[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.5-testing test] 56821: regressions - FAIL
flight 56821 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/56821/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 56728 test-amd64-amd64-rumpuserxen-amd64 15 rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 56728 Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 56728 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-xl-cubietruck 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf-pin 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf 12 migrate-support-check fail never pass test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass version targeted for testing: xen ddfe333aef87e6c5f52b84c8beb3277be4663313 baseline version: xen 0c4e0ef608c98abef6220b0b027d9ce8ec65fd5f ------------------------------------------------------------ People who touched revisions under test: Eugene Korenevsky <ekorenevsky@xxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Paul Durrant <paul.durrant@xxxxxxxxxx> Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> Suravee Suthikulpanit <Suravee.Suthikulpanit@xxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 fail test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 pass test-amd64-i386-xl-qemuu-win7-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-armhf-armhf-xl-cubietruck pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt pass test-amd64-i386-libvirt pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-armhf-armhf-xl-sedf-pin pass test-amd64-amd64-xl-sedf pass test-armhf-armhf-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-xl-qemut-winxpsp3 pass test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit ddfe333aef87e6c5f52b84c8beb3277be4663313 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue May 19 12:00:09 2015 +0200 x86: don't change affinity with interrupt unmasked With ->startup unmasking the IRQ, setting the affinity afterwards without masking the IRQ again is invalid namely for MSI (address and data can't be updated atomically and may - at least for MSI-X - be cached while unmasked). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AMD IOMMU: only translate remapped IO-APIC RTEs 1aeb1156fa ("x86 don't change affinity with interrupt unmasked") introducing RTE reads prior to the respective interrupt having got enabled for the first time uncovered a bug in 2ca9fbd739 ("AMD IOMMU: allocate IRTE entries instead of using a static mapping"): We obviously shouldn't be translating RTEs for which remapping didn't get set up yet. Reported-by: Sander Eikelenboom <linux@xxxxxxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Suravee Suthikulpanit <Suravee.Suthikulpanit@xxxxxxx> master commit: 1aeb1156fa43fe2cd2b5003995b20466cd19a622 master date: 2015-03-26 11:18:28 +0100 master commit: c33c51b81c82a51515bf4fa2a9717098c03e5013 master date: 2015-04-24 12:06:26 +0200 commit bf30232bf17ad2cdf55d50a98759ee45c0ad00e0 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue May 19 11:47:13 2015 +0200 x86: don't clear high 32 bits of RAX on sub-word guest I/O port reads 1- or 2-byte operations never alter the high halves of registers. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> master commit: 1191aa9d1988c469844eb4545689617a8b13eae1 master date: 2015-05-11 10:37:58 +0200 commit a824bf9daff246d8b6a269028fb7c391917cad24 Author: Eugene Korenevsky <ekorenevsky@xxxxxxxxx> Date: Tue May 19 11:46:31 2015 +0200 x86_emulate: fix EFLAGS setting of CMPXCHG emulation CMPXCHG sets CF, PF, AF, SF, and OF flags according to the results of the comparison the rAX with the operand of the instruction. rAX must be the first argument of the comparison (a minuend), the operand must be the second one (a subtrahend). Due to improper order of comparison arguments, CF, PF, AF, SF and OF flags were set incorrectly in the case of inequality. Need to swap them. Signed-off-by: Eugene Korenevsky <ekorenevsky@xxxxxxxxx> # Commit 20fd4b70a7647656812b8f276510e09b252db9f7 # Date 2015-05-04 12:03:19 +0200 # Author Eugene Korenevsky <ekorenevsky@xxxxxxxxx> # Committer Jan Beulich <jbeulich@xxxxxxxx> test_x86_emulate: extend EFLAGS check of CMPXCHG test CMPXCHG: in the case of inequality of the rAX and the operand, need to check CF, PF, AF, SF and OF flags as well. This adjustment covers the fix of incorrect comparison during CMPXCHG emulation. Signed-off-by: Eugene Korenevsky <ekorenevsky@xxxxxxxxx> master commit: 2232628ecbab42e7700287204daad71a3ce2208c master date: 2015-05-04 11:55:41 +0200 master commit: 20fd4b70a7647656812b8f276510e09b252db9f7 master date: 2015-05-04 12:03:19 +0200 commit f653b7fd6a876195ee99f021d735d5d1ae6bc330 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Tue May 19 11:45:34 2015 +0200 x86/hvm: implicitly disable an ioreq server when it is destroyed Currently, unless a (non-default) ioreq server is explicitly disabled before being destroyed, its gmfns will not be placed back into the p2m but still released back into the ioreq_gmfn mask. This is somewhat counter-intuitive and easily remedied by this small patch. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> master commit: ebd41901b96565b392e8d434a4c4ab543d5fb52b master date: 2015-04-24 12:14:23 +0200 commit 8dbdcc391001e50fad177400c85f11a2739b9e25 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Tue May 19 11:44:59 2015 +0200 x86/hvm: actually release ioreq server pages hvm_free_ioreq_gmfn has the sense of the ioreq_gmfn mask inverted; it needs to set a bit to release the gmfn, not clear it. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: cb791b84e7c0adce14194647912c4c3d28cddc4a master date: 2015-04-24 12:13:48 +0200 commit d0725109f73c1a400e39862c7eceac72b407b1b5 Author: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> Date: Tue May 19 11:43:35 2015 +0200 x86/efi: reserve SMBIOS table region when EFI booting Some EFI firmware implementations may place the SMBIOS table in RAM marked as BootServicesData, which Xen does not consider as reserved. When dom0 tries to access the SMBIOS, the region is not contained in the initial P2M and it crashes with a page fault. To fix this, reserve the SMBIOS region. Also, fix the memcmp checks for existence of the SMBIOS. Signed-off-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: bf68adcadaa2b0885c5d2f1c8e2e068e209eb041 master date: 2015-04-17 10:44:48 +0200 (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |