external memory 
block
    to the memory pool and provide an interface to register such memory.
    
    The mmap_ptr and mmap_len fields of the memblock tracking struct lose their
    mmap_ prefix since they are now also used for external memory blocks.
    
    We are only seeing this now because the gzip decoder doesn't leak and it's 
only
    relatively recently that kernels in the wild have switched to better
    compression.
    
    This is https://bugs.debian.org/767295
    
    Reported by: Gedalya <gedalya@xxxxxxxxxxx>
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit d17405f8153f7419db680a183f10129410feca05
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Nov 19 15:28:15 2014 +0000

    xen: arm: Support the other 4 PCI buses on Xgene
    
    Currently we only establish specific mappings for pcie0, which is
    used on the Mustang platform. However at least McDivitt uses pcie3.
    So wire up all the others, based on whether the corresponding DT node
    is marked as available.
    
    This results in no change for Mustang.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Acked-by: Pranavkumar Sawargaonkar <pranavkumar@xxxxxxxxxx>

commit 31180f87e4f7f63e3bca029b4a60978f57eb0331
Author: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
Date:   Fri Nov 21 14:31:30 2014 +0000

    xen/arm: clear UIE on hypervisor entry
    
    UIE being set can cause maintenance interrupts to occur when Xen writes
    to one or more LR registers. The effect is a busy loop around the
    interrupt handler in Xen
    (http://marc.info/?l=xen-devel&m=141597517132682): everything gets stuck.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reported-and-Tested-by: Andrii Tseglytskyi 
<andrii.tseglytskyi@xxxxxxxxxxxxxxx>
    Tested-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Release-acked-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

commit 8342b121cd57f4bebedc7ab4be69922b07afefa5
Author: Julien Grall <julien.grall@xxxxxxxxxx>
Date:   Thu Nov 20 17:36:03 2014 +0000

    scripts/get_maintainer.pl: Correctly CC the maintainers
    
    The current script is setting $email_remove_duplicates to 1 by default, on
    complex patch (see [1]), this will result to ommitting randomly some
    maintainers.
    
    This is because, the script will:
        1) Get the list of maintainers of the file (incidentally all the
           maintainers in "THE REST" role are added). If the email address 
already
           exists in the global list, skip it. => The role will be lost
        2) Filter the list to remove the entry with "THE REST" role
    
    So if a maintainers is marked with "THE REST" role on the first file and
    actually be an x86 maintainers on the script, the script will only retain
    the "THE REST" role. During the filtering step, this maintainers will
    therefore be dropped.
    
    This patch fixes this by setting $email_remove_duplicates to 0 by default.
    The new behavior of the script will be:
        1) Append the list of maintainers for every file
        2) Filter the list to remove the entry with "THE REST" role
        3) Remove duplicated email address
    
    Example:
    
    Patch: https://patches.linaro.org/41083/
    
    Before the patch:
    
    Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Ian Campbell <ian.campbell@xxxxxxxxxx>
    Wei Liu <wei.liu2@xxxxxxxxxx>
    George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    xen-devel@xxxxxxxxxxxxx
    
    After the patch:
    
    Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Ian Campbell <ian.campbell@xxxxxxxxxx>
    Wei Liu <wei.liu2@xxxxxxxxxx>
    Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>
    Tim Deegan <tim@xxxxxxx>
    Keir Fraser <keir@xxxxxxx>
    Jan Beulich <jbeulich@xxxxxxxx>
    George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    xen-devel@xxxxxxxxxxxxx
    
    [1] 
http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg00060.html
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    CC: Don Slutz <dslutz@xxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 47c6e7f28ddc27f194c7c4902ea3163ba582b582
Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
Date:   Wed Nov 12 17:31:33 2014 +0000

    xl: Return proper error codes for block-attach and block-detach
    
    Return proper error codes on failure so that scripts can tell whether
    the command completed properly or not.
    
    This is not a proper fix, since it fails to call
    libxl_device_disk_dispose() on the error path.  But a proper fix
    requires some refactoring, so given where we are in the release
    process, it's better to have a fix that is simple and obvious, and do
    the refactoring once the next development window opens up.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 28b4baacd599e8c10e6dac055f6a939bb730fb8a
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Nov 25 10:08:57 2014 +0100

    x86/HVM: don't crash guest upon problems occurring in user mode
    
    This extends commit 5283b310 ("x86/HVM: only kill guest when unknown VM
    exit occurred in guest kernel mode") to a few more cases, including the
    failed VM entry one that XSA-110 was needed to be issued for.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Release-Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

commit 1516b33961028ba4f6e70c0da464e9ed0a190760
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Nov 25 10:08:04 2014 +0100

    x86: don't ignore foreigndom input on various MMUEXT ops
    
    Instead properly fail requests that shouldn't be issued on foreign
    domains or - for MMUEXT_{CLEAR,COPY}_PAGE - extend the existing
    operation to work that way.
    
    In the course of doing this the need to always clear "okay" even when
    wanting an error code other than -EINVAL became unwieldy, so the
    respective logic is being adjusted at once, together with a little
    other related cleanup.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>
    Release-Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

commit dc419f0a3752032ab00124dc55609d9231e53128
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Nov 25 10:07:09 2014 +0100

    x86: tighten page table owner checking in do_mmu_update()
    
    MMU_MACHPHYS_UPDATE, not manipulating page tables, shouldn't ignore
    a bad page table domain being specified.
    
    Also pt_owner can't be NULL when reaching the "out" label, so the
    respective check can be dropped.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Release-Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

commit 0aabd10525326edfe5098c2ec5bfe05db7732c32
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Nov 25 10:05:29 2014 +0100

    x86/cpuidle: don't count C1 multiple times
    
    Commit 4ca6f9f0 ("x86/cpuidle: publish new states only after fully
    initializing them") resulted in the state counter to be incremented
    for C1 despite that using a fixed table entry (and the statically
    initialized counter value already accounting for it and C0).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    Release-Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.