[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 58502: regressions - trouble: broken/fail/pass



flight 58502 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/58502/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-qemuu-ovmf-amd64  3 host-install(3)  broken REGR. vs. 58392
 test-amd64-amd64-xl-xsm       6 xen-boot                  fail REGR. vs. 58392
 test-amd64-i386-xl-xsm        6 xen-boot                  fail REGR. vs. 58392
 test-amd64-i386-qemut-rhel6hvm-amd  6 xen-boot            fail REGR. vs. 58392
 test-amd64-i386-qemuu-rhel6hvm-intel  6 xen-boot          fail REGR. vs. 58392
 test-amd64-amd64-xl-qemut-debianhvm-amd64  6 xen-boot     fail REGR. vs. 58392
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm  6 xen-boot fail REGR. vs. 58392
 test-amd64-amd64-pair        10 xen-boot/dst_host         fail REGR. vs. 58392
 test-amd64-amd64-pair         9 xen-boot/src_host         fail REGR. vs. 58392
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm  6 xen-boot  fail REGR. vs. 58392
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  6 xen-boot     fail REGR. vs. 58392
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm  6 xen-boot  fail REGR. vs. 58392
 test-amd64-i386-freebsd10-amd64  6 xen-boot               fail REGR. vs. 58392
 test-amd64-amd64-xl-qemut-win7-amd64  6 xen-boot          fail REGR. vs. 58392
 test-amd64-amd64-xl-qemuu-ovmf-amd64  6 xen-boot          fail REGR. vs. 58392
 test-amd64-i386-xl-qemuu-winxpsp3  6 xen-boot             fail REGR. vs. 58392
 test-amd64-amd64-xl-qemuu-winxpsp3  6 xen-boot            fail REGR. vs. 58392
 test-amd64-i386-xl-qemut-winxpsp3  6 xen-boot             fail REGR. vs. 58392
 test-amd64-amd64-xl-qemut-winxpsp3  6 xen-boot            fail REGR. vs. 58392

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-libvirt-xsm   6 xen-boot                  fail REGR. vs. 58392
 test-amd64-i386-libvirt       6 xen-boot                  fail REGR. vs. 58392
 test-amd64-amd64-libvirt-xsm  6 xen-boot                  fail REGR. vs. 58392
 test-amd64-amd64-libvirt      6 xen-boot                  fail REGR. vs. 58392
 test-amd64-amd64-xl-sedf-pin  6 xen-boot                  fail REGR. vs. 58392
 test-amd64-amd64-xl-sedf      6 xen-boot                  fail REGR. vs. 58392
 test-armhf-armhf-libvirt-xsm 11 guest-start               fail REGR. vs. 58392
 test-armhf-armhf-libvirt     11 guest-start              fail blocked in 58392
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail like 58392

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-xsm      12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-check        fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop              fail never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-sedf-pin 12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-sedf     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop             fail never pass

version targeted for testing:
 xen                  ad7ea0dbb251176cb8beea1b46e14c9f039d95e5
baseline version:
 xen                  12e817e281034f5881f46e0e4f1d127820101a78

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Dario Faggioli <dario.faggioli@xxxxxxxxxx>
  Don Dugger <donald.d.dugger@xxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Juergen Gross <jgross@xxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64-xsm                                              pass
 build-armhf-xsm                                              pass
 build-i386-xsm                                               pass
 build-amd64                                                  pass
 build-armhf                                                  pass
 build-i386                                                   pass
 build-amd64-libvirt                                          pass
 build-armhf-libvirt                                          pass
 build-i386-libvirt                                           pass
 build-amd64-oldkern                                          pass
 build-i386-oldkern                                           pass
 build-amd64-pvops                                            pass
 build-armhf-pvops                                            pass
 build-i386-pvops                                             pass
 build-amd64-rumpuserxen                                      pass
 build-i386-rumpuserxen                                       pass
 test-amd64-amd64-xl                                          pass
 test-armhf-armhf-xl                                          pass
 test-amd64-i386-xl                                           pass
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                pass
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 fail
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                fail
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 fail
 test-amd64-amd64-libvirt-xsm                                 fail
 test-armhf-armhf-libvirt-xsm                                 fail
 test-amd64-i386-libvirt-xsm                                  fail
 test-amd64-amd64-xl-xsm                                      fail
 test-armhf-armhf-xl-xsm                                      pass
 test-amd64-i386-xl-xsm                                       fail
 test-amd64-amd64-xl-pvh-amd                                  fail
 test-amd64-i386-qemut-rhel6hvm-amd                           fail
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    fail
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    fail
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass
 test-amd64-i386-freebsd10-amd64                              fail
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         fail
 test-amd64-i386-xl-qemuu-ovmf-amd64                          broken
 test-amd64-amd64-rumpuserxen-amd64                           pass
 test-amd64-amd64-xl-qemut-win7-amd64                         fail
 test-amd64-i386-xl-qemut-win7-amd64                          fail
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail
 test-amd64-i386-xl-qemuu-win7-amd64                          fail
 test-armhf-armhf-xl-arndale                                  pass
 test-amd64-amd64-xl-credit2                                  pass
 test-armhf-armhf-xl-credit2                                  pass
 test-armhf-armhf-xl-cubietruck                               pass
 test-amd64-i386-freebsd10-i386                               pass
 test-amd64-i386-rumpuserxen-i386                             pass
 test-amd64-amd64-xl-pvh-intel                                fail
 test-amd64-i386-qemut-rhel6hvm-intel                         pass
 test-amd64-i386-qemuu-rhel6hvm-intel                         fail
 test-amd64-amd64-libvirt                                     fail
 test-armhf-armhf-libvirt                                     fail
 test-amd64-i386-libvirt                                      fail
 test-amd64-amd64-xl-multivcpu                                pass
 test-armhf-armhf-xl-multivcpu                                pass
 test-amd64-amd64-pair                                        fail
 test-amd64-i386-pair                                         pass
 test-amd64-amd64-xl-sedf-pin                                 fail
 test-armhf-armhf-xl-sedf-pin                                 pass
 test-amd64-amd64-xl-sedf                                     fail
 test-armhf-armhf-xl-sedf                                     pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass
 test-amd64-amd64-xl-qemut-winxpsp3                           fail
 test-amd64-i386-xl-qemut-winxpsp3                            fail
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail
 test-amd64-i386-xl-qemuu-winxpsp3                            fail


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-step test-amd64-i386-xl-qemuu-ovmf-amd64 host-install(3)

Not pushing.

------------------------------------------------------------
commit ad7ea0dbb251176cb8beea1b46e14c9f039d95e5
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Jun 11 17:56:15 2015 +0100

    libxl: libxl_internal.h: Clarify ao rule against internal callers

    Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    CC: Ian Campbell <ian.campbell@xxxxxxxxxx>
    CC: Wei Liu <wei.liu2@xxxxxxxxxx>
    CC: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Juergen Gross <jgross@xxxxxxxx>

commit c5089fae0f6f71443356530ecec4781788c7377a
Author: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
Date:   Fri Jun 12 12:07:05 2015 +0200

    x86: avoid tripping watchdog when constructing dom0

    Constructing dom0 may take a few seconds, particularly if the slow VESA
    graphics terminal is used. Process pending softirqs a few times to avoid
    tripping a watchdog with a short timeout.

    Signed-off-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>

    Move inclusion of xen/softirq.h (and at once clean up other includes).

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 98c51d0c7eb188745f564813443adcb5fd5db00b
Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
Date:   Fri Jun 12 12:06:24 2015 +0200

    cpupool: fix shutdown with cpupools with different schedulers

    trying to shutdown the host when a cpupool exists, has
    pCPUs, and has a scheduler different than the Xen's default
    one, produces this:

     root@Zhaman:~# xl cpupool-cpu-remove Pool-0 8
     root@Zhaman:~# xl cpupool-create name=\"Pool-1\" sched=\"credit2\"
     Using config file "command line"
     cpupool name:   Pool-1
     scheduler:      credit2
     number of cpus: 0
     root@Zhaman:~# xl cpupool-cpu-add Pool-1 8
     root@Zhaman:~# shutdown -h now

     (XEN) ----[ Xen-4.6-unstable  x86_64  debug=y  Not tainted ]----
     (XEN) CPU:    0
     (XEN) RIP:    e008:[<ffff82d080133bdf>] kill_timer+0x56/0x298
     (XEN) RFLAGS: 0000000000010002   CONTEXT: hypervisor
      ... ... ...
     (XEN) Xen call trace:
     (XEN)    [<ffff82d080133bdf>] kill_timer+0x56/0x298
     (XEN)    [<ffff82d08012233f>] csched_free_pdata+0x9b/0xcf
     (XEN)    [<ffff82d08012c30c>] cpu_schedule_callback+0x64/0x8b
     (XEN)    [<ffff82d08011bc7a>] notifier_call_chain+0x67/0x87
     (XEN)    [<ffff82d08010153e>] cpu_down+0xd9/0x12c
     (XEN)    [<ffff82d080101744>] disable_nonboot_cpus+0x93/0x138
     (XEN)    [<ffff82d0801aa6e7>] enter_state_helper+0xbd/0x365
     (XEN)    [<ffff82d0801061e5>] continue_hypercall_tasklet_handler+0x4a/0xb1
     (XEN)    [<ffff82d080132387>] do_tasklet_work+0x78/0xab
     (XEN)    [<ffff82d0801326bd>] do_tasklet+0x5e/0x8a
     (XEN)    [<ffff82d0801646d2>] idle_loop+0x56/0x6b
      ... ... ...
     (XEN) ****************************************
     (XEN) Panic on CPU 0:
     (XEN) FATAL PAGE FAULT
     (XEN) [error_code=0000]
     (XEN) Faulting linear address: 0000000000000041
     (XEN) ****************************************

    The fix is, when tearing down a pCPU, call the free_pdata()
    hook from the scheduler of the cpupool the pCPU belongs to,
    not always the one from the default scheduler.

    Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
    Reviewed-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>

commit 90b18f1666a89e7829912456ee32099c7669cb10
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Fri Jun 12 12:05:54 2015 +0200

    libelf: fix elf_parse_bsdsyms call

    elf_parse_bsdsyms expects the second paramater to be a physical address, not
    a virtual one.

    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>

commit 2cba5cfe8036eedf6654cdda2cabb6084508a81f
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Jun 12 12:04:26 2015 +0200

    x86/context-switch: prefer is_..._domain() over is_..._vcpu()

    Latch both domains alongside both vCPU-s into local variables, making
    use of them where possible also beyond what the title says.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit c6e24bdc1bcd6c7736326ddc24104a597e754103
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Jun 12 12:03:56 2015 +0200

    x86/HVM: prefer is_..._domain() over is_..._vcpu()

    ... when the domain pointer is already available or such operations
    occur frequently in a function.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 67a35cd752741d855b177b4d7b11b5ec80707e00
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Jun 12 12:03:13 2015 +0200

    x86: prefer is_..._domain() over is_..._vcpu()

    ... when the domain pointer is already available or such operations
    occur frequently in a function.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit ee78176f98f60ad6de32faabba46d863b75ceb28
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Jun 12 12:02:12 2015 +0200

    domctl: prefer is_..._domain() over is_..._vcpu()

    ... when the domain pointer is already available.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 4c94684bb7c20ff01d03fb1f22c03cc0c2fc417b
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jun 11 14:47:54 2015 +0200

    EFI: map allocation size must be set to zero

    Commit 8a753b3f1c ("efi: fix allocation problems if ExitBootServices()
    fails") replaced the use of a static (and hence zero-initialized)
    variable by an automatic (and hence uninitialized) one.

    Also drop the variable introduced by that commit in favor of re-using
    another available and suitable one.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 1f0721377952fc038b48f175d7061ec701359aac
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Thu Jun 11 14:44:47 2015 +0200

    x86/traps: loop in the correct direction in compat_iret()

    This is CVE-2015-4164 / XSA-136.

    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 5d5c09d853d3f212861f70c577c65d1703f752ae
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jun 11 14:44:12 2015 +0200

    gnttab: add missing version check to GNTTABOP_swap_grant_ref handling

    ... avoiding NULL derefs when the version to use wasn't set yet (via
    GNTTABOP_setup_table or GNTTABOP_set_version).

    This is CVE-2015-4163 / XSA-134.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 44a84eac301fba0f5f4f430d8f81929ee22b1187
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jun 11 11:58:29 2015 +0200

    EFI/ARM: don't treat EfiBootServices{Code,Data} as normal RAM under /mapbs

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit cdc6204b7749a53e6a4d95fac4440601c35a539d
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jun 11 11:55:05 2015 +0200

    VT-d: extend quirks to newer desktop chipsets

    We're being told that while on the server side the issue we're trying
    to work around is fixed starting with IvyBridge (another round of
    double checking is going on before we're going to remove the one
    IvyBridge ID that we're currently applying the workaround for), on the
    desktop side even Skylake still requires the workaround. Hence we need
    to add a whole bunch of desktop IDs.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Don Dugger <donald.d.dugger@xxxxxxxxx>

commit ae05fd3912b153e18efa3018d9f7cf9105ea5b43
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jun 11 11:54:10 2015 +0200

    VT-d: use qword MMIO access for MSI address writes

    Also make dmar_{read,write}q() actually do what their names suggest (we
    don't need to be concerned of 32-bit restrictions anymore).

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>

commit 73cb5d43a8f48930e4594ef7b15b974487651ffe
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jun 11 11:53:20 2015 +0200

    x86/MSI-X: use qword MMIO access for address writes

    Now that we support it for our guests, let's do so ourselves too.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 284ffb4f9b0d5c3a33c4c5bd87645d0cc342ca96
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jun 11 11:52:18 2015 +0200

    x86/vMSI-X: support qword MMIO access

    The specification explicitly provides for this, so we should have
    supported this from the beginning.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.